Automatic Detection of Click Fraud in Online Advertisements. Abhishek Agarwal, M.S. A Thesis COMPUTER SCIENCE

Size: px
Start display at page:

Download "Automatic Detection of Click Fraud in Online Advertisements. Abhishek Agarwal, M.S. A Thesis COMPUTER SCIENCE"

Transcription

1 Automatic Detection of Click Fraud in Online Advertisements by Abhishek Agarwal, M.S. A Thesis In COMPUTER SCIENCE Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Approved Dr. Rattikorn Hewett Chair of Committee Dr. Sunho Lim Dr. Eunseog Youn Peggy Gordon Miller Dean of the Graduate School August, 2012

2 ACKNOWLEDGMENTS I would like to thank Dr. Rattikorn Hewett for her guidance throughout my Master s research. Her in-depth knowledge of the subject, focus on clarity and quality of work has helped me learn skills which will help me for the rest of my career. Her guidance on the research is invaluable and has helped me cope with the challenges I faced throughout the course of this work. ii

3 TABLE OF CONTENTS Acknowledgments... ii Abstract... v List of Tables... vi List of Figures... vii Motivation... 1 Contributions... 5 Background Work... 7 Preliminaries... 9 Terms... 9 Problem Statement Assumptions Mathematical Theory of Evidence Mass Functions Combination Rule Proposed Dempster Shafer Theory for Click Fraud Detection The Core Element of Dempster Shafer Theory Mass functions for Click Fraud Detection Evidence 1: Number of clicks on the ad Evidence 2: Time spent in browsing Evidence 3: Ad-Visit after non-ad visit Evidence 4: Time of Click Evidence 5: Place of origin of click Evidence 6: Creating of membership Evidence 7: Adding a product in shopping cart Data Set & Illustration Data Description Example of belief computation using mass function and combination Evaluation Case Study Case Study iii

4 Discussion & Conclusions Bibliography iv

5 ABSTRACT Increasing advancement, access and availability of the Internet Technology have intensified the growth of Internet users over the last decade. This has made online advertising a popular venue for many companies to market their products and services. Today, online advertisement is one of the most important sources of revenues that impact the economy of many large enterprises. In online advertisement, an advertiser pays a broker (e.g., Google, Yahoo), who normally has a search engine, to post its online advertisement, which can be on any appropriate publisher site. The publisher earns revenues from the broker for each click on the advertisement posted on its site, while the advertiser will be charged. Thus, when an excessive number of clicks occur, this can quickly dry up the fund of a rival company and drive it out of the competing advertisement. At the same time, each click adds revenue to the publisher. This motivates click frauds, which refer to malicious acts to create fraudulent clicks with the intent to increase revenue or drive away competitors without real interest in the products or services being advertised. Identifying click frauds is a difficult problem because of the dynamic nature of the click behaviors, some of which are generated by humans and some are by automated software called bots. There have been previous work attempting to identify click frauds using various techniques but they tend to be limited by the types of the data, the way they are processing or assumptions that are not always achievable. This thesis presents an approach to automatically detecting click frauds in online advertising. The approach uses a mathematical theory of evidence to estimate the likelihood of a click whether it is fraud or genuine using web log data of a user s activities on the advertiser s website. One advantage of the proposed approach is the fact that the likelihood can be computed for each incoming click and thus it gives an online computation of the belief that fits well with the dynamic behaviors of users. The thesis describes the approach and evaluates its validity using two real-world case studies. We believe the approach is general in that it can be applied to any scenario. v

6 LIST OF TABLES 4.1 Fraud certification rules Sample log data Input from server log Coefficient values Mass function beliefs for illustrated example Computed belief values for Case Study Computed belief values for first IP Computed belief values for second IP Computed belief values for third IP vi

7 LIST OF FIGURES 1.1 % change of revenue for advertising media (GeekWire, 2012) Google s revenue source distribution in 2011 (Google Earnings Report, 2011) Scenario before click fraud occurred Scenario after click fraud occurred Click fraud detection framework using D-S theory Legends for timeline diagram Timeline diagram sample data in Table Timeline diagram for Table Combined belief of fraud for input in Figure Timeline input for Case Study Belief of fraud from mass function Belief of ~fraud from mass function Belief of ~fraud from mass function Belief of fraud from mass function Belief of fraud from mass function Belief of ~fraud from mass function Belief of ~fraud from mass function Combined belief of fraud for Case Study Timeline diagram for Case Study Combined belief values for Case Study vii

8 CHAPTER I MOTIVATION The Internet has seen tremendous growth in the last decade and according to current statistics from the World Bank, nearly 32% of the world population currently uses the Internet. This has made online advertising not only lucrative but also an important medium for businesses to reach out to a large consumer base (Jansen, 2007). Figure 1.1 below shows that while most other media of advertisement are losing market share, online advertisements are growing tremendously. Figure 1.1 % change of revenue for advertising media (GeekWire, 2012) Not only do online ads benefit advertisers, they are also a rich source of revenue for publishers who display ads on their websites and brokers like Google, Yahoo, MSN, Ask.com etc. who provide the technical platform for online advertisements. Thus, online ads drive the Internet economy and are the necessary life blood for its survival and growth. Figure 1.2 below shows that in % of Google s revenue was from online ads alone. 1

9 Figure 1.2 Google s revenue source distribution in 2011 (Google Earnings Report, 2011) Online advertising is however not free of issues and click fraud is a major problem which can impact its growth. Click fraud is a type of crime in online advertisement in which a user clicks on an ad not with a genuine interest in what the advertiser has to offer but with intent of either generating illegal revenue (for the publisher that hosts the advertisement) from clicks or to intentionally cause monetary loss to the advertiser. It hurts the advertisers and may deter them from investing in online ads. Many advertising mechanisms exist including the pay-per-click (PPC) scheme which contributes to about 57 percent of all the Internet ads with nearly more than US$16 billion in revenue in 2010 (Tuzhilin, 2006; IAB and PwC, 2010). A popular example of PPC scheme is the Google Adsense. In PPC brokers like Google place targeted ads in dedicated ad spaces on publisher websites. Brokers get paid by advertisers for every click on the ad and they share the income generated this way with the publishers. While PPC is a great model for online advertisement, it suffers the most from the problem of click fraud (Tuzhilin, 2006). Most of the publishers in PPC programs are small time blog owners and are the source of majority of the click fraud. Competitors of an advertiser can also commit click fraud in order to reduce competition and it may indirectly benefit their business. To commit click fraud, publishers or 2

10 competitors can click on the ad themselves, ask friends to do it, use an Internet bot script which repeatedly clicks on the ads or hire people to do it for them (Kshetri, 2010). Such clicks are of no value to the advertisers as the clicker has no intent to buy their product or service, use information or carry out any transaction useful to the advertiser s business (Jansen, 2007). The brokers too have an incentive in not filtering out all the click fraud as doing so will reduce their revenues. They can contribute to click fraud by passively letting the fraud happen and not taking adequate measures to stop it. The lesser known brokers have a greater incentive in doing so (Kshetri, 2010). Multiple lawsuits filed by various advertisers against Google and Yahoo for not taking adequate steps to curb click fraud are an indication of brokers inability or unwillingness in this regard. Figure 1.3 below shows a scenario before click fraud when the advertiser s money reserve (advertising budget) is full. The publisher, broker or competitors have not generated any illegal revenue from click fraud. Figure 1.3 Scenario before click fraud occurred Figure 1.4 below shows the scenario after click fraud which caused advertiser s budget to completely deplete and the broker, publisher and competitor s illegal profit to increase. 3

11 Figure 1.4 Scenario after click fraud occurred Reputed brokers like Google actively try to contain click fraud by filtering out fraudulent clicks and permanently blocking publishers who are found involved (Tuzhilin, 2006; Kshetri, 2010). They have access to a user s search activities and the data they collect from the publisher to find patterns in a user s behavior. The idea is to estimate a user s intention behind the click in order to rate a click as genuine or fraudulent. However they may not have access to the data about a user s actions on the advertiser s website where the user is taken following the click. This is because the advertiser may choose to share limited or no data at all with the broker due to their own privacy concerns (Tuzhilin, 2006). Brokers provide aggregate statistics to advertisers and do not share details on which clicks they found fraudulent in order to avoid making their detection mechanisms open to fraudsters. Thus advertisers are not adequately informed and there is a strong case for the advertisers to have their own click fraud detection system in place. This way the advertisers can protect themselves not only from fraudulent publishers and competitors but also from brokers who either fail to detect fraud or let it occur willingly. Such a system can help them estimate the extent of the fraud in their ad campaign and pay the brokers for genuine clicks only. It is important to note here that brokers have access to much larger sources of information than advertisers. The advertisers must be able to do the click fraud detection with the limited data they have about users action at their website. 4

12 Click fraud identification is a difficult problem to solve. Fraud mechanisms evolve and continually change over time. The fraud can be carried out both by humans and software bots with distinctive characteristic behaviors. It is difficult to track users with their IP addresses as IPs are generally dynamic in that a IP address of the same user may change anytime. A software bot too can use different IP addresses at a time to carry out click attacks. Finally, the advertiser has access to data from their server, which gives very limited information about a user s behaviors. Contributions This paper presents an approach to automatically detecting click fraud at the ad-site. The advertisers can use the proposed approach to detect their click frauds. Our approach employs the mathematical theory of evidence called Dempster-Shafer (DS) Theory (Shafer, 1976; Denoeux, 1995; Dong et al., 2010; Sentz et al., 2002) for evidence-based reasoning to estimate the likelihood of a click being fraudulent based on the evidence gathered from the weblog data available to the advertiser. The proposed approach can also be useful for brokers for computing correct charges to their clients if the data are available to them. Our approach is based on a widely used theory that allows the estimate of the likelihood to be computed as each incoming click is exhibited. That is it offers an on-line computation. Thus, after each click from a given IP we can estimate our belief if the click is suspicion to be fraudulent or not. In summary the contributions of this thesis include: (1) an approach for automatically detecting or identifying click frauds, (2) a framework for reasoning about click frauds that integrates relevant information extracted from weblog data with the evidence based reasoning to update click fraud analysis in real-time, and (3) core elements of the proposed approach that consists of a set evidences required in detecting click frauds. These evidences will be formulated in terms of functions called mass functions used in the DS theory. The rest of this thesis is organized as follows: Chapter II presents background work on click frauds identification. Chapter III gives preliminaries including terms and relevant concepts, the problem formulation and its assumption, and the Dempster-Shafer Theory along with its fundamental elements. Chapter IV presents our approach to the problem and the details of the core contribution on formulating mass functions for click fraud identification 5

13 problem. Chapter V explains the data set used for the approach and gives an illustrative example. Chapter VI evaluates the proposed approach with experiments on synthetic data generated on two case studies. Chapter VII gives concluding remarks and possible extension for future work. 6

14 CHAPTER II BACKGROUND WORK Many different types of solutions have been proposed to counter click fraud. (Tuzhilin, 2006) suggested a model where the advertisers pay for a click only if it leads to a conversion event like purchase to counter CF. Such a model is economically unviable for publishers and so is not available to advertisers. Another method proposed (Tuzhilin, 2006) is the use of data mining models based on past data to classify clicks as fraud or ~fraud (not fraud). Such a solution may suffer from high inaccuracy as fraud mechanisms evolve and change over time. There is an assumption that past clicking behavior is indicative of future behavior. A large number of past clicks which can be truly classified as valid or invalid are also required. This is a batch process and not online. Moreover such datasets are at the disposal of brokers only and other involved parties like advertisers cannot use them. The author clearly states these limitations. (Haddadi, 2010) discusses the use of bluff ads for detecting sources of click fraud like trained bots or poorly trained human workforce employed to carry out fraud. The display text of these ads is unrelated to the context of the user to whom they are displayed. For example a user in Australia should not ideally be shown an ad of a special offer on pizza in New York City. A click by the user is unnatural in this case and will indicate that the user is a bot or human involved in fraud. However careful humans and sophisticated bots can still beat it. Also this is a broker-centric model. This can be implemented by brokers and advertisers need to completely trust brokers in this. Recently (Antoniou et al., 2011) proposed a burst detection algorithm to detect high frequency of user activity in short time periods to detect various types of click frauds including voting click fraud, frauds related to blog post popularity, search engine retaliation and advertising click fraud. While this is a good general solution for all types of click frauds mentioned, it does not cater to the nuances of advertisement click fraud, as a simple detection of bursts may not be enough to differentiate between valid and invalid clicks. More 7

15 factors/evidences need to be taken into consideration before we could conclusively label a click as fraudulent. (Walgampaya et al., 2011) proposed a method to detect bot scripts involved in click fraud using Bayesian Classifiers. The methods above are either not sufficient to combat the problem of click fraud individually or require broker involvement of some kind. The involvement may be in the form of policy changes by brokers or sharing data at their disposal and they have been unwilling for both. As a result they cannot be used by advertisers to actively detect fraud at their site. (Kantardzic et al., 2010) proposed a real time click fraud detection and prevention system. It uses D-S Theory for multilevel data fusion of evidences from different sources like IP address, referrer, country etc. However they rely on data from both the client (advertiser) and server (broker). An advertiser does not have access to broker s data and hence this system is limited to be used by brokers only. Our approach equips advertisers with a fraud detection system using only the data at their disposal. The evidences that they extract from server data to formulate mass functions are very basic whereas some of our rules are sophisticated and novel to the best of our knowledge. We do not maintain any historical databases and exploit the fact from (Antoniou et al., 2011) that fraud will happen in bursts. Our approach is simple yet our set of rules is powerful and comprehensive making it difficult for fraudsters to carry out any viable attacks on the advertiser. For example, rules 1, 2, 4 and 5 make it difficult for a bot to generate clicks without detection. 8

16 CHAPTER III PRELIMINARIES This section outlines the foundation for the proposed method of click fraud detection and the assumptions we have taken. Terms We now define terms used in this thesis. Advertiser is a seller with an e-commerce website who pays for his ads to be displayed on other sites. These ads may create more traffic and revenue for the advertisers since a user who clicks on these ads is directed to their site. Ad-site is the advertiser s website. A user on the Internet can visit the ad-site by several means like using an Internet search, typing the URL of the advertiser on their browser, bookmark the advertiser and clicking it later or clicking on the ad on a publisher site. Ad-visit is a visit of a user to ad-site by clicking an ad. Non-ad visit is a user visit by any means other than clicking an ad. Session is a continuous period of time that a visitor navigates within the advertiser s site. In other words it is the duration for which a user maintains an active HTTP connection with the server. In a session the user can be browsing, reading, watching videos, filling out forms, registering for membership, adding products in a shopping cart, purchase products etc. Publishers are the websites which hosts ads for the advertisers and get paid for the click on those ads. Common examples are blogs and news sites. Broker is an intermediary between advertiser and publisher. They provide the technical platform for online advertisements. They are mostly Internet search engine companies like Google, Yahoo, AOL, Ask.com etc. and use their search technology to serve targeted ads on publisher sites based on website content, geographical location etc.. 9

17 Pay Per Click (PPC) is an online advertising model in which publishers display ads on their websites and get paid for each click on those ads. Google runs a PPC program called Adsense. Gclid is a unique ID called that is attached to the server log for every click that was made on Google ads. This helps identify unique visitors to the best approximation as Google uses various parameters to make this unique identification. Problem Statement Given a weblog data at the site of the advertiser over a period of time, find all occurrences of click fraud. For every such occurrence, identify its owner by its corresponding IP address. The advertiser s web server log data has information such as IP address, date & time, Gclid number (to be described later), a requested page and referrer for every click. Assumptions Due to the dynamic natures of IP addresses associated to each user, to solve the above problem in real practice, it is necessary to make the following assumptions. 1) IP addressing changes over time and a user may be assigned to different IP addresses while he/she is surfing the Internet. A user (either human or bot) may try to carry out fraudulent clicks using as many different IPs as possible in order to avoid detection. Therefore it is not feasible to use a long duration data of an IP. Instead we use a short duration of a window W. In this work, W is specified to be 30 minutes during which we assume that the IP address for a user will not change. This duration is typical and is reasonable though is quite different from other existing work. The probability that a user with a particular IP clicked on an ad and that the same IP is assigned to another user who also clicks on the same ad within the proposed window is negligibly low. Our approach is however not limited by this window size and one can pick a size that suits them well. 2) A fraudster has an incentive in clicking on an ad multiple times but no intention in making an actual purchase of a product or service. Fraudsters will make money on clicking on the ads but will have to spend money to make purchases and this is strictly against their end goal. Thus, if a user makes a purchase at the ad-site, we assume that the user is not 10

18 involved in fraud. However in some circumstances (like in order to confuse detection systems), the fraudster may make a purchase. Such an action will not help the fraudster as soon as he moves out of the time window W. 3) Fraudulent clicks with large time gaps in between every two clicks do not deliver any substantial monetary gain to the fraudster. The number of clicks has to be large enough with shorter gaps between them and therefore, a burst of clicks may indicate Click-Fraud (Antoniou, 2011). 4) Since HTTP is a stateless protocol it is difficult to accurately estimate the session duration. We sum the time difference between consecutive HTTP requests by the user to get the total session time but however there is no way to compute the exact time spent by the user viewing the last page since there is no request after that. We thus had to make an assumption that 30 seconds was spent on the last page. Our approach is however not limited by this assumption and any other duration can be assumed for the last page view. 5) We modeled our approach around Google s Adsense as it is the most widely accepted Pay Per Click program. We use gclid, a unique id attached by Google to the web server logs of advertisers for every click that was made on their ads. It follows Google s definition of unique visits. Google claims that it uses various parameters to assign unique gclids and third party CF detection engines which use the gclid are more accurate than others. So we take data filtered by the broker (Google) and apply our own approach for further filtration. However our approach can be modeled around any other PPC program and the way to identify the clicks that were made on advertisements could be by creating unique landing pages. This way by looking at server logs we can separate out visits made from ads. Mathematical Theory of Evidence Efforts in identifying click fraud have mostly concentrated on identifying a certain characteristic of user behavior and this is quite different from our approach. To provide a theoretical background of our approach we describe the mathematical theory of evidence also known as the Dempster-Shafer (D-S) Theory (Shafer, 1976; Denoeux, 1995; Dong et al., 2010; Sentz et al., 2002). It is related to traditional probability and set theory but is not the 11

19 same. The D-S theory allows probability assignment to a set of atomic elements rather than an atomic element and it can be used to represent not only the likelihood of occurrence of an event but also the uncertainty associated with it. Using the D-S Theory evidence, which is coming from multiple sources with varying level of certainty, can be effectively combined online. Its ease of use combined with a wide and successful application in many areas makes it an ideal candidate for application in click fraud detection which requires a complex model with several evidences. In our problem domain a user can either be a fraud or not a fraud (~fraud). So we have a finite set of hypothesis (atomic elements) in the problem domain U = {fraud, ~fraud}. The power set of U is a set {{fraud}, {~fraud}, {U}, { }}. Each of the four elements in the power set represents a belief between 0 and 1. {fraud} represents a belief of the user being a fraud; {~fraud} represents the belief of the user being not fraud; U represents the belief of user being both fraud and ~fraud and thus it represents the uncertainty; is an empty (null) set and it represents a contradiction, thus it is always 0. DS-Theory assigns belief to all the elements of this power set of U rather than mutually exclusive events of U. The sum of all belief values in the power set of U is 1. Mass Functions A degree of belief is represented as a belief function called mass function m which provides a probability assignment to any A U, where m( ) = 0 and m(fraud) + m(~fraud) + m(u) = 1. m( ) = 0 m(fraud) [0, 1] m(~fraud) [0, 1] m(u) [0, 1] X A m(x) = 1 12

20 The mass m(a) represents a belief exactly on A. For example, U = {faulty, ~faulty} represents a hypotheses of a suspect being both faulty and non-faulty. A situation in which m({fraud, ~fraud}) = 1 occurs where there is no certainty regarding an evidence at all and this cannot be adequately represented with traditional probability theory. A belief mass is therefore different from probability. As we see above the probabilities are being assigned to sets rather than mutually exclusive singletons (Shafer, 1976; Sentz et al, 2002). When the probabilities are assigned to mutually exclusive events i.e. either fraud or ~fraud such that m(u) is always 0 then DS-Theory becomes same as probability theory. For every mass function, there are associated functions of belief and plausibility. The degree of belief on A, bel(a) and the plausibility of A, pl(a) defined to be respectively: bel(a) = X A m(x) pl(a) = 1 bel(~a) = X A m(x). For example, bel({fraud}) = m({fraud}) + m( )=m({fraud}). In general, bel(a) = m(a) for any singleton set A U and in such a case the computation of bel is greatly reduced. However, bel(a) is not necessary the same as m(a) when A is not a singleton set. Thus, m, bel and pl can be derived from one another. Thus, belief and probability are different measures. In this thesis, we use the terms likelihood and belief synonymously. For our approach we use multiple evidences each of which contributes to either a belief (or disbelief) that a user is a fraud depending on the nature of the evidence and its quantified value (Dong et al., 2010). For example, if a user clicks many times on an ad, it becomes evidence that the user is a fraud. Each evidence can support a user for either fraud or ~fraud but not both. If an evidence for a user supports fraud, the rest of the belief from the evidence cannot commit only to the universal set U which quantifies the uncertainty. If evidence i supports that the user is fraud then the mass functions for the evidence are defined as follows: m i (fraud) = α*f m i (~fraud) = 0 13

21 m i (U) = 1 - α*f Where 0 < α < 1, is an empirically derived value that signifies the strength of the evidence in supporting the user is fraud. 0 < f < 1, is a function that is used to quantify the evidence. If evidence i supports that the user is ~fraud then the mass functions for the evidence are defined as follows: m i (fraud) = 0 m i (~fraud) = β*g m i (U) = 1 - β*g Where 0 < β < 1, is an empirically derived value that signifies the strength of the evidence in supporting the user is ~fraud. 0 < g < 1, is a function that is used to quantify the evidence. Combination Rule Since we have multiple mass functions, we need a way to combine them. A mass function can be combined using various rules including the popular Dempster s Rule of Combination, which is a generalization of the Bayes rule. For X, A, B U, a combination rule of mass functions m 1 and m 2, denoted by m 1 m 2 (or m 1, 2 ) is defined as the following: m 1,2 ( X ) m 1 m 2 ( X ) where K = A B X A B m 1 (A)m 2 (B) m 1 ( A)m 2 (B) 1 K and m 1 m 2 ( ) = 0 The combination rule can be applied in pairs repeatedly to obtain a combination of multiple mass functions. The above rule strongly emphasizes the agreement between multiple sources of evidence and ignores the disagreement by the use of a normalization factor. 14

22 15

23 CHAPTER IV PROPOSED DEMPSTER SHAFER THEORY FOR CLICK FRAUD DETECTION We propose an approach that can be used by the advertisers to detect fraud in real time using data available to them, without any data from the broker which can either be impossible to acquire or very limited if at all possible. This section describes our approach in detail and the mass functions that have been developed to compute the belief of fraud. The Core Element of Dempster Shafer Theory Figure 4.1 below shows the framework elements of click fraud detection using our approach. A user s clicking activity is captured by the advertiser s web server logs. The server logs are updated in real time as users request pages from the server and the click fraud detection system reads this data as soon as it is logged. For a latest click that the system is processing, it finds the IP address and reads all the log data from that IP in the window W. This data is pre-processed to extract out meaningful Figure 4.1 Click fraud detection framework using D-S theory 16

24 evidences and then formulated into various mass functions. Each mass function computes a belief of fraud which is unique and can conflict with the beliefs from other mass functions. These beliefs are combined using Dempser s combination rule. The combined belief is categorized into fraud, ~fraud or suspicious by using a set of threshold values. This process is repeated for every new user click. Mass functions for Click Fraud Detection Using the user behavior from the weblogs at the advertiser s site as evidences to reason about click fraud we formulate mass functions based on each of such core evidence. These evidence are contributed by various factors such as number of clicks on the ad, time spent browsing the advertiser site etc. The mass functions are used to compute belief value on the click being fraud or not fraud (~fraud). The belief value from different evidences is combined as each of them occurs in the data. A mass function contributes to either a belief (or disbelief) that a user is a fraud depending on its nature and its quantified value. The following gives detailed formulae of mass functions based on each evidence. The values α i and β i for evidence i represent the strength of the evidence in mass function formulation (m i ). In practice these values will be empirically derived. Evidence 1: Number of clicks on the ad If the number of clicks on the ad from an IP in the time window W (30 minutes) is high, then likelihood of the user being a fraud is high. Fraudsters have a natural incentive of making more money by clicking the ads many times in a short period of time (short bursts). The more they click, the more illegal revenue they generate for themselves. The Basic Mass Assignment (BMA) for this evidence will always support a belief of fraud whose value depends on the number of clicks. Let n be the number of clicks in the window W. Likelihood of the fraud = 1 1/n m 1 ( fraud) = α 1 (1-1/n) (1) 17

25 m 1 (~fraud) = 0 (2) m 1 (U) = 1 - m 1 ( fraud ) = 1 α 1 (1-1/n) (3) Evidence 2: Time spent in browsing If the time spent by the user at the ad-site is high then he/she is less likely to be a fraud. A genuine user will click the ad due to a real interest in advertiser s content (advertised product, service or website content) and is likely to spend more time exploring the ad-site than a fraudster. Fraudsters are less likely to do so since they are not interested in the product and so that they could do more clicks in a given time. The BMA for this rule will always support a belief of ~fraud whose value depends on the time spent at the ad-site. As a user continues to spend more time at the ad-site the belief that he is ~fraud will increase. Let t be the time spent by the user in all visits in the time window W (30 minutes) where 0 < t <= 30 minutes. The likelihood of ~fraud increases as t increases. m 2 (fraud) = 0 (4) m 2 (~ fraud) = β 2 *(t/w) (5) m 2 (U) = 1 - m 2 (~ fraud ) = 1 β 2 * (t/w) (6) Evidence 3: Ad-Visit after non-ad visit If a user clicks on an ad after a non-ad visit, then he is likely to be a fraud. Once a user makes a non-ad visit to the ad-site, it implies that the user is aware how to reach the site apart from clicking on the ad. Clicking on an ad after that seems unnecessary and indicates a likelihood of fraud. The BMA for this rule can support a belief of either fraud or ~fraud behavior. Let x be the likelihood of fraud. If the user has visited only via ads then x=0.1 (little likelihood of fraud). If the user has visited via ads after visiting normally then x=1.0 (high likelihood of fraud). Thus the mass functions when the evidence supports fraud are as follows: 18

26 m 3 (fraud) = α 3 *(x) (7) m 3 (~ fraud) = 0 (8) m 3 (U) = 1 - m 3 ( fraud ) = 1 - α 3 *(x) (9) Let y=1.0 be the likelihood of ~fraud if the user does not have an ad-visit after a non-ad visit. The mass functions if the evidence supports ~fraud are as follows: m 3 (fraud) = 0 (10) m 3 (~ fraud) = β 3 *(y) (11) m 3 (U) = 1 - m 3 ( ~fraud ) = 1 β 3 *(y) (12) Evidence 4: Time of Click If the click occurred in the most suspicious time (or most active period of fraud activity) then the user is likely to be a fraud. Fraudsters are generally known to be active during certain hours of the day and a click at such hours can be indicative of fraudulent activity. We follow Universal Time to determine this and not any particular time zone. If a click happens at that certain time slot of suspicion then the click is likely to be a fraud otherwise ~fraud. The BMA for this rule will support a belief of fraud if the time of click lies in the suspicious time range. Otherwise it will support a belief of ~fraud. Let T start and T end be the start and end of the suspicious time range, t be the time of click. Let x=1.0 be the likelihood of fraud if t lies between T start and T end. The mass functions when the evidence supports fraud are as follows: m 4 (fraud) = α 4 *(x) (13) m 4 (~ fraud) = 0 (14) m 4 (U) = 1 - m 4 ( fraud ) = 1 α 4 *(x) (15) Let y=1.0 be the likelihood of ~fraud if t does not lie between T start and T end. The mass functions when the evidence supports ~fraud are as follows: 19

27 m 4 (fraud) = 0 (16) m 4 (~fraud) = β 4 *(y) (17) m 4 (U) = 1 - m 4 (~ fraud ) = 1 β 4 *(y) (18) Evidence 5: Place of origin of click If the click originated from a location (country, state or city) where the advertiser has no business then the user is likely to be a fraud. Ads are often targeted for audience of a particular region where the advertisers have a reach or rights to sell their products. This is especially true for small and medium sized businesses that are restricted to a country or city. Even large advertisers mostly advertise to a local clientele such as a car company which sells in many countries but has different ads based on the different models it sells in each country. If a click originates from a location outside of advertiser s region of business then it is likely to be fraud as the user will get no value from such a click. Also it is notable that in some countries the laws against cyber frauds are very weak and this fact is utilized by fraudsters to their advantage. Fraudsters use IP addresses originating from these countries through bots or hiring people (many of whom do not realize that their act is causing huge losses to advertisers) at low cost to carry out the fraud in order to avoid prosecution (Kshetri, 2010). As a result such clicks have high suspicion associated with them. This rule has the ability to limit a range of fraudulent attacks which depend on using IP addresses from varied geographical locations (these include the use of both humans and bots). The BMA for this rule supports a belief of fraud if the click originated from a region outside of advertiser s business and a belief of ~fraud otherwise. Let x=1.0 be the likelihood of fraud if the click originated from a region outside of advertiser s business. The mass functions when the evidence supports fraud are as follows: m 5 (fraud) = α 5 *(x) (19) m 5 (~ fraud) = 0 (20) m 5 (U) = 1 - m 5 ( fraud ) = 1 - α 5 *(x) (21) 20

28 Let y=1.0 be the likelihood of fraud if the click originated from a region outside of advertiser s business. The mass functions when the evidence supports ~fraud are as follows: m 5 (fraud) = 0 (22) m 5 (~fraud) = β 5 *(y) (23) m 5 (U) = 1 - m 5 (~ fraud ) = 1 - β 5 *(y) (24) Evidence 6: Creating of membership If the user creates a membership account (register as member) with the advertiser, then he/she is less likely to be a fraud. However he/she may or may not create such an account. Fraudsters however are less likely to register themselves at the ad-site or create membership account as they have no incentive in doing so and because it also requires them to spend some time and give out some information like , address etc. The BMA for this rule supports a belief of ~fraud if a membership account was created, otherwise supports negligible belief of fraud. Let x=1 be the likelihood of fraud if a membership account is created. The mass functions when the evidence supports fraud are as follows: m 6 (fraud) = α 6 * (x) (25) m 6 (~fraud) = 0 (26) m 6 (U) = 1 - m 6 ( fraud ) = 1 - α 6 *(x) (27) Let y=1 be the likelihood of ~fraud if a membership account is not created. The mass functions when the evidence supports ~fraud are as follows: m 6 (fraud) = 0 (28) m 6 (~ fraud) = β 6 *(y) (29) m 6 (U) = 1 - m 6 ( ~fraud ) = 1 - β 6 *(y) (30) 21

29 Evidence 7: Adding a product in shopping cart If the user adds a product to his shopping cart, then he/she is less likely to be a fraud. Due to a lack of genuine interest in the advertiser s product or services, a fraudster is less likely to use a shopping cart. Using a shopping cart requires the user to spend time for which a fraudster has no incentive. The BMA for this rule supports a belief of ~fraud if a product was added to a cart otherwise supports a negligible belief of fraud. Let x=1.0 be the likelihood of fraud if the user does not add any product to his shopping cart. The mass functions when the evidence supports fraud are as follows: m 7 (fraud) = α 7 * (x) (31) m 7 (~fraud) = 0 (32) m 7 (U) = 1 - m 7 ( fraud ) = 1 α 7 *(x) (33) Let y=1.0 be the likelihood of ~fraud if the user adds a product to his shopping cart. The mass functions when the evidence supports ~fraud are as follows: m 7 (fraud) = 0 (34) m 7 (~ fraud) = β 7 *(y) (35) m 7 (U) = 1 - m 7 ( ~fraud ) = 1 - β 7 *(y) (36) Individually, the evidences are not sufficient in determining the likelihood of a user being fraud or ~fraud. Each evidence may give different or contradicting belief of fraud depending on their nature. But upon combination they provide a highly accurate estimate. Thus, the likelihood of a click being fraudulent is estimated by combining the beliefs obtained from corresponding mass functions for each of the supporting evidences. To define the rule for combining mass functions, suppose m 1 and m 2 be two distinct mass functions of a particular click. Dempster s rule of combination can be applied as shown below. For readability, we omit i, and replace {f i }, {~f i } and U i by f, ~f and U, respectively. m 1,2 (f)= (m 1 (f)m 2 (f)+m 1 (f)m 2 (U)+m 1 (U )m 2 (f)) (1 K) 22

30 m 1,2 (~f)=(m 1 (~f)m 2 (~f)+m 1 (~f)m 2 (U)+m 1 (U)m 2 (~f)) (1 K) m 1,2 (U)=(m 1 (U)m 2 (U )) (1 K), where K = m 1 (f)m 2 (~f) + m 1 (~f)m 2 (f). This combination rule can be applied repeatedly pair-wise until evidence from all clicks has been incorporated into the computation of the likelihood of each statement. Our proposed approach certifies the clicks based on the corresponding likelihood of them being fraudulent using the beliefs combined from all of the evidences. Table 4.1 below describes the thresholds that we have empirically derived from our experiments and tests. Table 4.1 Fraud certification rules Lower Upper Not Fraud Suspicious Fraud A combined belief of fraud < 0.5 indicates ~fraud. A combined belief of fraud >= 0.65 indicates fraud and all values in between indicate a suspicion. 23

31 CHAPTER V DATA SET & ILLUSTRATION In this section we give a detailed explanation of the data that we use in our approach. We also show an illustrated example using our data set with our approach. Data Description Click data is not publicly available. Any real weblog data from a web server is a property of the owner of the server and are not made public due to privacy concerns by the owner. Moreover such data need to be cleaned to extract data in relevant format. This is a time consuming process and is not a focus of our research. For these reasons we use synthetic data for our research. Furthermore we can manipulate synthetic data and add patterns of fraud for evaluating different click fraud scenarios. The data show weblog from the advertiser s web server. For our experiments and evaluations we synthesize log data in combined log format (CLF). We pre-process the raw logs and extract the following information from them for each user in real time: IP address of the remote computer requesting the web page; time and date of request; the page that was requested; and the Gclid number. The region from which the click originated can be easily extracted from the IP address by using one of the many geo location services which map the IP to a place using geo location database. The Table 5.1 below shows a sample data extracted from the server logs. 24

32 Table 5.1 Sample log data IP Address Click No Gclid No Time of click Requested Page Referrer /5/2012 1:50 index.htm adsite.htm /5/2012 1:56 index.htm adsite.htm /5/2012 1:59 page1.htm index.htm /5/2012 2:01 page2.htm page1.htm null 3/5/2012 2:05 index.htm google.com null 3/5/2012 2:08 page1.htm index.htm null 3/5/2012 2:10 page2.htm page1.htm null 3/5/2012 2:14 index.htm null null 3/5/2012 2:16 page1.htm index.htm null 3/5/2012 2:17 page2.htm page1.htm Each row of the Table 5.1 above represents a HTTP request by the user made to the advertiser s web server. Whenever a user requests content from the advertiser an HTTP request is generated. Below are some observations which describe data represented by the Table 5.1. Every row represents a click by the user requesting content from the ad-site. All the clicks in the table above are by the same user since the IP address is the same for all rows of the log. Index.htm is the landing page. Every time index.htm is the requested page, it implies a new visit. The Table 5.1 has 4 unique visits. A non-null Gclid number implies an ad-visit. Click numbers 1 through 4 belong to an advisit since they have a valid Gclid number attached. Two different Gclid numbers above imply two different ad-visits. The first click with Gclid number 1001 implies an ad-visit. Since there is only 1 row with Gclid number 1001, it implies that the user did not make any other page requests after landing on the ad-site during first ad-visit. The second click with Gclid number 1002 is also an ad-visit. 25

33 However in this visit the user requested page1.htm and page2.htm also (click number 3 and 4). Each row with a null Gclid number implies a non-ad visit. Click numbers 5 through 10 correspond to two non-ad visits. Click number 5 corresponds to first non-ad visit and the third visit overall. The visitor was referred to the ad-site by Google search since google.com is the referrer. After landing the user requested two more pages in the same visit, page1.htm and page2.htm. Click number 8 corresponds to second non-ad visit and fourth visit overall. A null referrer implies that the user may have typed in the ad-site s URL in his browser or had previously bookmarked the site and clicked on the bookmark. After landing the user requested two more pages in the same visit, page1.htm and page2.htm. 26

34 We will use a timeline diagram to help illustrate our inputs (like Table 5.1) for the rest of the thesis. Figure 5.1 shows the legends for the diagram and Figure 5.2 shows a timeline diagram corresponding to the input from Table 5.1. Figure 5.1 Legends for timeline diagram Figure 5.2 Timeline diagram sample data in Table 5.1 A timeline diagram is a visual representation of a user s clicking data from the server weblogs. Just by looking at Figure 5.2 we can easily make certain observations. The user has made 4 unique visits. The first two visits were ad-visits and the last two were non-ad visits. The width of the session blocks indicates session durations. The first visit was a very short session in which the user did not request any pages after landing. In all the other visits the user requested two other pages and the session durations are longer. The start and end times of every session is also given. Lastly we can see that the user neither logged in as a member in any of the sessions nor used a shopping cart. 27

35 Example of belief computation using mass function and combination In this example we analyze and compute the belief of a user being fraud or ~fraud using our approach. The purpose is to explain the approach and the computations involved along with a simple example. The following is a sample input in Table 5.2 below. Table 5.2 Input from server log IP Address Click No Gclid No Time of click Requested Page Referrer /5/2012 1:56 index.htm adsite.htm /5/2012 2:01 index.htm adsite.htm /5/2012 2:07 index.htm adsite.htm /5/2012 2:13 index.htm adsite.htm /5/2012 2:18 index.htm adsite.htm /5/2012 2:23 index.htm adsite.htm From Table 5.2 above we can easily conclude that the user made six ad-visits. The user did not request any page of ad-site other than index.htm. Figure 5.3 below shows the timeline diagram for the data corresponding to Table 5.2. Figure 5.3 Timeline diagram for Table 5.2 As soon as a row is logged corresponding to a user activity, the system reads it immediately and computes the mass beliefs for each piece of evidence which are then combined to get an overall belief score using Dempster s combination rule. For the Table

36 above six belief values will be computed corresponding to every click. Thus the belief about the user changes with every user click and is updated. The evidence combination process combines beliefs from each conflicting evidence and gives a belief score for a user s each click. To demonstrate our approach we will work out the calculation of belief values at the 6 th click. Please note that we use the α and β values from Table 5.3. These values have been derived empirically with our experiments and will be used with all our computations. Table 5.3 Coefficient values Evidence No α β Evidence 1 always supports a belief of fraud and therefore at the 6 th click on the ad the mass function values are: m 1 (fraud) = 0.8* (1-1/6) = m 1 (~fraud) = 0 m 1 (U) = 1 - m 1 * ( fraud ) = *(1-1/6) = Evidence 2 always supports a belief of ~fraud. The user spends 30 seconds in each visit since he does not open any other page and therefore the total time spent is 180 seconds. The window size W is 1800 seconds. Therefore the mass function values are: m 2 (~ fraud) = 0.99 *(180/1800) =

37 m 2 (fraud) = 0 m 2 (U) = 1 - m 2 *(~ fraud ) = * (180/1800) = Evidence 3 supports a little belief of fraud since there was no non-ad visit by the user. Therefore the mass function values are: m 3 (fraud) = 0.6* (0.1) = 0.06 m 3 (~ fraud) = 0 m 3 (U) = 1 - m 3 *( fraud ) = *(0.1) = 0.94 Evidence 4 supports a belief of fraud since the 6 th click occurs at a suspicious time (2:23 AM). Therefore the mass function values are: m 4 (fraud) = 0.2*(1) = 0.2 m 4 (~ fraud) = 0 m 4 (U) = 1 - m 4 *( fraud ) = 1-0.2*(1) = 0.8 Evidence 5 supports a belief of fraud since we assume that the IP originates from a region outside the area of business of the advertiser. Therefore the mass function values are: m5 (fraud) = 0.4 *(1) = 0.4 m5 (~ fraud) = 0 m5 (U) = 1 - m5* (fraud) = *(1) = 0.6 Evidences 6 and 7 support a little fraud since no product was added to a shopping cart and neither was a membership account used. Therefore the mass function values are: m6 (fraud) = 0.02 *(1) =

38 m6 (~fraud) = 0 m6 (U) = 1 - m7 *(fraud) = *(1) = 0.98 m7 (fraud) = 0.01* (1) = 0.01 m7 (~fraud) = 0 m7 (U) = 1 - m8* (fraud) = * (1) = 0.99 From Table 5.4 below we can observe that each mass function gives a varying degree of belief values and these can be conflicting. Table 5.4 Mass function beliefs for illustrated example belief(fraud) belief(~fraud) m m m m m m m Now we can apply the Dempster s rule of combination to get the combined belief about the user from the mass beliefs in Table 5.4. K = m 1 (f)m 2 (~f) + m 1 (~f)m 2 (f) = K = m 1,2 (f) = m 1 (f)m 2 (f)+m 1 (f)m 2 (U)+m 1 (U )m 2 (f)/(1-k) = m 1,2 (~f) =m 1 (~f)m 2 (~f)+m 1 (~f)m 2 (U)+m 1 (U)m 2 (~f)/(1-k) = m 1,2 (U )= m 1 (U)m 2 (U )/(1-K) =

39 m 1,2 is the combined mass belief from functions 1 and 2. Next we combine this with mass functions for function 3 to get the combined mass belief m 1,2,3 K = m 1,2 (f)m 3 (~f) + m 1,2 (~f)m 3 (f) = K = m 1,2,3 (f) = m 1,2 (f)m 3 (f)+m 1,2 (f)m 3 (U)+m 1,2 (U )m 3 (f) = m 1,2,3 (~f)= m 1,2 (~f)m 3 (~f)+m 1,2 (~f)m 3 (U)+m 1,2 (U)m 3 (~f) = m 1,2,3 (U ) = m 1,2 (U)m 3 (U ) = The above belief combination repeats until no more evidence needs to be considered. Thus, the belief of the hypothesis that click 6 is fraudulent is calculated in accumulative fashion. Following the procedure we go on to get the combined belief of all mass beliefs m 1,2,3.7 m 1,2,3.7 (f) = m 1,2,3.7 (~f) = m 1,2,3.7 (U ) = As we can clearly see, the belief (fraud) of 0.84 is clearly above the threshold for fraud (0.65) given in Table 4.1 and so the user is certified as fraud. Figure 5.4 gives a graphical representation of the combined belief of fraud over all the 6 clicks made by the user (in this example we have worked out the mass value computation of 6 th click only but the figure plots the mass values computed for all clicks from 1 st through 6 th ). We can easily observe how the combined belief changes as more clicks are made. 32

40 Figure 5.4 Combined belief of fraud for input in Figure

41 CHAPTER VI EVALUATION In this section we present two case studies (scenarios), each of which corresponds to a different type of click fraud attack. In case study 1 we present a scenario where a human user is trying to perform click fraud and uses different click patterns in order to avoid detection. In case study 2 we present a scenario where a software bot is used to perform click fraud and it tries to make detection difficult by using multiple IP addresses. In both the cases we present our output and show that our approach is able to successfully detect click fraud. We will discuss the generality of our solution in Chapter VII. Case Study 1 We present a scenario where a human user is trying to commit click fraud and avoid detection by giving an impression of a regular user. Figure 6.1 below show the user activity for the test case. Figure 6.1 Timeline input for Case Study 1 A fraudster needs to repeatedly click on the ad in order to make a substantial profit. In this case the fraudster clicks the ad seven times (leading to seven ad-visits). The fraudster also 34

42 enters the ad-site via a regular search (non-ad visit) to give a stronger impression of a regular user. He/she spends time on the site after landing (with random session durations) and carries out activities like opening 32 links in the ad-site after landing, creating membership account and adding a product to his shopping cart. Below we describe the belief computed from every mass function and the combined belief in figures 6.2 through 6.9. We have plotted the belief value with time (in the range of window W). Please note that some of the functions support both fraud and ~fraud at different times depending on the input and thus they can have both types of beliefs at different times. In these cases we just show belief of fraud for the purpose of clarity. Also note that whenever a function supports belief in ~fraud then the belief in fraud becomes 0 and vice versa. 35

43 Figure 6.2 below shows the belief computed from Mass Function 1 (Number of clicks on the ad) according to which if the number of clicks on the ad from an IP in the time window W (30 minutes) is high, then likelihood of the user being a fraud is high. Mass Function 1 supports only a belief of fraud and the belief at the first click on the ad is 0. The belief increases as more clicks are made on the ad. The increase is faster in the first five clicks due to the nature of the function. It is notable that the belief of fraud does not increase in the third visit as it is a non-ad visit. This function does not consider any other user activity apart from the number of clicks on the ad. Therefore user activities like a non-ad visit (third visit), adding products to shopping cart etc. do not affect the belief of this mass function. Figure 6.2 Belief of fraud from mass function 1 36

44 Figure 6.3 below shows the belief computed from Mass Function 2 (Time spent in browsing) according to which if the time spent by the user at the ad-site is high then he/she is less likely to be a fraud. This function supports only the belief of ~fraud. In this case study the user spent time in every session and this is reflected in an increasing belief of ~fraud. This belief clearly contradicts the belief from Mass Function 1 which supports a belief of fraud. The fraudster has spent a considerable time browsing the ad-site during every visit to give an impression of a genuine user. As we can see below the user has a high belief of ~fraud at the end. Figure 6.3 Belief of ~fraud from mass function 2 37

45 Figure 6.4 below shows the belief computed from Mass Function 3 (Ad-visit after non-ad visit) according to which if a user clicks on an ad after a non-ad visit, he/she is likely to be a fraud. Once a user makes a non-ad visit to the ad-site, it implies that the user is aware how to reach the site apart from clicking on the ad. The first three visits are all ad-visits and therefore the function supports a little belief of fraud. The fourth visit is a non-ad visit and therefore the function does not support fraud (belief become 0). But the fifth visit is an advisit (after non-ad visit). The function computes a high belief of fraud because of this and we see that the belief of fraud spikes up to 0.6. Figure 6.4 Belief of ~fraud from mass function 3 38

EXPOSING CLICK FRAUD

EXPOSING CLICK FRAUD Using Web Analytics To Identify Possible Click Fraud A White Paper From Net Applications NETAPPLICATIONS.COM What Is Click Fraud? page 2/7 Click Fraud Vs. Paid Placement "In your experience, how much of

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

GOOGLE ANALYTICS 101

GOOGLE ANALYTICS 101 GOOGLE ANALYTICS 101 Presented By Adrienne C. Dupree Please feel free to share this report with anyone who is interested in the topic of building a profitable online business. Simply forward it to them

More information

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet

More information

Click Fraud. CyberGroup January 18, 2006

Click Fraud. CyberGroup January 18, 2006 Click Fraud CyberGroup January 18, 2006 The Basics Advertisers agree to pay Google or Yahoo for preferential placement in searches The Basics Advertisers agree to pay Google or Yahoo for preferential placement

More information

The Lane s Gifts v. Google Report

The Lane s Gifts v. Google Report The Lane s Gifts v. Google Report By Alexander Tuzhilin Professor of Information Systems at the Stern School of Business at New York University, Report published July 2006 1 The Lane s Gifts case 2005

More information

MEASURING AND FINGERPRINTING CLICK-SPAM IN AD NETWORKS

MEASURING AND FINGERPRINTING CLICK-SPAM IN AD NETWORKS MEASURING AND FINGERPRINTING CLICK-SPAM IN AD NETWORKS Vacha Dave *, Saikat Guha and Yin Zhang * * The University of Texas at Austin Microsoft Research India Internet Advertising Today 2 Online advertising

More information

Web Analytics Definitions Approved August 16, 2007

Web Analytics Definitions Approved August 16, 2007 Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative

More information

Search Engine Optimization

Search Engine Optimization Search Engine Optimization Search An Introductory Guide How to improve the effectiveness of your web site through better search engine results. As you ve probably learned, having a Web site is almost a

More information

How to Carry Out Internet Marketing for Small and Medium-Sized Enterprises

How to Carry Out Internet Marketing for Small and Medium-Sized Enterprises How to Carry Out Internet Marketing for Small and Medium-Sized Enterprises LIU Xuehua, DONG Shuoling Hebei Normal University of Science & Technology, China, 066004 Abstract: The Marketing of SMEs in China

More information

How To Advertise With A 2Nd Tier Ppc Search Engine

How To Advertise With A 2Nd Tier Ppc Search Engine Pay-Per-Click Search Engine 800.577.1165 7Search.com 1 Table of Contents Page 3... Synopsis: 2nd-Tier Offers Greater ROI Pages 3-4...... The Internet as an Advertising Medium Pages 4-5..... PPC Advertising

More information

SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973)

SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) Purview of Pay to Click Websites in Increasing E-Commerce through Incentive

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Free Analytics are Not Always the Best Deal

Free Analytics are Not Always the Best Deal Free Analytics are Not Always the Best Deal Summary The choice between utilizing a free Analytics solution versus a paid Analytics solution is not as straight forward as it may appear. Indeed, free Analytics

More information

Interpreting Web Analytics Data

Interpreting Web Analytics Data Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in

More information

For more information, or to get started with an Online Marketing campaign, contact Ray Archie at: ray@mediumrarenyc.com. or by phone at 212 363 0363

For more information, or to get started with an Online Marketing campaign, contact Ray Archie at: ray@mediumrarenyc.com. or by phone at 212 363 0363 Online Marketing, an overview We will get more potential customers to your website and we will get more of your site s visitors contacting you. We can determine what your potential customers are searching

More information

Capturing Meaningful Competitive Intelligence from the Social Media Movement

Capturing Meaningful Competitive Intelligence from the Social Media Movement Capturing Meaningful Competitive Intelligence from the Social Media Movement Social media has evolved from a creative marketing medium and networking resource to a goldmine for robust competitive intelligence

More information

"#!$!%&&!!!! % Hosting Expert: Brian White President/Owner Web Hosting Solutions www.webhostingsolutions.com

#!$!%&&!!!! % Hosting Expert: Brian White President/Owner Web Hosting Solutions www.webhostingsolutions.com ! "#!$!%&&!!!! % Introduction 1 - What is Web Hosting? - What is a Web Hosting Reseller? - What Web Hosting Options Are Available?...2 What Additional Services Are Typically Offered? 3 - What Level of

More information

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology Attracting Buyers with Search, Semantic, and Recommendation Technology Learning Objectives Using Search Technology for Business Success Organic Search and Search Engine Optimization Recommendation Engines

More information

News and Information. Advertising and Marketing. Web. Design, Hosting, Promotion, Advertising, SEO

News and Information. Advertising and Marketing. Web. Design, Hosting, Promotion, Advertising, SEO SEARCH ENGINE ADVERTISING PROMOTION News and Information. Advertising and Marketing. WEB HOSTING Web WEB DESIGN REVISED: MAY, 2008 Design, Hosting, Promotion, Advertising, SEO McLeod County Road 1 and

More information

TECHNIQUES USED IN SEARCH ENGINE MARKETING

TECHNIQUES USED IN SEARCH ENGINE MARKETING TECHNIQUES USED IN SEARCH ENGINE MARKETING Assoc. Prof. Liviu Ion Ciora Ph. D University of Craiova Faculty of Economics and Business Administration Craiova, Romania Lect. Ion Buligiu Ph. D University

More information

T: 0800 135 7186 cravenplan.com/search

T: 0800 135 7186 cravenplan.com/search Introduction Cravenplan Computers Ltd has been building and optimising websites for over 12 years and with a dedicated, experienced search engine marketing team we are in an excellent position to help

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

Pay-per-action model for online advertising

Pay-per-action model for online advertising Pay-per-action model for online advertising Mohammad Mahdian 1 and Kerem Tomak 1 Yahoo! Research. Email: {mahdian,kerem}@yahoo-inc.com Abstract. The online advertising industry is currently based on two

More information

Google Analytics Basics

Google Analytics Basics Google Analytics Basics Contents Google Analytics: An Introduction...3 Google Analytics Features... 3 Google Analytics Interface... Changing the Date Range... 8 Graphs... 9 Put Stats into Context... 10

More information

When executed properly, an SEM campaign can drive targeted traffic to your site at a

When executed properly, an SEM campaign can drive targeted traffic to your site at a Astonish ebook The Benefits of a Targeted SEM Campaign Search Engine Marketing (SEM), synonymously referred to as Pay-Per-Click (PPC) 1, has grown to become a fundamental piece of advertising strategy

More information

Flying Under the Radar

Flying Under the Radar Flying Under the Radar Affiliate Fraud and Cybersquatting FORWARD According to the New York Times, the most valuable traffic that a Web site can receive is from people who arrive at a site by typing its

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved Table of Contents Introduction: Gathering Website Intelligence 1 Customize Your System for Your Organization s Needs 2 CRM, Website Analytics and Email Integration 3 Action Checklist: Increase the Effectiveness

More information

Getting Started with Google Analytics 7 Easy but comprehensive steps

Getting Started with Google Analytics 7 Easy but comprehensive steps Getting Started with Google Analytics Right, so you have a shiny new website or you have a site that has been up and running for a while now that s great. The hard work is done and the leads and sales

More information

Google Analytics. Web Skills Programme

Google Analytics. Web Skills Programme Google Analytics Web Skills Programme Google - some facts Google search handles over 1 billion searches per day 7.2 billion daily page views 87.8 billion monthly worldwide searches conducted on Google

More information

Social media metics How to monitor a Social Media campaign?

Social media metics How to monitor a Social Media campaign? Social media metics How to monitor a Social Media campaign? White paper Summary I II III IV V VI VII VIII IX X Introduction Preparing the website Setting up the objectives Measuring the traffic on the

More information

Search Engine Optimization and Search Engine Marketing: A Primer for Clients

Search Engine Optimization and Search Engine Marketing: A Primer for Clients Search Engine Optimization and Search Engine Marketing: A Primer for Clients Catamount Studios 1805 N Tejon St Colorado Springs, CO 80907 T 719.481.3201 F 719.302.4513 www.catamountstudios.com Introduction

More information

Web Log Mining: A Study of User Sessions

Web Log Mining: A Study of User Sessions Web Log Mining: A Study of User Sessions Maristella Agosti and Giorgio Maria Di Nunzio Department of Information Engineering University of Padua Via Gradegnigo /a, Padova, Italy {agosti, dinunzio}@dei.unipd.it

More information

Digital marketing services

Digital marketing services Digital marketing services Experience. Capability. Technology A website must be supported with marketing and advertising if it is to become a true business channel. Sam Saltis, Managing Director, bwired

More information

1. Link Building 2. Site Content 3. Advertising 4. Email Marketing 5. Viral Marketing 6. Affiliate Marketing 7. Search Engine Optimization 8.

1. Link Building 2. Site Content 3. Advertising 4. Email Marketing 5. Viral Marketing 6. Affiliate Marketing 7. Search Engine Optimization 8. 1. Link Building 2. Site Content 3. Advertising 4. Email Marketing 5. Viral Marketing 6. Affiliate Marketing 7. Search Engine Optimization 8. Landing Page Optimization LINK BUILDING & SITE CONTENT I m

More information

Reputation Management using Trust based Decision making System through Temporal and correlation analysis

Reputation Management using Trust based Decision making System through Temporal and correlation analysis Reputation Management using Trust based Decision making System through Temporal and correlation analysis V.Raja Gopal 1,S.Sumathi 2, Asst.Professor, Dept of Information Technology, Sri Krishna Engineering

More information

Web Analytics. Using emetrics to Guide Marketing Strategies on the Web

Web Analytics. Using emetrics to Guide Marketing Strategies on the Web Web Analytics Using emetrics to Guide Marketing Strategies on the Web Web analytics is the practice of measuring, collecting, analyzing and reporting on Internet data for the purposes of understanding

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

The 8 Key Metrics That Define Your AdWords Performance. A WordStream Guide

The 8 Key Metrics That Define Your AdWords Performance. A WordStream Guide The 8 Key Metrics That Define Your AdWords Performance A WordStream Guide The 8 Key Metrics That Define Your Adwords Performance WordStream Customer Success As anyone who has ever managed a Google AdWords

More information

The battle to contain fraud is as old as

The battle to contain fraud is as old as 22 SPONSORED FEATURE COMBATTING DIGITAL FRAUD Combatting digital fraud Combatting digital fraud has become a strategic business issue for today s CIOs. The battle to contain fraud is as old as business

More information

JK WEBCOM TECHNOLOGIES

JK WEBCOM TECHNOLOGIES Who We Are? JK Webcom Technologies has been providing unending services to the audience at large since August 2004. Located in Rajouri Garden in New Delhi, we operate and serve individuals and businesses

More information

Retrieving Business Applications using Open Web API s Web Mining Executive Dashboard Application Case Study

Retrieving Business Applications using Open Web API s Web Mining Executive Dashboard Application Case Study ISSN:0975-9646 A.V.Krishna Prasad et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (3), 2010, 198-202 Retrieving Business Applications using Open Web API

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

Web Analytics Definitions

Web Analytics Definitions Web Analytics Definitions Web Analytics Association 401 Edgewater Place Suite 600 Wakefield MA 01880 USA standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative Commons Attribution-Noncommercial-No

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Introduction 3. What is SEO? 3. Why Do You Need Organic SEO? 4. Keywords 5. Keyword Tips 5. On The Page SEO 7. Title Tags 7. Description Tags 8

Introduction 3. What is SEO? 3. Why Do You Need Organic SEO? 4. Keywords 5. Keyword Tips 5. On The Page SEO 7. Title Tags 7. Description Tags 8 Introduction 3 What is SEO? 3 Why Do You Need Organic SEO? 4 Keywords 5 Keyword Tips 5 On The Page SEO 7 Title Tags 7 Description Tags 8 Headline Tags 9 Keyword Density 9 Image ALT Attributes 10 Code Quality

More information

Tracking True & False Demystifying Recruitment Marketing Analytics

Tracking True & False Demystifying Recruitment Marketing Analytics Tracking True & False Demystifying Recruitment Marketing Analytics THE CANDIDATE JOURNEY SIMPLIFIED THE DECISION CYCLE SIMPLIFIED Awareness & Attraction Research & Decision Conversion Action THE CANDIDATE

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

A guide to affilinet s tracking technology

A guide to affilinet s tracking technology A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does

More information

Online masters degree programs without thesis >>>CLICK HERE<<<

Online masters degree programs without thesis >>>CLICK HERE<<< Online masters degree programs without thesis. As early as 1920, more than 50 percent of the tobacco consumed in Britain was in the form of cigarettes. Online masters degree programs without thesis >>>CLICK

More information

netsmartz Visibility on the Net I N T E R N E T M A R K E T I N G

netsmartz Visibility on the Net I N T E R N E T M A R K E T I N G netsmartz Visibility on the Net I N T E R N E T M A R K E T I N G ISO 9001: 2000 CERTIFIED Our company is a certified Yahoo Search Marketing Ambassador and can help your ad get solid results on Yahoo s

More information

Campaign Goals, Objectives and Timeline SEO & Pay Per Click Process SEO Case Studies SEO & PPC Strategy On Page SEO Off Page SEO Pricing Plans Why Us

Campaign Goals, Objectives and Timeline SEO & Pay Per Click Process SEO Case Studies SEO & PPC Strategy On Page SEO Off Page SEO Pricing Plans Why Us Campaign Goals, Objectives and Timeline SEO & Pay Per Click Process SEO Case Studies SEO & PPC Strategy On Page SEO Off Page SEO Pricing Plans Why Us & Contact Generate organic search engine traffic to

More information

The Sales Lead System

The Sales Lead System The Sales Lead System Contents Intro... 3 Network Marketing Ad Basics... 3 Blogging... 4 Article Marketing... 4 Video Marketing... 5 E-mail Marketing... 6 Pay Per Click... 7 Banner Ads... 8 Social Marketing...

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

ONLINE ADVERTISING (SEO / SEM & SOCIAL)

ONLINE ADVERTISING (SEO / SEM & SOCIAL) ONLINE ADVERTISING (SEO / SEM & SOCIAL) BASIC SEO (SEARCH ENGINE OPTIMIZATION) Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's

More information

The Pay Per Click Marketing Guide

The Pay Per Click Marketing Guide The Pay Per Click Marketing Guide Step By Step Guide To Make Your Business Click Congratulations You Get FREE Giveaway Rights To This Entire Ebook You have full giveaway rights to this ebook. You may give

More information

Automatic Timeline Construction For Computer Forensics Purposes

Automatic Timeline Construction For Computer Forensics Purposes Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Website benchmarking report

Website benchmarking report Website benchmarking report For [client name] [date] 1 of 11 [client name] 2008 Website Criteria Pty Ltd Contents 1. What this report tells you... 3 2. The benchmarking method... 4 3. Key to the comparative

More information

Increasing Traffic to Your Website Through Search Engine Optimization (SEO) Techniques

Increasing Traffic to Your Website Through Search Engine Optimization (SEO) Techniques Increasing Traffic to Your Website Through Search Engine Optimization (SEO) Techniques Small businesses that want to learn how to attract more customers to their website through marketing strategies such

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

BeeSocial. Create A Buzz About Your Business. Social Media Marketing. Bee Social Marketing is part of Genacom, Inc. www.genacom.

BeeSocial. Create A Buzz About Your Business. Social Media Marketing. Bee Social Marketing is part of Genacom, Inc. www.genacom. BeeSocial M A R K E T I N G Create A Buzz About Your Business Social Media Marketing Bee Social Marketing is part of Genacom, Inc. www.genacom.com What is Social Media Marketing? Social Media Marketing

More information

We all need to be able to capture our profit generating keywords and understand what it is that is adding the most value to our business in 2014.

We all need to be able to capture our profit generating keywords and understand what it is that is adding the most value to our business in 2014. Running a business that uses the internet means that you need to understand and capture the information that drives traffic to your website and most importantly sales and Google Analytics provides this

More information

Here are our Pay per Click Advertising Packages:

Here are our Pay per Click Advertising Packages: Did you know that PPC is the fastest way to drive instant traffic to your website? What can your website do without traffic? Without traffic, you are losing time, opportunities and money to your competition.

More information

Topic 4. 4.3 Dempster-Shafer Theory

Topic 4. 4.3 Dempster-Shafer Theory Topic 4 Representation and Reasoning with Uncertainty Contents 4.0 Representing Uncertainty 4.1 Probabilistic methods 4.2 Certainty Factors (CFs) 4.3 Dempster-Shafer theory 4.4 Fuzzy Logic Dempster-Shafer

More information

How to set up a campaign with Admedo Premium Programmatic Advertising. Log in to the platform with your email address & password at app.admedo.

How to set up a campaign with Admedo Premium Programmatic Advertising. Log in to the platform with your email address & password at app.admedo. How to set up a campaign with Admedo Premium Programmatic Advertising Log in to the platform with your email address & password at app..com For further support please email: hi@.com Campaign Delivery Settings

More information

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read

More information

Google and Yahoo Keyword Auctions. Ryan Gabbard

Google and Yahoo Keyword Auctions. Ryan Gabbard Google and Yahoo Keyword Auctions Ryan Gabbard 1 Outline Google Ads Overview Targeting Ads Content Network and Site-Targeting Ad Design Advice Tools Yahoo Auctions 2 Google Ads Overview Account Structures

More information

Google Places Optimization (FAQ)

Google Places Optimization (FAQ) Google Places Optimization (FAQ) 1. What is local Search? Local search is any search aimed at finding something within a specific geographic area like hotel in Los Angles. Most of the time Google delivers

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

TOP3 MEDIA IS A FULL-SERVICE, ONLINE MARKETING AGENCY THAT EMPLOYS TOMORROW S TECHNOLOGY FOR TODAYS ONLINE SUCCESS. FOR YEARS,OUR TEAM OF DEDICATED

TOP3 MEDIA IS A FULL-SERVICE, ONLINE MARKETING AGENCY THAT EMPLOYS TOMORROW S TECHNOLOGY FOR TODAYS ONLINE SUCCESS. FOR YEARS,OUR TEAM OF DEDICATED TOP3 MEDIA IS A FULL-SERVICE, ONLINE MARKETING AGENCY THAT EMPLOYS TOMORROW S TECHNOLOGY FOR TODAYS ONLINE SUCCESS. FOR YEARS,OUR TEAM OF DEDICATED PROFESSIONALS HAVE PROVIDED BUSINESSES OF ALL SIZES ACROSS

More information

Adwords 110 Success Secrets. Copyright by Lois Rogers

Adwords 110 Success Secrets. Copyright by Lois Rogers Adwords 110 Success Secrets Copyright by Lois Rogers Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying,

More information

China Search International Introducing Baidu

China Search International Introducing Baidu China Search International Introducing Baidu Introducing Baidu THE CHINA OPPORTUNITY China China is the third largest country in the world in terms of land mass after Russia and Canada. It s the largest

More information

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research SEO 360: The Essentials of Search Engine Optimization By Chris Adams, Director of Online Marketing & Research INTRODUCTION Effective Search Engine Optimization is not a highly technical or complex task,

More information

Branding and Search Engine Marketing

Branding and Search Engine Marketing Branding and Search Engine Marketing Abstract The paper investigates the role of paid search advertising in delivering optimal conversion rates in brand-related search engine marketing (SEM) strategies.

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User Privacy 28/29

More information

Internet Marketing Basics

Internet Marketing Basics Is Your Website is Ready for the Internet? In this presentation we will share tips to market your business on the Internet Topics Include: Blogs E-Mail Marketing Search Engine Marketing Search Engine Optimization

More information

Search Engine Optimization: What You Really Need to Know

Search Engine Optimization: What You Really Need to Know Search Engine Optimization: What You Really Need to Know The always changing areas of Internet marketing and automation can leave a small legal practice in the dust. How can you keep up and what do you

More information

Digital Marketing Training Institute

Digital Marketing Training Institute Our USP Live Training Expert Faculty Personalized Training Post Training Support Trusted Institute 5+ Years Experience Flexible Batches Certified Trainers Digital Marketing Training Institute Mumbai Branch:

More information

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General General Basic Basic Small Office Small Office Enterprise Enterprise RAID Web Storage 200 MB 1.5 MB 3 GB 6 GB 12 GB 42 GB Web Transfer Limit 36 GB 192 GB 288 GB 480 GB 960 GB 1200 GB Mail boxes 0 23 30

More information

Integrate.com. Taking Quality Control to the Next Level

Integrate.com. Taking Quality Control to the Next Level Integrate.com Taking Quality Control to the Next Level A Trustworthy Marketplace I ntegrate.com maintains an unparalleled commitment to excellence. Great lengths are taken to build a trustworthy marketplace

More information

» Jump to indexing (document details)

» Jump to indexing (document details) Small Business (A Special Report); So Many Hits, So Few Sales: Click fraud is fast becoming a problem for small businesses advertising online Colleen DeBaise. Wall Street Journal. (Eastern edition). New

More information

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself.

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself. We've all heard how great Internet Shopping can be; some say you can find goods at prices far cheaper than at traditional stores, as online platforms don t have to manage expensive overheads. Online shoppers

More information

Numerical Algorithms Group

Numerical Algorithms Group Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful

More information

Presented By: Web Analytics 101. Avoid Common Mistakes and Learn Best Practices. June 2012. Lubabah Bakht, CEO, Vitizo

Presented By: Web Analytics 101. Avoid Common Mistakes and Learn Best Practices. June 2012. Lubabah Bakht, CEO, Vitizo Presented By: Web Analytics 101 Avoid Common Mistakes and Learn Best Practices June 2012 Lubabah Bakht, CEO, Vitizo Web Analytics 101, Lubabah Bakht, June 2012 This 12-page whitepaper provides a deep understanding

More information

How To Choose The Right Affiliate Tracking Software

How To Choose The Right Affiliate Tracking Software How To Choose The Right Affiliate Tracking Software Affiliate Software Ebook Table of Contents About this guide Affiliate Marketing Main criteria Tracking reliability Integration methods Feature set Mobile

More information

Internet Advertising: Is Your Browser Putting You at Risk?

Internet Advertising: Is Your Browser Putting You at Risk? ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was

More information

Discover the best keywords for your online marketing campaign

Discover the best keywords for your online marketing campaign Discover the best keywords for your online marketing campaign Index n... 3 Keyword discovery using manual methodology... 5 Step 1: Keyword analysis and search... 6 Step 2... 10 Additional tools... 11 Competitors...

More information

A Comparison of Google and Yahoo: Which is More Cost Effective When Using Sponsored Links for Small Companies?

A Comparison of Google and Yahoo: Which is More Cost Effective When Using Sponsored Links for Small Companies? CS-BIGS 2(2): 114-119 2009 CS-BIGS http://www.bentley.edu/csbigs/vol2-2/kennedy.pdf A Comparison of Google and Yahoo: Which is More Cost Effective When Using Sponsored Links for Small Companies? Kristin

More information

Case Study: How Generic Domain Names Impact a SEM Campaign

Case Study: How Generic Domain Names Impact a SEM Campaign Case Study: How Generic Domain Names Impact a SEM Campaign Karan Budhiraja 1 Executive Summary A challenge for online marketers is getting more clicks out of their pay-per-click search engine campaigns,

More information

Pizza SEO: Effective Web. Effective Web Audit. Effective Web Audit. Copyright 2007+ Pizza SEO Ltd. info@pizzaseo.com http://pizzaseo.

Pizza SEO: Effective Web. Effective Web Audit. Effective Web Audit. Copyright 2007+ Pizza SEO Ltd. info@pizzaseo.com http://pizzaseo. 1 Table of Contents 1 (X)HTML Code / CSS Code 1.1 Valid code 1.2 Layout 1.3 CSS & JavaScript 1.4 TITLE element 1.5 META Description element 1.6 Structure of pages 2 Structure of URL addresses 2.1 Friendly

More information

Keywords the Most Important Item in SEO

Keywords the Most Important Item in SEO This is one of several guides and instructionals that we ll be sending you through the course of our Management Service. Please read these instructionals so that you can better understand what you can

More information

Case Study: Closing The Loop

Case Study: Closing The Loop Case Study: Closing The Loop Connect digital marketing data and offline sales data to get true ROI with this cost-effective approach to Customer Intelligence. As digital marketing techniques and technologies

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information