Title :
The analysis of youths´ searching behavior
Author :
Li, Chao ; Wu, Bin ; Li, Yuxiao
Author_Institution :
Beijing Key Lab. of Intell. Telecommun., Software & Multimedia, Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
In order to create a safe and harmonious cyberspace environment for youth and protect them from the impact of bad information such as pornography, violence and gambling, most of the current solutions are to shield the sites containing this information. However some youth will take the initiative to seek out this bad information. In this paper we propose a method to analyze the searching behavior of youth and then to shield those keywords that may impact their health over time. We suggest that search engine operators provide keywords filtering technology to limit the searching behavior of youth. Operators should return to warning users who search keywords that contain bad information and record the searching log as feedback to parents. Of course parents should provide their IP addresses to the search engine operators first, to allow operators to set their IP addresses within the scope of supervising. Relying on search logs we count and classify keywords to understand the trend of youths´ searching behavior and the areas that they often are interested in. Then we cluster the keywords in each area to get some main clusters and frequent keywords. Using this method we can grasp youths´ searching behavior and protect them from the impact of bad information effectively.
Keywords :
Internet; behavioural sciences computing; information retrieval; pattern classification; pattern clustering; search engines; security of data; IP addresses; Internet era; cyber security; cyberspace environment; gambling; keywords filtering technology; pornography; search engine operators; searching log; youth searching behavior analysis; Classification algorithms; Clustering algorithms; Internet; Machine learning algorithms; Search engines; Text categorization; Training; bad informations; classify; cluster; searching behavior; shield;
Conference_Titel :
Cybersecurity Summit (WCS), 2011 Second Worldwide
Conference_Location :
London
Print_ISBN :
978-1-4577-1449-8