Upload
vuonghuong
View
223
Download
0
Embed Size (px)
Citation preview
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
12
WEB USAGE MINING CONTEXTUAL FACTOR: HUMAN
INFORMATION BEHAVIOR
Ms. Ravita Mishra
Information Technology Dept, Ramrao Adik Institute of Technology, Nerul Navi Mumbai,
India
ABSTRACT
With the rapid development of information technology, the World Wide Web has
been widely used in various applications, such as search engines, online learning and
electronic commerce. These applications are used by a diverse population of users with
heterogeneous backgrounds, in terms of their knowledge, skills, and needs. Therefore, human
factors are key issues for the development of web-based application and research. This paper
first identifies reviews from different authorsand then examines the three important human
factors: gender differences, prior knowledge, and cognitive styles. The review result is not
significantly correct; a new model is proposed that will access the data (log data) and show
the human access behavior. The proposed model has two stages: web intelligence and
navigation pattern. Stage 1(web intelligence system) captures data from different server and
converts in the form of table (data store). Stage 2 uses the N-gram algorithm which assumes
that the last N-pages browsed affect the probability of the next page to be visited, and user
navigation sessions are modelled as a hypertext probabilistic grammar whose higher
probability strings correspond to the user’s preferred trails.In this paper web caching and pre-
fetching are two important approaches used to reduce the noticeable response time perceived
by users.The model improves the navigation pattern of users and find the users behavior (
gender difference and user type) that finding is used by site designer and researchers and also
used for detecting and avoiding the terror threats caused by terrorists all over the world.The
paper is organized into five different parts, first part contain introduction, second part contain
different type of web mining third part contain usage mining on the web and forth part
contain analysis of human factor and evaluation technique,fifth part contain propose
methodology and last part contains application, limitation, conclusion and further work.
Keywords: Pattern Discovery, Contextual factor, Information Retrieval, N-gram,
Gender difference, Cognitive style and Prior experience.
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & MANAGEMENT INFORMATION SYSTEM (IJITMIS)
ISSN 0976 – 6405(Print) ISSN 0976 – 6413(Online)
Volume 5, Issue 1, January - April (2014), pp. 12-29 © IAEME: http://www.iaeme.com/IJITMIS.asp Journal Impact Factor (2013): 5.2372 (Calculated by GISI) www.jifactor.com
IJITMIS
© I A E M E
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
13
1.INTRODUCTION
Web mining is a very hot research topic which combines two of the activated research
areas: Data Mining and World Wide Web. The Web mining research relates to several
research communities such as Database, Information Retrieval and Artificial Intelligence.
Web mining is categorized in into three areas: Web content mining, Web structure mining
and Web usage mining. Web content mining focuses on the discovery/retrieval of the useful
information from the web contents/data/documents, while the Web structure mining
emphasizes to the discovery of how to model the underlying link structures of the web [14,
16]. Web usage mining is relative independent, but not isolated, category, which mainly
describes the techniques that discover the user's usage pattern and try to predict the user's
behaviors. Web mining is the term of applying data mining techniques to automatically
discover and extract useful information from the World Wide Web documents and services
[16]. Here, human factors are increasingly seen as important issues, as reflected in the
substantial number of existing studies in the area. Among various human factors, gender
differences (e.g., Roy, Taylor, & Chi, 2003), prior knowledge (e.g., Calisir&Gurel, 2003) and
cognitive styles (e.g., Chen &Macredie, 2004) have significant impacts on web-based
interaction. Furthermore, these three human factors have certain inter-relations. For example,
females tend to behave similarly to novices, in terms of the extent to which they experience
disorientation problems; males and experts seem to have similar preferences in their
interaction patterns, with studies reporting that they enjoy non-linear interaction (Ford &
Chen, 2000). Despite the growing number of studies looking at these three human factors,
there is a lack of an integrated review which synthesizes their effects.
2. WEB DATA MINING 2.1 Overview: Today, with the tremendous growth of the data sources available on the Web
and the dramatic popularity of e-commerce in the business community, Web mining has
become the focus of quite a few research projects and papers [13, 14, and 15]. In previous
research, they suggested a similar way to decompose web mining into the following subtasks:
Resource Discovery: The task of retrieving the intended information from web.
Information Extraction: Automatically selecting and pre-processing specific information
from the retrieved web resources. Generalization: Automatically discovers general patters at
the both individual web sites and across multiple sites. Analysis: Analyzing the mined
pattern. The authors of [10] claims the web involves three types of data: data on the web
(content), web log data (usage) and web structure data. The author classified the data type as
content data, structure data, usage data, and user profile data.
2.1.1 Web Content Mining: Web content mining describes the automatic search of
information resourceavailable online and involves mining web data contents. The web
document usually contains several types of data, such as text, image, audio, video, metadata
and hyperlinks. The technologies that are normally used in web content mining are NLP and
IR. Some of them are semi-structured such as HTML documents or a more structured data
like the data in the tables or database generated HTML pages, butmost of the data is
unstructured text data [14].
2.1.2 Web Structure Mining: Technically, web content mining mainly focuses on the
structure of inner-document, while web structure mining tries to discover the link structure of
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
14
the hyperlinks at the inter-document level. Based on the topology of the hyperlinks, web
structure mining will categorize the web pages and generate the information, such as the
similarity and relationship between different web sites. Web structure mining can also have
another direction – discovering the structure of web document itself. This type of structure
mining can be used to reveal the structure (schema) of web pages; this would be good for
navigation purpose and make it possible to compare/integrate web page schemes. The
structural information generated from the web structure mining includes the following: the
information measuring the frequency of the local links in the web tuples in a web table; the
information measuring the frequency of web tuples in a web table containing links that are
interior and the links that are within the same document; the information measuring the
frequency of web tuples in a web table that contains links that are global and the links that
span different web sites; the information measuring the frequency of identical web tuples that
appear in a web table or among the web tables [15,20]. In general, if a web page is linked to
another web page directly, or the web pages are neighbors, we would like to discover the
relationships among those web pages. The relations maybe fall in one of the types, such as
they related by synonyms or ontology, they may have similar contents, and both of them may
sit in the same web server therefore created by the same person [13, 14].
2.1.3 Web Usage Mining: Analyzing the web access logs of different web sites can help
understand the user behaviour and the web structure, thereby improving the design of this
colossal collection of resources. There are two main tendencies in web usage mining driven
by the applications of the discoveries: General Access Pattern Tracking and Customized
Usage Tracking. The general access pattern tracking analyzes the web logs to understand
access patterns and trends. These analyses can be used for better structure and grouping of
resource providers. Applying data mining techniques on access logs unveils interesting access
patterns that can be used to restructure sites in a more efficient grouping, pinpoint effective
advertising locations, and target specific users for specific Selling ads. Customized usage
tracking analyzes individual trends. Its purpose is to customize web sites to users. The
information displayed the depth of the site structure and the format of the resources can all be
dynamically customized for each user over time based on their access patterns.
2.2. STEPS IN WEB MINING Web usage mining falls in three areas 1: Pre-processing 2: Pattern discovery 3:
Pattern analysis. Preprocessing further categorized into three parts.
2.2.1 Pre-processing: Pre-processing is categorized in three types they are: Content Pre-
processing, Structure Pre-processing and Usage Pre-processing. Content preprocessing is the
process of converting text, image, scripts and other files into the forms that can be used by
the usage mining. For the content of static page views, the preprocessing can be easily done
by parsing the HTML and reformatting the information or running additional algorithm as
desired [15].The structure preprocessing can be treated similar as the content preprocessing.
However, each server session may have to construct a different site structure than others [13,
15].The inputs of the preprocessing phase may include the Web server logs, referral logs,
registration files, index server logs, and optionally usage statistics from a previous analysis.
The outputs are the user session file, transaction file, site topology, and page classifications.
It’s always necessary to adopt a data cleaning techniques to eliminate the impact of the
irrelevant items to the analysis result. Without sufficient data, it is very difficult to identify
the users [14].The session identification is also a part of the usage preprocessing. The goal of
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
15
it is to divide the page accesses of each user, who is likely to visit the Web site more than
once, into individual sessions. The simplest way to do is to use a timeout to break a user’s
click-stream into session. Another problem is named as path completion, which indicates the
determining if there are any important accesses missed in the access log. The methods used
for the user identification can be used for path completion. The final procedure of the pre-
processing is formatting, which is a preparation module to properly format the sessions or
transactions.
2.2.2 Pattern Discovery
Pattern discovery converges the algorithms and techniques from several research
areas, such as data mining, machine learning, statistics, and pattern recognition. Pattern
discovery falls in following categories: Statistical Analysis, Association Rules, Clustering,
Classification, Sequential Pattern and Dependency Modeling. Statistical techniques are the
most powerful tools in extracting knowledge about visitors to a Web site. The analysts may
perform different kinds of descriptive statistical analyses based on different variables when
analyzing the session file [13]. By analyzing the statistical information contained in the
periodic web system report, the extracted report can be potentially useful for improving the
system performance, enhancing the security of the system.Association rule mining techniques
can be used to discover unordered correlation between items found in a database of
transactions [13]. The association rules refer to sets of pages that are accessed together with a
support value exceeding some specified threshold. The web designers can restructure their
web sites efficiently with the help of the presence or absence of the association rules.
Clustering analysis is a technique to group together users or data items with the similar
characteristics. Clustering of user information or pages can facilitate the development and
execution of future marketing strategies [13]. Clustering of users will help to discover the
group of users, who have similar navigation pattern. It’s very useful for inferring user
demographics to perform market segmentation in E-commerce applications or provide
personalized web content to the individual users. Classification is supervised inductive
learning technique that maps a data item into one of several predefined classes. In the web
domain, Web master or marketer will have to use this technique if he/she want to establish a
profile of users belonging to a particular class or category. This requires extraction and
selection of features that best describe the properties of a given class or category [13].
Sequential Patternfinds the inter-session pattern, such that a set of the items follows the
presence of another’s in a time-ordered set of sessions.It also includes other types of temporal
analysis such as trend analysis, change point detection, or similarity analysis. It’s very useful
for the web marketer to predict the future trend, which help to place advertisements aimed at
certain user groups [13]. Dependency Modelingrepresents significant dependencies among
the various variables in the web domain [13]. The modeling technique provides a theoretical
framework for analyzing the behavior of users, and is potentially useful for predicting future
web resource consumption.
2.3 PATTERN ANALYSIS The goal of this process is to eliminate the irrelative rules or patterns and to extract
the interesting rules or patterns from the output of the pattern discovery process. Output of
algorithms is not in the form suitable for direct human consumption, and thus need to be
transform to a format can be assimilate easily [13]. There are two most common approaches
for the pattern analysis. One is to use the knowledge query mechanism such as SQL, while
another is to construct multi-dimensional data cube before perform OLAP operations.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online)
3. ANALYSIS OFCONTEXTUAL FACTOR
In the given framework
analysed and it includes: information exploration, seeking, filtering, use
Based on the framework, various contextual
credibility and browser dependence
economic, social, and political -
model, the user dimension is considered to be influenced by the particular task, information
need, knowledge state, cognitive style, affective state and so on. They measured users’
cognitive styles and affective states before a user study, applying a process
while users were conducting information
relationships among the elements of the dimensions
users judge cognitive authority and information quality by two types of judgment
judgment and evaluative judgment
the judgments through a user study.
Review process:Due to the massive growth of the
topic and attracts more and more attenti
extract information from data set for business needs, which determines its application is
highly customer-related. In business r
research area which demonstrates completes human information behavior based on
experimental dataset. Analysis of this factor is based on four points. 1. Gender difference 2.
Cognitive style 3. Prior experience
few commercial analysis applications available
efficient, flexible and powerful tools, lots of work needs to be done for
developer.
Figure 4.1 illustrates the review process, which consists of four stages
As shown in above Fig.
journals and search engines; here
include empirical studies related to gender differences, prior knowledge and cognitive styles.
The search terms for these electronic resources included four group
International Journal of Information Technology & Management Information System (IJITMIS),
6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
16
ANALYSIS OFCONTEXTUAL FACTOR (HUMAN INFORMATION BEHAVIOR)
In the given framework, contextual parameter human information behaviour
information exploration, seeking, filtering, use and communication
e framework, various contextual factors –user interest, difficulty, time taken,
credibility and browser dependence and their influential factor physical, cognitive, affective,
- and their implications were investigated [12]. In
, the user dimension is considered to be influenced by the particular task, information
need, knowledge state, cognitive style, affective state and so on. They measured users’
states before a user study, applying a process-tracing technique
while users were conducting information-seeking tasks, and found various types of
relationships among the elements of the dimensions. In (Rieh 2002), the authors found that
ive authority and information quality by two types of judgment
judgment and evaluative judgment – and they also identified the main facets and keywords of
the judgments through a user study.
Due to the massive growth of the e-commerce, privacy becomes a sensitive
topic and attracts more and more attention recently. The basic goal of web mining is to
extract information from data set for business needs, which determines its application is
related. In business related customer data, Human factor is
which demonstrates completes human information behavior based on
experimental dataset. Analysis of this factor is based on four points. 1. Gender difference 2.
enceand 4. Web based interaction. Although there are quite a
few commercial analysis applications available and many more are free on to develop the
efficient, flexible and powerful tools, lots of work needs to be done for both researcher
4.1 illustrates the review process, which consists of four stages
Fig.there is four major stages. Stage one search
here resources were selected because they were known to
empirical studies related to gender differences, prior knowledge and cognitive styles.
The search terms for these electronic resources included four groups: (1) Internet and
International Journal of Information Technology & Management Information System (IJITMIS),
(2014), © IAEME
BEHAVIOR)
information behaviour is
and communication.
user interest, difficulty, time taken,
physical, cognitive, affective,
cations were investigated [12]. In previous
, the user dimension is considered to be influenced by the particular task, information
need, knowledge state, cognitive style, affective state and so on. They measured users’
tracing technique
seeking tasks, and found various types of
In (Rieh 2002), the authors found that
ive authority and information quality by two types of judgment - predictive
and they also identified the main facets and keywords of
commerce, privacy becomes a sensitive
eb mining is to
extract information from data set for business needs, which determines its application is
Human factor is a fertilized
which demonstrates completes human information behavior based on
experimental dataset. Analysis of this factor is based on four points. 1. Gender difference 2.
Although there are quite a
o develop the
both researcher and
4.1 illustrates the review process, which consists of four stages
searches electronic
resources were selected because they were known to
empirical studies related to gender differences, prior knowledge and cognitive styles.
s: (1) Internet and WWW;
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
17
(2) Gender, females/males; boys/girls, and men/women; (3) Prior knowledge, system
experience, novices/experts, domain expertise, domain knowledge, computer experience,
previous experience, Internet experience; and (4) Cognitive styles, learning styles, field
dependence.Stage two analyzes search based on timeline. Stage three selects the analysis
based on titles, elements and keywords. Stage four asses the behavior based on credibility.
3.1GENDER DIFFERENCES Gender difference is important variable that influences computing skills and find the
human information behavior and their emotions. As the web has become a popular platform
for various applications, such as search engines, online learning and electronic commerce, a
growing body of studies has been conducted to examine gender differences in the use of the
web, this literature suggests that major differences between males and females lie within
navigation patterns, attitudes and perceptions [8, 9].In the previous research number of
theoretical survey will be taken and the literature has suggested that males report lower levels
of computer anxiety than their female counterparts; in addition, it also seems that males
achieve much better outcomes than females in the use of computers (Karavidas, Lim,
&Katsikas, 2004). Gender difference will be analyzed by Navigation Pattern andAttitudes
and Perceptions.
Navigation pattern is defined as the way user access the webpages. Without good
navigation, a site becomes useless to visitors. They can’t find the information they need, and
then seek out competing sites instead. It’s vital that your sites be easy to navigate if you want
to be a successful designer. There are certain navigation patterns that work on virtually all
sites. The first pattern tabbed navigation, second pattern is header navigation and third pattern
is blog, informational and reference site, corporate site etc.Large et al. (2002) examined how
boys and girls behaved differently when retrieving information from the web. 53 students,
comprising 23 boys and 30 girls from two grade-six classes, were the subjects of their study.
Overall, the boys explored more hypertext links per minute, tended to perform more page
jumps per minute, entered more searches in search engines, and gathered and saved
information more often than the girls, while the boys spent less time viewing pages than the
girls [8, 9]. Furthermore, Ford, Miller and Moss (2001) investigated individual differences in
internet searching using a sample of 64 Master’s students with 20 males and 44 females. The
above mentioned studies suggest that females and males show different approaches to
navigation, reflected in the navigation patterns that they exhibit, but that there are
contradictory findings.Table 1 Summarize how male and female student explore the web
pages.
Table 1: Gender Difference
Author/Year Male Female
ET/el/2002(23 boys and 30 girls) Explore more hyperlink Explore less hyperlink
Roy et el /2003(equal no. of boys and girls)
More page Jump Less Page Jump
Lorigo/2006( 23 boys and 30
girls)
Linear Non-Linear
Lio,Huang2008( equal no. of
boys and girls)
Non-linear Linear
Ford,Miller/1996( 24 boys and
44 girls)
More Effective Less Effective
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
18
Attitudes and Perceptions: Perceptioncan determine the attitude it defines how you perceive
the word.Attitude is what the individual thinks about the perception and perception is the
human subjective experience of information provided by the senses. A number of studies
suggest that there are gender differences in attitudes towards web-based interaction and
perceptions. The first survey result state that 630 Anglo-American undergraduates completed
the Student Computer and Internet Survey, the results of which indicated that females
reported more computer anxiety and less computer self-efficacy than males. Schumacher and
Morahan-Martin (2001) conducted a survey to identify gender differences in attitudes
towards computers and the Internet. The survey was completed by 619 students,the results of
which indicated that females reported more computer anxiety and less computer self-efficacy
than males. Similar results were also found in the study by Koohang(2004), which
investigated 154 students of undergraduate management program, and the results indicated
that males had significantly higher positive perceptions than the females toward using the
digital library [5].The studies reviewed so far in this section indicate that females tend to have
more negative attitudes towards the use of the web than males and that they feel less able
when using the web than their male peers.
Table 2: Attitude and Perception
Author/Year Male Female
Jackson,Ervin/2001(630 students) Less computer
anxiety
More Computer
anxiety
Koohnag/2004 (245 students) Positive perception Negative perception
Koohang,Durante/2003(125 students) No significant
difference
---
Hong/2002( 24 students) Asynchronous
learning
Synchronous learning
3.2 PRIOR KNOWLEDGE
User’s prior knowledge includes system experience and domain knowledge and
alsorefers to user’s understanding of the content area (Lazonder, 2000). Prior knowledge or
domain knowledge also depends on web-based instruction, text structure, navigation facility
and internet searching, number of studies suggests that prior knowledge also growing body of
research low prior knowledge users and high prior knowledge users show different levels of
familiarity and have different requirements. The first survey result state that 200 students
participated in the web-based course and the authors found that the participants with more
experience in the use of internet tools used less time to organize their work and visited fewer
pages in each session [5]. The results showed that experts issued longer queries than non-
experts and experts also used many more technical query terms than non-experts [8].Prior
knowledge depends on the following categories:
Web-based instruction, Text structure, Navigation facilities and Internet Searching:
Web-based instruction:Some research has suggested that individuals with different levels of
prior knowledge show preferences for different types of text structure and different kinds of
navigation facilities.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
19
Text structure: Three types of text structure – hierarchical, non-linear, and mixed
(hierarchical structure with cross referential links) has found and a number of studies have
examined how text structure interacts with user’s prior knowledge; the findings suggest that
experts and novices differ in their performance depending on the text structure used in Web-
based instruction. Survey 1, McDonald and Stevenson (1998) examined the effects of text
structure and prior knowledge on navigation performance [8, 9]. The results showed that the
performance of knowledgeable participants was better than that of non-knowledgeable
participants, as they had a better conception of the subject matter than non-knowledgeable
participants. Survey 2,Calisir and Gurel (2003) also investigated the interaction of three types
of text structure – linear, hierarchical and mixed in relation to the prior knowledge of users.
However, in contrast to the study by McDonald and Stevenson (1998), they examined the
influence of text structure and prior knowledge on learning performance, rather than on
navigation performance. Survey 3,Amadieu, Tricot, and MarinéDo (2005) obtained similar
results. Three types of structure were provided: hierarchical; network; and linear. The results
indicated that low prior knowledge learners demonstrated better performance in the
hierarchical structure, whereas the hierarchical structure seemed to obstruct the domain
representation for high prior knowledge learners. The findings suggest that a hierarchical
structure is most appropriate for non-knowledgeable subjects. The summary of text structure
analysis is given below:
Table 3: Text Structure
Author/Year Knowledge participant Non-knowledge
participant
McDonald and steewan(1998)
(Three structure non-linear, hierarchical and mixed)
Better understanding of
subject matter
Less understanding of
subject matter
Calisir and Gurel (2003)
(Three types of text structure – linear, hierarchical and mixed)
Linear and Mixed
Structure
Hierarchical structure
Amadieu, Tricot, and MarinéDo (2005)(Three types
of structure hierarchical, networkand linear.
Non-linear structure
Hierarchical Structure
Mitchell, Chen, and Macredie
(2005) students reacted to Web-based instruction with 74 undergraduate students
Non-linear
Linear
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
20
Navigation facilities: When considering the relationships between learning strategies and
navigation facilities, student’s prior knowledge is an important factor in determining whether
a particular navigation facility is likely to be useful. Most current Web-based instruction
applications provide a range of navigation facilities to allow users to employ multiple
approaches to support their learning. Hierarchical maps and alphabetical indices are most
commonly used in Web-based instruction; each of them provides different functions in
relation to information access. The characteristics of the different navigation facilities may
influence how users develop their learning strategies, making navigation support a critical
issue. Farrell and Moore (2001) investigated with the use of different navigation facilities
(linear, main menu and search engine) influence user’s achievement and attitude [2, 3]. 200
students were placed into three groups based on their knowledge levels (low, middle, and
high) with the results indicating that high-knowledge users commonly tended to use search
engines to locate specific topics. Conversely, low-knowledge users seem to benefit from
hierarchical maps, which can facilitate the integration of individual topics [4].
Internet Searching: The goal of each fact-finding task was to find one specific answer to a
simple question while the broader tasks required the participants to find several documents
that would satisfy the task. The results indicated that no significant differences were noted
between experts and novices regarding the fact-finding, several studies also argue that prior
knowledge plays a substantial role in internet searching, which covers three aspects: search
strategies; search performance; and search perception. Regarding search strategies, Tabatabai
and Luconi(1998) investigated different strategies used by three experts and three novices.
The results showed that experts used more keywords while novices used the ‘Back’ key more
often; used fewer search engines; and missed some highly relevant sites [5].
Table 4: Internet searching
Author/Year Expert Novices
Tabatabi and Luconi/1998
More keywords
Back key
2006
One specific answer
Broader answer
Thatcher/2008
Web experience
Cognitive search
3.3 COGNITIVE STYLES
Cognitive style also plays an essential role in web-based instruction, learning
preference, learning performance and internet searching. Field Dependence is a user’s
perception or comprehension of information is influenced by the surrounding perceptual or
contextual field.
Web-based instruction:Web based instruction isthe relationships between the degree of Field
Dependence and student’s learning performance and learning preferences.
Learning performance: Students Cognitive styles are determined by using cognitive style
analysis (Riding, 1991) and their learning performance are in breadth first and depth first
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
21
versions. Ford and Chen (2000) found that Field Dependent learners in the breadth-first
version performed better than those in the depth-first version. Conversely, Field Independent
students performed better in the depth-first version than those in the breadth-first version [5].
Graff (2003) determine an individual’s cognitive style, and the relationship between cognitive
style and performance in two versions of the system – long-page and short-page versions [4].
The study’s findings indicated that Field Independent students achieved superior scores in the
long-page condition whereas Field Dependent students were superior in the short-page
condition [5]. Learning preferences: Learning preferences are the choices that learners show in certain
types of learning environments and activities such as the selection of certain navigation paths
or facilities. Studies state that field independent and field dependent students show different
learning preferences. Lee, Cheng, Rai, and Depickere (2005) investigated student’s learning
preferences in WebCT. The study’s findings indicate that field dependent students were
accustomed to linear learning whereas field independent students tended to have a preference
for non-linear learning.
Internet searching: In this analysis GEFT was used to identify the participant’s cognitive
styles and participants were asked to find answers from the Web for two search questions.
The results showed that there were a statistically significant correlation between GEFT scores
and the time spent for searching and the URLs visited. The participants with the higher GEFT
scores conducted the longer search sessions, and visited more URLs. In contrast, the
participants with the lower GEFT scores had the shorter search sessions.Kim, Yun, and Kim
(2004) compare search strategies of different cognitive style groups and the results showed
that the Field Dependent group demonstrated significantly more repeated search attempt and,
more use of search operators [4,5].
4. PROPOSED MODEL
4.2 WEB INTELLIGENCE ARCHITECTURE The proposed model solves the problem discussed above and provides easier
technique to find behaviour and increased the reliability of the system. The model is divided
into two parts in first part web intelligent system is used to record the web logs from server or
client using ISP. Second part uses the N-gram technique to combine content and usage
mining. The framework should enable the collection of online data from various Internet
Service Providers (ISPs), optionally analyzing the data in real-time, andtransmitting the
relevant data cleaning purpose. Previous review results had some limitation like:Inconsistent
results:The results reported in existing studies are not fully consistent. There are
contradictory findings as to whether gender differences influence user’s attitudes and
perceptions towards Web-based interaction and whether cognitive styles affect user’s
learning performance. In the future, we are developing a standard template for the
questionnaires so that the accuracy of the results can be improved. Lack of mixed methods
and limited application:The survey suggests that quantitative methods are favoured when
seeking to find the overall effectiveness of the systems. It is clear that quantitative and
qualitative methods have different strengths and weaknesses. However, existing study mixes
quantitative and qualitative methods. Fig.2. Proposed Architecture. As illustrated in Fig. 1,
individual surfers' activities are managed by various ISP’s and are recorded by each ISP. The
data is cleaned and filtered according to requirements. Filtered data is transmitted to relay and
is further propagated to a persistent data store, where it can be further analyzed by Big-Data
analysis tools.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online)
Stage-1
Data sets consisting of web log records for 5063 users are
University website. Web log is unprocessed text file which is recorded from t
Server. E.g. Log file of DePaul University (
De-Paul University (or any other log file) will be used for analysis. The pattern of log file is
shown below:
<Date><Time><C-ip><Cs-Username><S
<Cs-Method><Cs-Uri-Stem><Cs-
Web
Page
Persistent
Data Store
Big Data
Analytics
Pre-
Processing
Relay(Real time
Analysis)
International Journal of Information Technology & Management Information System (IJITMIS),
6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
22
1 Stage-
Fig. 2 Web intelligent System
Data sets consisting of web log records for 5063 users are collected from De Paul
University website. Web log is unprocessed text file which is recorded from t
Log file of DePaul University (www.cdm.maya.depaul.edu).Recorded log file
rsity (or any other log file) will be used for analysis. The pattern of log file is
Username><S-Sitename><S-Computername><S-Ip><S
-Uri-Query><Sc-Status><Time-Taken><Cs-Version>
Web
Page
EOI Parameter
(Behavioraleter)
N-gram
GenerationExtraction
Classification/
Prediction
Contextual F
(Human Behavior)
Classification of
Web PLog
File
International Journal of Information Technology & Management Information System (IJITMIS),
(2014), © IAEME
-2
collected from De Paul
University website. Web log is unprocessed text file which is recorded from the IIS Web
Recorded log file
rsity (or any other log file) will be used for analysis. The pattern of log file is
Ip><S-Port>
Version>
EOI Parameter
ehavioralParameter)
gram Feature
eneration and action
Classification/
Prediction
Contextual Factor
(Human Behavior)
Classification of
Web Pages
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
23
The structure of log file:
Here we are suggesting few parameters that indicate the active involvement of the
subject in an EOI. Where each parameter in itself may have a limited predictive value, the
combination of these parameters may yield an accurate prediction or evidence.
A. Intensity of surfing/accessing
It measures the intensity of the user's Internet surfing activities and measuringthe
browsing intensity value by the number of pages that the user visited in a given time. When a
user shows an increased interest in a given event, we can assume that he will visit related web
pages, more intensively than usual. Consequently, historical data of the user's surfing
intensity should be used when searching for anomalies. We are measuring browser intensity
of users by field CS-Uri-Stem and CS-Version of log file.
B. Frequency of revisiting/refreshing a given page
It measures the number of revisit/refresh operations performed by the user on each
page. Through this information the system may locate stressful behavior, where the user
strives for immediate updates regarding his topic of interest. He may repeatedly and
frequently revisit the same page, or simply push the 'refresh' button on the browser.
Significant peaks in this parameter may be observed at real-time and it is calculated by the
CS-Uri-Stem and Time-Taken field of log file.
C. Irregular/Unusual hours of activity It measures irregular surfing hours and irregular lengths of surfing sessions.
Examination of a user's historical data may reveal a regular pattern, concerning his surfing
hours. This parameter requires analyzing the user's historical data to learn the regular surfing
hours and session-lengths. The irregular hours are calculated by Time-Taken filed of log file
and deviations from such patterns can be found by anomaly detection methods.
D. Interaction level (Passive (high)/Active (low)) It measures the level of the user's interaction, ranging from 'low' (passive only), to
'high' (mostly active). In passive surfing the user suffices with reading pages, whereas in
active surfing he may chat, write email, commit responses or talkbacks, do Internet shopping,
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
24
and so on and it is calculated by S-code and Cs-Method filed of log file. Regarding our
'terrorist' scenario, we hypothesize that, as the deadline comes closer, the subject will lower
his or her active profile, and will focus on passive consumption of relevant information.
E. Diversity of interest topics/content topics
It measures user's range of interest topics, surfers are often attracted to diverse topics
such as news, sports, music, gaming or finances. When the subject is focused on an urgent
issue, we assume that it will affect his or her surfing pattern, restricting the range of visited
sites to a specific topic. The diversity measure can be learned from user’shistorical data,
using clustering methods and it is calculated by S-Sitename, CS-Uri-Stem and Cs-Uri-Query
field of log file. Significant deviations show up as anomalies or outliers.
F. Classification of webpage Web pages are index pages and content pages. An index page is a page used by the user
for navigation of the web site. It normally contains little information except links. A content
page is a page containing information the user would be interested in and its content offers
something other than links.
Algorithm step
• Two threshold count threshold and link threshold
• Set χ =1/(mean reference length of all pages)
• t= -ln(1-Ỵ)/χ
• For each page p
• If P’s file type is not HTML orP’s end of session count > count _threshold
• Mark P as a content page else
• P’s number of links > link _threshold
• Mark p as an index page else
• If P’s reference length < t
• Mark P as an index page else mark P as a content page
Correlation with EOI timing We assume that our five behavioral parameters are correlated with the timing of the
EOI. When the timing of the EOI is known to the investigator, as in forensic investigations,
such correlations can provide supportive evidence in a rather straightforward manner.
However, when the timing of the EOI is unknown to the investigator, as in pre-emptive
investigations, the behavioural parameters can still be used for prediction.
4.2 IMPROVED NAVIGATION PATTERN Here we are using the N gram model which assumes that the last N pages browsed
affect the probability of the next page to be visited. The model is based on the theory of
probabilistic grammars providing it with a sound theoretical foundation for future
enhancements. We propose a new model for handling the problem of mining log data which
directly captures the semantics of the user navigation sessions. We model the user navigation
records, inferred from log data, as a hypertext probabilistic grammar whose higher
probability generated strings correspond to the user’s preferred trails. There are two contexts
in which such model is potentially useful. On the one hand, it can help the service provider to
understand the user’s needs and as a result improve the quality of its service. The quality of
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
25
service can be improved by providing adaptive pages suited to the individual user, by
building dynamic pages in advance to reduce waiting time. On the other hand, such a model
can be useful to the individual web user by acting as a personal assistant integrated with
his/her web browser. Model has the advantage of being compact, self-contained, coherent,
and based on the well-established work probabilistic grammars. In fact the size of the model
depends only on the size of the web site being analysed and the amount of data collected.
Extensive experiments with both real and random data were conducted and the results show
that, in practice, the algorithm runs in linear time in the size of the grammar. Our model has
potential use both in helping the web site designer to understand the preferences of the
sitevisitor’s, and in helping individual users. To better understand their own navigation
patterns and increase their knowledge of the web’s content.Our approach has the following
characteristics: 1) Extracting search-focused information from web pages. 2) Taking key n-
grams as the representations of search-focused information. 3) Employing data mining for
extraction model using search log data. 4) Employing learning to search-focused key n-grams
as features.
4.2.1 KEY N-GRAMEXTRACTION
Extraction step requires data pre-processing, training data generation and N-gram
feature generation and N-gram extraction with task classification.
Pre-processing: We assume that the objects to be searched and ranked by the search engine
are web pages. During pre-processing, a web page in HTML format is parsed and represented
as a sequence of tags/words.
Algorithm step
• Read records in Logtable, For each record in Logtable
• Read fields (Sc_code, Sc_method)
• If Sc_code = ‘**’and Sc_ method = ‘**’ Then
• Get IP address and URL_link
• If suffix.URL_Link= {*.gif,*.jpg,*.css} Then
• Delete suffix.URL_link
• Save IP_sddress and URL_Link
• End if Else , Read next record End
Training Data Generation: We can consider automatically extracting queries from the page.
Head pages generally include a number of associated queries in the search log data. Such data
can naturally be used as training data for the automatic extraction of queries, particularly for
tail pages. We treat the n-grams in each of the document’s queries as its labelled key n-grams.
For example, when a document is “ABDC” associated with the query “ABC”, we consider
unigrams “A”, “B”, “C”, and bigrams “AB” are key n-grams with the assumption that they
should be ranked higher than unigram “D”, and bigrams “BD”and “DC”, by the extraction
model.
N-gram Features Generation: Web pages contain rich formatting information compared to
plain text. We utilize both textual and formatting information to create features in the
extraction model in order to accurately extract key n-grams. Feature generation based on two
parameter1. Frequency features 2. Appearance features.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
26
1. Frequency Features The original/normalized term frequencies of an n-gram within several fields, tags and
attributes are utilized.
• Frequency in Fields: Frequency in fields is: URL, page title, meta- keyword and
meta-description.
• Frequency within Structure Tags: The frequencies of n-gram in texts within a header,
table or list indicated by HTML tags including <h1>, . . . ,<h6>, <table>, <li> and
<dd>.
• Frequency within Highlight Tags: Texts highlighted or emphasized by HTML tags
including <a>, <b>, <i>, <em> and <strong>.
• Frequency within Attributes of Tags: These are hidden texts which are not visible to
users. Specifically, title, alt, href and src tag attributes are used.
• Frequencies in other Contexts: It includes: page headers, page meta-data, page body
and HTML file.
2. Appearance Features The appearances of n-grams are also important for position, coverage and distribution
.indicators of their importance.Position indicates when it first appears in the title, paragraph
and document and Coverage indicate the coverage of an n-gram in the title or a header and
distribution are used to distribute across different parts of a page.
N-Gram Extraction and Task Classification: Features for each n-gram are then extracted, an
extraction model is trained.Key n-gram extraction is formalized as a learning to rank
problem.In learning, a ranking model is trained which rank n-grams and task user’s current
task will be finalized.The main aim task classification algorithm is to find the user’s task and
is classified into two main group’s casual user and careful user, in casual searching the user
wants to find the precise and credible information.
Algorithm step
• Frequently visited URLs as indicators for the task type classification (Cs-Uri-Stem)
field.
• Web task threshold (t=5ms).
• Storing all frequently visited URLs and counting the occurrence of the Frequently
Visited URLs.
• If frequently visited URLs are more than or equals to 5 then setting the user task is
careful user, otherwise the user task is casual user.
• If frequently visited URL have query (Cs-Uri-Query) and that query will be same then
setting the user task is casual otherwise the user task is careful user.
• Total no. of the URL in casual searching was higher than total no. of URL in careful
searching.
5. APPLICATION AND FUTURE TRENDS AND CONCLUSION 5.1 APPLICATION
Web-wide tracking – DoubleClick: ‘Web-wide tracking’, is tracking an individual across all
sites he visits is one of the most intriguing and controversial technologies, it provides an
understanding of an individual’s lifestyle and habits. The value of this technology in
applications such as cyber-threat analysis and homeland defense is quite clear, and it might
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
27
be only a matter of time before these organizations are asked to provide this information.
Understanding Web communities – AOL: Applying web mining to the data collected from
community interactions provides AOL with a very good understanding of its communities,
which it has used for targeted marketing through ads and e-mail solicitations. The idea is to
treat the community as a highly specialized focus group, understand its needs and opinions on
new and existing products; and also test strategies for influencing opinions. Web Catching:
The Web caching aims to improve the performance of web-based systems by storing and
reusing web objects that are likely to be used in the near future. It has proven to be an
effective technique in reducing network traffic, decreasing the access latency and lowering
the server load[18] .Web caching has focused on the use of historic information about web
objects to aid the cache replacement policies. Web Prefetching: Web prefetching is a
technique for reducing web latency based on predicting the next future web objects to be
accessed by the user and prefetching them during times. The prefetching technique has two
main components: The prediction engine and the prefetching engine. The prediction engine
runs a prediction algorithm to predict the next user’s request [18].
5.2 FUTURE DIRECTION Fraud and Threat analysis: The anonymity provided by the Web has led to a significant
increase in attempted fraud, from unauthorized use of individual credit cards to hacking into
credit card databases for blackmail purposes. Yet another example is auction fraud, which has
been increasing on popular sites like eBay. Since all these frauds are being perpetrated
through the Internet, Web mining is the perfect analysis technique for detecting and
preventing them. Web mining and Privacy: While there are many benefits to be gained from
Web mining, a clear drawback is the potential for severe violations of privacy. Public attitude
towards privacy seems to be almost schizophrenic – i.e. people say one thing and do quite the
opposite. The research issue generated by this attitude is the need to develop approaches,
methodologies and tools that can be used to verify and validate that a Web service is indeed
using an end-user’s information in a manner consistent with its stated policies.
5.3 CONCLUSION
This paper will present a state-of-the art review of the current research associated with
these human factors. This review will be important for practitioners who want to develop a
sound understanding of the needs and preferences of users with various characteristics such
as intensity of surfing, interest, gender difference and topic similarity. Our model has
potential use both in helping the web site designer to understand the preferences of the site
visitor’s, and their behaviour and access pattern that will be used to decide the human
information behaviour. The model also analyzes the users’ web surfing patterns and traces the
terrorists and criminals activities. In this paper we are using the N-grams methods to search
log data, and the characteristics of key n-grams can be applied to the other data set. The
extracted key n-grams are used as features of the relevance ranking model for finding users
current task and their access behaviour. This approach also applicable to understand the
navigation patterns and increase their knowledge of the web’s content and it also applicable
in a posterior forensic investigation. The model will also help designers to develop web-based
personalized applications that can accommodate user’s individual differences and used for
detecting and avoiding the terror threats caused by terrorists all over the world.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
28
REFERENCES
[1] Ford, N., Miller, D., & Moss, N, “ Web search strategies and human individual
differences: Cognitive and demographic factors, internet attitudes, and approaches” .
Journal of the American Society for Information Science and Technology, pp. 741–
756. 2005.
[2] Graff, M. (2003). “Learning from web-based instructional Systems and cognitive
style”. British Journal of Educational Technology, 34(4), 407–418.
[3] Chi E. H.; Pirolli P.; Chen K.; and Pitkow J. 2001. “Using information scent to model
user information needs and actions and the Web” . In Proceedings of the SIGCHI
conference on Human factors in computing systems,490- 497, Seattle, Washington,
United States: AC/M 22/11/2007).
[4] Kim K. and Allen B. 2002. Cognitive and task influences on web searching behavior.
Journal of the American Society forInformation Science and Technology, 53(2):109-
119: JohnWiley& Sons.
[5] Sherry y. chen, Robert Macradie,” web based interaction: A review of three important
human factors”, International journal of information management, journal homepage:
www.elsevier.com/locate/ijinfomgt pp. 1-9, 2010.
[6] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel
type involving products of Besselfunctions,” Phil. Trans. Roy. Soc. London, vol.
A247, pp. 529– 551, April 1955.
[7] White R. W. and Drucker S. M. 2007. Investigating behavioral variability in web
search. In Proceedings of the16th international conference on World Wide Web, 21-
30,Banff, Alberta, Canada: ACM.
[8] K.R.Suneetha, K.R.Krishnamoorthy,“Identifying User behavior by Analyzing Web
Server Access File” IJCSNA International Journal of Computer Science and Network
Security, Vol. 9 No.4 April 2009
[9] Alaa El-Halees “Mining Students Data to AnalyzingLearning Behavior: a Case
Study”, http://eref.uqu.edu.sa/files/eref2/folder6/f158.pdf
[10] R.Cooley, B.Mobasher, and J.Srivastav, “Web mining: Information and Pattern
Discovery on the World Wide Web”,Proc. IEEE Intl. Conf. Tools with Al, Newport
Beach, CA, pp.558-56, 1997
[11] Mahesh thyloreramkrishna, LathaKomalGowdar, LalatessSomashekarHavanur, “Web
mining: Key Accomplishments, Application, and Future Directions”, International
conference on Data Storage and Data Engineering, pp. 186-191, 2010
[12] Jinhyuk Choi, Jeongseok Seo, Geehyuk Lee “Analysis of web usage pattern using
various contextual factors” Association of advancement of artificial intelligence pp. 1-
9, 2009.
[13] R. Cooley, B. Mobasher, J. Srivastava, “Web Mining Information and Pattern
Discovery on the World Wide Web”, InProceedings of the 9th IEEE International
Conference on Tools With Artificial Intelligence, Newport Beach, CA, 1997.
[14] J.Srivastava, R. Cooley, M. Deshpande and P- N.Tan, “Web Usage Mining:
Discovery and Applications of usage pattern From Web Data”, SIGKDD
Explorations, Vol.1, Issue 2, 2000.
[15] Cooley, R., Mobasher, B.,&Srivastava, J. (1999). “Data preparation for mining world
wide web browsing patterns” Journal of Knowledge and Information Systems, 1 (1),
5-32.
International Journal of Information Technology & Management Information System (IJITMIS),
ISSN 0976 – 6405(Print), ISSN 0976 – 6413(Online), Volume 5, Issue 1, January - April (2014), © IAEME
29
[16] R. Kosala, H. Blockeel, “Web Mining Research: A Survey”,in SIGKDD Explorations
2(1), ACM, July 2000.
[17] JaideepSrivastava, Robert Cooleyz ,MukundDeshpande, Pang-Ning Tan, “Web
Usage Mining: Discovery and Applications of Usage Patterns from Web
Data”SIGKD Explorations. ACM SIGKDD, pp. 1-10, Jan 2000.
[18] Sandhaya Gawade , Hitesh Gupta, “Review of Algorithms for Web Pre-fetching
andCaching, International Journal of Advanced Research in Computer and
Communication Engineering Vol. 1, Issue 2, pp. 1-4, April 2012.
[19] RozitaJamiliOsfouei, “Behaviour mining of female students by analysing log files”, In
Proceeding of IEEE fifth international Conferences on Digital
InformationManagement ICDM 2010, Canada pp. 5-8. July 2010.
[20] T. Anand, S. Padmapriya, E. kirubakram, “Terror Tracking Using Advanced Web
Mining Perspective”, In Proceeding of IEEE Fourth international Conferences on
Intelligent agent and multimedia. pp. 1-4, 2009.
[21] Jos’eBorges and Mark Levene, “Data Mining of User Navigation Patterns”
Department of Computer Science, University College London, Gower Street, London,
pp. 1-19, April 2000.
[22] Chen Wan, KepingBi,Yunhua Hu, “Extracting Search-Focused Key N-Grams for
Relevance Ranking in Web Search” WSDM’12, February 8–12, 2012, Seattle,
Washington, USA, ACM. pp. 1-10.2012.
[23] Prof. Sindhu P Menon and Dr. Nagaratna P Hegde, “Research on Classification
Algorithms and its Impact on Web Mining”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 495 - 504,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[24] Alamelu Mangai J, Santhosh Kumar V and Sugumaran V, “Recent Research in Web
Page Classification – A Review”, International Journal of Computer Engineering &
Technology (IJCET), Volume 1, Issue 1, 2010, pp. 112 - 122, ISSN Print: 0976 –
6367, ISSN Online: 0976 – 6375.
[25] Suresh Subramanian and Dr. Sivaprakasam, “Genetic Algorithm with a Ranking
Based Objective Function and Inverse Index Representation for Web Data Mining”,
International Journal of Computer Engineering & Technology (IJCET), Volume 4,
Issue 5, 2013, pp. 84 - 90, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[26] Purvi Dubey and Asst. Prof. Sourabh Dave, “Effective Web Mining Technique for
Retrieval Information on the World Wide Web”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 156 - 160, ISSN
Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[27] Hemprasad Badgujar and Dr. R.C.Thool, “His: Human Identification Schemes on
Web”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 2, 2013, pp. 198 - 212, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.