Effective Prediction of Kid s Behaviour Based on Internet Use



Similar documents
Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Keywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance.

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.

Research and Development of Data Preprocessing in Web Usage Mining

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

Guideline on Windows 7 Parental Controls

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Arti Tyagi Sunita Choudhary

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

Profile Based Personalized Web Search and Download Blocker

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Periodic Web Personalization for Meta Search Engine

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

Capturing and Analyzing the Web Experience

Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

How to train your Browser Controller

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari

A UPS Framework for Providing Privacy Protection in Personalized Web Search

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Belmont 16 Foot Sailing Club. Privacy Policy

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

HomeNet. Gateway User Guide

Web Mining as a Tool for Understanding Online Learning

Digital media glossary

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT

RDM+ Desktop for Windows Getting Started Guide

E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.

Internet Activity Analysis Through Proxy Log

1. Chat4Support Introduction

Pre-Processing: Procedure on Web Log File for Web Usage Mining

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life

Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM

Staying Safe Online. A Practical Guide for Parents and Children.

Reference Guide TEAM. Pogoplug Team. Reference Guide Cloud Engines Inc., All Rights Reserved.

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.2 Access to Content Management System

Fig (1) (a) Server-side scripting with PHP. (b) Client-side scripting with JavaScript.

How to Configure Guest Management on the DWC-1000

Technology (Information Technology) Benchmarks

User Behavior Analysis Based On Predictive Recommendation System for E-Learning Portal

Learning Objectives. Interactive Media. Learning Objectives (cont.) Interactive Media. Traditional Advertising Versus Interactive Communications

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data

3 Easy Steps to Get Started

Table of Contents. Lesson 5: Assign Delegate...30 Objectives Assign A Delegate Edit Delegate Permissions... 33

Profound Outdoors Privacy Policy

LDA Based Security in Personalized Web Search

A SURVEY ON WEB MINING TOOLS

MOBICIP NAME. Mobicip. Company. Version Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows)

Web Mining Functions in an Academic Search Application

Web Log Based Analysis of User s Browsing Behavior

Visualizing e-government Portal and Its Performance in WEBVS

Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4)

User's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes

Ensure safe and appropriate web surfing for all users with customizable filtering.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

Yammer Training Guide Facilitator s Notes

1. Collection and Use of Personal Information

PREPROCESSING OF WEB LOGS

A Study of Web Log Analysis Using Clustering Techniques

Frequently Asked Questions for the USA TODAY e-newspaper

News and Information. Advertising and Marketing. Web. Design, Hosting, Promotion, Advertising, SEO

Analyzing Chinese-English Mixed Language Queries in a Web Search Engine

The ad units mobile users will most likely click on P5

THE OMNICHANNEL CONSUMER

Moodle on Android. Polat Olu 1

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING

Home Internet Filter User Guide

Searching the Social Network: Future of Internet Search?

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Phone Apps for Online Safety Apple and Android

Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4)

E-Learning User Manual

Explanation of Membership Benefits 2. Register for Seminars 5. View Live Webcasts 6 View On-Demand Web Programs 7. The PLI Mobile App for the ipad 8

HP ARCHIVING SOFTWARE FOR EXCHANGE

Cyber safety Parent Easy Guide 63

Personalization of Web Search With Protected Privacy

Who Needs Parental Controls?

Employee Internet Usage February 15, 2007

Engage your customers

Privacy Policy. MSI may collect information from you on a voluntary basis when you:

Advertising on the Internet

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

CSSEA Helpdesk User Guide

F-Secure Mobile Security. Android

graphical Systems for Website Design

How to Carry Out Internet Marketing for Small and Medium-Sized Enterprises

Web Mining using Artificial Ant Colonies : A Survey

Transcription:

International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective Prediction of Kid s Behaviour Based on Internet Use Dept. of Computer Sc., Maharaja Surajmal Institute, Janakpuri, Delhi. Abstract Internet use has become essentially universal among adolescents. Young people are exposed to an increasingly open and collaborative online social culture, whichallows them to access information and maintain friendships and relationships. Young people are, however, at a dynamic stage of development in which risk-taking behaviours and immature decision making capacities can lead to negative outcomes. Parents involvement in safe use of technology starts from a child s first use, and they are a critical part of ensuring their teenage children s responsible and safe use of online services. Monitoring Internet use and communicating with teenage children are important strategies. The aim of the paper is to help parents for monitoring their child computer and Internet usage details and provide them with the tools to understand the online behaviour of their teenage children. Keywords: Web mining; monitoring; classification; pre-processing 1. Introduction Nowadays Internet and computer usage grow dynamically among youngsters. Monitoring the Internet usage of their teenage children is a strategy that is often suggested for parents, and the literature indicates that the majority of parents do engage in monitoring behaviours at least some of the time. Monitoring behaviours include checking that sites are appropriate for their child s use, and keeping an eye on the screen, with checks more likely to occur at younger ages [8]. Certain factors are seen as making it difficult for parents to monitor and manage children s Internet use including: a) Not being able to keep an eye on the screen or what the child is doing all of the time. This is especially applicable in the age of wireless connections and

184 Internet-enabled mobile phones, and access that is occurring within school time [9]; b) The amount of time children and teenager spend on Internet-related activities; c) Children s resistance to time limits; d) Difficulty of preventing exposure to inappropriate content; e) Children s own control of details (e.g., through use of passwords, phone locks and private browsing; f) Difficultyparents have in keeping up with the pace of change on the Internet, particularly social networkingand virtual reality sites. By considering all of these factors the objective of this paper is to record all the usage data of the child and store it for the parents for the future use and apply the different mining techniques to check the web behaviour of the child. The rest of the paper is structured as follows. Section 2 reviews the related work on behavioural analysis.in Section 3 we shortly explain the basics of web mining; Section 4 presents the way to collect data. In Section 5 weexplain the workings of our approach and finallydraw the conclusions and future directions in Section 6. 2. Related Work Dembczyński et al. [1] have created dataset consist of 4882 different users and 20 different Web page categories. They have explored the week and 24-hour periodicity in users behaviour, among others. All of their algorithms scale well with large data and have linear time complexity, which is the smallest possible complexity for such problems.kellar[2] propose two further studies: an exploration of monitoring behaviour on the Web through semi-structured interviews and the development and validation of recommendations for the design of future Web browser tools. Morrison et al. [3] present three taxonomic classification schemes based on Web users responses to what Web activities significantly impacted their decisions and actions. The taxonomic classifications focus on three variables: the Purpose of people s search on the Web, the method people use to find information, and the Content of the information for which they are searching. Sellen et al. [4] studied the Web activities of 24 knowledge workers over two days.participants were interviewed in front of theirweb history at the end of the second day and described the different activities in which they engaged. Activities wereclassified into six main categories: finding, information gathering, browsing, transacting,communicating,and housekeeping. Then compared the duration of all. Shahabi [5] have introduced a remote agent(javascript and applet) thatacquires the user interactions from the browser at the client side. Vespan [6] describe the process of discovering internet user behaviourmodels by analysing proxy server raw data and they emphasize theimportance of such models for the e-learning environment. They have usedurl as source of input to analyse Web user behaviour. They have identify six different behavioural models namely study and research,daily life, shopping and products/services information,on-line communication,job, and entertainment. Krzysztof [7] describes a method for classifying users' interests based on an analysis of the site-keyword graph. The method

Effective Prediction of Kid s Behaviour Based on Internet Use 185 is for extracting sub-graphs representing users' main interests from a site-keyword graph which is generated from augmented Web audience measurement data (Web log data).their solution has low time and space complexity; scales well with large datasets and, at the same time, produce high-quality results. 3. Mining the Web Web mining is a very broad research area emerging to solve the issues that arise due to the WWW phenomenon. The Web mining research is a converging research area from several research communities, such as Databases, IR and AI.[10] Web mining can be defined roughly as data mining using data generated by the web and includes the following sub areas: web content mining, web usage mining, and web structure mining. Web usage mining is an important and fast developing area of web mining where a lot of research has been done already. Web usage data includes web server access logs, proxy server logs, cookies, user profiles, registration data, user sessions, user queries, bookmark data, mouse clicks and scrolls and any other data as the results of interactions. The analysis of the user s click data is known as Web usage mining.web usage mining literature focuses on techniques that could predict user behaviour patterns. Web usage mining studies could be classifiedinto two categories: those based on the server side and those based on the client side. Studiesbased on the client side retrieve data from the user using cookies or other methods.the other application area of web usage mining includes effective web site management, creating adaptive sites, business and support services, personalization, and network traffic flow analysis and so on. Web usage mining consists of three main phases, namely Data Pre-processing, Pattern Discovering and Pattern Analysis. 4. Creating Usage Dataset Behavioural profiling involves collecting data (recording, storing and tracking) and searching it for identifying patterns (with the help of data mining algorithms). Fig. 1: Software for collecting usage data.

186 The data collection phase is often referred to as Behavioural Tracking.The Web user behaviour has been contributed to a variety of factors from timeto time.secondly, collecting rich and detailed user data is another challenge poised toour research. There are no direct means to collect both the computer usage information as well as Web browser interactions.the software for collecting and storing usage data(computer and internet both) has been created and the screenshot for the same is shown below. The objectives of this work are to monitoring, observing and understanding how the computer and web is used and utilized by the children and teenager and then find their behaviour. There are various advantages of finding user behaviour 1. Information so gathered could be used to offer feedback to parents of users. 2. To apply the mining techniques to the recorded dataset so that parents can put an eye on the usage record of their child. 3. To put restriction on the child computer and internet usage. 5. Process of Finding User Behaviour Usage history refers to data recorded into a log file as a user (child) enters any internet address on a web browser's using URL bar. Next step is Pre-processing of web data to make it suitable for mining.it is identified as one of the key issues for Web mining. The collected internet log file includes path and browser,access date and access time.out of path and browser the key items are get filtered in pre-processing step. To derive the behaviour roles of children, their activity patterns need to be compared against the behavioural characteristics of each role type. Afterwards log datacan be classified by user behaviour. We classify child behaviour on web browser as acquiring knowledge, download, buying, work, relationship and Enjoyment etc. Web user behaviour is also influenced by externalfactors. For example student is preparing for his/her exam, so the nature of websurfing is related to study and education based surfing. The table showing classification of child behaviour depending on the usage pattern is as shown below: Table 1: Classifying child behaviour for Internet usage data. BEHAVIOUR Acquiring Knowledge Buying SPECIFIC CLASSIFICATION KEYWORDS Explore, Explore Viewing the Document, *.doc,*.ppt,*.xls,*.pdf, Learning, *.txtetc. Blog, Lecture, study, learn Map, Blog News sites Map Weather sites News Shopping, Reservation Weather,rain,sunny, temp Shop, store, stock, collection Reserve, ticket, booking

Effective Prediction of Kid s Behaviour Based on Internet Use 187 Work Relationship Mail, Calendar, Banking Registration Community, Chat Mail, email, e-mail Cal Bank Register forum, cafe, society, group, community, social sites address chat Download/copy ftp://,download ftp://,download Enjoyment Game, Movie, Music, Cartoon, Sports, Videos Game, Movie, Music, Cartoon, Sports, Videos The child behaviour is categorized by using the above stated rules.monitoring what the teen is searching and where they re going online will help the parents toblock content being sent from the computer, set limits on the time that children can go online, filter inappropriate content and check childonline behavior offline. 6. Conclusion and Future Work In this paper, we have proposed a new method for monitoring child's behavior during Internet use that can help the parents to lower the harmful or dangerous situations.parents are need to be more aware of the times when young people are on-line, in contact with others and explain them which sites are inappropriate and off-limits, amount of time and times of day computer is used, and which information cannot be shared online. Further in future we will apply the mining techniques on the same data for finding the behavioral pattern,that can help the parents to easily guide their children to safe and rewarding online experiences. 7. Acknowledgement I am thankful to my PhD thesis supervisor, ProfessorMayank Singh for guiding me in preparing this paper. References [1] Dembczyński K., Kotłowski.W, Sydow.M (2008), Effective Prediction of Web UserBehaviour with User-Level Models, Fundamental Informaticae, IOS Press, 0169-2968 (Print) 1875-8681 (Online), Volume 89, Number 2-3 / 2008, page 189.

188 [2] M. Kellar(2006),'An examination of user behaviour during Web information tasks',proceeding CHI EA '06 CHI '06 extended abstracts on Human factors in computingsystems ACM New York, NY, USA 2006. [3] Morrison, J. B., Pirolli, P. and Card, S. K. (2001)., A Taxonomic Analysis of WhatWorld Wide Web Activities Significantly Impact People s Decisions and Actions., InProceedings of the CHI 01 Extended Abstracts on Human Factors in ComputingSystems, Seattle, WA, 163-164. [4] Sellen, A. J., Murphy, R. and Shaw, K. L. (2002)., How Knowledge Workers Use theweb., In Proceedings of the SIGCHI Conference on Human Factors in ComputingSystems (CHI 2002), Minneapolis, MN, 227-234. [5] Cyrus S., Farnoush B.K. (2001), A Framework for Efficient and Anonymous WebUsage Mining Based on Client-Side Tracking, Lecture Notes In Computer Science;Vol. 2356 archive Revised Papers from the Third International Workshop on MiningWeb Log Data Across All Customers Touch Points table of contents Pages: 113 144Year of Publication: 2001 ISBN:3-540-43969-2. [6] Dragoş M. Vespan,(2007), Internet User Behaviour Model Discovery Process,Revista Informatica Economică, nr. 3 (43)/2007. [7] Krzysztof D., Wojciech K., Marcin S. (2008), Effective Prediction of Web UserBehaviour with User-Level Models, Fundamenta Informaticae, IOS Press, 0169-2968 (Print) 1875-8681 (Online), Volume 89, Number 2-3 / 2008, page 189. [8] www.mass.gov/ago/...the...internet.../monitoring-internet-use.html [9] www.stopmedicineabuse.org/blog/.../monitoring-your-teens-online-behavior [10] www.ieee.org.ar/downloads/srivastava-tut-paper.pdf