E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.

Size: px
Start display at page:

Download "E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management."

Transcription

1 University of Fribourg, Switzerland Department of Computer Science Information Systems Research Group Seminar Online CRM, 2005 Prof. Dr. Andreas Meier E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management Paper by: Beat Raess Ruelle des Macons 9 CH-1700 Fribourg beat.raess@gmx.net

2 Contents 1 Introduction 2 2 CRM and Web Mining Customer Relationship Management (CRM) Perspectives of CRM Adding the E to CRM Web Mining Web Content Mining Web Structure Mining Web Usage Mining Web Usage Mining in E-CRM Objectives Application Fields of Web Usage Mining The Web Usage Mining Process Data Cleaning User and Session Identification Data Integration Pattern Discovery and Analysis Conclusion 16 1

3 1 Introduction Customer Relationship Management (CRM) is a business strategy oriented on the needs of customers (cf. [Wikipedia 2005]). As a management and organisation form, it is mainly concerned with improving customer orientation and satisfaction in order to assure the acquisition of new and the retention of existing customers of an enterprise (cf. [Schoegel 2002, p. 33]). Online or Electronic Customer Relationship Management (E-CRM) adds the electronic component of modern information and communication technologies (e.g. the internet) to CRM. E-CRM depends on detailled information concerning the customer s characteristics, needs, interests and behaviour. In the case of e-commerce, the problem consists in extracting the relevant information from a huge amount of data. As a consequence, appropriate techniques such as Data or Web Mining are a useful mean to achieve the desired results. Data mining 1 deals with the automated search of patterns inherent in large amounts of data. The aim is to retrieve new information based on existing data by applying methodes from statistics and pattern recognition (cf. [Wikipedia 2005c]). The term Web Mining then refers to the application of such data mining techniques to extract information from the internet (cf. [Wikipedia 2005b]). Web Mining can be classified into three different categories. Web Content Mining and Web Structure Mining analyse the content and structure of web pages, whereas Web Usage Mining studies the behaviour of online surfers. Based on research papers of the involved domains, the objective of this paper is to present, how Web Usage Mining can provide the necessary information needed for Electronic Customer Relationship Management. Section 2 introduces the relevant terms and notions concerning CRM, E-CRM and Web Mining in general. Afterwards, section 3 concentrates on Web Usage Mining and how it is used in E-CRM. This includes an overview over the objectives and application fields, as well as an explanation of the process of Web Usage Mining in E-CRM. 1 also referred to as Knowledge-Discovery in Databases (KDD) 2

4 2 CRM and Web Mining The aim of this section is to provide the background concerning Customer Relationship Management and Web Mining. In addition to the definition of these terms, their fundamental concepts are briefly explained. 2.1 Customer Relationship Management (CRM) The relation of a customer to an enterprise can be classified into the four phases of the Buying Cycle 2 (cf. [Kincaid 2002, p. 45]): In the consider phase, the customer becomes aware of a specific need and explores possible solutions. He then evaluates and chooses the optimal alternative and places an order in the purchase phase. The obtained product is then installed and utilized in the use phase, and in the repurchase phase he eventually decides to retire or upgrade it. Figure 1 shows this Buying Cycle and the associated marketing and E-CRM tasks involved. Figure 1: Buying Cycle [Schoegel 2002, p.69] Customer Relationship Management now is the strategic use of information, processes, technology and people to manage the customer s relationship with [a] company (marketing, sales, services, and support) accross the whole customer life cycle [Kincaid 2002, p.41]. The objective of CRM is to assure a company s ability to build up and maintain a long-lasting, profitable relation to customers in order to fully benefit from their economical potential. In particular, the acquisition of new clients as well as the retention of existing ones needs to be ensured (cf. [Schoegel 2002, p. 33]). 2 a similar concept is the Customer Life Cycle 3

5 2.1.1 Perspectives of CRM Based on the above definition, CRM can now be analysed according to [Schoegel 2002, p ] from three different perspectives: a strategic, a process oriented and a technological point of view. The strategic perspective focuses on the active management of the customer relationship. The aim is to build up and maintain the economic potential of the individual customers, based on the fact, that a customer only is profitable for an enterprise after some years, due to more frequent and increased purchases, reduced support and operating costs. Instead of only aquiering new clients, CRM therefore tries to establish a long-lasting relation to valuable customers by for example offering new products (crossselling) and services to existing clients. From the process perspective, the goal is to implement the above mentioned strategy. Independent of the communication or distribution channel involved, a customer should obtain the necessary services by the company during the whole Customer Life Cycle. CRM should convince the customer that he will benefit from establishing a long-lasting relation to the company. The perspective of the information technology consists in the automatisation of all customer management processes. CRM systems should support and integrate operative processes at the front-office, offer possibilities for the collaboration between all involved parties as well as provide analytical tools to retrieve the relevant data. The aim is to build up an integrated system in order to acquire and exploit the full economical potential of a customer. Using such a system adds the E to CRM Adding the E to CRM Electronic Customer Relationship Management (E-CRM) incorporates modern information and communication technologies into traditional CRM. The potential of E-CRM is to provide a system, which allows the integration of all involved parties and aspects of CRM. The vision of E-CRM is to offer means to collect and analyse data from various internal and external sources in order to extract information concerning valuable customers and how a company should interact with them (cf. [Schoegel 2002, p. 44]). Nevertheless, as the cited author states, IT is only an instrument to achieve this vision, but does not provide a CRM-Solution by itself. To illustrate the 4

6 activities of E-CRM systematically, he proposes in [Schoegel 2002, p ] a model consisting of an identification, selection and interaction phase (compare Figure 2). Figure 2: Phase Model [Schoegel 2002, p. 46] The identification phase tries to first gather all relevant data concerning customers, markets and basic conditions, and to structure this data afterwards to identify specific customer groups. In the case of e-commerce, an approach is to use Data or Web Mining methods (see section 3) to extract the necessary information and to classify customers into groups. Having these customer groups, the selection phase then aims at choosing the valuable customer segments. The objective is to adapt or adjust the relation to these groups according to their specific needs and their value for the enterprise. The next phase, the interaction, now wants to establish a profitable relation to these customers. This interaction is based on the information obtained in the two previous stages. 2.2 Web Mining With the still increasing importance of the internet, the amount of information and data available is constantly growing. Associated with this fact are among others the following problems (cf. [Kosala 2000, p. 1]): finding the relevant information, creating new knowledge out of the information available, personalization of information and learning about consumers or individual users. To solve these information overload problems, Web Mining techniques can be used. The term Web Mining describes the use of data mining techniques to automatically discover and extract information from Web documents 5

7 and services [Kosala 2000, p. 2]. It is an interdisciplinary domain integrating research from database, information retrieval, artificial intelligence, machine learning and natural language processing. According to [Kosala 2000, p. 2], Web Mining can be decomposed in the subtasks of resource finding (retrieve intended Web documents and data), information selection and pre-processing (automatically selecting specific information), generalization (discover patterns) and analysis (validation, interpretation of the mined patterns). Based on which part of the Web is mined, Kosala further suggests to decompose Web Mining into three different categories (cf. [Kosala 2000, p. 3-4]). Web Content Mining searches useful information from Web contents, data or documents, Web Structure Mining wants to discover a model of the link structures of the web, and Web Usage Mining analyses secondary data generated by the user s interaction and behaviour. These categories (see Figure 3) are briefly introduced in the following paragraphs, a more detailled overview can be found in [Kosala 2000, p. 3-10]. Figure 3: Web Mining Categories [Kosala 2000, p. 5] Web Content Mining The web contains several types of data like text, images, hyperlinks, audio or video. In order to find these information, people nowadays often browse or search the internet based on keywords. But using search tools, as for example Google, often leads to a great number of irrelevant search results. Web Content Mining therefore tries to find new means to retrieve relevant data from the internet. From an information retrieval view, the research aims at improving the finding itself or the filtering of the information. This is basically done by applying text mining techniques, because most of the 6

8 web content is unstructured text data. From an database research view, the focus is on finding models to capture web data. The goal here is to obtain new means to perform more sophisticated queries, which lead to better search results Web Structure Mining The internet basically is a set of linked web pages. Web Structure Mining is interested in the structure of these links to finally be able to improve retrieval performance, to categorize web pages, find out similarities or relationships between pages or to determine authority or overview sites for specific subjects. To accomplish this, the internet often is modelled as a graph so that appropriate algorithms can be applied afterwards. An introduction to this research area can be found in the paper [Fuernkranz 2002] Web Usage Mining While the above mentioned categories rely on primary web data, Web Usage Mining studies secondary data generated by the interaction of the user with a website. This secondary data includes for example web server logs, proxy or browser logs, cookies, user queries, bookmark data, sessions, transactions or mouse clicks and scrolls. The idea here is to make sense of the data generated by the Web surfer s sessions or behaviors [Kosala 2000, p. 4]. A first approach is to map web usage data into common relational database tables and then to apply corresponding data mining techniques. Another approach uses the raw data, like log files and cookies, directly. The objective of both is to pre-process and clean the data to be able to find patterns within it afterwards. The main applications for Web Usage Mining are to find out user profiles or models and to learn navigation patterns. The gained information then can be used for different tasks like adaptive web interfaces (personalized), improving the effectiveness of web sites or systems, site modification, business intelligence and usage characterization. 7

9 3 Web Usage Mining in E-CRM Customer Realtionship Management (CRM) tries to build up and maintain a long-lasting, profitable relation to a customer accross the whole customer life cycle in order to fully benefit from a client s economical potential. Electronic Customer Relationship Management (E-CRM) integrates modern information and communication technologies into traditional CRM as a means to support this process. To achieve the objectives of E-CRM, detailled information concerning the customer s characteristics, needs, interests and behaviour are required. In the case of e-commerce, a possible approach to obtain this information is to apply techniques of Web Usage Mining. This section first provides an overview over the objectives and general application fields of Web Usage Mining. Afterwards, the process of Web Usage Mining, consisting of the data selection and cleaning, user and session identification, data integration and pattern discovery and analysis, is outlined. Where not stated otherwise, the information concerning this section is based on the research papers of Hajo Hippner (cf. [Hippner 2002]) and Michael Ceyp (cf. [Ceyp 2002]). 3.1 Objectives In the phase model of E-CRM (compare Figure 2), the identification stage serves to first gather all relevant data concerning customers, markets and basic conditions, and to structure this data afterwards to identify specific customer groups. The resulting information then is used as a basis for the decisions in the selection and interaction phase, where valuable customer segments are selected for establishing a profitable relation to these groups of customers. In the case of e-commerce, such as for example in online shops, a customer first is only an anonymous visitor of the corresponding web site. It is therefore necessary to obtain the relevant information about these customers. During the interaction of the user with the web pages or applications, a considerable amount of data is generated (see Figure 4). This includes for example server log files, where each page request or error is recorded, cookies, which store information of a user s session, or data from online forms, where the user himself enters information. 8

10 Figure 4: Datasources in E-Commerce [Hippner 2002, p. 98] The problem now consists in extracting the relevant information out of this huge amount of data. As simple web page and logfile statistics often are inadequate, an alternative approach is to use techniques from Web Usage Mining to identify and analyse patterns in the collected secondary web data. 3.2 Application Fields of Web Usage Mining One of the main applications of Web Usage Mining is to provide information about online customers concerning their characteristics, needs, interests and behaviour. In the context of E-CRM, the purpose is to e.g. identify specific customer groups according to criterias like buying behaviour. This can serve as a basis for further activities, such as proposing cross- or up-selling opportunities. Another possibility is to use the obtained mining results directly to optimize a company s internet portal. Having information about the clients preferred way of browsing allows to place product information or advertisement at the corresponding important pages. Also personalization can be achieved by Web Usage Mining. This includes for example customized marketing campaigns for certain groups of customers. Likewise, the content of the web page can be displayed dynamically for each customer according to the group he belongs to. For example, the layout of the page can be adjusted or information concerning certain products can be displayed. Web Mining can also have an impact on the strategical planning of an enterprise. Based on the mining result, marketing activities can for example be addressed to a certain segment of customers only. Other possibilities include strategic alliances with other websites or online advertisement on certain sites. 9

11 Table 1 lists the above mentioned and further application fields of Web Usage Mining according to [Hippner 2002, p. 101]. Documentation: Information: Buying Behaviour: Optimization: Personalization: Strategical Planning: - documentation of online customer behaviour - web statistics - enhance datawarehouse with interaction data - how are my clients? - market / customer segmentation - classification of customers - customer potential analysis - analyse the buying behaviour of customers - shopping cart analysis - selling patterns, recognize trends - determine cross- / up-selling potential - configure internet portal - success control of the internet presence - optimized placement of advertisement - target group specific marketing campaigns - individual interaction with online customers - personalized page content - personalized products, services - planning of marketing campaigns - strategical alliances Table 1: Application Fields of Web Usage Mining (cf. [Hippner 2002, p. 101]) 3.3 The Web Usage Mining Process The fundamental difference between Data and Web Mining is the format of the raw data used. In the case of Data Mining, this data is stored in the tables of a relational database, whereas the data source for Web Usage Mining consists of server log files, cookies or data from online forms. A first approach is to map this web usage data into common relational database tables, whereas another approach uses the raw data directly. The objective of both is to pre-process and clean the raw data, apply corresponding data mining techniques and try to find patterns afterwards. The process of Web Usage Mining then can be decomposed into five different stages (see Figure 5). The first stage is the data cleaning, which 10

12 Figure 5: Web Usage Mining Process [Hippner 2002, p. 91] serves to extract the web page requests out of other data contained in the server log files. Based on the clean log, the user and session identification stage then tries to identify individual user s and their session s. Having this session data discovered allows to integrate other data, like user or customer data, afterwards. Pattern discovery is then applied to the integrated data and the analysis tries to find interesting patterns, which may contain useful information Data Cleaning Prior to the actual data cleaning, it needs to be determined, which type of raw data is going to be analysed. The most common data source here are the access and error logfiles of webservers or application servers. Such a server records all user activity by default and writes them into a text file. In the case of webservers, two common formats for the log files are used: the Common Logfile Format (CLF) and the Expanded Common Logfile Format (ECLF). They contain among others information concerning the IP adress of the request (host), the date and time or the kind of request, depending on how the webserver is configured. Table 2 lists the entries of a default Apache webserver logfile. The data cleaning then consists primarely in the identification of web page requests. The problem with webserver logfiles is, that they log each file request from a client. This includes web pages, images or stylesheets, as seen in the example of Figure 6. The determination of the number of actual 11

13 host ident authuser date request status bytes IP address of the client (remote host) which made the request to the server identity of the client (if available) userid of the person requesting the document (if available) time that the server finished processing the request request line from the client status code that the server sends back to the client size of the object returned to the client Table 2: Apache Webserver Logfile (cf. [Apache 2005]) page requests is therefore usually done by selecting a characteristic element of a certain page, like the page document itself (e.g. home.php). Figure 6: Example Apache Logfile Nevertheless, it is not possible to determine the exact number of web page requests due to caching. Often requested pages are kept in cache of either the proxy server of an internet provider or in the clients browser itself. This improves performance, because such a cached page can be loaded faster as when it is requested of the webserver each time. A possibility to solve this problem is to force clients to reload cached pages regularely by setting the corresponding parameters. But the drawback of this strategy is a decreased performance of the webserver User and Session Identification User Identification: The next step is the identification of individual users, which is the crucial criteria for the whole Web Usage Mining process. Basically, this can be done by using the IP adresse contained in the logfile, which uniquely defines a computer in the internet. Nevertheless, there exists a number of problems concerning this approach. First, because internet provider only have a restricted number of possible IP adresses, they usually assign dynamic IP adresses to their clients. As a consequence, clients do not always have the same IP or, stated otherwise, the same IP may belong to different clients. Second, even a unique IP 12

14 adresse may be used by different users, as for example in the case of public computers in a company or in an internet cafe. And last, not all clients are really human users, there exists a number of robots or spiders which automatically search the web for information or indexing web pages. To solve these problems, a basic approach is to combine the IP address with the browser used. The ECLF logfile contains a field indicating the browser type (e.g. Internet Explorer, Firefox). As this field also indicates the access of robots and spiders, these records can be easily eliminated. But it stays difficult to determine users with dynamic IP s, because most people still use the same browser (Internet Explorer). Further, this approach does not give any result for clients using a public computer. An alternative is to use cookies for the identification of users. A webserver can send cookies to a client in order to store information like the session-id on the local harddisc of a client s machine (see Figure 7). The persistency of cookies can be set to only the current session or to a specific date. This way, it is possible to clearly identify a certain computer. Nevertheless, clients using a public computer still can not be identified. Further, a user can delete cookies or set his browser s privacy settings to either disable cookies at all, or to automatically delete them. Figure 7: Cookie Content In summary, there is no possibility to automatically identificate a user uniquely. This fact is a major problem of Web Usage Mining, because it is only possible to analyse multiple-transaction patterns with a clear identification. As a consequence, if an unambiguous identification is required, the only possibility to identify a user is by a login with username and password. 13

15 But also this approach has its drawback, because customers can invent fake identities. Session Identification: The term session refers to all page requests a specific user has done in a certain time period. Because webservers log requests independent of clients, the previous identification of users is required in order to be able to identify now such a session. The usual criteria to determine a session is the time between subsequent page requests of a user. The end of a session is reached, if the user does not request another page in a defined time period (e.g. 30 minutes). Having identified a session, valuable information can be obtained concerning the entrance of a user, the number of requested pages, the time a user spends on a certain page or the most common exit pages Data Integration In addition to the information obtained by the user and session identification, it is often useful to integrate further data for a refined analysis. Common data sources include user data, customer data or transaction data. Care needs to be taken concerning data security and privacy. No data should be accessible by unauthorized persons nor should it be used without the explicit approval of a customer. User data can be obtained by means of login and user profiles. Here the user himself enters the corresponding information into forms. A good practice is to use an opt-out default, where the user explicitly selects the optin possibility only if he agrees that this data may be used by the company. Similarly to user data, customer data from a productive system can be used as well. Finally, transaction data can be gathered automatically from e.g. online orders. This kind of data is especially useful, because it contains valuable information regarding the behaviour of customers like the buying behaviour Pattern Discovery and Analysis Having selected and cleaned the raw web data, identified users and sessions and possibly integrated further data, the actual data mining can now begin. The aim is to find patterns in the integrated data, which allow in the 14

16 subsequent analysis to obtain information concerning the customer s characteristics, needs, interests and behaviour. The usual methods used in Data Mining include Path Analysis (Sequence Analysis, Click-Stream Analysis), Classification, Clustering, Predicting and Association Analysis. The following paragraphs introduce these different methods based on [Ceyp 2002, p ], for a more detailled explanation refer to one of the available books on data mining like [Han 2000]. Path Analysis (Sequence Analysis, Click-Stream Analysis): This method tries to find out constantly recurring navigation paths of the user. This can be accomplished by analysing the discovered sessions of the users. The main interest is to optimize the website in such a way, as it is convenient to browse for a user. Further goals are to find out the user s entrance URL to a company s website. Based on this information, the locating of the website can be optimized by for example adding advertisement banners on the corresponding entrance sites. Classification: This analysis assigns customers to certain predefined classes according to some criterias. If for example a user visits a certain page and stays there for some time, this can be interpreted as an interest in the corresponding page s content. According to this content, he then can be classified e.g. as buyer or non-buyer. Clustering: With clustering, users are assigned according to similarities to a certain class. Such a class is consistent internally, but can be clearly distinguished from other classes. The example given in [Ceyp 2002, p. 116] is a travel portal that classifies customers according to their interests into e.g. last-minute, education or beach vacationer. Predicting: As implied in the name, this methode tries to predict certain values based on recorded facts. This is usually only a probabilistic approach by applying for example regression analysis. Predicting can for example be used to estimate an average order value of a customer in an online shop. Association Analysis: Association Analysis wants to discover rules having a certain significance concerning some conditions. As the measured 15

17 values do not need to be absolutely precise, this approach often is used for e.g. offering customers cross-selling opportunities. So proposes for example Amazon.com further books according to already selected books. 4 Conclusion In the case of E-CRM, it is necessary to collect information concerning the characteristics, needs, interests and behaviour of previously anonymous customers. As a huge amount of data is generated by the interaction of clients with a web application, the problem consists in extracting the relevant information out of this data. The approach to apply Web Usage Mining to identify and analyse patterns in the collected secondary web data has the potential to obtain the desired results. Nevertheless, it is not possible to definitively identify a customer. This is a major drawback, because the clear identification of clients is a key component of Web Usage Mining for E-CRM. Not having this information restricts the possible analysis afterwards, because no multiple-transaction patterns can be discovered. A solution to overcome this problem is to demand an explicit login of the customer by a username and password. But this approach requires, that the customer has the impression to obtain a profit (e.g. sales discount) by providing his personal information. In summary, the objective of Web Usage Mining is to provide information about online customers. The main application fields include the documentation of online customer behaviour, optimization of a company s internet portal, the analysis of buying behaviour and personalization of the content and layout of websites. But due to the mentioned uncertainties concerning the user identification, it is doubtable, if multiple-transactions patterns can be analysed. 16

18 List of Figures 1 Buying Cycle [Schoegel 2002, p.69] Phase Model [Schoegel 2002, p. 46] Web Mining Categories [Kosala 2000, p. 5] Datasources in E-Commerce [Hippner 2002, p. 98] Web Usage Mining Process [Hippner 2002, p. 91] Example Apache Logfile Cookie Content List of Tables 1 Application Fields of Web Usage Mining (cf. [Hippner 2002, p. 101]) Apache Webserver Logfile (cf. [Apache 2005])

19 References [Apache 2005] Apache: Apache Web Server Version 2. Log Files. URL: ( ). [Ceyp 2002] Ceyp, Michael H. 2002: Potenziale des Web Mining für das Dialog Marketing. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p [Fuernkranz 2002] Fuernkranz, Johannes 2002: Web Structure Mining. Exploiting the Graph Structure of the World-Wide Web. Austrian Research Institute for Artificial Intelligence, Wien, Austria, O.J. URL: ftp://ftp.ai.univie.ac.at/papers/oefai-tr pdf ( ). [Han 2000] Han, Jiawei / Kamber, Micheline: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc, San Fransisco, USA. [Hippner 2002] Hippner, Hajo / Merzenich, Melanie / Wilde, Klaus D. 2002: Web Mining im E-CRM. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p [Kincaid 2002] Kincaid, Judith W. 2002: Customer Relationship Management. Getting it Right! Prentice Hall PTR, New Jersey, USA. [Kosala 2000] Kosala, Raymond / Blockeel, Hendrik: Web Mining Research: A Survey. Department of Computer Science Katholieke Universiteit Leuven, Belgium, July URL: ( ). [Schoegel 2002] Schoegel, Marcus / Schmidt, Inga 2002: E- CRM - Management von Kundenbeziehungen im Umfeld neuer Informations- und Kommunikationstechnologien. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p

20 [Wikipedia 2005] Wikipedia 2005: Customer relationship management URL: relationship management ( ). [Wikipedia 2005b] Wikipedia 2005: Web Mining URL: Mining ( ). [Wikipedia 2005c] Wikipedia 2005: Data Mining URL: mining ( ). 19

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

An Enhanced Framework For Performing Pre- Processing On Web Server Logs An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

Advanced Preprocessing using Distinct User Identification in web log usage data

Advanced Preprocessing using Distinct User Identification in web log usage data Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of

More information

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination 8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,

More information

Customer Relationship Management

Customer Relationship Management Customer Relationship Management CRM is Any application or initiative designed to help an organization optimize interactions with customers, suppliers, or prospects via one or more touch points for the

More information

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

A guide to affilinet s tracking technology

A guide to affilinet s tracking technology A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does

More information

Web Analytics Definitions Approved August 16, 2007

Web Analytics Definitions Approved August 16, 2007 Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative

More information

Opinion 04/2012 on Cookie Consent Exemption

Opinion 04/2012 on Cookie Consent Exemption ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is

More information

EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA

EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Articles 37 Econ Lit C8 EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Assoc. prof. Snezhana Sulova, PhD Introduction Today increasing numbers of commercial companies are using the electronic

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK

5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK 5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK CUSTOMER JOURNEY Technology is radically transforming the customer journey. Today s customers are more empowered and connected

More information

Web Mining Functions in an Academic Search Application

Web Mining Functions in an Academic Search Application 132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS

More information

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content

More information

Analyzing the footsteps of your customers

Analyzing the footsteps of your customers Analyzing the footsteps of your customers - A case study by ASK net and SAS Institute GmbH - Christiane Theusinger 1 Klaus-Peter Huber 2 Abstract As on-line presence becomes very important in today s e-commerce

More information

Pre-Processing: Procedure on Web Log File for Web Usage Mining

Pre-Processing: Procedure on Web Log File for Web Usage Mining Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.

More information

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,

More information

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical

More information

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests

More information

graphical Systems for Website Design

graphical Systems for Website Design 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,

More information

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning

More information

Web Usage mining framework for Data Cleaning and IP address Identification

Web Usage mining framework for Data Cleaning and IP address Identification Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract

More information

Click stream reporting & analysis for website optimization

Click stream reporting & analysis for website optimization Click stream reporting & analysis for website optimization Richard Doherty e-intelligence Program Manager SAS Institute EMEA What is Click Stream Reporting?! Potential customers, or visitors, navigate

More information

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate

More information

Cookie Policy. Introduction About Cookies

Cookie Policy. Introduction About Cookies Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION

ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS

More information

Association rules for improving website effectiveness: case analysis

Association rules for improving website effectiveness: case analysis Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, dimitrijevic@vtsns.edu.rs Tanja Krunić, The

More information

PREPROCESSING OF WEB LOGS

PREPROCESSING OF WEB LOGS PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data

More information

Hello, Goodbye. The New Spin on Customer Loyalty. From Customer Acquisition to Customer Loyalty. Definition of CRM.

Hello, Goodbye. The New Spin on Customer Loyalty. From Customer Acquisition to Customer Loyalty. Definition of CRM. Hello, Goodbye. The New Spin on Customer Loyalty The so-called typical customer no longer exists. Companies were focused on selling as many products as possible, without regard to who was buying them.

More information

SKoolAide Privacy Policy

SKoolAide Privacy Policy SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing

More information

Doc ID: URCHINB-001 (3/30/05)

Doc ID: URCHINB-001 (3/30/05) Urchin 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be

More information

TEXT ANALYTICS INTEGRATION

TEXT ANALYTICS INTEGRATION TEXT ANALYTICS INTEGRATION A TELECOMMUNICATIONS BEST PRACTICES CASE STUDY VISION COMMON ANALYTICAL ENVIRONMENT Structured Unstructured Analytical Mining Text Discovery Text Categorization Text Sentiment

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

Web Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher

Web Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Google Analytics Guide. for BUSINESS OWNERS. By David Weichel & Chris Pezzoli. Presented By

Google Analytics Guide. for BUSINESS OWNERS. By David Weichel & Chris Pezzoli. Presented By Google Analytics Guide for BUSINESS OWNERS By David Weichel & Chris Pezzoli Presented By Google Analytics Guide for Ecommerce Business Owners Contents Introduction... 3 Overview of Google Analytics...

More information

Pay Reply website Privacy Policy. Data processor. Location of data processing. Types of processed data

Pay Reply website Privacy Policy. Data processor. Location of data processing. Types of processed data Pay Reply website Privacy Policy This page provides an outline of the way the personal data of Pay Reply website visitors is managed. This notice is also provided according to the terms of art. 13 of Italian

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

A SURVEY ON WEB MINING TOOLS

A SURVEY ON WEB MINING TOOLS IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

Generalization of Web Log Datas Using WUM Technique

Generalization of Web Log Datas Using WUM Technique Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,

More information

Identifying User Behavior in domainspecific

Identifying User Behavior in domainspecific Identifying User Behavior in domainspecific Repositories Wilko VAN HOEK a,1, Wei SHEN a and Philipp MAYR a a GESIS Leibniz Institute for the Social Sciences, Germany Abstract. This paper presents an analysis

More information

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu

More information

HOW DOES GOOGLE ANALYTICS HELP ME?

HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors

More information

CONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE.

CONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE. Privacy Statement Elanco, a division of Eli Lilly and Company (Lilly), (referred to as Elanco or Lilly in this Privacy Statement) respects the privacy of visitors to our websites, and as a result, we have

More information

Web Mining in E-Commerce: Pattern Discovery, Issues and Applications

Web Mining in E-Commerce: Pattern Discovery, Issues and Applications Web Mining in E-Commerce: Pattern Discovery, Issues and Applications Ketul B. Patel 1, Jignesh A. Chauhan 2, Jigar D. Patel 3 Acharya Motibhai Patel Institute of Computer Studies Ganpat University, Kherva,

More information

Lifesize Cloud Privacy Statement

Lifesize Cloud Privacy Statement Lifesize Cloud Privacy Statement When you use Lifesize Cloud, you provide certain information to Lifesize, Inc. and its affiliates, successors and assigns (collectively referred to as Lifesize ), including

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Chapter ML:XI. XI. Cluster Analysis

Chapter ML:XI. XI. Cluster Analysis Chapter ML:XI XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster

More information

1. TYPES OF INFORMATION WE COLLECT.

1. TYPES OF INFORMATION WE COLLECT. PRIVACY POLICY GLOBAL ASSESSOR POOL, LLC, DBA PINSIGHT ( Company or we or us ) is committed to protecting your privacy. We prepared this Privacy Policy to describe our practices regarding the information

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Business Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues

Business Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues Business Process Services White Paper Personalizing E-Commerce: Improving Interactivity to Increase Revenues About the Author Subramaniam MV Subramaniam is a Delivery Manager at Tata Consultancy Services

More information

A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH

A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH 205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology

More information

Cookie Policy. Introduction About Cookies

Cookie Policy. Introduction About Cookies Introduction About Cookies Cookie Policy Most websites you visit will use cookies in order to improve your user experience by enabling that website to remember you, either for the duration of your visit

More information

Digital media glossary

Digital media glossary A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A

More information

GOOGLE ANALYTICS 101

GOOGLE ANALYTICS 101 GOOGLE ANALYTICS 101 Presented By Adrienne C. Dupree Please feel free to share this report with anyone who is interested in the topic of building a profitable online business. Simply forward it to them

More information

Selling Digital Goods Online

Selling Digital Goods Online PayLoadz.com Selling Digital Goods Online How to use the PayLoadz and PayPal services to sell digital goods on your web site Updated: 02/12/2006 TABLE OF CONTENTS INTRODUCTION...3 HOW IT WORKS...3 GETTING

More information

The web server administrator needs to set certain properties to insure that logging is activated.

The web server administrator needs to set certain properties to insure that logging is activated. Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing

More information

White paper: Google Analytics 12 steps to advanced setup for developers

White paper: Google Analytics 12 steps to advanced setup for developers White paper: Google Analytics 12 steps to advanced setup for developers We at Core work with a range of companies who come to us to advises them and manage their search and social requirements. Dr Jess

More information

Cookie Policy. Introduction About Cookies

Cookie Policy. Introduction About Cookies Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

recommendation in e-commerce

recommendation in e-commerce recommendation in e-commerce Luminis Recommendation Services We are leaving the age of information and entering the age of recommendation Chris Anderson Authors: Hans Bossenbroek Hans Gringhuis Luminis

More information

Lead Generation in Emerging Markets

Lead Generation in Emerging Markets Lead Generation in Emerging Markets White paper Summary I II III IV V VI VII Which are the emerging markets? Why emerging markets? How does online help? Seasonality Do we know when to profit on what we

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Web Analytics: Enhancing Customer Relationship Management

Web Analytics: Enhancing Customer Relationship Management Web Analytics: Enhancing Customer Relationship Management Nabil Alghalith Truman State University The Web is an enormous source of information. However, due to the disparate authorship of web pages, this

More information

EXHIBIT 2. CityBridge Privacy Policy. Effective November 4, 2014

EXHIBIT 2. CityBridge Privacy Policy. Effective November 4, 2014 EXHIBIT 2 CityBridge Privacy Policy Effective November 4, 2014 CityBridge LLC ("We") are committed to protecting and respecting your privacy. This Privacy Policy describes how we collect, use and share

More information

DARTFISH PRIVACY POLICY

DARTFISH PRIVACY POLICY OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity

More information

Internet Advertising Glossary Internet Advertising Glossary

Internet Advertising Glossary Internet Advertising Glossary Internet Advertising Glossary Internet Advertising Glossary The Council Advertising Network bring the benefits of national web advertising to your local community. With more and more members joining the

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Privacy Policy. 1. Principle

Privacy Policy. 1. Principle Privacy Policy WHU Otto Beisheim School of Management (hereinafter WHU ) is committed to protecting the privacy and security of the personal information collected from visitors to, and members of, the

More information

Context Aware Predictive Analytics: Motivation, Potential, Challenges

Context Aware Predictive Analytics: Motivation, Potential, Challenges Context Aware Predictive Analytics: Motivation, Potential, Challenges Mykola Pechenizkiy Seminar 31 October 2011 University of Bournemouth, England http://www.win.tue.nl/~mpechen/projects/capa Outline

More information

Google Analytics Basics

Google Analytics Basics Google Analytics Basics Contents Google Analytics: An Introduction...3 Google Analytics Features... 3 Google Analytics Interface... Changing the Date Range... 8 Graphs... 9 Put Stats into Context... 10

More information

Google Analytics Access for Bentley Employees

Google Analytics Access for Bentley Employees Google Analytics Access for Bentley Employees 1. Google Analytics Login Google Analytics URL: http://www.google.com/analytics User name: bentleyshared@gmail.com Password: 2015analytics 2. Google Analytics

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Data protection at affilinet

Data protection at affilinet at affilinet Rev. 04/03/2014 at affilinet Content at affilinet 1 1. Collection and processing of personal data and other data when visiting our Web pages 1 2. Collection and processing of our customers

More information

Effective Prediction of Kid s Behaviour Based on Internet Use

Effective Prediction of Kid s Behaviour Based on Internet Use International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective

More information

Web Log Mining: A Study of User Sessions

Web Log Mining: A Study of User Sessions Web Log Mining: A Study of User Sessions Maristella Agosti and Giorgio Maria Di Nunzio Department of Information Engineering University of Padua Via Gradegnigo /a, Padova, Italy {agosti, dinunzio}@dei.unipd.it

More information

Mining for Web Engineering

Mining for Web Engineering Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara

More information

Improving Privacy in Web Mining by eliminating Noisy data & Sessionization

Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Rekha Garhwal Computer Science Department Om Institute of Technology & Management, Hisar, Haryana, India Abstract: data mining

More information

An Effective Analysis of Weblog Files to improve Website Performance

An Effective Analysis of Weblog Files to improve Website Performance An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL

More information

Study Guide #2 for MKTG 469 Advertising Types of online advertising:

Study Guide #2 for MKTG 469 Advertising Types of online advertising: Study Guide #2 for MKTG 469 Advertising Types of online advertising: Display (banner) ads, Search ads Paid search, Ads on social networks, Mobile ads Direct response is growing faster, Not all ads are

More information

Johnson Controls Privacy Notice

Johnson Controls Privacy Notice Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

5Subscription Management Automate. 6Electronic License Activation (ELA) 7Electronic License Management. 8Electronic Software Delivery (ESD)

5Subscription Management Automate. 6Electronic License Activation (ELA) 7Electronic License Management. 8Electronic Software Delivery (ESD) PAGE 1 OF 5 FEATURES SOLO Server is our flagship feature-rich license automation and distribution server. SOLO Server Lite is more for customers who want a very basic activation server and want to deeply

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information