• DocumentCode
    2677166
  • Title

    The analysis of youths´ searching behavior

  • Author

    Li, Chao ; Wu, Bin ; Li, Yuxiao

  • Author_Institution
    Beijing Key Lab. of Intell. Telecommun., Software & Multimedia, Beijing Univ. of Posts & Telecommun., Beijing, China
  • fYear
    2011
  • fDate
    1-2 June 2011
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    In order to create a safe and harmonious cyberspace environment for youth and protect them from the impact of bad information such as pornography, violence and gambling, most of the current solutions are to shield the sites containing this information. However some youth will take the initiative to seek out this bad information. In this paper we propose a method to analyze the searching behavior of youth and then to shield those keywords that may impact their health over time. We suggest that search engine operators provide keywords filtering technology to limit the searching behavior of youth. Operators should return to warning users who search keywords that contain bad information and record the searching log as feedback to parents. Of course parents should provide their IP addresses to the search engine operators first, to allow operators to set their IP addresses within the scope of supervising. Relying on search logs we count and classify keywords to understand the trend of youths´ searching behavior and the areas that they often are interested in. Then we cluster the keywords in each area to get some main clusters and frequent keywords. Using this method we can grasp youths´ searching behavior and protect them from the impact of bad information effectively.
  • Keywords
    Internet; behavioural sciences computing; information retrieval; pattern classification; pattern clustering; search engines; security of data; IP addresses; Internet era; cyber security; cyberspace environment; gambling; keywords filtering technology; pornography; search engine operators; searching log; youth searching behavior analysis; Classification algorithms; Clustering algorithms; Internet; Machine learning algorithms; Search engines; Text categorization; Training; bad informations; classify; cluster; searching behavior; shield;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cybersecurity Summit (WCS), 2011 Second Worldwide
  • Conference_Location
    London
  • Print_ISBN
    978-1-4577-1449-8
  • Type

    conf

  • Filename
    5978793