Web Mining Research Papers 2011
This type of structure mining can be used to reveal the structure (schema) of Web pages, this would be good for navigation purpose and make it possible to compare/integrate Web page schemes.
This type of structure mining will facilitate introducing database techniques for accessing information in Web pages by providing a reference schema.
The growing trend of selling personal data as a commodity encourages website owners to trade personal data obtained from their site.
This trend has increased the amount of data being captured and traded increasing the likeliness of one’s privacy being invaded.
Some mining algorithms might use controversial attributes like sex, race, religion, or sexual orientation to categorize individuals.
These practices might be against the anti-discrimination legislation.
Another important concern is that the companies collecting the data for a specific purpose might use the data for totally different purposes, and this essentially violates the user’s interests.Government agencies are using this technology to classify threats and fight against terrorism.The predicting capability of mining applications can benefit society by identifying criminal activities.Web usage mining essentially has many advantages which makes this technology attractive to corporations including government agencies.This technology has enabled e-commerce to do personalized marketing, which eventually results in higher trade volumes.Based on the topology of the hyperlinks, Web structure mining will categorize the Web pages and generate the information, such as the similarity and relationship between different Web sites.Web structure mining can also have another direction -- discovering the structure of Web document itself.The companies which buy the data are obliged make it anonymous and these companies are considered authors of any specific release of mining patterns.They are legally responsible for the contents of the release; any inaccuracies in the release will result in serious lawsuits, but there is no law preventing them from trading the data.The applications make it hard to identify the use of such controversial attributes, and there is no strong rule against the usage of such algorithms with such attributes.This process could result in denial of service or a privilege to an individual based on his race, religion or sexual orientation.