{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:31:43Z","timestamp":1764304303666},"reference-count":73,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2008,12]]},"abstract":"<jats:p>The purpose of this paper is to provide a more current evaluation and update of web mining research and techniques available. Current advances in each of the three different types of web mining are reviewed in the categories of web content mining, web usage mining, and web structure mining. For each tabulated research work, we examine such key issues as web mining process, methods\/techniques, applications, data sources, and software used. Unlike previous investigators, we divide web mining processes into the following five subtasks: (1) resource finding and retrieving, (2) information selection and preprocessing, (3) patterns analysis and recognition, (4) validation and interpretation, and (5) visualization. This paper also reports the comparisons and summaries of selected software for web mining. The web mining software selected for discussion and comparison in this paper are SPSS Clementine, Megaputer PolyAnalyst, ClickTracks by web analytics, and QL2 by QL2 Software Inc. Applications of these selected web mining software to available data sets are discussed together with abundant presentations of screen shots, as well as conclusions and future directions of the research.<\/jats:p>","DOI":"10.1142\/s0219622008003150","type":"journal-article","created":{"date-parts":[[2008,12,30]],"date-time":"2008-12-30T10:05:52Z","timestamp":1230631552000},"page":"683-720","source":"Crossref","is-referenced-by-count":58,"title":["WEB MINING: A SURVEY OF CURRENT RESEARCH, TECHNIQUES, AND SOFTWARE"],"prefix":"10.1142","volume":"07","author":[{"given":"QINGYU","family":"ZHANG","sequence":"first","affiliation":[{"name":"Department of Computer &amp; Information Technology, Arkansas State University, State University, Arkansas 72467-0130, USA"}]},{"given":"RICHARD S.","family":"SEGALL","sequence":"additional","affiliation":[{"name":"Department of Computer &amp; Information Technology, Arkansas State University, State University, Arkansas 72467-0130, USA"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf3","volume-title":"Mining the Web: Discovering Knowledge from Hypertext Data","author":"Chakrabarti S.","year":"2003"},{"key":"rf5","first-page":"1225","volume":"41","author":"Chen L.","journal-title":"Inform. Process. Management: Int. J."},{"key":"rf6","volume-title":"The Data Administration Newsletter","author":"Clendaniel T. S.","year":"2002"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1145\/767193.767194"},{"key":"rf10","first-page":"123","volume":"15","author":"Cyrus S.","journal-title":"INFORMS J. Comput. Special Issue on Data Mining"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1145\/240455.240473"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1145\/990301.990306"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10255"},{"key":"rf15","first-page":"17","volume":"21","author":"Furnkranz J.","journal-title":"\u00d6GAI-J."},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622005001404"},{"key":"rf19","first-page":"54","author":"Han J.","journal-title":"Computer"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-003-0109-6"},{"key":"rf23","first-page":"428","volume":"3","author":"Kanellopoulos D.","journal-title":"Int. Rev. Comput. Software"},{"key":"rf24","first-page":"42","author":"Kolari P.","journal-title":"Comput. Sci. Eng."},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1145\/360402.360406"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.dbm.3240241"},{"key":"rf30","volume-title":"Web Data Mining: Exploring Hyperlinks, Contents and Usage Data","author":"Liu B.","year":"2007"},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1145\/1046456.1046457"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1002\/0470108096"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345169"},{"key":"rf37","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-006-0004-1"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026238916441"},{"key":"rf41","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000019288.63141.e4"},{"key":"rf42","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-414-9"},{"key":"rf44","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00109-4"},{"key":"rf45","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2005.11.006"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345167"},{"key":"rf48","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"rf53","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006002258"},{"key":"rf54","doi-asserted-by":"publisher","DOI":"10.2495\/DATA06"},{"key":"rf55","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023618504691"},{"key":"rf56","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006002283"},{"key":"rf57","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009839827683"},{"key":"rf58","first-page":"149","volume":"13","author":"Amarasiri R.","journal-title":"Neural Comput. Appl."},{"key":"rf59","first-page":"327","volume":"12","author":"Boncella R.","journal-title":"Commun. Assoc. Inform. Syst."},{"key":"rf60","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-006-0003-2"},{"key":"rf61","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00103-3"},{"key":"rf62","first-page":"140","volume":"13","author":"Chau R.","journal-title":"Neural Comput. Appl."},{"key":"rf63","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024606901978"},{"key":"rf64","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-003-0107-8"},{"key":"rf65","doi-asserted-by":"publisher","DOI":"10.1504\/IJBPIM.2006.012624"},{"key":"rf66","doi-asserted-by":"publisher","DOI":"10.1145\/643477.643478"},{"key":"rf67","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0248-3"},{"key":"rf68","first-page":"225","volume":"53","author":"Faccaand F.","journal-title":"Data Knowledge Eng."},{"key":"rf69","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-005-1315-9"},{"key":"rf70","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011469000311"},{"key":"rf71","doi-asserted-by":"publisher","DOI":"10.1145\/1125944.1125945"},{"key":"rf72","doi-asserted-by":"publisher","DOI":"10.1504\/IJEB.2004.005881"},{"key":"rf73","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000019278.84222.b7"},{"key":"rf74","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2006.012000"},{"key":"rf75","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2004.04.002"},{"key":"rf76","first-page":"1290","volume":"56","author":"Huang X.","journal-title":"J. Am. Soc. Inform. Sci. Tech."},{"key":"rf77","first-page":"55","volume":"46","author":"Jiang X.","journal-title":"Inform. Software Tech."},{"key":"rf78","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021515408295"},{"key":"rf80","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(03)00004-9"},{"key":"rf81","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000019279.81927.c5"},{"key":"rf82","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(01)00040-9"},{"key":"rf83","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(01)00034-3"},{"key":"rf84","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-006-8562-2"},{"key":"rf85","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(01)00008-8"},{"key":"rf86","first-page":"141","volume":"7","author":"Pabatsjaute Z.","journal-title":"Intll. Data Anal."},{"key":"rf87","doi-asserted-by":"publisher","DOI":"10.1108\/17410390410566715"},{"key":"rf88","doi-asserted-by":"publisher","DOI":"10.1504\/IJMSO.2006.008771"},{"key":"rf89","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0004-z"},{"key":"rf90","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00109-4"},{"key":"rf91","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/545151.545175","volume":"45","author":"Smyth P.","journal-title":"Commun. ACM"},{"key":"rf92","volume-title":"Web Data Mining and Applications in Business Intelligence and Counter-Terrorism","author":"Thuraisingham A.","year":"2004"},{"key":"rf93","doi-asserted-by":"publisher","DOI":"10.1023\/B:ETIN.0000047476.05912.3d"},{"key":"rf94","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015750423727"},{"key":"rf95","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000023675.04946.f1"},{"key":"rf96","doi-asserted-by":"publisher","DOI":"10.1080\/713827182"},{"key":"rf97","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015185802583"},{"key":"rf98","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00211-6"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622008003150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T02:37:33Z","timestamp":1632883053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622008003150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":73,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2008,12]]}},"alternative-id":["10.1142\/S0219622008003150"],"URL":"https:\/\/doi.org\/10.1142\/s0219622008003150","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,12]]}}}