APP下载

A Machine Learning Approach to User Profiling for Data Annotation of Online Behavior

2024-03-13MoonaKanwalNajeedKhanandAftabKhan

Computers Materials&Continua 2024年2期

Moona Kanwal ,Najeed A.Khan and Aftab A.Khan

1Computer Science and Information Technology Department,NED University of Engineering and Technology,Karachi,Pakistan

2Computer Engineering Department,Sir Syed University of Engineering and Technology,Karachi,Pakistan

3College of Education,Health and Human Services,Longwood University,Farmville,VA,USA

ABSTRACT The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.

KEYWORDS User intent;cluster;user profile;online search;information sharing;user behavior;search reasons

1 Introduction

The Internet has allowed people to reach across the globe and businesses to reach and engage people across the world.User-centric digitization has benefited businesses and users by creating more relevant,helpful,and engaging digital experiences.Technological advancement has also generated opportunities for scientists to investigate online users,their needs,and intentions in online engagement and provide solutions to make users’online experiences satisfying.Seeking information is the most common and leading online engagement for people.The information influx observed on the internet has crossed a staggering figure in zettabytes and is expected to reach exabytes by 2025.Thus,user needs for information,or as [1] calls it,user intent,is a subject that has been continuously researched for two decades.The internet is all about users;whether it is educational,entertainment,marketing,or commerce,user experiences are analyzed to create better content,produce better products,advertise better deals,or,in short,improve revenue.User profiling is an effective way to identify user informational needs and analyze users based on their online behaviors and practices,leading to the creation of customized information filters,digital marketing models,optimized search results,etc.

The research focuses on the intent to identify user groups of similar information interests.Other research discussed in the article has studied users and classified intentions based on a single behavior aspect.In contrast,this research proposes multiple behavioral dimensions to explore user intent and type.The research is part of Ph.D.research work and aims to collect online users’feedback on searching,sharing,and verifying information.This study targets the South Asian population residing in any region,male and female,and above the age of 18 years.Different venues like social media,universities,and professional circles are targeted to enroll participants for this study with an estimated population size of 250.The research answers the following research questions:

• Can machine learning determine user characteristics based on their behavior and practices in searching,sharing,and verifying information?

• Can user behavior be generalized as a ground truth or golden rule for labeling users?

This research develops a machine learning model to identify user intent types based on search,dissemination,trust behavior,and practices for obtaining information.First,the user information is captured by a survey questionnaire.Next,the data is preprocessed and analyzed using statistical methods.Scoring is computed for the user’s openness in searching,extravert sharing,and conscientiousness in trusting information.The scores are then clustered using K-Mean Clustering.The clustering provided five clusters depicting users’intent.User intent characteristics are extracted using feature averaging.The user profile is created based on user intent clusters and lastly,generalized to obtain ground truth for user labeling.

1.1 Exploration of Multidimensional User Online Behavior Using AI

One of the trending research topics is to capture user intention in acquiring information and provide ease in bringing that information to the user screen.The research stretches from user navigation,individual preferences,likes and dislikes,search results,and relevance of search queries[2],to user interaction and preferences on social media.For example,in the study[3],the users’physical attributes are used to analyze user interaction in image searching and content to design a search intent system.Online social platforms have also become a dynamic source of information,as was noted by the researchers[4]during COVID-19.User intent to browse information has taken an active seat by also becoming part of the information creation that is being searched.Social media engagement shifts the user intention from browsing to disseminating content[5].Sentiment Analysis is also used in analyzing and understanding user online behavior,e.g.,reference[6]used machine learning on tweets to analyze the sentiments of online users and study their intentions,whereas reference [7] performed semantic analysis of websites to customize search results to better suit the user intent.This research and many others have shaped search engine results,social platform information feeds,and online marketing[8].

Users’need to propagate information is also essential as it can help control the dissemination of authentic information while filtering misinformation.Recent surveys show that social platforms are the prime source of information gathering and exchange [9].Numerous research studies have investigated user perspectives on internet content and news integrity.A recent study showed that certain types of social media users are highly motivated to verify informationvs.the users whose primary intent on social media is to seek entertainment [10].In [11],the authors conducted a study exploring the user’s purpose in verifying the information and the methods employed.The research discovered various factors like source credibility and headline content to be prima facie in ascertaining the veracity of information.Information verification has become a challenge for news agencies and end users with the spread of fake information.Research shows that users easily fall for false information if it supports their viewpoint[12].

1.2 Depicting Intent through User Conceptual Profile

Another set of research has targeted capturing a broad set of user characteristics that can target the user’s search intent.Authors[13]studied the demographic characteristics of online users and their wide range of activities,including searching,socializing,banking,etc.,reference[14]discussed gender differences in searching behavior and search satisfaction,whereas reference[15]used machine learning classifier to identify gender based on user’s browsing history.Furthermore,an exploratory study was conducted in[16]to observe different personality traits in generation groups based on internet usage and other online activities whereas reference[17]created a BP Neural Network model for predicting personality traits based on user social standing and textual content produced on social platforms.Another work is that of[18],which studied Instagram users’social behavior and proposed three groups of users based on their e-commerce activities.Authors in [19] presented user characteristics based on behavior on online social platforms.They used clustering analysis to group users based on social activities on social networks like YouTube and presented the different types of information consumer and producer users.The authors in another research[20]investigated differences in gender behavior and intention in information sharing.According to the authors,the information shared on social platforms varies from status updates and liking a post to advertisement sharing,especially on social media like Facebook or Twitter.Furthermore,the intention to share information differs for men and women based on social ties and commitments.The study [21] discussed factors like extraordinary circumstances or times of crisis(e.g.,the COVID-19 pandemic),social influence,or user attitudes as causes of an increase in the use of social platforms to access and share information being the only way to connect to rest of the world.The study in[18]investigated Taiwan’s Instagram users’social behavior and used big data analytics and k-Mean to cluster users and generate user profiles for social media and commerce development.Searching intent and browsing activities on given content were analyzed by authors in [22].The study proposed three user groups based on the query analysis and selection based on the given target.

The literature review reveals that different user profiles have been researched based on single metrics like e-commerce activity,content consumption,production or social activities,demographics,etc.This research investigates user online behavior and practices in seeking information and uses multiple factors like online searching,information propagation,verification,and demographics like gender,age,and occupation.This research proposes user profiles benefit businesses and users by creating a more personalized experience,targeting ideal customers through focused marketing,increasing website traffic by filtering information users desire,designing customized search filters,etc.The user profile template can be used as a metric for learning systems that can classify users.

1.3 Research Contribution

The research contributions are as follows:

• Identified the user behavioral features based on information searching,verifying,and sharing behaviors.

• Identified user groups of similar information interests.

• Proposed a new User Intent Class template or golden rule for annotating users based on online information seeking behavior.

• Proved that machine learning can distinguish online users based on a combination of multibehavioral factors.

The following section highlights and discusses the methodology used for feature engineering,data modeling,clustering,and generating User Intent Class Template.Finally,Section 3 focuses on the results,followed by the discussion and conclusion.

2 Research Methodology

This research aims to investigate online activities and preferences that users employ in searching,sharing,and verifying information and develop a user intent model that can summarize the general characteristics of users concerning online behavior and practices.The proposed modeling steps are presented in Fig.1.The pipeline is developed after considering related work with a particular focus on the categorical nature of the data.The literature review also revealed that the existing models have yet to cover user search,social,and verify information aspects as complete user information-seeking behavior and,therefore,cannot be directly used.Other works include data types,like textual,and stateof-the-art models,like deep net models used in [23] for text analysis.However,text extraction from social media and visual data are hard to obtain from participants due to privacy and hence are hard to acquire.This concern has also inspired this research to use user feedback on internet experience as they perceive and use this data to generate a user intent model.Also,formulating a generic user profile that can be used later to label users is one of the objectives.

Figure 1:Proposed process flow

The investigation collected user feedback on their online activities,preferences,and use of social networks for information dissemination.The data collected underwent the feature engineering process to extract prominent features.Three new attributes,Search Openness,Online Extravert,and Information Conscientious,are introduced,which are computed based on existing data and represent scores for searching,sharing,and verifying behavior.K-Mean Clustering is used on the new attributes to group similar data.Based on the user characteristics,labels are assigned to clusters.The clusters obtained are added to the original data.Feature average is computed for each class,and the user profile is summarized and labeled.A generalized user template is created and validated by domain experts.User attributes are then analyzed to understand user intent as learned by the machine.Each process in modeling is explained in detail in the following sections.

PyCaret1https://pycaret.readthedocs.io,Python pandas,and scikit-learn2https://scikit-learn.orgare used for feature engineering,data modeling,and classification.Pearson Chi-square Test is run using the Python SciPy3https://scipy.orgstats module.Visualization is done using PyCaret and OriginPro20234https://www.originlab.com.

2.1 Feature Engineering

2.1.1 Data Collection

The investigation is based on a qualitative survey comprising multiple categorical questions about user online behavior.It is divided into four parts: (1) users’demographic data,(2) searching behavior and action,(3) user intent toward information dissemination,and (4) user perception and actions on verification of information.The questions include a mixture of multiple choice,Likerttype,open-ended questions and case studies,which are formulated based on the literature survey on automated fact-checking [24] and traditional journalism [25–27].It has been piloted by ten users of different backgrounds and ages to ensure that the question’s objective is correctly captured.Based on their review,the questions are finalized.Two special cases are introduced (Figs.SA-I and SAII).The cases highlight the user’s point of view toward sharing and verifying content.Both cases use fake content deliberately to gather the user behavior toward trusting online content.Domain experts have examined the questionnaire to ensure that standard practices and ethical obligations are met.The JotForm5www.jotform.complatform is used as a survey medium.The questionnaire link,consent form,and invitation letter are broadcasted to different national and international community groups on social platforms like Facebook6http://facebook.comand WhatsApp,closed faculty,students,and other university employee groups.Participation has been anonymous and voluntary,and no incentive was pledged.Three hundred initial responses have been received against the threshold of 200.The final participants are mainly from South Asia and North America,with mostly Urdu or Hindi as their native language.Table SI shows a summary of participants’demographic information.Other features that later became insignificant are listed in Table SII.

2.1.2 Data Preprocessing and Encoding

Data pre-processing is essential in data analysis to ensure that the data is correct and free from noise,incomplete records,or unwanted or unsuitable data.Therefore,formal data pre-processing steps defined in [28] are carried out to clean and prepare the data for analysis.Fig.2 illustrates the preprocessing steps.

Figure 2:Data preprocessing steps

Since the data is collected using a well-defined input validation mechanism,the chances of noise in the data are significantly less.However,data still requires transformation to be helpful for any statistical or machine-learning process.The data is structured but textual and descriptive;hence,all descriptive data are transformed into short words for processing ease.All the columns or categories have the same naming convention,i.e.,main_variable|category_name,e.g.,Gender|Male.The category’s skewness is decreased by combining skewed options with other options,eliminating options,or creating range bins.For example,the occupation sector has many options,but some are merged based on the imbalance response count.Similarly,age ranges created in the questionnaire are further combined to create two bins in years,adults(18–40)and old adults(>40).Missing values are replaced with None.The data is further transformed by splitting columns with multiple entries due to multiple-choice selections.Since the nature of the data is categorical,the data with more than two categories are treated as nominal variables,and some with ordered categories like sometimes,rarely,and frequently are considered ordinal[29].

The data is hot encoded[30]to convert nominal and ordinal data to a numerical format.This is done because statistical analysis and general machine learning models require a numerical data format.One-hot encoding,the most used categorical data encoding scheme,is selected for transformation.Hot encoding converts categorical data into a binary vector where each category value is assigned a separate column.All entries with a value are marked one and the rest zero.This is repeated for all the values of categories.Other efficient encoding schemes like Hash encoding,Factorization[30],Target encoding[31],etc.,can also be used for categorical data;however,hot encoding is still a better choice as it expands data column-wise while keeping rows the same with no data loss.Other techniques support single-category variables,and separating each category before encoding would lead to an exponential increase in rows,creating redundancy in data.Hot encoding creates sparse data,but it becomes a problem for a large number of columns[31],which is not the case here.Table I in the supplementary file lists a few initial categorical data.

The Skewness in data influences the data analysis and feature reduction process;therefore,after encoding,the slightly skewed categories are merged.Some categories like trusted_publisher,though they did not appear skewed,are still combined with medium_verify_online categories to simplify data and reduce dimensions while removing the skewness of medium_verification_online categories.Figs.SB–I–V illustrate initial skewed data (encoded form).Figs.3–5 show the distribution of the final feature after feature engineering.Table 1 lists some of the features after transformation (for readability,the naming convention defined above is not used).Scaling and normalization are not required for binary data,but for transformation to numeric data for dimension reduction and scoring,normalization is performed on the dataset.This is discussed more in Section 2.2.2.

Table 1:Example categories after feature engineering

The initial dataset has 30 main variables,and after preprocessing of data,it is reduced to 25,while categories within these variables are also reduced.As a result,the participants’responses are also reduced to 255 after preprocessing.After encoding,the 25 variables are expanded to 50 variables.

Figure 3:Demographic features after feature processing

Figure 4:Search,share,and verify preferences features after feature processing

Figure 5:Search,share,and verify medium features after feature processing

2.1.3 Data Analysis and Feature Selection

Feature selection is an essential step in data analysis as it eliminates redundant or insignificant features that may cause overfitting of machine learning models.The outcome also reduces the data dimensions,which may help in better accuracy of the machine learning model[32].Different feature analysis techniques are available under the umbrella of 3 significant methods.(1)Filter,which is based on the ranking model;(2)Wrapper based on classification learning models;and(3)Embedded based on simple feature searching or recursive elimination models [33].The filtering method is chosen for initial analysis,and univariant statistical analysis,like the Hypothesis Test for Independence,is used to help distinguish dependent and independent variables[29].

The chi-square test for independence (χ2) is used in hypothesis testing to find the significant correlations between variables.The hypothesis includes H0=Two categorical variables having no relationship and H1=There is a relationship between two categorical variables.The chi-square determines whether a relationship exists between variables of the population.H0 is rejected onp-value<αwhereα=0.05 and accepted if thep-value is>0.05[34].Theαis standard but not fixed and can be adjusted based on the problem statement.The chi-square test(χ2)is performed on the one hot encoded preprocessed data.Thep-values are derived for all the variables paired with each other.The standardαof 0.05 required adjustment since we have multiple classes under each variable[35].

Bonferroni Adjustment is a simple and adaptive method for any simultaneous inference situation and is used for correcting thep-value.It divides the nominalp-value by the number of tests performed simultaneously or,in other words,by the number of classes within the variable.This way,each class is now transposed to become the primary variable.This ensures the main variable’s overall significance does not exceed the nominalp-value[36].Thus,the significance of features is determined byp-value ≤αc whereasαc

Therefore,thep-value is adjusted using the Bonferroni-Adjusted method defined as:

where Target alpha level=overall alpha level(usually 0.05),n=number of tests.

2.2 Data Modelling

The approach to answering the first research question involves finding user similarities based on their searching and sharing behavior and practices or generalizing user profiles as [37] indicated.In this research,unsupervised learning is used as it reflects the exploratory nature of the data.With no specific target in mind,unsupervised learning is best used in grouping datasets and labeling them based on the feature relationship.In addition,unsupervised learning offers clustering techniques that use feature similarity to form clusters.The similarity measure is a numeric representation of the closeness of objects and is calculated differently for different clustering techniques like K-Mean,Hierarchal,Spectral,etc.,[38].For this research,multiple methods are applied(Table SIV),and K-Mean is selected as the best model for capturing different groups of users.

2.2.1 Computing Feature Scores Using Weighted Feature

The data comprised binary features that reflected the user’s search,share,and verification behavior.Various research has used mathematical,statistical,and machine learning models to compute label or sample scores better to represent different data patterns.Reference[39]have added item-weighting scores to help the data model rank items that better represent features and samples,whereas [40]calculated user privacy scores by creating a mathematical model template that relates features such that correlation does not change.Authors in this study also used a probabilistic model to calculate scores.In this research,the first step is to identify the user characteristics and their level of involvement in the internet.Three new variables are introduced,computed as the sum of the weighted mean of features.The scores are termed SO,OE and IC.

Search Openness (SO)encapsulates searching behavior depicted from data.It includes search medium and browsing preferences.Online Extravert (OE)defines the sharing behavior based on sharing medium,preferences,and opinions based on cases 1 and 2.Information Conscientious (IC)summarizes information verification mediums and criteria and verification opinions in cases 1 and 2.The demographic features and the new computed scores are used to recognize user behavioral patterns.Case 1 and 2 features are also included in SE and IC since these cases explicitly target the share and verification behavior of the user.

The scores for SO,SE,and IC are calculated as follows:

where Sc=score,V=SO,SE and IC,k=total no.of categories.

The weighted mean(WM)is defined as:

where R=participant response on jthcategory,WMij=weighted mean at the ithresponse,and jthcategory.

The mean of the binary category is defined as:

where Fc=frequency of jthcategory,S=n number of samples,M=mean of jthcategory

The new score and demographic features are presented for cluster analysis.Since most clustering techniques work on numeric data sets,whereas this data had binary features,it needed to go through transformation to meet the format required by Clustering techniques.

2.2.2 Removing Outliers and Normalizing Data

Binary data does not require standardization or normalization;however,data with the new score features are normalized firstly to convert binary data to numeric,as most clustering techniques work on numeric data.The Z-score method is used for this purpose[41].The Isolation Forest or I-Forest technique is used for removing outliers.The threshold was set to 20%.The resultant dataset is reduced to 201 rows.

2.2.3 Identifying User Groups by Employing Clustering Technique

Clustering is an unsupervised machine learning technique derived from Cluster analysis;a statistical method used in exploratory data analysis.Clustering aims to group data that exhibit similar patterns or characteristics.This is done by identifying feature similarities and forming clusters by organizing data in hierarchal structures or nested sequences[42].Clustering learning was selected to investigate similarities in participants’data and determine if the behavior observed in this data can be labeled.

Normalized data consisting of demographic data,SO,OE,and IC scores,mentioned in the previous section,is presented to K-Mean clustering.K-Mean is a partitioning unsupervised technique and a widely used clustering method.K-Mean finds centroids of K clusters closest to the samples[43].The number of clusters K here is arbitrary,and different validation techniques are used to validate the quality of clusters.The K-Elbow curve is used to identify optimal clusters.Fig.6 reflects on the optimal k=5(the point where the line curves),with a distortion score of 1136(the sum of squared distances from the assigned centroids).Silhouette[44]is used to validate the cluster separation.Fig.7 indicates that the average silhouette score of 0.3 shows the fair separation of clusters.The analysis also shows no negative score in clusters,indicating that all the data members are well-placed in clusters.Fig.8 shows the 3D plot of clusters.Different outlier thresholds are tried to maximize outlier removal without decreasing the distance between clusters and the distribution of clusters.Other clustering techniques were also tried on data,including Hierarchal,Spectral,and Birch;however,K-Mean performed better.(Table SIV provides silhouette scores for different techniques using k=5 and k=4).

Figure 6:Elbow curve for optimal k clusters

Figure 7:Silhouette plot for cluster performance

Figure 8:3D view of clusters

2.3 Mining User Intent Class Characteristics for Labelling

The User intention to seek information is projected by the User Intent Class (UIC) model as five classes.The characteristics of each class are extracted based on feature contribution.Based on the behavioral factors observed in the UIC,a labeling scheme is proposed in this research and summarized to represent the user profile.

Online User profiling is an active research domain that helps design effective filtering systems for enhancing user engagement online.Reference [23] used linguistic features to classify different types of Twitter users,and reference [18] used structured data and applied clustering techniques to group Instagram users on commerce activities.Similarly,reference[45]used Facebook user posts and other features to group users by personality.Reference[46]classified Facebook users’frequency related to their activity,group membership likes shares,etc.,to determine personality.

2.3.1 Labelling UIC by Computing Feature Average

The characteristics are summarized based on the average participation of features in clusters.The features fi where i=1-n total features,the participation of fi in UICj where j=0–4,is calculated as

i.e.,the average participation of the feature is greater or equal to the total average participation of the feature in all UIC.Table SV–VIII show feature participation in clusters,whereas the total represents average cluster participation per feature.

UIC0,which includes adults,primarily males,with science and technology as the occupation sector,focuses on searching and sharing information but verifying selected content.UIC0 is labeled as Focused.UIC1 has a higher frequency of adult females of education,finance,and insurance occupations and use the internet for serious and casual activity but have a higher need to verify data.UIC1 is labeled as NetVenturer.UIC2 includes males who use the internet for targeted content and update information and use OSN for relaxation and staying connected to the world.UIC2 is labeled as Aware.UIC3 comprised late-age adult males who use the internet and social media to explore;however,they believe in investigating content before accepting or sharing.UIC3 is labeled as Committed.UIC4 consists of more female adults who are either unemployed or homemaker and uses the internet and social media for casual surfing and socializing and occasionally verify the information.UIC4 is labeled as Casual Surfer.The labels are proposed based on the average participation.The characteristics extracted based on Eq.(5)are presented as the user characteristics and cluster labels in Table 2.

Table 2:UIC characteristics and labels proposed

2.4 Generalizing UIC Features

The characteristics summarized in Table 2 are generalized to obtain ground truth or a template for labeling a new set of users.

2.4.1 UIC Feature Generalizing Criteria

The generalized rule for mapping UIC model features is outlined in Figs.9a and 9b.The main categories are genderized based on the behavior identified in User Intent Classes.The names are proposed based on general characteristics,e.g.,the new feature names under browsing preferences are inspired by the Google categorization of websites.However,each term is defined based on the research results and may differ from other generalizations.

Figure 9a:Schema for generalizing UIC SO and OE feature to Create UIC template

2.4.2 Generating User Template

The User profile was shown to domain experts,who verified the transition process and generic translation.The expert validated the efficacy of the template on a random sample of user data and achieved a reliability of 75%.The sample data selected from user feedback data is mapped using the general scheme presented in Section 2.4.1.The template is further generalized based on the observation defined in Table SIX.

It is then presented to a domain expert,which computes Inter-Rater Reliability (IRR).The criterion for annotation is set to 50% coverage of rules.Inter-Rater Reliability(IRR)is the degree of agreement between independent observers or raters who assess the event or annotate the data based on ground truth or golden rules associated with the event[47].Percentage is used as IRR and calculated as

whereas UICTIRRis the Inter-Rater Reliability of the UIC Template,UIC LabelMis an annotated label in the sample that matches UIC.The final UIC Template is presented in Table 3.

Table 3:User intent class template

3 Results and Discussion

This research aims to identify users’characteristics based on their search preferences,informationsharing intention,and trust in the information.The objective is to develop a machine learning framework to identify behavioral patterns and establish a ground truth based on their online behavior and practices.The user intent machine learning model uses the K-Mean clustering technique to identify user behavioral patterns,thus answering RQ1,grouping them into clusters,and extracting significant features that can be mapped into a generalized User Intent class template or ground truth with an IRR of 75%.The UIC template proposed answers the RQ2.The result shows that UIC2 appears to have male users with high search openness,online extravert,and information conscientiousness.On the other hand,UIC4 has mostly female adults with less searching and sharing engagement but not much in verifying content.The user profile is further discussed later in this section.The following section discusses the framework performance.

3.1 Cluster Validation

The clusters generated by K-Mean have a silhouette coefficient of 0.34,which suggests that clusters have overlapping membership.Fig.7 shows clusters 2 and 4 have lower membership than other clusters,whereas clusters 4,2,and 0,with silhouette score 0.5,are relatively well separated than clusters 1 and 3.The KMean model is tried with different k settings,while other clustering techniques are also tested(Table SIV).K-Mean model on k=4 shows considerable overlapping and a decrease in silhouette score.Other clustering models,though,performed well with marginal differences in average silhouette score but presented more overlapping in some clusters;hence,K-Mean clustering with k=5 is considered optimal.The model performance is also tested by changing the outlier threshold for better cluster separation and,finally,is set to 20%.The model stability is also tested and is further validated by manual annotation.It is inferred that the lower volume of data,outliers interfering in cluster density,and shifting cluster centroid may contribute to a lower silhouette coefficient.However,the cluster classification shows good results,increasing the performance of the entire model.

3.2 User Characteristics and UIC Labels

User characteristics captured by five clusters are used to label the cluster.The characteristics are summarized based on the average participation of categories in clusters.However,almost all the categories have contributed to some degree in clusters;some features show more influence than others.Tables SV–VIII illustrate feature participation in clusters.Fig.9c presents proposed UIC labels with summarized characteristics.UIC0,which includes adults,primarily males,with science and technology as the occupation sector focuses on searching and sharing information but verifying selected content.UIC0 is labeled as Focused.UIC1 has a higher frequency of adult females of education,finance,and insurance occupations and use the internet for serious and casual activity but have a higher need to verify data.UIC1 is labeled as NetVenturer.UIC2 includes males who use the internet for targeted content and update information and use OSN for relaxation and staying connected to the world.UIC2 is labeled as Aware.UIC3 comprised late-age adult males who use the internet and social media to explore;however,they believe in investigating content before accepting or sharing.UIC3 is labeled as Committed.UIC4 consists of more female adults who are either unemployed or homemaker and uses the internet and social media for casual surfing and socializing and occasionally verify the information.UIC4 is labeled as Casual Surfer.Tables 2 and 3 present the user characteristics and cluster labels after consulting with a domain expert.It is observed that users(above 18 years)generally do like to have some degree of verification of information;however,their level differs.It is interesting that occupation also directs the user’s intentions and activities.User patterns of searching and sharing are concentrated in their area.This can also be seen in UIC4,where users are more into casual content,probably because they do not belong to a specific occupation.

The IRR of 75% indicates that the UIC Template is generalized enough to act as ground truth and can be used for labeling new users.This is beneficial for developing customized searching,targeted marketing,and search engine optimization based on user preferences related to content consumption and production.

This research has targeted user searching behavior,information sharing,and verification intent to generate a generic user profile.The data was derived from user feedback rather than scrapped from the internet as privacy concerns have discontinued many social platforms for sharing data.Moreover,the review revealed that generic user profiles that model user behavior,interest,and intention are not covered,and user profiles are mostly context-based.Another objective of this research is to develop a machine-learning model that can summarize generic user profiles based on information searching,sharing,and verification behaviors.

Figure 9c:UIC propose labels

4 Conclusion and Future Work

This research is conducted to answer two questions: a) Can machine learning determine online user characteristics based on their behavior and practices in searching,sharing,and verifying information?b)Can user characteristics be generalized to generate a user intent template or ground truth?This research uses a hybrid machine learning approach to successfully cluster similar users based on their online search,share,and verification behavior.It proposes a new user profile ground truth that can be used to annotate users.The unsupervised K-Mean Clustering machine learning technique groups users based on similar features.The clustering resulted in five User Intent Classes(UIC)with a distortion score of 1120 and an average silhouette score of 0.34.Five different types of users are proposed based on their information-seeking behavior,and the characteristics are summarized.TheCommittedare those who balance work and leisure,theCasual Surferssearch and share for leisure with minimal need to authenticate information,theNetVenturersuses the internet for all purpose but keep their eyes open,theFocusedmainly seek information for serious work,and theAwarekeep themselves up to date on information but use the internet wisely.A UIC template is also proposed,which is a generalized form obtained from the findings.The findings for Inter-Rater Reliability(IRR)of 75% show that the UIC template can successfully annotate user based on their information seeking behavior.

These findings can be used to tailor online services to use generic user profiles that can be securely used to increase the user experience on the internet by providing the information the user generally intends.The research contributed to developing a framework for profiling users based on unique threedimensional data,i.e.,user search intent,information dissemination needs,and content credibility criteria.This research proposes new variables to identify and generalize user intentions in seeking online information.User online intentions have been investigated previously in different contexts and perspectives.Information-seeking behavior and the use of social media to consume and produce information are a few areas explored under user intention.Studies like[9]and[10]were also conducted in social or psychological contexts to understand user trust in information consumed through the internet.This research argues that user intention in seeking information is a mixture of multiple behaviors and must be considered in knowing the full intent of the user in acquiring knowledge.The research shows a correlation between search and share,whereas verification adds weight to how much truth users desire.Better search filters can be designed based on such data.Search Engine Optimization(SEO),targeted advertising,and shopping experience for user services can also benefit from user profiling.

The research captured specific demographic data;therefore,more extensive,and diverse data is required for further generalization.Diversity was initially aimed for but was restricted by regional reachability and funding restrictions.Payment-based user platforms like Amazon Mechanical Turk can be used to enroll participants of diverse backgrounds.More sophisticated models,like neural nets,can be tried with a more extensive set.The research did not aim for a real-time model that can also be focused on in the future.In addition,further work can be done to capture live user actions and create a mapping framework to evaluate the current model.

Acknowledgement:The authors would like to thank the study participants and data Raters for their valuable services.

Funding Statement:This research is funded by the Ministry of Science and Technology (MoST)Endowment Fund governed under NED University of Engineering and Technology Pakistan.https://csrd.neduet.edu.pk/.

Author Contributions:The authors confirm their contribution to the paper as follows:Study Conception and Design:Moona Kanwal,Najeed A.Khan;Data Collection,Analysis and Interpretation of Results:Moona Kanwal,Najeed A.Khan,Aftab A.Khan;Draft Manuscript Preparation: Moona Kanwal.All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials:Data collected in this research is part of Ph.D.research and cannot be made available at this time.However,it can be made available upon reasonable request in the future.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

Supplementary Materials:The supplementary material is available online at https://doi.org/10.32604/cmc.2024.047223.