Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You and Your Team.

Learn More →

Session identification techniques used in web usage mining

Session identification techniques used in web usage mining PurposeThe purpose of this paper is to critically analyze the state-of-the-art session identification techniques used in web usage mining (WUM) process in terms of their limitations, features, and methodologies.Design/methodology/approachIn this research, systematic literature review has been conducted using review protocol approach. The methodology consisted of a comprehensive search for relevant literature over the period of 2005-2015, using four online database repositories (i.e. IEEE, Springer, ACM Digital Library, and ScienceDirect).FindingsThe findings revealed that this research area is still immature and existing literature lacks the critical review of recent session identification techniques used in WUM process.Originality/valueThe contribution of this study is to provide a structured overview of the research developments, to critically review the existing session identification techniques, highlight their limitations and associated challenges and identify areas where further improvements are required so as to complement the performance of existing techniques. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Online Information Review Emerald Publishing

Session identification techniques used in web usage mining

Online Information Review , Volume 40 (7): 21 – Nov 14, 2016

Loading next page...
 
/lp/emerald-publishing/session-identification-techniques-used-in-web-usage-mining-k0jWNKzP9A
Publisher
Emerald Publishing
Copyright
Copyright © Emerald Group Publishing Limited
ISSN
1468-4527
DOI
10.1108/OIR-08-2015-0274
Publisher site
See Article on Publisher Site

Abstract

PurposeThe purpose of this paper is to critically analyze the state-of-the-art session identification techniques used in web usage mining (WUM) process in terms of their limitations, features, and methodologies.Design/methodology/approachIn this research, systematic literature review has been conducted using review protocol approach. The methodology consisted of a comprehensive search for relevant literature over the period of 2005-2015, using four online database repositories (i.e. IEEE, Springer, ACM Digital Library, and ScienceDirect).FindingsThe findings revealed that this research area is still immature and existing literature lacks the critical review of recent session identification techniques used in WUM process.Originality/valueThe contribution of this study is to provide a structured overview of the research developments, to critically review the existing session identification techniques, highlight their limitations and associated challenges and identify areas where further improvements are required so as to complement the performance of existing techniques.

Journal

Online Information ReviewEmerald Publishing

Published: Nov 14, 2016

References