Chapter

The Adaptive Web

Volume 4321 of the series Lecture Notes in Computer Science pp 54-89

User Profiles for Personalized Information Access

  • Susan GauchAffiliated withElectrical Engineering and Computer Science, Information & Telecommunication Technology Center, 2335 Irving Hill Road, Lawrence Kansas 66045-7612
  • , Mirco SperettaAffiliated withElectrical Engineering and Computer Science, Information & Telecommunication Technology Center, 2335 Irving Hill Road, Lawrence Kansas 66045-7612
  • , Aravind ChandramouliAffiliated withElectrical Engineering and Computer Science, Information & Telecommunication Technology Center, 2335 Irving Hill Road, Lawrence Kansas 66045-7612
  • , Alessandro MicarelliAffiliated withDepartment of Computer Science and Automation, Artificial Intelligence Laboratory, Roma Tre University, Via della Vasca Navale, 79 00146 Rome

* Final gross prices may vary according to local VAT.

Get Access

Abstract

The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research projects and companies are exploring the use of personalized applications that manage this deluge by tailoring the information presented to individual users. These applications all need to gather, and exploit, some information about individuals in order to be effective. This area is broadly called user profiling. This chapter surveys some of the most popular techniques for collecting information about users, representing, and building user profiles. In particular, explicit information techniques are contrasted with implicitly collected user information using browser caches, proxy servers, browser agents, desktop agents, and search logs. We discuss in detail user profiles represented as weighted keywords, semantic networks, and weighted concepts. We review how each of these profiles is constructed and give examples of projects that employ each of these techniques. Finally, a brief discussion of the importance of privacy protection in profiling is presented.