A Study of Customer Behaviour Through Web Mining
Abstract
Web mining is the extraction of interesting and potentially useful patterns and hidden information from web documents and web activities by applying data mining technology. The most important challenge of electronic commerce (E-commerce) is to understand as much as possible the customers wants, desires, and buying patterns to ensure competitiveness in the E-commerce era. Nowadays, any information related to consumer behavior has an important value in the highly competitive nature of the E-commerce market. Therefore, web mining can be used to find those obvious data that have potential value to reduce competition and simultaneously increase business profit. This paper aims to study the classification of web mining to extract customer behavior in E-commerce, investigate customer behavior through the techniques and processes of the web data mining used, explore the application of web mining in E-commerce, and increase profit.
Downloads
References
Li Yong-hong; Liu Xiao-liang, "Research of data mining based on e-commerce," Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on , vol.4, no., pp.719,722, 9-11 July 2010
Chaoyang Xiang; Shenghui He; Lei Chen, "A Studying System Based on Web Mining," Intelligent Ubiquitous Computing and Education, 2009 International Symposium on , vol., no., pp.433,435, 15-16 May 2009
Li Mei; Feng Cheng, "Overview of Web mining technology and its application in e-commerce," Computer Engineering and Technology (ICCET), 2010 2nd International Conference on , vol.7, no., pp.V7-277,V7-280,16-18 April 2010
Yadav, M.P.; Feeroz, M.; Yadav, V.K., "Mining the customer behavior using web usage mining in e-commerce," Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on , vol., no., pp.1,5, 26-28 July 2012 Dsfds
Gu Chengjian; Huang Lucheng, "Web Mining in Technology Management," Business and Information Management, 2008. ISBIM '08. International Seminar on , vol.2, no., pp.88,91, 19-19 Dec. 2008
Li Haigang; Yin Wanling, "Study of Application of Web Mining Techniques in E-Business," Service Systems and Service Management, 2006 International Conference on , vol.2, no., pp.1587,1592, 25-27 Oct. 2006
Cheng Yu; Xiong Ying, "Application of Data Mining Technology in E-Commerce," Computer Science-Technology and Applications, 2009. IFCSTA '09. International Forum on , vol.1, no., pp.291,293, 25-27 Dec. 2009 Ff
Zhiwu Liu; Li Wang, "Study of Data Mining Technology Used for E-commerce," Intelligent Networks and Intelligent Systems (ICINIS), 2010 3rd International Conference on , vol., no., pp.509,512, 1-3 Nov. 2010
S.Yadav, K.Ahmad, J.Shekhar, ”Analysis of Web Mining Applications and Beneficial Areas”, International Journal of IUM, vol.12, Issue 2, 2011.
Shen Zihao; Wang Hui, "Research on E-Commerce Application Based on Web Mining," Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on , vol., no., pp.337,340, 22-23 June 2010 Fsd
Tang, Hewen; Yan, Honglin; Zengfang Yang; Yu Ma; Chunping Li, "Application of Data Mining in Electronic Commerce," Information Engineering, 2009. ICIE '09. WASE International Conference on , vol.1, no., pp.631,634, 10-11 July 2009
Preeti Sharma and Sanjay Kumar, "An Approach for Customer Behavior Analysis Using Web Mining", International Journal of Internet Computing, ISSN: 2231-696, Issue-2, 2011.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.