<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Visualising web server logs for a Web 1.0 audience using Web 2.0 technologies: eliciting attributes for recommendation and profiling systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ed de Quincey</string-name>
          <email>Ed.de.Quincey@city.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patty Kostkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>David Farrell</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>City eHealth Research Centre (CeRC), City University</institution>
          ,
          <addr-line>London</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2009</year>
      </pub-date>
      <fpage>22</fpage>
      <lpage>26</lpage>
      <abstract>
        <p>Web server logs have been used via techniques such as user profiling and recommendation systems to improve user experience on websites. The data contained within server logs however has generally been inaccessible to nontechnical stakeholders on website development projects due to the terminology and presentation used. We describe a process that uses visualisation to enable these stakeholders to identify questions about site usage including user profiling and behaviour. The development of this tool utilising Web 2.0 technologies is described as well as feedback from the first stage of user evaluation on a realworld multi-national web development project called e-Bug. The potential for this process to elicit user attributes and behaviour that can be incorporated into automated user profiling systems is also discussed.</p>
      </abstract>
      <kwd-group>
        <kwd>Visualisation</kwd>
        <kwd>Web Server Logs</kwd>
        <kwd>User Profiling</kwd>
        <kwd>Web 2</kwd>
        <kwd>0 Technologies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Research into online user behaviour has been aided by the relative ease of collecting
feedback data using implicit methods such as web server logs [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ], compared to
explicit methods such as usability testing [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], tagging [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and ratings [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The data
stored in server logs has been used to create a number of recommendation [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ]
[
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] and profiling systems [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
      </p>
      <p>
        This has had a dramatic impact on the user experience e.g. Amazon [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] but apart
from deliberate or accidental releases of server log data (e.g. NetFlix Prize1, AOL),
the information contained within the logs has been generally hidden from the users of
a website and more importantly from non-technical stakeholders of a web
development project. This means that few people outside of the server log analysis or
web development communities fully understand the information that is stored in web
logs and the user behaviour that it can explain.
1 http://www.netflixprize.com/
      </p>
      <p>
        There have been several commercial attempts (Google Analytics2, Sawmill3,
WebTrans4) that have tried to make server logs, and therefore user behaviour, more
accessible to site owners. However, these applications analyse generic features of
sites that do not answer specific questions that certain stakeholders will have and do
not help them identify trends in user behaviour due to the sheer volume and technical
nature of the information presented [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        A potential solution to this problem is to use techniques from the field of Software
Visualisation (SV) to make the data contained within server logs more accessible to
non-technical stakeholders in website development projects. Using these methods
utilises the innate pattern matching ability [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] of the human cognitive system to
identify trends in user behaviour which might be missed by the current automated
profiling and recommendation systems. Once identified, non-technical stakeholders,
such as content providers, can adapt content and the site design to fit user behaviour
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. This human expertise could then potentially be integrated into current automated
recommendation and profiling systems.
      </p>
      <p>This paper describes the process of developing and using visualisation techniques
to disseminate site usage information to non-technical stakeholders, in order to
identify potential attributes for user profiling and recommendation systems. An
ongoing multinational project in e-Health, called e-Bug (www.e-bug.eu), has been
used as a test-bed and feedback from project stakeholders is detailed. The future
possibilities of this technique are discussed as well as general implementation issues
from using Web 2.0 technologies.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Background Information</title>
      <sec id="sec-2-1">
        <title>2.1 Visualisation and Metaphors</title>
        <p>
          Visualisation is concerned with making large amounts of information more
comprehensible for the user by using a visual representation. Software Visualisation
has been successfully used by software engineers to “make software more visible”
[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] by representing the significant features of code using a visual metaphor. A well
known example of a visualisation is the London Underground Tube Map5 which is a
representation of a complex, real world artifact that can be understood immediately
and navigated simply. A detailed taxonomy of SV has been produced by Brice et al.
[
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] and also the related fields of Information Visualisation, Visual Analytics [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ][
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]
and Metaphors used in interface design [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] contain a number of related and relevant
techniques.
2 http://www.google.com/analytics/
3 http://www.sawmill.net/
4 http://www.webtrans.co.uk/
5 http://www.tfl.gov.uk/gettingaround/1106.aspx
2.2 The e-Bug Project
e-Bug is a European Commission funded project that aims to reduce inappropriate
antibiotic use and improve hygiene through improving the education of young people
in seventeen participating countries. e-Bug combines traditional methods of
classroom delivery with online, browser-based (Flash) games to teach a pupils in
junior and senior schools about microbes, hand and respiratory hygiene, and
antibiotics. Example lessons and media are available on the e-Bug website6 alongside
games that can be used alongside the pack or standalone [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>Currently the server logs from the e-Bug project are analysed using a proprietary
application called Sawmill. This produces standard reports that cover information
such as visits, hits, content viewed, visitor demographics and systems and referrers.
These reports are produced monthly and uploaded onto the e-Bug website7. It was
found however that although the project partners expressed a high degree of interest
in the website statistics during meetings, the format that the reports were currently in
were not easily accessible to non-technical users. This was mainly due to the
terminology used and the statistics presented not answering specific questions that the
project partners had regarding the users of the site [D. Farrell 2009, pers. comm.]. It
was decided therefore that the server logs from the e-Bug project website would make
a suitable test-bed to use visualisation techniques to analyse and present the statistics
in a way that reduced the confusion and elicited potential attributes for user profiling.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Method for server log visualisation</title>
      <p>
        A User Centred Methodology (UCD) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] was used to develop a prototype
application that would visualise the statistics that were currently calculated by the
Sawmill application e.g. visits during particular months/years, geolocations of visits.
      </p>
      <p>
        Sketching has been used previously to create code visualisation software [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] and
so the same approach was used initially to explore potential metaphors and
representations that could be used. An example sketch is shown below in Figure 1.
6 http://www.e-bug.eu
7 http://www.e-bug.eu/ebug_secret.nsf/England-Project-General/eng_eng_p_wp_gn_stats
      </p>
      <p>At this stage two potential metaphors were identified: a weather map metaphor and
a timeline metaphor. After discussion with members of the project team it was
decided to begin by developing the weather map metaphor as this would support one
of the main features that was missing from the current reports: accurate geographical
distribution of the users of the site.
3.1</p>
      <sec id="sec-3-1">
        <title>Web 2.0 Technologies for Visualisation</title>
        <p>Having identified possible interface designs for the application, an online prototype
system was developed and suitable technologies explored for creating the map
metaphor. The following figure shows the first version of the prototype.</p>
        <p>The interface incorporates two main visualisations. An area on the left hand side of
the screen that shows the number of visitors and page views in a particular year and
month (and their daily distribution) using simple bar charts. The area on the right
contains a map with individual visitors denoted by their location with a marker (in
this case the e-Bug logo). Users can select particular months from the drop down
menu on the left and navigate the map using the navigation icons and the mouse
pointer.</p>
        <p>The map was created using the Google Maps API, which uses JavaScript to make
asynchronous calls (AJAX) to display the map and the markers. The data for the
markers is stored in an XML file that is generated by a PHP page parsing a CSV file
that is created using Sawmill8. The CSV file contains paired values of a users’
hostname and the number of page views that came from that IP address. PHP is then
used along with the GEOIP Lite Open Source reverse geolocation database9 to
calculate a longitude and latitude for each hostname. These are then saved in an XML
file in the following format:
&lt;marker lat="40.6333" lng="-7.8333"/&gt;</p>
        <p>The bar charts were created using the Google Charts API, which creates dynamic
images based on parameters passed in the querystring, for example:
&lt;img
src=”http://chart.apis.google.com/chart?cht=p3&amp;chd=t:60
,40&amp;chs=250x100&amp;chl=Hello|World” alt=”Bar chart” /&gt;
The parameters were determined using PHP pages and CSV files that contain
monthly and daily totals of visits and page views.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 Evaluation</title>
      <p>This prototype was then uploaded to the e-Bug website and feedback was elicited
from members of the e-Bug project team from seventeen European countries, as well
as researchers involved in similar projects at UK Universities as part of the UCD
process. The evaluation was in the form of an email with a set of open-ended
questions that respondents were asked to answer regarding the interface. The main
focus of this exercise was to ascertain whether the information that was being
represented was clear enough, whether appropriate metaphors were being used and
also whether there were any other statistics that users would be interested in. As this
is an ongoing project, feedback has so far been received from nine respondents.</p>
      <p>The majority of respondents reacted positively to the interface and the visualisation
and a number of them were able to give detailed feedback, indicating that they were
able to understand what the page was showing and what it did not. The main recurring
points from this feedback are detailed below:
 Add representation that shows “magnitude of visitors” as it is difficult to gauge
repeat visitors, number of pages viewed and markers that overlap.
8 The data from Sawmill was used rather than the raw server logs due to the fact that Sawmill
filters out certain web crawlers as well as using custom filters that have been created to
remove certain IP addresses.
9 http://www.maxmind.com/app/geolitecity
 Add specific place markers to the map that do not appear (unless at a higher zoom
level).
 Add specific evaluation areas/overlays onto the map10.
 Show the density of visitors in each area i.e. show visitors per 100,000 population
to get more meaningful comparisons.
 Add in a view of popular pages downloads and where they originate from.
 Highlight returning visitors.
 Add in a view that shows the times of day that various pages are being accessed
e.g. if the games are being viewed outside of school hours this could indicate that
students are playing them at home.
 Ability to compare months and countries.</p>
      <p>One of the most interesting points noted by the stakeholders however was the fact
that the data being represented itself is a potential area of confusion. For example, a
number of users gave the general impression that they did not know the difference
between a visitor and a hit. It became clear that the target users of this application do
not posses the same knowledge that experts in the field take for granted and further
investigation into this area is being conducted.</p>
      <p>Following on from this, a second version is currently being developed to take into
account the feedback and also to tackle some of the issues that have been raised with
regards to the interface and the information that users would like displayed. A
screenshot(s) from the second iteration of the software is shown below:</p>
      <p>As well as markers and statistics for visitors, information regarding pack
downloads (educational resources for teachers in Word and PowerPoint files) has
been included and split into “Junior” and “Senior” versions.</p>
      <p>This version of the application also uses an updated visitors’ visualisation that
takes into account the number of page views from a particular users. The well-known
temperature scale visualisation used on weather maps has been utilised to be able to
differentiate between the levels of activity in various regions.
10 this can potentially be achieved using the Google Polylines’ API</p>
    </sec>
    <sec id="sec-5">
      <title>5 Discussion</title>
      <sec id="sec-5-1">
        <title>5.1 Potential for use in User Profiling</title>
        <p>Initial feedback has already indicated that visual representations of the data have
allowed the non-technical stakeholders in the project to start to identify user types and
user behaviour. One particular interest is whether pupils are accessing the games
pages at home or at school and whether the tool can identify whether it is a student
viewing the website or a teacher. By geographically representing visitors in relation to
the location of target schools, along with the time they are accessing the site can
potentially achieve this simple user profiling task.</p>
        <p>This example and others detailed in Section 4 indicate that providing non-technical
stake holders with a visual representation of the server logs has allowed them to
communicate requirements for further analysis which can either be integrated into the
filters used in the Sawmill application or into the visualisation tool. Without the use of
visualisation techniques, it is doubtful that these questions regarding the users of the
site and their behaviour would have been raised.</p>
        <p>Further investigation of user profiles and understanding of national profiling
differences is a subject of our ongoing research.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2 Strengths of Web 2.0 Technologies for Visualisation</title>
        <p>There are a number of advantages with using Web 2.0 technologies such as the
various Google API’s and AJAX such as being able to create richer and more
interactive online interfaces but the main advantage relates to being able to utilise
users’ pre-existing skills and experience. The majority of users have prior experience
with interfaces such as Google Maps and in the same way that the Desktop has
become the standard metaphor used for operating systems, maps and markers and the
various methods of interaction that Google has developed have become a standard in
this area. Being able to “piggy-back” on to that frees the user from the interface and
allows them to focus on the visualisation, even though this application is a bespoke
solution.</p>
        <p>
          An associated advantage is that Google is a global organisation and so is its
software. The potential users of this software are from a diverse set of countries with
a number of different languages and levels of expertise. With Google being even
more popular in Europe than the US [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], and its projected market share expected to
take over the number one position from MapQuest by the end of the year [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], means
that the chances of a user having had previous exposure to the Google Maps interface,
and therefore the interface of this application, is quite high. This also has follow on
advantages for issues such as localisation and internationalisation.
        </p>
        <p>The other advantage is the increased speed in development. Being able to harness
pre-existing API’s allows for rapid prototyping and the ability to demonstrate a
working concept to users to elicit feedback almost immediately and also allows for
faster changes and incremental versions.</p>
        <p>Finally, the fact that Web 2.0 technologies are also designed to be accessible via a
number of different browsers and platforms also allows for speedier access and
dissemination of the information which is vital for cross-nation projects such as
eBug.</p>
      </sec>
      <sec id="sec-5-3">
        <title>5.3 Limitations of Web 2.0 Technologies for Visualisation</title>
        <p>One of the main problems with the Google Maps marker metaphor is the problem of
occlusion, something that is common when using 3-D visualisations. If a user visits
the site numerous times or downloads numerous pack or pages it is difficult to
represent that with numerous markers on the map as they will overlap with one
another. This can partially solved with the colour coding of markers but the accuracy
of the geolocation database and the fact that numerous visitors can originate form the
same area means that the markers often overlap. To improve this a method for
clustering the markers so that close “neighbours” are represented by one marker and
for this information to be presented textually once a user clicks on a clustered marker
are being investigated.</p>
        <p>A related problem is the amount of data that can be represented using these tools
and the limitations of the browser. During testing of the application it was found that
once around five thousand markers were placed on the screen using the standard
Google method, the browser would slow down and become unusable. For this
prototype this problem was solved by filtering out duplicate markers and also
nonEuropean hits (as this was not required at this stage in the site’s development).
However once the site it is launched and publicised further this year, there will be an
increase in visitors and therefore an increase in markers. Clustering methods are
therefore currently being investigated.</p>
        <p>One final problem that was highlighted from user feedback was that relying on
users having had prior experience on Google Maps means that for those who have
not, or those who do not realise that this is a Google Maps interface, have initial
problems with the interface. Adding extra methods of navigation or instructional
video/instructions are currently being piloted.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6 Conclusion</title>
      <p>The process of identifying appropriate visualisations to allow non-technical users to
start to identify site usage from server logs is important for successful web site
development and evaluation. The process presented in this paper has provided a
number of insights into the potential of using Web 2.0 tools and metaphors for
visualisation and dissemination of information. Although at an early stage, the tool is
already providing insights into a number of usage patterns on the site which are
enabling non-technical stakeholders of the e-Bug project to start to identify distinct
user profiles and most importantly to start to be able to utilise the data stored in server
logs more readily.</p>
      <p>
        Future work will include an investigation into pre-existing taxonomies that exist of
software visualisation [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] to see which might be relevant for representing web server
log data and also which can be supported by Web 2.0 technologies. Also, current
visualisation techniques from the biological sciences will be studied to see if any of
these are appropriate e.g. spread of user activity being represented in a similar way to
disease spread.
      </p>
      <p>Following on from this, the tool will be used in an investigation into user
behaviour on the e-Bug website in order to see whether researchers can identify usage
trends visually and what are the attributes of these trends e.g. time of day a user visits
plus geographical location might indicate whether they are a pupil or a teacher. This
will then feed directly into the development and tailoring of content for the site and
the potential for incorporating this into an automated profiling system will be
investigated.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dupret</surname>
            ,
            <given-names>G. E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Piwowarski</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A user browsing model to predict search engine click data from past observations</article-title>
          .
          <source>In Proceedings of the 31st Annual international ACM SIGIR Conference on Research and Development in information Retrieval (Singapore, Singapore, July 20 - 24</source>
          ,
          <year>2008</year>
          ).
          <source>SIGIR '08. ACM</source>
          , New York, NY,
          <fpage>331</fpage>
          -
          <lpage>338</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Joachims</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Optimizing search engines using clickthrough data</article-title>
          .
          <source>In Proceedings of the Eighth ACM SIGKDD international Conference on Knowledge Discovery and Data Mining</source>
          (Edmonton, Alberta, Canada,
          <source>July 23 - 26</source>
          ,
          <year>2002</year>
          ).
          <source>KDD '02. ACM</source>
          , New York, NY,
          <fpage>133</fpage>
          -
          <lpage>142</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Joachims</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Granka</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hembrooke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radlinski</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Gay</surname>
          </string-name>
          , G.:
          <article-title>Evaluating the accuracy of implicit feedback from clicks and query reformulations in Web search</article-title>
          .
          <source>ACM Trans. Inf. Syst</source>
          .
          <volume>25</volume>
          ,
          <issue>2</issue>
          (Apr.
          <year>2007</year>
          ),
          <volume>7</volume>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Nielsen</surname>
          </string-name>
          , J.:
          <article-title>Usability inspection methods</article-title>
          .
          <source>In Conference Companion on Human Factors in Computing Systems</source>
          (Boston, Massachusetts, United States,
          <source>April 24 - 28</source>
          ,
          <year>1994</year>
          ). C. Plaisant, Ed.
          <source>CHI '94. ACM</source>
          , New York, NY,
          <fpage>413</fpage>
          -
          <lpage>414</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Spool</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Schroeder</surname>
          </string-name>
          , W.:
          <article-title>Testing web sites: five users is nowhere near enough</article-title>
          .
          <source>In CHI '01 Extended Abstracts on Human Factors in Computing Systems</source>
          (Seattle, Washington, March 31 - April 05,
          <year>2001</year>
          ).
          <source>CHI '01. ACM</source>
          , New York, NY,
          <fpage>285</fpage>
          -
          <lpage>286</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kipp</surname>
          </string-name>
          , M. E. and
          <string-name>
            <surname>Campbell</surname>
          </string-name>
          , D. G.:
          <article-title>Patterns and inconsistencies in collaborative tagging systems: An examination of tagging practices</article-title>
          . Available from http://dlist.sir.arizona.edu/1704/01/KippCampbellASIST.pdf (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Anand</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kearney</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Shapcott</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Generating semantically enriched user profiles for Web personalization</article-title>
          .
          <source>ACM Trans. Interet Technol. 7</source>
          ,
          <issue>4</issue>
          (Oct.
          <year>2007</year>
          ),
          <volume>22</volume>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Schafer</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Riedi</surname>
          </string-name>
          , J.:
          <article-title>Recommender systems in e-commerce</article-title>
          .
          <source>In Proceedings of the 1st ACM Conference on Electronic Commerce (Denver</source>
          , Colorado, United States,
          <source>November 03 - 05</source>
          ,
          <year>1999</year>
          ).
          <source>EC '99. ACM</source>
          , New York, NY,
          <fpage>158</fpage>
          -
          <lpage>166</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Schafer</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          , J.:
          <article-title>Ecommerce recommendation application</article-title>
          ,
          <source>Data Mining and Knowledge Discovery</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          /2):
          <fpage>115</fpage>
          -
          <lpage>153</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sarwar</surname>
            ,
            <given-names>B. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karypis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          , J.T.:
          <article-title>Item-based collaborative filtering recommendation algorithms</article-title>
          ,
          <source>Proc. of the Tenth Int. WWW Conf</source>
          ., pp.
          <fpage>285</fpage>
          -
          <lpage>295</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ali</surname>
          </string-name>
          , K. and
          <string-name>
            <surname>van Stam</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>TiVo: making show recommendations using a distributed collaborative filtering architecture</article-title>
          .
          <source>In Proceedings of the Tenth ACM SIGKDD international Conference on Knowledge Discovery and Data Mining</source>
          (Seattle, WA, USA,
          <year>August</year>
          22 -
          <issue>25</issue>
          ,
          <year>2004</year>
          ).
          <source>KDD '04</source>
          . ACM Press, New York, NY,
          <fpage>394</fpage>
          -
          <lpage>401</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Herlocker</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Terveen</surname>
            ,
            <given-names>L. G.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Riedl</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Evaluating collaborative filtering recommender systems</article-title>
          .
          <source>ACM Trans. Inf. Syst</source>
          .
          <volume>22</volume>
          ,
          <issue>1</issue>
          (Jan.
          <year>2004</year>
          ),
          <fpage>5</fpage>
          -
          <lpage>53</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kostkova</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diallo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Jawaheer</surname>
          </string-name>
          , G.:
          <article-title>User Profiling for Semantic Browsing in Medical Digital Libraries</article-title>
          ,
          <source>Proceedings of ESWC</source>
          <year>2008</year>
          ,
          <article-title>The Semantic Web: Research and Applications</article-title>
          , 5th European Semantic Web Conference, Tenerife, Canary Islands, Spain, June 1-
          <issue>5</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Danilowicz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Indyka-Piasecka</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Dynamic User Profiles Based on Boolean Formulas, Lecture Notes in Computer Science</source>
          , Volume
          <volume>3029</volume>
          /
          <year>2004</year>
          , pages
          <fpage>779</fpage>
          -
          <lpage>787</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Linden</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and York, J.:
          <article-title>Amazon.com Recommendations Item-to-Item Collaborative Filtering</article-title>
          , IEEE Internet Computing,
          <string-name>
            <surname>January-February</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Drott</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          :
          <article-title>Using Web server logs to improve site design</article-title>
          .
          <source>In Proceedings of the 16th Annual international Conference on Computer Documentation (Quebec</source>
          , Quebec, Canada,
          <source>September 24 - 26</source>
          ,
          <year>1998</year>
          ).
          <source>SIGDOC '98. ACM</source>
          , New York, NY,
          <fpage>43</fpage>
          -
          <lpage>50</lpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Sinha</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Recognizing complex patterns</article-title>
          .
          <source>Nat Neurosci</source>
          <volume>5</volume>
          :
          <fpage>1093</fpage>
          -
          <lpage>1097</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Petre</surname>
          </string-name>
          , M. and
          <string-name>
            <surname>de Quincey</surname>
          </string-name>
          , E.:
          <article-title>A gentle overview of software visualisation</article-title>
          .
          <source>Computer Society of India Communications. August</source>
          ,
          <volume>6</volume>
          -
          <fpage>11</fpage>
          . ISSN 0970-
          <fpage>647X</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Price</surname>
            ,
            <given-names>B. A.</given-names>
          </string-name>
          <string-name>
            <surname>Baecker</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Small</surname>
            ,
            <given-names>I. S.</given-names>
          </string-name>
          <article-title>A Principled Taxonomy of Software Visualization</article-title>
          ,
          <source>Journal of Visual Languages and Computing</source>
          ,
          <volume>4</volume>
          ,
          <year>1993</year>
          ,
          <fpage>211</fpage>
          -
          <lpage>266</lpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Thomas</surname>
            ,
            <given-names>J.J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Cook</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Illuminating the Path: The R&amp;D Agenda for Visual Analytics</article-title>
          .
          <source>National Visualization and Analytics Center</source>
          . p.
          <fpage>3</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Tufte</surname>
            ,
            <given-names>E.R.</given-names>
          </string-name>
          :
          <source>The Visual Display of Quantitative Information. Graphics</source>
          Press (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Erickson</surname>
          </string-name>
          , T.:
          <source>Working With Interface Metaphors</source>
          ,
          <fpage>65</fpage>
          -
          <lpage>73</lpage>
          , edited by B.
          <article-title>Laurel, The Art of Human-Computer Interface Design</article-title>
          , AddisonWesley Publishing Company Inc, Reading, Massachusetts, USA. (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kostkova</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Farrell</surname>
          </string-name>
          , D.:
          <article-title>e-Bug online Games for Children: Educational Games Teaching Microbes, Hand and Respiratory Hygiene and Prudent Antibiotics Use in Schools across Europe</article-title>
          ,
          <source>In the Proceedings of the ESCAIDE 2008 conference</source>
          , Berlin,
          <year>November 2008</year>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.U.S. Department of Health &amp;
          <article-title>Human Services: Step-by-Step Usability Guide</article-title>
          . Available: http://www.usability.gov/.
          <source>Last accessed 4th February</source>
          <year>2009</year>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Craft</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Cairns</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Using Sketching to Aid the Collaborative Design of Information Visualisation Software-A Case Study, In Human Work Interaction Design: Designing for Human Work</article-title>
          , Springer Boston, Volume (
          <volume>221</volume>
          ), p.
          <fpage>103</fpage>
          -
          <lpage>122</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lipsman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Google Holds Top Spot in European Site Rankings</article-title>
          , According to comScore World Metrix. Available: http://www.comscore.com/press/release.asp?press=
          <fpage>988</fpage>
          .
          <source>Last accessed 1st March</source>
          <year>2009</year>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.ABI Research:
          <article-title>The Google Maps vs MapQuest Online Mapping Portal War Is Driving Map 2</article-title>
          .0 Innovations. Available: http://tinyurl.com/dlwj7d.
          <source>Last accessed 5th March</source>
          <year>2009</year>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>