{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:34:07Z","timestamp":1761006847419,"version":"build-2065373602"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we report ongoing efforts in a large scale research project to develop methods for profiling individual Web search engine users by leveraging data recorded in the transaction logs of search engines. Our research aim is to investigate how completely one can profile a Web searcher using log data. Taking a broad brush approach, we present an array of profiling attributes to illustrate the spectrum of user characteristics possible from log data. Specifically, we present ongoing research for determining a user 's location, geographical interest, topic of interest, level of interest, the degree of commercial intent, whether the user plans to make a purchase, and whether the user will click a link. We present the state of our ongoing research in user profiling along with that of other researchers. Our findings show that one can develop a fairly robust profile of a Web searcher using log data. We also discuss issues of determining the specific identity of the user. We conclude with a discussion of the implications for the areas of system development, online advertising, privacy, and policies concerning the use of such profiling.<\/jats:p>","DOI":"10.1002\/meet.2009.1450460240","type":"journal-article","created":{"date-parts":[[2010,1,29]],"date-time":"2010-01-29T11:13:48Z","timestamp":1264763628000},"page":"1-19","source":"Crossref","is-referenced-by-count":4,"title":["To what degree can log data profile a web searcher?"],"prefix":"10.1002","volume":"46","author":[{"given":"Bernard","family":"Jansen","sequence":"first","affiliation":[]},{"given":"Mimi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Danielle","family":"Booth","sequence":"additional","affiliation":[]},{"given":"Daehee","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Kathuria","sequence":"additional","affiliation":[]},{"given":"Pat","family":"Bonner","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"issue":"2","key":"e_1_2_8_2_1","volume":"25","author":"Beitzel S. M.","year":"2007","journal-title":"Automatic classification of Web queries using very large unlabeled query logs ACM Transactions on Information Systems"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792552"},{"key":"e_1_2_8_4_1","doi-asserted-by":"crossref","unstructured":"Dai H. K. Nie Z. Wang L. Zhao L. Wen J.\u2010R. Li Y.(2006 23\u201026 May). InDetecting Online Commercial Intention (OCI)(pp.829\u2013837). Paper presented at the World Wide Web Conference (WWW2006) Edinburgh Scotland.","DOI":"10.1145\/1135777.1135902"},{"key":"e_1_2_8_5_1","unstructured":"Hotchkiss G.(2004).Inside the Mind of the Searcher. Retrieved 15 March 2005 fromhttp:\/\/www.enquiro.com\/research.asp"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2006.06.005"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.07.015"},{"key":"e_1_2_8_8_1","unstructured":"Jansen B. J. Booth D. L. Spink A.(Forthcoming).Patterns of Queries Modification During Web Searching. Journal of the American Society for Information Science and Technology."},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/281250.281253"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20564"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-974-8.ch001"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/17440080710848116"},{"issue":"8","key":"e_1_2_8_13_1","first-page":"1071","volume":"58","author":"Markey K.","year":"2007","journal-title":"Twenty\u2010five years of end\u2010user searching, part 1: Research findings Journal of the American Society for Information Science and Technology"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20601"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20696"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-974-8.ch002"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","unstructured":"Rose D. E. Levinson D.(2004 17\u201022 May). In S. Feldman M. Uretsky M. Najork C. Wills (Eds.) Understanding User Goals in Web Search(pp.13\u201319). Paper presented at the World Wide Web Conference (WWW 2004) New York NY USA.","DOI":"10.1145\/988672.988675"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165774.1165776"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/331403.331405"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20093"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10262"},{"issue":"2","key":"e_1_2_8_22_1","first-page":"12","article-title":"Term Co\u2010occurrence in Internet Search Engine Queries: An Analysis of the Excite Data Set","volume":"24","author":"Wolfram D.","year":"1999","journal-title":"Canadian Journal of Information and Library Science"},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"Yates R. B. Benavides L. C. Gon\u017aalez C.(2006).The Intention Behind Web Queries. In F. Crestani P. Ferragina M. Sanderson (Eds.) Lecture Notes in Computer Science: String Processing and Information Retrieval (SPIRE 2006) (Vol. 4209\/2006 pp.98\u2013109). Glasgow Scotland: Springer Berlin \/ Heidelberg.","DOI":"10.1007\/11880561_9"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20993"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2008.07.003"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75829-7_6"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460240","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.1450460240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:31Z","timestamp":1760955511000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.1450460240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.1450460240"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.1450460240","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}