102
Figure 9
.
Golden
Eye main window
Golden Eye was installed on the students’ computers to record their lookups
in the CD condition, and to take notes of the exact time each student needed to finish
the reading tasks in both conditions
.
The information recorded by the MS was
electronically saved in secure log files concealed in the students’ computers for later
retrieval and
analysis
.
See Figure 10 for
MS features used in the study
.
103
Figure 10
.
Time and lookups recording features
in monitoring software
As shown in Figure 10, enabling the
Window Title Monitoring feature will
start monitoring and recording all applications’ windows title on the computer to see
what files have been opened and closed, all marked with a timestamp
.
Therefore, the
reading time spent by the subjects was calculated through subtracting the file-opening
time (Starting Time) from the file-closing time (End Time)
.
See Figure 11 on next
page for a sample window
title monitoring log
.
104
Figure 11
.
Sample window title monitoring Log
Microsoft Excel - Test-1 (8), 04/27/2011
12:34:40
Starting Time.
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 12:57:06
Microsoft Excel - Test-1 (8), 04/27/2011 13:00:02
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:00:32
Microsoft Excel - Test-1 (8), 04/27/2011 13:00:47
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:08:39
Microsoft Excel - Test-1 (8), 04/27/2011 13:10:25
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:10:35
Microsoft Excel - Test-1 (8), 04/27/2011 13:12:08
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:12:29
Look Up | CALD3, 04/27/2011 13:13:45
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:13:51
Pictures | CALD3, 04/27/2011 13:16:26
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:16:51
Pictures | CALD3, 04/27/2011 13:17:59
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:18:02
Microsoft Excel - Test-1 (8), 04/27/2011 13:18:07
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:19:41
Smart
thesaurus, 04/27/2011 13:20:05
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:20:09
Smart thesaurus, 04/27/2011 13:20:58
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:21:03
Look Up | CALD3, 04/27/2011 13:21:05
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:21:27
Microsoft Excel - Test-1 (8), 04/27/2011 13:21:40
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:22:25
Pictures | CALD3, 04/27/2011 13:22:38
Cambridge Advanced Learner's Dictionary - 3rd Edition, 04/27/2011 13:22:43
Microsoft Excel - Test-1 (8), 04/27/2011
13:23:42
End Time.
105
Similarly, enabling the
Keyboard Monitoring feature will start the keystroke
spy to monitor and log all keystrokes and everything typed
during monitoring sessions
(Figure 12)
.
Figure 12
.
Sample keyboard
strokes log file
Bergenholtz & Johnsen (2005, p. 117) explain:
Tile, 04/27/2011, 11:13:36
Drums, 04/27/2011, 11:19:25
Dwarf, 04/27/2011, 11:23:25
Shortage, 04/27/2011, 11:25:50
Laborious, 04/27/2011, 11:28:07
Sharp, 04/27/2011, 11:36:38
Surge, 04/27/2011, 11:39:44
Wheat, 04/27/2011, 11:48:07
Boundaries, 04/27/2011, 12:03:57
Analyses of log files reveal exactly which lemmas and which types of
information have been requested, and, perhaps more significantly, which
lemmas and which type of information have been requested but were not
found in the dictionary. Furthermore, log files allow lexicographers to
see the types of information which have not, or not yet, been searched
for. All in all, log files may thus be used as a tool for improving internet
dictionaries – and perhaps also printed dictionaries – quite considerably.