{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:00:25Z","timestamp":1761807625038},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,25]],"date-time":"2010-11-25T00:00:00Z","timestamp":1290643200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s13278-010-0015-3","type":"journal-article","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T17:09:42Z","timestamp":1290618582000},"page":"173-185","source":"Crossref","is-referenced-by-count":21,"title":["Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions"],"prefix":"10.1007","volume":"1","author":[{"given":"Muhaimenul","family":"Adnan","sequence":"first","affiliation":[]},{"given":"Mohamad","family":"Nagi","sequence":"additional","affiliation":[]},{"given":"Keivan","family":"Kianmehr","sequence":"additional","affiliation":[]},{"given":"Radwan","family":"Tahboub","sequence":"additional","affiliation":[]},{"given":"Mick","family":"Ridley","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Rokne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,25]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Abiteboul S, Preda M, Cobena G (2003) Adaptive on-line page importance computation. In: Proceedings of the international Conference on World Wide Web, pp 280\u2013290","DOI":"10.1145\/775152.775192"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Adnan M, Alhajj R, Rokne JG (2009) Identifying social communities by frequent pattern mining, IV, pp 413\u2013418","DOI":"10.1109\/IV.2009.49"},{"key":"15_CR3","unstructured":"Ardissono L, Torasso P (2000) Dynamic user modeling in a web store shell. In: Proceedings of the conference European conference on artificial intelligence, Berlin, Germany, pp 621\u2013625"},{"key":"15_CR4","unstructured":"Batagelj V (2003) Analysis of large networks\u2014islands presented at Dagstuhl seminar 03361: algorithmic aspects of large and complex networks Dagstuhl"},{"key":"15_CR5","unstructured":"Batagelj V, Mrvar A (1998) Pajek\u2014program for large network analysis. http:\/\/vlado.fmf.uni-lj.si\/pub\/networks\/pajek\/"},{"issue":"1","key":"15_CR6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/1052934.1052942","volume":"5","author":"A Borodin","year":"2005","unstructured":"Borodin A, Roberts GO, Rosenthal JS, Tsaparas P (2005) Link analysis ranking: algorithms, theory, and experiments. ACM Trans Internet Technol 5(1):231\u2013297","journal-title":"ACM Trans Internet Technol"},{"key":"15_CR7","unstructured":"Borges J, Levene M (1999) Data mining of user navigation patterns. In: Proceedings of workshop on web usage analysis and user profiling (WEBKDD), in conjunction with ACM SIGKDD international conference on knowledge discovery and data mining, San Diego, CA, pp 31\u201336"},{"key":"15_CR8","unstructured":"Brin S, Motwani R, Page L, Winograd T (1998) What can you do with a web in your pocket. Bull IEEE Comput Soc Tech Comm Data Eng 21:37\u201347"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. In: Proceedings of the seventh international World Wide Web conference","DOI":"10.1016\/S0169-7552(98)00110-X"},{"issue":"6","key":"15_CR10","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/0169-7552(95)00043-7","volume":"27","author":"LD Catledge","year":"1995","unstructured":"Catledge LD, Pitkow JE (1995) Characterizing browsing strategies in the World-Wide Web. Comput Netw ISDN Syst 27(6):1065\u20131073","journal-title":"Computer Networks and ISDN Systems"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chen Z, Fu AW-C, Tong FC-H (2004) Optimal algorithms for finding user access sessions from very large web logs. J World Wide Web 6:259\u2013279","DOI":"10.1023\/A:1024606901978"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Chakrabarti S, Dom B, Gibson D, Kleinberg J, Raghavan P, Rajagopalan S (1998) Automatic resource compilation by analyzing hyperlink structure and associated text. In: Proceedings of the international conference on World Wide Web","DOI":"10.1016\/S0169-7552(98)00087-7"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Cho J, Roy S, Adams RE (2005) Page quality: in search of an unbiased web ranking. In: Proceedings of ACM SIGMOD, pp 551\u2013562","DOI":"10.1145\/1066157.1066220"},{"issue":"1","key":"15_CR14","first-page":"32","volume":"1","author":"R Cooley","year":"1999","unstructured":"Cooley R, Mobasher B, Srivastavaa J (1999) Data preparation for mining World Wide Web browsing patterns. J Knowl Inform Syst 1(1):32\u201355","journal-title":"J Knowl Inform Syst"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Dean J, Henzinger M (1999) Finding related pages in the World Wide Web. In: Proceedings of the international conference on World Wide Web","DOI":"10.1016\/S1389-1286(99)00022-5"},{"key":"15_CR16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00018730601170527","volume":"56","author":"LF da Costa","year":"2007","unstructured":"da Costa LF, Rodrigues FA, Travieso G, Villas Boas PR (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56:167\u2013242","journal-title":"Advanced Physics"},{"issue":"2","key":"15_CR18","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0378-8733(91)90017-N","volume":"13","author":"LC Freeman","year":"1991","unstructured":"Freeman LC, Borgatti SP, White DR (1991) Centrality in valued graphs: a measure of betweenness based on network flow. Soc Netw 13(2):141\u2013154","journal-title":"Social Networks"},{"key":"15_CR19","unstructured":"Fu Y, Sandhu K, Shih MY (1999) Clustering of webusers based on access patterns. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"15_CR20","unstructured":"Han EH, Karypis G, Kumar V, Mobasher B (1997) Clustering based on association rule hypergraphs. In: Proceedings of the workshop on research issues on data mining and knowledge discovery, Tucson, Arizona, pp 9\u201313"},{"key":"15_CR21","unstructured":"Hsu WH, King A, Paradesi MS, Pydimarri T, Weninger T (2006) Collaborative and structural recommendation of friends using weblog-based social network analysis. In: AAAI spring symposium on computational approaches to analyzing weblogs (CAAW), vol SS-06-03, Menlo Park, CA, pp 55\u201360"},{"issue":"4","key":"15_CR22","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/TKDE.2003.1209010","volume":"15","author":"J Hou","year":"2003","unstructured":"Hou J, Zhang Y (2003) Effectively finding relevant web pages from linkage information. IEEE Trans Knowl Data Eng 15(4):940\u2013951","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Karypis G, Aggarwal R, Kumar V, Shekhar S (1997) Multilevel hypergraph partitioning: applications in VLSI domain. In: Proceedings ACM\/IEEE design automation conference","DOI":"10.1145\/266021.266273"},{"key":"15_CR24","unstructured":"Kleinberg J (1998) Authoritative sources in a hyperlinked environment. In: Proceedings of the ninth annual ACM-SIAM symposium on discrete algorithms, pp 668\u2013677"},{"issue":"2","key":"15_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1017\/S0269888901000108","volume":"16","author":"A Kobsa","year":"2001","unstructured":"Kobsa A, Koenemann J, Pohl W (2001) Personalized hypermedia presentation techniques for improving online customer relationships. Knowl Eng Rev 16(2):111\u2013155","journal-title":"Knowl Eng Rev"},{"key":"15_CR17","unstructured":"Le TV, Kulikowski CA, Muchnik IB (2008) Coring method for clustering a graph. ICPR 2008, pp 1\u20134"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Lee S, Yong HS (2005) Web personalization: my own web based on open content platform. Web Information Systems Engineering, WISE 2005, 3806, pp 731\u2013739","DOI":"10.1007\/11581062_80"},{"key":"15_CR27","unstructured":"Li CH, Chui CK (2005) Web structure mining for usability analysis. In: Proceedings of IEEE\/WIC\/ACM international conference on web intelligence, pp 309\u2013312"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Massa P, Hayes C (2005) Page-rerank: using trusted links to re-rank authority. In: Proceedings of IEEE\/WIC\/ACM international conference on web intelligence, pp 614\u2013617","DOI":"10.1109\/WI.2005.112"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Pirolli P, Pitkow J, Rao R (1996) Silk from a sow\u2019s ear: extracting usable structures from the Web. In: CHI \u201996: Proceedings of the SIGCHI conference on human factors in computing systems, pp 118\u2013125","DOI":"10.1145\/238386.238450"},{"key":"15_CR30","unstructured":"R Development Core Team (2009) R: a language and environment for statistical computing, reference index version 2.10.1. R Foundation for Statistical Computing"},{"key":"15_CR31","unstructured":"Schafer B, Konstan JA, Riedl J (2001) E-commerce recommendation applications, data mining and knowledge discovery, vol 5(1\u20132). Kluwer Academic Publishers, Boston, pp 115\u2013152"},{"key":"15_CR32","unstructured":"Shahabi C, Zarkesh AM, Abidi J, Shah V (1997) Knowledge discovery fromuser\u2019s Webpage navigation. In: Proceedings of the IEEE international workshop on research issues in data engineering (RIDE), pp 20\u201329"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Yan X, Han J, Afshar R (2003) CloSpan: mining closed sequential patterns in large datasets. In: Proceedings of 2003 SIAM international conference on data mining, SDM\u2019 03","DOI":"10.1137\/1.9781611972733.15"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-010-0015-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-010-0015-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-010-0015-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T14:27:18Z","timestamp":1559831238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-010-0015-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,25]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s13278-010-0015-3","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,25]]}}}