2011
DOI: 10.1007/s10618-011-0236-8
|View full text |Cite
|
Sign up to set email alerts
|

Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 76 publications
0
3
0
1
Order By: Relevance
“…There are extensive user query log analysis studies on web search engines and R systems in the literature (Agosti, Crivellari & Nunzio, ; Chau et al, ; Chen & Cooper, ; Cooper, ; He et al, ; Hsieh‐Yee, ; Jansen et al, ; Jansen & Spink, ; Jansen, ; Jansen & Spink, , 2006; Jansen, Spink, Bateman, & Saracevic, 1998; Jansen, Spink, & Saracevic, ; Limam, Coquil, Kosch, & Brunie, ; Marchionini, ; Mat‐Hassan & Levene, ; Ross & Wolfram, ; Silverstein, Marais, Henzinger, & Moricz, ; Stenmark, ; Stenmark & Jadaan, ; Teevan et al, ; Yi, Beheshti, Cole, Leide, & Large, ; Wolfram, ; Zhang, Wolfram, & Wang, ). For example, Stenmark () used an automatic clustering technique to analyze search engine log files from a corporate intranet and divided searchers into three categories based on their actual search behavior: fact seekers who would benefit from higher precision; holistically oriented seekers who would benefit more from higher recall; and knowledgeable users who are information‐seeking savvy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are extensive user query log analysis studies on web search engines and R systems in the literature (Agosti, Crivellari & Nunzio, ; Chau et al, ; Chen & Cooper, ; Cooper, ; He et al, ; Hsieh‐Yee, ; Jansen et al, ; Jansen & Spink, ; Jansen, ; Jansen & Spink, , 2006; Jansen, Spink, Bateman, & Saracevic, 1998; Jansen, Spink, & Saracevic, ; Limam, Coquil, Kosch, & Brunie, ; Marchionini, ; Mat‐Hassan & Levene, ; Ross & Wolfram, ; Silverstein, Marais, Henzinger, & Moricz, ; Stenmark, ; Stenmark & Jadaan, ; Teevan et al, ; Yi, Beheshti, Cole, Leide, & Large, ; Wolfram, ; Zhang, Wolfram, & Wang, ). For example, Stenmark () used an automatic clustering technique to analyze search engine log files from a corporate intranet and divided searchers into three categories based on their actual search behavior: fact seekers who would benefit from higher precision; holistically oriented seekers who would benefit more from higher recall; and knowledgeable users who are information‐seeking savvy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Agosti, Crivellari, and Di Nunzio () reviewed research on log analysis during the past decade and identified two main areas: web search engine log analysis and digital library systems log analysis. The goal of web search engine log analysis is to characterize users' information need: how users make requests by submitting queries to the search engine, how users interact with the search engine to retrieve search results, and how the search engine organizes and presents search results.…”
Section: Related Workmentioning
confidence: 99%
“…L'analyse de la journalisation est une vieille technique de recherche en informatique (Tolle, 1983). Lorsqu'elle porte sur l'utilisation des systèmes par des utilisateurs, elle consiste à étudier les échanges électroniques entre les systèmes et les personnes (Agosti et al, 2011) ; (Agosti et Di Nunzio, 2007) ; (Jansen, 2009). Le forage de données en EIAH est l'analyse de cette journalisation de grands volumes de d'échanges entre l'étudiant et le système.…”
Section: Analyse De Journalisation Et Traces Utilisateursunclassified