Discovery of Personalized Information Systems Usage Patterns

Users use information systems to accomplish their tasks usually consisting of multiple steps. Each user or user group might have a preferred sequence of the steps. Adaptive information systems attempt to exploit such usage patterns, and it is expected that adaptivity can be improved through personalizing processes and accounting for temporal and sequential dependencies. However, there is a lack of empirical evidence of existence of personalized information systems usage patterns. The objective of this paper is to analyze empirical information systems usage data in order to confirm existence of personalized information systems usage patterns, which could be further used in developing adaptive information systems. Empirical data analyzed are derived from log files of customers service website of a telecommunication company and of university’s e-learning system. The Longest Common Subsequence algorithm is used to discover patterns in task execution. It is found that frequency of patterns observation varies significantly between the data sets although in both cases personalized patterns are observed more frequently than general patterns. The personalized patterns also are more precise than the general patterns.

[1]  Jaideep Srivastava,et al.  Data Preparation for Mining World Wide Web Browsing Patterns , 1999, Knowledge and Information Systems.

[2]  Feng-Hsu Wang,et al.  Effective personalized recommendation based on time-framed navigation clustering and association mining , 2004, Expert Syst. Appl..

[3]  Mathias Géry,et al.  Evaluation of web usage mining approaches for user's next request prediction , 2003, WIDM '03.

[4]  Leandro Balby Marinho,et al.  A system of agent-based software patterns for user modeling based on usage mining , 2005, Interact. Comput..

[5]  Yoon Ho Cho,et al.  Application of Web usage mining and product taxonomy to collaborative recommendations in e-commerce , 2004, Expert Syst. Appl..

[6]  Fotis Lazarinis,et al.  Current research issues and trends in non-English Web searching , 2009, Information Retrieval.

[7]  C. J. Pound,et al.  Extracting Business Rules from Information Systems , 1999 .

[8]  Jānis Grabis,et al.  User Modelling Driven Adaptive Enterprise Applications , 2008 .

[9]  Alan F. Smeaton,et al.  Personalisation and recommender systems in digital libraries , 2005, International Journal on Digital Libraries.

[10]  N. R. T. P. van Beest,et al.  Redesigning business processes: a methodology based on simulation and process mining techniques , 2009, Knowledge and Information Systems.

[11]  Yueh-Min Huang,et al.  NP-miner: A real-time recommendation algorithm by using web usage mining , 2006, Knowl. Based Syst..

[12]  P. S. Sastry,et al.  A survey of temporal data mining , 2006 .

[13]  Wil M. P. van der Aalst,et al.  Discovering colored Petri nets from event logs , 2007, International Journal on Software Tools for Technology Transfer.

[14]  Paul P. Maglio,et al.  An architecture for developing attentive information systems , 2001, Knowl. Based Syst..

[15]  Jaideep Srivastava,et al.  Web usage mining: discovery and applications of usage patterns from Web data , 2000, SKDD.

[16]  Sally Jo Cunningham,et al.  A transaction log analysis of a digital library , 2000, International Journal on Digital Libraries.

[17]  Thomas H. Cormen,et al.  Introduction to algorithms [2nd ed.] , 2001 .

[18]  Haibin Liu,et al.  Combined mining of Web server logs and web contents for classifying user navigation patterns and predicting users' future requests , 2007, Data Knowl. Eng..