Access Logs. Prof. Sheizaf Rafaeli Electronic commerce
|
|
- Justina Gregory
- 8 years ago
- Views:
Transcription
1 Access Logs Prof. Sheizaf Rafaeli Electronic commerce
2
3
4
5 Advantages of maintaining state Shopping cart applications Customizing and personalizing content Tracking navigation patterns Creating subscriber status Remembering pesky passwords Rewarding frequent or return visits Changing banners and bookmarks Games: remembering scores, high scores, skill levels Prof. Sheizaf Rafaeli E-Business 5
6 Maintaining state Stored in cookies Encoded in URL links Sent in hidden form variables Stored in variables in other (hidden) frames Stored on the web server (least desirable) Prof. Sheizaf Rafaeli E-Business 6
7 Cookies Magic cookies Persistent client state HTTP cookies A cookie is a small amount of information that a Web site sends to your browser. When your browser receives a cookie, it saves the cookie on your hard drive for future use When you re-visit a site, your browser checks for any pre-defined preferences (cookies) for that particular site. Prof. Sheizaf Rafaeli E-Business 7
8 Cookies Enable storing information on the client s browser for later retrieval Most powerful technique for maintaining state within a web site Prof. Sheizaf Rafaeli E-Business 8
9 Web sites use cookies in many different ways. Sites can accurately determine how many people actually visit the site. It turns out that because of proxy servers, caching, concentrators and so on, the only way for a site to accurately count visitors is to set a cookie with a unique ID for each visitor. Using cookies, sites can determine: How many visitors arrive How many are new vs. repeat visitors How often a visitor has visited The first time a visitor arrives, the site creates a new ID in the database and sends the ID as a cookie. The next time the user comes back, the site can increment a counter associated with that ID in the database. Sites can store user preferences (often referred to as customization). E-commerce sites can implement things like shopping carts and "quick checkout" options. It would be impossible to implement a convenient shopping mechanism without cookies or something like them. TRY THIS: Prof. Sheizaf Rafaeli E-Business 9
10 Prof. Sheizaf Rafaeli E-Business 10
11 Prof. Sheizaf Rafaeli E-Business 11
12 Prof. Sheizaf Rafaeli E-Business 12
13 Prof. Sheizaf Rafaeli E-Business 13
14 Prof. Sheizaf Rafaeli E-Business 14
15 Prof. Sheizaf Rafaeli E-Business 15
16 Are YOU a voyeur? Visit (choose red) Was it interesting? Prof. Sheizaf Rafaeli E-Business 16
17 Problems, Constraints and Disadvantages (real) Cookie may not be persistent May be deleted by accident or on purpose may be disallowed or frozen Browser may impose limitations, distorting the information Unencrypted, may give away secrets Made to sound scary (see myths) Prof. Sheizaf Rafaeli E-Business 17
18 Where are cookies stored? By Netscape, as cookies.txt on Windows machines or as MagicCookies (on Macs) By Explorer in special directory named Windows/Cookies By other browsers - wherever they wish Prof. Sheizaf Rafaeli E-Business 18
19 Cookie Myths The biggest problem seems psychological Big brother violating privacy? Cookies seldom used for this purpose Cookies cannot be used to get data from your hard drive, your address or sensitive information about your person HOWEVER: look at delivering targeted REAL TIME marketing Prof. Sheizaf Rafaeli E-Business 19
20 WebBugs (doubleclick s secret) A hidden active link <img src= width=1height=1> </img> Prof. Sheizaf Rafaeli E-Business 20
21 The DoubleClick Controversy Profiling Prof. Sheizaf Rafaeli E-Business 21
22 DoubleClick Personal data sent to DoubleClick servers includes: My address My full name My mailing address (street, city, state, and Zip code) My phone number Transactional data sent to DoubleClick includes: Names of VHS movies I am interested in buying Details of a plane trip Search phrases used at search engines Health conditions See Richard Smith s Prof. Sheizaf Rafaeli E-Business 22
23 Cookie Myths (2) Early implementations of Java and JavaScript did allow awful things but for the most part these security leaks have been plugged. Software limits total size of cookie file: less than 1.2 MB no more than 80 KB per each web site each site can only access its own Prof. Sheizaf Rafaeli E-Business 23
24 Cookie Myths (3) A site can only access a cookie that has been set from its own domain, It cannot access any other cookies from your computer. Prof. Sheizaf Rafaeli E-Business 24
25 Morally Permissible Cookies Collection of Personal Information Customer preferences Online shopping Mr. Smith
26 Immoral Uses of Cookies Centralization of Personal Information In order to measure our browsing behavior, target marketers track us over the Internet by adding cookies to the advertisement banners on so many Web pages. Is such a use of cookies ethical? Does it fit within a reasonable expectation of privacy on the Web?
27 Prof. Sheizaf Rafaeli E-Business 27
28 _hOEvuq1T.jpg
29 29
30 30
31 31
32 32
33 Online Filter Bubbles (Eli Pariser) /talks/eli_pariser_b eware_online_filter _bubbles.html 33
34
35
36
37 Why have an interest in hits, visitors, visits and sessions? Bragging rights Assessing advertising rates Pricing and billing Site design Feedback and navigational help for users Quality assurance Security concerns Copyright enforcement Marketing research Editorial and marketing quality improvements
38 Surveys and panels Media Metrix utilizes its patented, superior operatingsystem metering methodology to track Internet and Digital Media audience usage behavior in real-time - click-byclick, page-by-page, minute-by-minute. Media Metrix has a sample of more than 70,000 people under measurement worldwide, yielding monthly, weekly, and daily data collection and reporting. (
39
40 Information sources about the audience "clickstream": Speculate (data-less research) Surveys (ask 'em) and panels (watch em grow) Experiments (watch 'em in the lab) Counters (visible and hidden; internal and external) Cookies Javascript background processes Active-X background processes Java background processes CGI environment variables CGI events (info sent with POST commands) Eyeball-trackers and other physiological measures
41 Information sources about the audience "clickstream": ***Logs*** Non-server logs, such as history files created by the browsers, intermediate logs recorded by firewall and proxy devices, cookie logs on individual clients and intermediating networks. PC-Meters (measuring at the source, like TV-meters) (watch 'em at home) perhaps used in panels of participating households (likely to happen in major markets. unlikely to capture the essence of the web, as the sample is already biased).
42 Different types of LOGS: Error Security Referrer Browser (Agent) Access-Logs
43 What do log files count? Remember: sessions are "connectionless" or "stateless! The common access log file contains data entries for 1. Remote host name or IP number 2. User_logname - often not implemented and replaced by "-" 3. Authenticated_user - replaced by "-" if not an authenticated request 4. Date and time 5. Request from client (name of document, file or command) 6. HTTP status code returned to client (200 is success) 7. Number of bytes sent REFER and ERROR may have more
44 A snapshot from an access log: annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff1sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/watz2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:54: ] "GET /vol1/issue4/mclaugh.html HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:55: ] "GET /vol1/issue4/watz1sm.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /bluebar.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /address2.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55:57 sample +0200] "GET of /names.gif a few HTTP/1.0" lines from an lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /Platsite.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /SCOUTSEL.GIF HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:56:15 access_log +0200] "GET / HTTP/1.0" of one 200 of 5469 the servers of port327.cjnetworks.com - - [04/Jan/1998:21:58: ] "GET / HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:58:49 the +0200] Journal "GET /vol1/issue3/crede.html of Computer HTTP/1.0" Mediated port327.cjnetworks.com - - [04/Jan/1998:21:59: ] "GET /journal.html HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:59:50 Communication +0200] "GET /vol1/issue3/vol1no3.html (JCMC): HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:22:00: ] "GET /vol3/issue2/ HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:22:00: ] "GET /vol3/issue2/head.jpg HTTP/1.0" cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] ( "GET /vol1/issue3/search.vol1no3.html and HTTP/1.0" shelley.gre.ac.uk - - [04/Jan/1998:22:01: ] "POST /cgi-jcmc/srch.vol1no3.cgi HTTP/1.0" cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /vol1/ HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/back.gif HTTP/1.0" sorrel.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/blank.gif HTTP/1.0" sorrel.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/folder.gif HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET / HTTP/1.0"
45 A snapshot from an access log: annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff1sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/watz2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:54: ] "GET /vol1/issue4/mclaugh.html HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:55: ] "GET /vol1/issue4/watz1sm.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /bluebar.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /address2.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /names.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /Platsite.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /SCOUTSEL.GIF HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:56: ] "GET / HTTP/1.0" port327.cjnetworks.com - - [04/Jan/1998:21:58: ] "GET / HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:58: ] "GET /vol1/issue3/crede.html HTTP/1.0" port327.cjnetworks.com - - [04/Jan/1998:21:59: ] "GET /journal.html HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:59: ] "GET /vol1/issue3/vol1no3.html HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:22:00: ] "GET /vol3/issue2/ HTTP/1.0" ww-tp06.proxy.aol.com reading textual - - [04/Jan/1998:22:00:20 HTML files or requesting +0200] "GET graphic /vol3/issue2/head.jpg "gif" files. Other HTTP/1.0" "sessions" 200 are 7203 more cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /vol1/issue3/search.vol1no3.html HTTP/1.0" shelley.gre.ac.uk - - [04/Jan/1998:22:01: ] "POST /cgi-jcmc/srch.vol1no3.cgi HTTP/1.0" cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /vol1/ HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/back.gif HTTP/1.0" sorrel.mcc.ac.uk an educational/academic - - [04/Jan/1998:22:01:53 institution +0200] while "GET /icons/blank.gif others are using HTTP/1.0" commercial and network sorrel.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/folder.gif HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET / HTTP/1.0" Seven simultaneous "hosts", "visiting" over a randomly chosen period of just under ten minutes in "an evening in the life of an online journal". Even in this small sample one can sense that some of the "sessions" are "directed", some "meandering". Some are passive, just interactive. One visitor generated a "POST" record that results in running a CGI program. Note how the visitors are from different countries (two in this case). Several visitors originates from accounts/connections. If we follow the log long enough, we can begin to discern a pattern of interests for individual visitors and in the aggregate for types of visitors.
46 A snapshot from an access log: annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/giff1sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:53: ] "GET /vol1/issue4/watz2sm.gif HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:54: ] "GET /vol1/issue4/mclaugh.html HTTP/1.0" annex bmi.net - - [04/Jan/1998:21:55: ] "GET /vol1/issue4/watz1sm.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /bluebar.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /address2.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /names.gif HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /Platsite.jpg HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:55: ] "GET /SCOUTSEL.GIF HTTP/1.0" lib21.lib.edinboro.edu - - [04/Jan/1998:21:56: ] "GET / HTTP/1.0" port327.cjnetworks.com - - [04/Jan/1998:21:58: ] "GET / HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:58: ] "GET /vol1/issue3/crede.html HTTP/1.0" port327.cjnetworks.com - - [04/Jan/1998:21:59: ] "GET /journal.html HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:21:59: ] "GET /vol1/issue3/vol1no3.html HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:22:00: ] "GET /vol3/issue2/ HTTP/1.0" ww-tp06.proxy.aol.com - - [04/Jan/1998:22:00: ] "GET /vol3/issue2/head.jpg HTTP/1.0" cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /vol1/issue3/search.vol1no3.html HTTP/1.0" shelley.gre.ac.uk - - [04/Jan/1998:22:01: ] "POST /cgi-jcmc/srch.vol1no3.cgi HTTP/1.0" cumin.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /vol1/ HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/back.gif HTTP/1.0" sorrel.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/blank.gif HTTP/1.0" sorrel.mcc.ac.uk - - [04/Jan/1998:22:01: ] "GET /icons/folder.gif HTTP/1.0" saffron.lut.ac.uk - - [04/Jan/1998:22:01: ] "GET / HTTP/1.0"
47 Different measures Hit Page View Visit Session Status Code Date and Time Reach
48 And see:
49
50 To Measure is to Manage Commercial and semi-free analysis services Websidestory and Hitbox Another approach: Media metrix / PCMeter Nedstats NetRatings/Nielsen
51 It is important to distinguish Exposure between counting for: Click-through Interactivity Other outcome : learning, persuasion, employee monitoring, law enforcement, etc.
52 Online Marketing Metrics: Lexicon Metrics that focus on success of Web site in achieving audience or market share Impressions Click-through rate (CTR) View-through rate (VTR) Hits Page views Stickiness (duration) Unique visitors Loyalty Reach Recency
53 Online Marketing Metrics: Lexicon (cont d) Metrics that focus on conversion of visitor to customer Acquisition rate Conversion rate Browse-to-buy-ratio View-to-cart ratio Cart conversion rate Checkout conversion rate Abandonment rate Retention rate Attrition rate
54 Online Marketing Metrics: Lexicon (cont d) metrics Open rate Delivery rate Click-through rate ( ) Bounce-back rate Unsubscribe rate Conversion rate ( )
55 Problems and drawbacks with logs: Inappropriate, mistaken use Not aggregating, not separating wheat from chaff Deliberate "fudging" or worse Dynamic content Offline reading Proxies, robots, caches, forwarding, printed copies Multi casting Plug-ins and media objects No record of what happens offsite (inside java, etc.)
56 Ethical issues Should web-stats be made public? Would it be ethical to NOT make logs public? Should web stats be made public even if only in aggregate? Should decisions, allocation, pricing, strategy, etc. be based on log stats?
57
58
59
60
61 Getting Paranoid? Remember the paranoid s epitaph See CNET s paranoiac toolkit Use Window-washer for your cookie, cache, history and bookmarks.
62 Paranoid 2? Blackbook But remember that there is Prudence, and
63 Paranoid 3? LittleBrother, from
64 More on Little Brother
65 Moving into CRM CRM: Customer Relationship Management
66 What to look for in analysis tools Scalability: deal with 100 s of daily MB Manageability and Customizability Integration with rest of site Reactive and Proactive Analysis Departmental, compatmentalized and personalized views and cuts Data mining and drill down functionality
67 Further References See Junkbusters brief history of junk At: Please see access logs web page, on: NewMedia.com s How do you measure up, at: For some datamining and CRM pointers Yahoo s collection of Access log analysis tools Hypernews list: DevTools:
68 Further References Scientific American, April 1999 Watch the Watchers David Brin s The Transparent Society Addison Wesley, 1998.
69
70 Google Analytics
71 Analytics
72
73 Cookies and.
74
75
76
77 Expressions Instead of Impressions
78
79
80
81
82
83 Big Data
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 8-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 8-2 Chapter
More informationAlexander Nikov. 8. ecommerce Marketing Communications. Marketing Communications. Outline
INFO 3435 ecommerce Teaching Objectives 8. ecommerce Marketing Communications Identify the major forms of online marketing communications. Explain the costs and benefits of online marketing communications.
More informationECM 210 Chapter 6 - E-commerce Marketing Concepts: Social, Mobile, Local
Consumers Online: The Internet Audience and Consumer Behavior Around 75% (89 million) of U.S. households have Internet access in 2012 Intensity and scope of use both increasing Some demographic groups
More informationInternet Advertising Glossary Internet Advertising Glossary
Internet Advertising Glossary Internet Advertising Glossary The Council Advertising Network bring the benefits of national web advertising to your local community. With more and more members joining the
More informationE-commerce 2014. Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition
E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Chapter 6 E-commerce Marketing and
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationClick stream reporting & analysis for website optimization
Click stream reporting & analysis for website optimization Richard Doherty e-intelligence Program Manager SAS Institute EMEA What is Click Stream Reporting?! Potential customers, or visitors, navigate
More informationHow To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
More informationWeb Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative
More informationGoogle Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey
1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics
More informationGreen Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:
Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification
More informationESSENTIALS OF ENTREPRENEURSHIP AND SMALL BUSINESS MANAGEMENT 6E Chapter 9: E-Commerce and the Entrepreneur
CHAPTER 9 E-Commerce and the Entrepreneur The Internet: Changing the Face of Business Successful companies use the Internet as a mechanism for transforming their companies and for changing everything about
More informationRegain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
More informationHow We Use Your Personal Information On An Afinion International Ab And Afion International And Afinion Afion Afion
AFFINION INTERNATIONAL AB COMPANY PRIVACY AND COOKIES POLICY The privacy and cookies policy sets out how we use any personal information that you give to us, or that we may collect or otherwise process
More informationIf you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.
c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always
More informationweb analytics ...and beyond Not just for beginners, We are interested in your thoughts:
web analytics 201 Not just for beginners, This primer is designed to help clarify some of the major challenges faced by marketers today, such as:...and beyond -defining KPIs in a complex environment -organizing
More informationA guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
More informationWhat is Web Security? Motivation
brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
More informationESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
More informationWeb Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
More informationIf your organization is not already
Before you build your Web site, you need a solid design. Eden Watt At a Glance When you develop your first e-commerce site, you will discover that there are a few new things to learn about application
More informationIndex. AdWords, 182 AJAX Cart, 129 Attribution, 174
Index A AdWords, 182 AJAX Cart, 129 Attribution, 174 B BigQuery, Big Data Analysis create reports, 238 GA-BigQuery integration, 238 GA data, 241 hierarchy structure, 238 query language (see also Data selection,
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationGoogle Analytics Basics
Google Analytics Basics Contents Google Analytics: An Introduction...3 Google Analytics Features... 3 Google Analytics Interface... Changing the Date Range... 8 Graphs... 9 Put Stats into Context... 10
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationPrivacy Policy. The Read Privacy Policy was created on June 11, 2015
Legal Privacy Policy The Read Privacy Policy was created on June 11, 2015 Your privacy is important to Read and always will be. So we ve developed a Privacy Policy that covers how we collect, use, disclose,
More informationGuide to Analyzing Feedback from Web Trends
Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?
More informationgraphical Systems for Website Design
2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,
More informationPaladin Computers Privacy Policy Last Updated on April 26, 2006
Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our
More informationWeb Analytics. Using emetrics to Guide Marketing Strategies on the Web
Web Analytics Using emetrics to Guide Marketing Strategies on the Web Web analytics is the practice of measuring, collecting, analyzing and reporting on Internet data for the purposes of understanding
More informationPrivacy Policy - LuxTNT.com
Privacy Policy - LuxTNT.com Overview TNT Luxury Group Limited (the owner of LuxTNT.com). knows that you care how information about you is used and shared, and we appreciate your trust that we will do so
More informationThe web server administrator needs to set certain properties to insure that logging is activated.
Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information
More informationcomscore Media Metrix Description of Methodology
comscore Media Metrix Description of Methodology Unified Digital Measurement United States November, 2013 1 Introduction This document provides an overview the methodologies used by comscore to deliver
More informationEuropcar.co.uk collects personal data that you voluntarily provide. This information is collected when you:
Privacy Policy I What type of information do we collect? Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: - Register / Become a Europcar member
More informationPrivacy Policy Last Updated September 10, 2015
Privacy Policy Last Updated September 10, 2015 Tanger Properties Limited Partnership d/b/a Tanger Outlets or Tanger Outlet Centers ("Tanger," "we" or us ), which includes affiliated companies owned or
More informationW3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
More informationSeashore Point Privacy Policy and Terms of Service
Seashore Point Privacy Policy and Terms of Service The Residences at Seashore Point and Seashore Point Wellness Center ( Community, We, Us ) respects your privacy and is committed to protecting it through
More informationv6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
More informationElo Touch Solutions Privacy Policy
Elo Touch Solutions Privacy Policy Your privacy is very important to us. At Elo Touch Solutions, Inc. ( Elo, we or us which includes any of our worldwide direct and indirect subsidiaries), we recognize
More informationWeb Analytics Definitions
Web Analytics Definitions Web Analytics Association 401 Edgewater Place Suite 600 Wakefield MA 01880 USA standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative Commons Attribution-Noncommercial-No
More informationThis Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi.
Effective April 13, 2015 This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. AG Jewelers knows that you care how information about you is used
More informationIBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet
IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer
More informationINTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy.
Privacy Policy Last Modified: July 20, 2015 INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. This privacy policy describes the types
More informationGUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
More informationDemystifying Digital Introduction to Google Analytics. Mal Chia Digital Account Director
Demystifying Digital Introduction to Google Analytics Mal Chia Digital Account Director @malchia @communikateetal Slides will be emailed after the session 2 Workshop Overview 1. Introduction 2. Getting
More informationVyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?
Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy
More informationBath & Body Works Online Privacy and Security
Bath & Body Works Online Privacy and Security This privacy policy explains what personal information is collected through this Web siteour various online channels, how that information is used, to whom
More informationAffiliate Link At A Glance
Affiliate Link At A Glance Who is Affiliatetracking.com? Affiliatetracking.com was established in May of 1998 to help webmasters with small budgets establish an affiliate program. Since our beginning,
More informationBUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
More informationFOUR BLOCK FOUNDATION, INC. PRIVACY POLICY November 6, 2015
FOUR BLOCK FOUNDATION, INC. PRIVACY POLICY November 6, 2015 At Four Block Foundation, Inc. ( Four Block, we, us, or our ), our fundamental philosophy is "site visitors first." That value powers all of
More informationDoc ID: URCHINB-001 (3/30/05)
Urchin 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be
More informationWeb Hosting Control Panel
Web Hosting Control Panel Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. This guide will provide you with an over view of the
More informationQuick Reference Guide: Shared Hosting
: Shared Hosting TABLE OF CONTENTS GENERAL INFORMATION...2 WEB SERVER PLATFORM SPECIFIC INFORMATION...2 WEBSITE TRAFFIC ANALYSIS TOOLS...3 DETAILED STEPS ON HOW TO PUBLISH YOUR WEBSITE...6 FREQUENTLY ASKED
More informationChapter 6. E-commerce Marketing Concepts. Copyright 2009 Pearson Education, Inc. Slide 6-1
Chapter 6 E-commerce Marketing Concepts Copyright 2009 Pearson Education, Inc. Slide 6-1 The Revolution in Internet Marketing Technologies Three broad impacts: Scope of marketing communications broadened
More informationMaximum Global Business Online Privacy Statement
Maximum Global Business Online Privacy Statement Last Updated: June 24, 2008. Maximum Global Business is committed to protecting your privacy. Please read the Maximum Global Business Online Privacy Statement
More informationFAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationLearning Objectives. Interactive Media. Learning Objectives (cont.) Interactive Media. Traditional Advertising Versus Interactive Communications
CHAPTER 12 Interactive Media Learning Objectives Describe the various elements of internet communications Identify the key organization members that constitute the online advertising industry Evaluate
More informationPublic Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting your privacy.
PRIVACY POLICY 2015 PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting
More informationGoogle AdWords Remarketing
Google AdWords Remarketing AdWords remarketing is not only great for driving visitors back to your website to convert but is also great at improving your branding which in effect increases conversion and
More informationThe Impact of Cookie Deletion on Site-Server and Ad-Server Metrics in Australia
Measuring the digital world. TM The Impact of Cookie Deletion on Site-Server and Ad-Server Metrics in Australia An Empirical comscore Study January 2011 Table of Contents Background & Overview Cookie Deletion:
More informationCustomer Relationship Management
Customer Relationship Management CRM is Any application or initiative designed to help an organization optimize interactions with customers, suppliers, or prospects via one or more touch points for the
More informationAn Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
More informationWorking With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
More informationWeb Hosting Control Panel
Web Hosting Control Panel Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. This guide will provide you with an over view of the
More informationChecklist for Web Application Testing
Checklist for Web Application Testing July 27, 2004 Submitted By Infosys Technologies Limited Author Setumadhav Kulkarni (Setumadhav_Kulkarni@infosys.com) Web Testing Checklist.doc Page 1 of 9 COPYRIGHT
More informationTransforms company websites into a best-run web based businesses
Transforms company websites into a best-run web based businesses DeskGod.com makes traditional web managing software obsolete. DeskGod.com main goal is to provide number of tools for analyzing and automation
More informationCookies Overview and HTTP Proxies
Cookies Overview and HTTP Proxies What is a Cookie? Small piece of data generated by a web server, stored on the client s hard drive. Serves as an add-on to the HTTP specification (remember, HTTP by itself
More informationLoad testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
More informationChapter 23: Uploading Your Website to the Internet
1 Chapter 23: Uploading Your Website to the Internet After you complete your website, you must upload (save) your site to the internet. Before you upload, Web Studio provides you with options to view your
More informationWeb Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher
Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,
More informationWeb Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General
General Basic Basic Small Office Small Office Enterprise Enterprise RAID Web Storage 200 MB 1.5 MB 3 GB 6 GB 12 GB 42 GB Web Transfer Limit 36 GB 192 GB 288 GB 480 GB 960 GB 1200 GB Mail boxes 0 23 30
More informationAlexander Nikov. 7. ecommerce Marketing Concepts. Consumers Online: The Internet Audience and Consumer Behavior. Outline
INFO 3435 E-Commerce Teaching Objectives 7. ecommerce Marketing Concepts Alexander Nikov Identify the key features of the Internet audience. Discuss the basic concepts of consumer behavior and purchasing
More informationANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationHow To Choose The Right Affiliate Tracking Software
How To Choose The Right Affiliate Tracking Software Affiliate Software Ebook Table of Contents About this guide Affiliate Marketing Main criteria Tracking reliability Integration methods Feature set Mobile
More informationWebsite analytics / statistics Monitoring and analysing the impact of web marketing
Website analytics / statistics Monitoring and analysing the impact of web marketing What are website analytics / statistics? Web analytics is the measurement, collection, analysis and reporting of website
More informationHP Business Process Monitor
HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal
More informationZubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationAnonymity on the Internet Over Proxy Servers
Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues ei08116@fe.up.pt Matej Bulić ei12010@fe.up.pt Introduction user always leaves digital sign need for security and anonymity Proxy
More informationCONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE.
Privacy Statement Elanco, a division of Eli Lilly and Company (Lilly), (referred to as Elanco or Lilly in this Privacy Statement) respects the privacy of visitors to our websites, and as a result, we have
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationSearch Engine Optimization Glossary
Search Engine Optimization Glossary A ALT Text/Tag or Attribute: A description of an image in your site's HTML. Unlike humans, search engines read only the ALT text of images, not the images themselves.
More informationGUIDE TO WEBSITES AND E-COMMERCE
GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1
More informationCHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
More informationPRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
More informationSetting Up Solar Web Commerce. Release 8.6.9
Setting Up Solar Web Commerce Release 8.6.9 Legal Notices 2011 Epicor Software Corporation. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Epicor and the Epicor logo
More informationA Model of Online Instructional Design Analytics. Kenneth W. Fansler Director, Technology Services College of Education Illinois State University
1 20th Annual Conference on Distance Teaching and Learning click here -> A Model of Online Instructional Design Analytics Kenneth W. Fansler Director, Technology Services College of Education Rodney P.
More informationHow to set up a campaign with Admedo Premium Programmatic Advertising. Log in to the platform with your email address & password at app.admedo.
How to set up a campaign with Admedo Premium Programmatic Advertising Log in to the platform with your email address & password at app..com For further support please email: hi@.com Campaign Delivery Settings
More informationApplication Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationHOW DOES GOOGLE ANALYTICS HELP ME?
Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors
More informationFacebook Management BENEFITS OF SOCIAL MEDIA MANAGEMENT
Digital Strategy Facebook Management BENEFITS OF SOCIAL MEDIA MANAGEMENT r Targeted advertising r New customer acquisition r Branding r Customer engagement r Reputation management r Controlled customer
More informationData Sheet: Work Examiner Professional and Standard
Data Sheet: Work Examiner Professional and Standard Editions Overview One of the main problems in any business is control over the efficiency of employees. Nowadays it is impossible to imagine an organization
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationQuorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
More informationDISCLOSURES WEB PRIVACY POLICY
DISCLOSURES WEB PRIVACY POLICY This Privacy Policy governs your use of this website and any content, products or services made available from or through this website including any sub domains thereof ("Website").
More information