[1] 互联网周刊: 2014年中国大数据厂商综合服务水平TOP100 [R/OL]. [2014-07-02]. http://www.199t.com/ archives/251580.html. (China Internet Weekly. The Top 100 Comprehensive Service Level of China Big Data Vendors in 2014 [R/OL]. [2014-07-02]. http://www.199it.com/archives/ 251580.html.)
[2] Elsevier. SEO Scams Growing [J]. Computer Fraud & Security, 2009(10): 1-2.
[3] Sullivan D. Who Invented the Term "Search Engine Optimization"? [EB/OL]. [2014-12-27]. http://forums.searchenginewatch.com/showpost.php?p=2119&postcount=10.
[4] Bailyn E, Bailyn B. Outsmarting Google: SEO Secrets to Winning New Business [M]. Indiana USA: QuePublishing, 2011: 21-167.
[5] Kapoun J, Tillman H. Evaluating Web Sites: Criteria and Tools [EB/OL]. [2014-07-15]. https://olinuris.library.cornell. edu/ref/research/webeval.html.
[6] 张欢, 夏圆, 齐向楠. 基于Google排名影响因素的SEO策略分析[J]. 现代情报, 2011, 31(11): 70-74. (Zhang Huan, Xia Yuan, Qi Xiangnan. Optimizing Strategies for Search Engines Based on Google [J]. Journal of Modern Information, 2011, 31(11): 70-74.)
[7] Zikopoulos P C, Eaton C, deRoos D. Understanding Big Data [M]. USA: The McGraw-Hill Companies, 2012.
[8] Gu J, Zhang L. Data, DIKW, Big Data and Data Science [J]. Procedia Computer Science, 2014, 31: 814-821.
[9] De Wilde P. Small, Medium & Big Data [EB/OL]. [2014-07- 16]. http://www.slideshare.net/pierredewil-de/small-medium- and-big-data.
[10] O'Day V L. Information Ecologies [J]. The Serials Librarian, 2000, 38(1-2): 31.
[11] Nardi B A, O'Day V L. Information Ecologies: Using Technology with Heart [M]. MA: MIT Press, 1999.
[12] Nardi B A. Information Ecologies [J]. Reference & User Services Quarterly, 1998, 38 (1): 49.
[13] Nam Y, Lee Y O, Park H W. Can Web Ecology Provide a Clearer Understanding of People's Information Behavior During Election Campaigns [J]. Social Science Information, 2013, 52(1): 91-109.
[14] Davenport T H, Prusak L. Information Ecology: Mastering the Information and Knowledge Environment [M]. Oxford: Oxford University Press, 1997.
[15] 陈锡生,袁京蓉.企业信息资源生态系统中信息制度要素研究[J]. 技术经济, 2002(7): 21-22. (Chen Xisheng, Yuan Jingrong. Elements of the Information System in the Enterprise Information Resources Ecosystem [J]. Technology Economics, 2002(7): 21-22.)
[16] 王晰巍,叶乃溪, 崔凤玲, 等. 中外信息生态研究进展的比较分析[J]. 图书情报工作, 2013, 57(5): 142-148, 127. (Wang Xiwei, Ye Naixi, Cui Fengling, et al. Comparative Analysis on Research Development of Chinese and Foreign Information Ecology [J]. Library and Information Service, 2013, 57(5): 142-148, 127.)
[17] Dickinger A, Stangl B. Website Performance and Behavioral Consequences: A Formative Measurement Approach [J]. Journal of Business Research, 2013, 66(6): 771-777.
[18] González M, Palacios B. Quantitative Evaluation of Commercial Web Sites: An Empirical Study of Spanish Firms [J]. International Journal of Information Management, 2004, 24(4): 313-328.
[19] Yalcin N. What is Search Engine Optimization: SEO [J]. Procedia - Social and Behavioral Sciences, 2010(9): 487-493.
[20] 赵仪, 赵熊, 张成昱. 专业网站的评价指标分析[J]. 现代图书情报技术, 2002(4): 43-45. (Zhao Yi, Zhao Xiong, Zhang Chengyu. Analyzing of Evaluating Indicators for Specialized Website [J]. New Technology of Library and Information Service, 2002(4): 43-45.)
[21] 周鑫, 孙建红. SEO技术及其效果的实证分析——以谷歌搜索引擎为例[J]. 经营与管理, 2013(10): 105-108. (Zhou Xin, Sun Jianhong. An Empirical Analysis of SEO Technology and Its Effect [J]. Management and Administration, 2013(10): 105-108.)
[22] 百度. 百度搜索引擎优化指南2.0 [EB/OL]. [2014-07-01]. http://wenku.baidu.com/view/f576c31d650e52ea5518983f. html. (Baidu. Baidu Search Engine Optimization Guide 2.0 [EB/OL]. [2014-07-01]. http://wenku.baidu.com/view/f576c 31d650e52ea5518983f.html.)
[23] 刘江玲. 面向大数据的知识发现系统研究[J].情报科学, 2014, 32(3): 90-92, 101. (Liu Jiangling. Research on Knowledge Discovery System Faced in Big Data [J]. Information Science, 2014, 32(3): 90-92, 101.)
[24] 王新才, 丁家友. 大数据知识图谱: 概念、特征、应用与影响[J]. 情报科学, 2013, 31(9): 10-14, 136. (Wang Xincai, Ding Jiayou. Mapping Knowledge Domain of Big Data: Concept, Feature, Application and Impact [J]. Information Science, 2013, 31(9): 10-14, 136.)
[25] Chen C L P, Zhang C Y. Data-intensive Applications, Challenges, Techniques and Technologies: A Survey on Big Data [J]. Information Sciences, 2014, 275: 314-347.
[26] Avrachenkov K, Dudin A, Klimenok V, et al. Optimal Threshold Control by the Robots of Web Search Engines with Obsolescence of Documents [J]. Computer Networks, 2011, 55(8): 1880-1893.
[27] 丁佳. 基于大数据环境下的网络安全研究[J]. 网络安全技术与应用, 2014(4): 116-119. (Ding Jia. The Study of Network Security Based on Large Data Environment [J]. Network Security Technology & Application, 2014(4): 116-119.)
[28] 于长钺, 于秀山, 马睿涵. 基于网站集中的Web信息搜索速度优化研究[J]. 情报科学, 2012, 30(5): 717-719. (Yu Changyue, Yu Xiushan, Ma Ruihan. Research on the Speed Optimization of Web Information Search Based on Hub Sites [J]. Information Science, 2012, 30(5): 717-719.)
[29] 金培权, 郝行军, 岳丽华. 面向新型存储的大数据存储架构与核心算法综述[J]. 计算机工程与科学, 2013, 35(10): 12-25. (Jin Peiquan, Hao Xingjun, Yue Lihua. A Survey on Storage Architectures and Core Algorithms for Big Data Management on New Storages [J]. Computer Engineering & Science, 2013, 35(10): 12-25.)
[30] 吕清远. 大数据时代下的微信营销价值[J]. 现代经济信息, 2013(20): 279. (Lv Qingyuan. The Marketing Value of WeChat on Big Data Environment [J]. Modern Economic Information, 2013(10): 279.)
[31] White A. Search Engines: Left Side Quality versus Right Side Profits [J]. International Journal of Industrial Organization, 2013, 31(6): 690-701.
[32] 文必龙, 宗文栋. 海量并行处理系统的大数据读写接口优化研究[J]. 郑州轻工业学院学报: 自然科学版, 2012, 27(3): 28-30, 48. (Wen Bilong, Zong Wendong. Research on Interface Optimization for Reading and Writing Large Data of Massive Parallel Processing System [J]. Journal of Zhengzhou University of Light Industry: Natural Science, 2012, 27(3): 28-30, 48.)
[33] 李晨晖, 崔建明, 陈超泉. 大数据知识服务平台构建关键技术研究[J]. 情报资料工作, 2013(2): 29-34. (Li Chenhui, Cui Jianming, Chen Chaoquan. Studies in the Key Technology of the Big Data Knowledge Service Platform Construction [J]. Information and Documentation Services, 2013(2): 29-34.)
[34] Hayes B. Cloud Computing [J]. Communications of the ACM, 2008, 51(7): 9-11.
[35] Ngai E. Selection of Web Sites for Online Advertising Using the AHP [J]. Information & Management, 2003, 40(4): 233-242.
[36] Lin S H, Chu K P, Chiu C M. Automatic Sitemaps Generation: Exploring Website Structures Using Block Extraction and Hyperlink Analysis [J]. Expert Systems with Applications, 2011, 38(4): 3944-3958.
[37] Sooda A K, Enbodya R J, Bansal R. Dissecting SpyEye - Understanding the Design of Third Generation Botnets [J]. Computer Networks, 2013, 57(2): 436-450.
[38] 喻钧, 季靖, 李景涛, 等. 网站漏洞检测软件的设计与应用[J]. 信息安全与技术, 2013(8): 112-114. (Yu Jun, Ji Jing, Li Jingtao, et al. Design and Application of Site Loophole Detection Software [J]. Information Security and Technology, 2013(8): 112-114.)
[39] Salas M I P, Martins E. Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security [J]. Electronic Notes in Theoretical Computer Science, 2014, 302: 133-154. |