Personal Monitoring of Web Information Exchange: Towards Web Lifelogging

Size: px
Start display at page:

Download "Personal Monitoring of Web Information Exchange: Towards Web Lifelogging"

Transcription

1 Personal Monitoring of Web Information Exchange: Towards Web Lifelogging Mathieu d Aquin, Salman Elahi and Enrico Motta Knowledge Media Institute, The Open University Walton Hall, Milton Keynes, MK7 6AA, UK {m.daquin, s.elahi, e.motta}@open.ac.uk ABSTRACT With more and more services relying on the Web to communicate with their users, the amount of information exchanged daily by an individual through various Web channels has become difficult to control. Not only have Web 2.0 applications participated to this increase from within the browser, but many other tools now rely on the Web as their basic communication infrastructure, including RSS aggregators, social network apps, update sites, etc. While in principle this gives better possibilities to share and exchange information with various people and organizations, it also makes it more difficult for Web users to fully comprehend, explore and exploit exchanges of their own data. In this paper, we present a set of tools and an experiment on using semantic data management to track and record users Web activities, as a way of personal monitoring. More specifically, we describe a tool, a Web lifelogger, dedicated to tracking every exchanges realized over the Web and to store these logs using semantic technologies. We run an experiment on using such a tool for a period of 2.5 months for a particular user, and show how the collected data can be used by the user to monitor and study his own online behavior. We detail in particular the computation of basic analytics (related to the time of Web activities, the locations of the exchanges, etc.), the creation of a model of the perceived trust relationship this user has with different websites (based on the data he exchanged with them) and an investigation on what we can learn about the user from analyzing his use of Web search engines. 1. INTRODUCTION On today s Web, information is constantly being exchanged between the users and various websites. However, the mechanisms allowing individual users to keep track of their activity on the Web are still limited. Indeed, they are often based on a Web 1.0 model, where interaction is restricted to visiting Web pages, therefore ignoring the inherent complexity of Web exchanges. This applies of course to the simple history feature included in most Web browsers, but also to more recent tools such as Google Web History 1, which focuses only on searches and web page visits, realized within a single Web browser. As our initial experiments (see be- 1 Copyright is held by the authors. Web Science Conf. 2010, April 26-27, 2010, Raleigh, NC, USA.. low) showed us, Web users activities are a lot more complex than what can be captured by such tools, spreading over multiple agents and including many different forms of interactions, beyond search and consultation. In addition, because of this increasing complexity, it is becoming more and more important to provide the users with the means to monitor the full range of their activities, giving them the ability to keep track, memorize and control their information exchange. In this paper, we present a set of tools and an experiment dedicated to the personal monitoring of Web activities. In other terms, we consider here the complete Web life of individual users, in what can be described as the Web equivalent of a lifelogging system. Lifelogging is described in [4] as the undiscriminating collection of information concerning one s life and behavior. Here, we developed a system to collect, keep track and make sense of information related to an individual s activity on the Web. Technically, this system is a Web Proxy program which, installed on the computer of the user, intercepts and records any communication occurring with the external Web through the HTTP protocol. As an experiment, we ran this logging system on the computer of the first author of this paper over a period of 2.5 months. This resulted in 9GB of data, corresponding to more than 100 Million triples in RDF and representing over 3 Million HTTP requests (and the corresponding responses). On the basis of these initial results, we show how such data can be used to provide the user with tools that visualize, explore and integrate this information to support him in better understanding, and so controlling, his own online behavior. We first consider basic analytics, similar to the ones computed from the access logs of websites, but taking the perspective of the user. This provides ways to understand for example at what time most of the Web activity takes place, relating this to real-life daily events. It also shows what are the common destinations of Web exchanges and what tools are used, giving an insight on the complexity, fragmentation and level of implicit inherent to Web communication. Considering these results, we then focus on the situation of data exchange and on assessing the trust relationship that exist between the user and various websites. Indeed, looking at what data has been sent to various websites, we can expose the user to what we can perceive as being his level of trust to a given website, and the criticality he associates with various pieces of data. Letting him interact with this model also helps identifying conflicting situations, where the perceived model of trust does not match the user s own view, therefore providing a first step towards a more informed way 1

2 to handle personal privacy management. Finally, search is probably the most common activity on the Web and we show how analyzing the user s search behavior can derive useful information. 2. RELATED WORK A range of tools exist already to support users in monitoring their own Web activity, including tools used to debug communication protocols. More related to our approach here, we can mention for example Google Web History 2 and the Attention Recorder 3. Both take the form of plugins for popular Web browsers, and record accesses to websites in order to build a record of Web activities. Other commercial products such as Rescue Time 4 record general activities on the computer of the user, including websites accessed through the browser, in this case for the purpose of helping them manage their productivity. However, such tools are still limited in the sense that they record only a restricted amount of information (attention data: websites explicitly accessed through the Web browser) and only allow usage of the data which is directly intended by the tool (provide reports and improve the results of search, sharing and optimizing attention, etc.) As it appears in our experiment (see below), data exchange on the Web is a very complex activity, often fragmented and partly implicit. Dedicated tools are therefore needed to monitor them and derive equally complex records of personal Web activities directly for the user s consumption and allowing him to obtain an integrated view on many aspects of his own online behavior, including productivity, search interests, social interaction and privacy. 3. BASIC UNDERLYING TECHNOLOGY AND EXPERIMENT SETTING In order to represent a sufficiently broad overview of personal data transfer on the Web, we need a tool which would fulfill two main requirements: 1- it needs to be transparent to the user, acting in background without disrupting normal Web activities; and 2- it needs to collect information as complete as possible, in particular, independently from the Web agent used (various Web browsers, but also many other tools such as online music programs e.g., itunes and spotify, clients getting Web images and other content from inside s, etc.) For these reasons, we implemented a HTTP logging mechanism as a Web proxy, running on the local computer of the user. A proxy is a tool that acts as an intermediary between a client and external servers the client is trying to connect to. Web proxies are often used in organizations to implement cache control mechanisms for all the Web users inside the organization s network. Here however, we use a Web proxy locally. Web communications can be redirected to it through the system preferences so that any HTTP request going out of the user s computer (and any response back) is intercepted, logged and re-directed to the right destination (which could be another Web proxy). As shown in Figure 1, the logs of the Web activity collected through this tool are represented in RDF, using a simple, ad-hoc HTTP ontology. These logs record Figure 1: Overview of the Web lifelogging system. the complete information included as part of the HTTP protocol (e.g., destination, agent, cache information, referrers, etc.), as well as pointers to the actual data exchanged, which is saved on the local file system. As a way of experimenting with Web lifelogging, we ran this logging proxy on the computer of the first author of this paper for a period of 2.5 months (uninterrupted). This led to a record of over 3 million HTTP requests, spanning over many different Web agents on the user s local computer, and representing all together 100 million RDF triples and 9GB of data. This particular user makes an active use of the Web not only as part of his personal activities, but also to a large extent in his job as a computer science researcher involved in Semantic Web research. This might explain the surprisingly large amount of requests collected. However, the analyses realized in the next section show that, even though he is a heavy user of the Web, this user s activities do not make appear specific elements that other users would not share. Also, while the size and richness of the data collected makes it fit to the purpose of monitoring and exploring various aspects of the user s online behavior, the scalability of the tool and its ability to process such data in real time represent a major challenge for this work. This is however outside the scope of this paper and will be treated as future work. 4. MONITORING AND ANALYZING VARI- OUS ASPECTS OF PERSONAL WEB AC- TIVITIES Thanks to the technology described above, the user can collect rich, large-scale data about his own activity on the Web. However, collecting raw data is only the first part of the process. In this section, we present some analyses we realize on the basis of this data. Indeed, as shown in our experiment, even the simplest forms of analytics can help the user to better comprehend his own behavior and derive sometimes surprising conclusions. We go a step further and describe in more details the application of new models to assess the perceived trust the user appears to give to various websites, and the different levels of criticality he associates with various pieces of personal data. We also look at what we can learn from investigating the most common activity 2

3 users generally realize on the Web: search. 4.1 Basic Analytics There exist many analytics tool to be used by website administrators to monitor the traffic on there servers. These are based on the logs of accesses to the website (collected locally or through a remote service such as google-analytics.com), to compute various types of statistics. We consider that such statistics could be of value also to a Web user concerning his own Web traffic, inverting the relation and looking at which websites are accessed, as well as at what time most activities happen, where are the destinations of requests and what tools are used to access the Web. Figure 2 shows some of the visualizations that are being computed on the basis of the collected data in our experiment, concerning four basic aspects which we summarize below. Time. The way the amount of Web activity evolves in time for a given user can provide useful indications concerning his own behavior and habits, not only online, but also in connection with other aspects of his life. For example, Figure 2(a) shows the sum of the numbers of Web requests realized over the time of the experiment, according to the time of the day. It therefore represents the typical shape of the user s day on the Web, but more importantly allows to identify common events happening in the user s life during such a typical day. The Web service sleepingtime.org can derive the time in which a user is most likely to be sleeping based on his activity on Twitter. For this particular user, this service returns 12am to 7am 5. We can easily see that this result correlates with the activity graph in Figure 2(a), but also that this graph can be used to identify other common events such as commuting or having dinner. An interesting addition to such an analysis would be to connect these results with the user s calendar, and with a log of his locations (e.g., collected from a GPS-enabled device). Such refinements integrating activity data from various sources and devices will be considered as future work (see Section 5). Location. One of the interesting properties of the Web is that it provides access to information independently from the places where such information physically reside. Nevertheless, the locations of the servers to which Web requests are sent is an interesting information, showing in particular that, however global the Web might be, the user activity tends to concentrate on specific parts of the world. Indeed, looking at Figure 2(b), we can see that, unsurprisingly, most of the requests from the considered user were sent to either Europe (or more specifically the parts of Europe the user relates to: France and the UK) and the US (which host most of the global services used commonly by the user). There are however interesting exceptions to this, including small numbers of requests sent to places such as China, Japan, Alaska or Nigeria. In relation with elements described in the next section concerning trust, in the cases where personal information is being exchanged with particular websites, knowing where they are located could be crucial, as the privacy laws in the places where such critical information is being held can be different from the ones the user would naturally expect to apply considering his European background. 5 on 25/03/2010 (a) (b) (c) (d) Figure 2: Elements of Web Activity Analytics. (a) Sum of the numbers of HTTP Requests per hour of the day over 2.5 months; (b) Location of the servers of accessed websites; (c) Tag Cloud showing the most accessed websites; (d) Distribution of number of requests per agent (y-axis is log scale). 3

4 Popularity. The websites which the user accesses most often i.e., which he finds the most popular would naturally appear as an interesting and straightforward information. However, looking at the tag-cloud like visualization of requests to websites in Figure 2(c), it appears that interpreting the results of such a simple analysis is not as trivial as expected. Indeed, it should first be noted that, in order for this visualization to be readable, two websites were removed from the input data, as they were representing more than 100 times more requests than any of the other websites. These two websites, api.facebook.com and watson.kmi.open.ac. uk represent Web services accessed at regular intervals and to exchange large quantities of data by automatic applications. This also applies to other websites that appear prominently in the visualization, such as search.twitter.com. In addition, the most popular website besides the ones automatically accessed is which is maintained by the user on the basis of an Ajax-based content management system, the high number of requests being therefore more an effect of the technological infrastructure underlying the website, rather than of its popularity (this also applies for example to org). Only once these considerations are taken into account, we can start identifying commonly accessed websites such as or www. neon-project.org. However, another significant exception appears here: Indeed, this represents the most common analytics tool used by many thousands of other websites. The user has never explicitly accessed but only as a side effect of accessing other websites, therefore unknowingly exchanging large quantities of information without having previously given explicit agreement. Agents. Finally, we have already established from above that a large proportion of the user s Web activity occurs without the user even being aware of it. This also transpires when looking at the different tools that access the Web on the user s computer. Indeed, most users would only mention the use of Web browsers to access the Web. However, we found 49 different User-Agents mentioned in our experiment s data, the user s usual Web browser being only the third most active (see Figure 2(d)). Indeed, in accordance with what we discussed above, many applications (such as TweetDeck 6 installed on the user s computer) make automatic accesses to the Web at regular intervals. We can also mention the user s client (getting RSS feeds and images from the Web), automatic update applications, ical (communicating with an online calendar application) and social music applications amongst the most prominent tools contributing to the user s Web traffic. In summary, it appears that even the simplest statistical analyses, such as what presented above, can lead to surprising discovery concerning the user s own Web activity. More importantly, it stresses the fact that Web data exchange is difficult to manage for an individual user, as it happens in a fragmented and partly implicit manner at a large scale. For this reason, the next section focuses on extracting from this data explicit models of the perceived trust given to the accessed websites, and of the criticality of the data exchanged Observing Trust Relationships and Data Criticality As lengthly described in [3], trust is a central element of any social interaction, and therefore, of any exchange on the Web. Indeed, beyond the Web 2.0 emphasis on the Web as a social platform, where people can exchange and share information, experience and more, any communication on the Web appears to be a social interaction between a person (Web user) and a website, which ultimately represents another person, group of persons or organization [2]. Therefore, based on the data collected through our logging mechanism, we consider here a user-centric view on trust in websites (domains) and on the criticality of the data sent to these websites. The intent is to derive from the traces of the user s activity a model of his own trust relationship with the various websites he interacts with. Of course, the data collected using the tool described above contains a lot more information than necessary for this purpose. We therefore extract from this data a subset that corresponds to elements of data that are being sent by the user s Web agents to external websites. We use a simple SPARQL query to obtain the list of requests to which data was attached. This includes HTTP GET requests with parameters (e.g., in search?q=keywords the parameter is q=keyword), as well as HTTP POST requests where the same kind of parameters are enclosed in the content (data) part of the request. As a second step, we use a purpose-built tool to identify personal information in these data transfers. Without going into the details, this tool provides mechanisms for the user to create mappings between the parameters used in particular websites (e.g., and attributes of a very simple model of the user profile (with attributes such as UserName and ). As a result, we obtain a simple model of Web data transfer, where a set of domains d i D (websites) have each received a subset of the set of personal data p i P from the user profile. In our experiment, there were 123 different domains that received data from 36 different attributes in the user profile. Our goal here is, relying on the simple notion of data transfer defined above, to analyse the behavior of the user and derive what is expected to be his implicit trust relationship with the considered websites, and the correlated levels of criticality he seems to associate to each of the considered pieces of data. Crucially, these two notions are highly inter-dependent. Indeed, on the one hand, it is natural for an external observer to assess the trust somebody has in another agent based on the information he is prepared to disclose to this external agent. For example, if I consider my mobile phone number as a critical information, and disclose it to a particular website, this seems to indicate a high level of trust in this particular website. On the other hand, assessing the criticality of a piece of data can be done by considering how much this information is disclosed to external, varyingly trusted agents. The information about my screen resolution for instance might not be considered very critical, since I have provided it to many different website, most of them not very trusted. On the basis of these simple intuitions, we define a measure of the observed trust in a website as the value of the 4

5 Figure 3: Visualization of the observed trust in domains (top) and the observed data criticality (bottom). criticality of the most critical piece of data this website has received. The measure of criticality of a piece of data is designed to be a function of the number and trust values of websites having received this data. Formally, the criticality of a piece of data p i is equal to 1 1+ P d j C(p i ) 1 T (d j ) where C(p i) is the set of domains having received the piece of data p i and T (d j) is the observed trust value for the domain d j. Of course, the measures of trust and criticality being inter-dependent, we treat them as a sequence, calculating itierativly the values of trust at a time t based on the values of criticality at time t 1. Using 0.5 as initial values, these measures converge to a precision of in 285 iterations on our data. Ultimately, the goal of computing the model of observed trust described above is to allow the user to explore it, getting informed about his apparent behavior, and compare this apparent behavior with his own view on trust and data criticality. In other terms, a method to visually explore and interact with the measures of trust and criticality is needed to get the benefit of the observation of Web activity back to the user. We therefore developed a tool (see Figure 3) displaying the observed model of trust in domains and criticality of data using a simple visualization (each bubble represents a value, the bigger and further along the axis the bubble is, the higher the value). Basic interaction mechanisms are also allowed, enabling the user to explore the underlying data (e.g., selecting a piece of data shows to which domains it was sent, therefore providing a justification for the assigned value of criticality), but also to align this perceived model with his own view, for example by dragging a domain bubble towards smaller values, to indicate a lower level of trust in the corresponding website. Such interactions provide simple mechanisms to explore one s own behavior related to trust and data exchange, and possibly detect conflicts in this behavior (i.e., exchanges that would contradict the fundamental assumption that critical data can only be sent to trusted websites). A more complete investigation on applying such a tool for the user to assess his own behavior regarding data exchange and privacy is still needed. However, this has shown very valuable already in identifying interesting, or potentially problematic situations. For example, following from the discussion in the previous section, it appeared that about 50% of the websites having received personal data from the user were unknown to him. Amongst them, many received data having a high level of criticality (e.g., elements of browsing history), while being, according to the user, untrusted or even unknown (e.g., google-analytics.com). This demonstrates the potential of such a tool in making the user aware of his own behavior, supporting him in implementing a more informed management of his own privacy. 4.3 Investigating Search Behavior Searching is one of the most common explicit activity users realize online. As such, in contrast with the elements described in the previous section which looked at implicit models the user might not be aware of, analyzing the way a particular individual makes use of search mechanisms like the ones provided by google.com can help to derive a lot of 5

6 Figure 4: Most commonly searched keywords. information about their conscious behavior, interests, etc. To realize this, we extracted from our activity log data (again using a relatively simple SPARQL query) all the requests that correspond to known search engines (which is made relatively easy by the fact that our user employes almost exclusively the Google search engine, although often in different locations, e.g., google.com, google.co.uk, google.fr). We then parsed these URLs to extract the keywords used, and obtained 709 different queries, representing 456 unique sets of keywords. From this result, we can already identify an interesting phenomenon. Indeed, it appears surprising that such a large proportion of the queries are actually duplicated, and have been re-entered (most of the time in the same search engine) several times over a period of 2.5 months. To better understand this phenomenon, we used the referrer information contained in the request data as stored in our logs to investigate how the user used the results of search. First, it is interesting to notice that only a part (311) of the queries to search engines led to the user following one or more of the results. Out of these 311 unique queries, 231 had only 1 result being used by the user and in 18 of these cases, the same results were followed multiple times (up to 23 times). In contrast, there is not any query in our dataset for which more than 8 different results where actually followed by the user. One way to interpret the elements described above is by considering the way search is used by the user. Indeed, surprisingly, it appears that, in most cases, search is not considered as an exploratory activity by this user, i.e., it is not used with the purpose of discovering resources of interest. Instead, it is used in the majority of the cases (75%) as a way to locate resources that the user knows exist, and has often visited before, but for which he did not record the actual address. In other words, the search engine seems to be used extensively as an index, addressing known websites with keywords, rather than as a way to find out about existing websites. Such behavior has actually been identified in a number of recent studies on repetition in search queries (see for example [5]), showing that navigational search is glob- Figure 5: Terms of interest as extracted from search keywords. The y-axis corresponds to SemanticProxy s measure of relevance. ally becoming a major aspect of the use of search engines, compared to the more traditional informational search [1]. Another element of interest concerning the activity of using a search engine on the Web, is that it can demonstrate particular areas of relevance to the user, which can help better define the user in terms of his interests. First, the tag cloud in Figure 4, generated from the list of search words employed by the user during the considered period, confirms the hypothesis above that many of the uses of search this user is making have for only purpose to retrieve resources that he knows exist (in this case, the user often research the pdf files of his own publications). However, it also makes appear certain keywords that relate to concepts of high relevance to the user, in particular to his job as a computer science researcher, including Java (referring here to the programming language), eclipse (referring to the development environment), AWK (corresponding in this case to the programming language for text processing, which the user was employing extensively during this period), Web, ontology, standard, etc. To deepen this analysis and find broader topics of interests for the user, we experimented with the SemanticProxy 7 service which is part of OpenCalais 8. SemanticProxy analyzes a text to extract from it relevant and important entities, which might not appear explicitly in the text, but be inferred as important concepts based on the content of the text. Using as an input text the list of search queries realized by the user, SemanticProxy detected with 92% confidence that the main topic corresponding to the user s search terms was Technology/Internet. The tool also extracted the set of possible tags that, according to its methods, would best characterize the user search queries: Technology Internet, Portable Document Format, Swoogle, AWK, Computer science, Software engineering, Ontology, Semantic Web, and Computing. Finally, we obtain from the same service a list

7 of generic terms supposedly of interest to the user, ordered according to their assessed levels of relevance (see Figure 5). Despite a few slightly unexpected results, the elements extracted from SemanticProxy are not particularly surprising. However, it is interesting that the search behavior of a user extracted from his activity logs and the use of an openly available tool can characterize the user so well in terms of his interests. While there is not doubt that many online systems employ similar methods to build user profiles to target results (and, in many cases, advertisement), providing such a profile to be exploited by the user himself could be valuable, as it gives additional pointers to resources relating to the extracted topics and could be used to relate with people of similar interests in social applications. 5. DISCUSSION: GOING FURTHER Above, we described the way we collect a semantic record of a user s Web activity, for the purpose of helping this user to better understand his own data exchange and behavior on the Web. Our experiment realized with such a Web activity log collected over a period of 2.5 months shows that this data can effectively be turned into a black box of the user s Web life, helping him in tracking and understanding various types of events for the purpose of personal monitoring, personal information management or privacy. Indeed, we detailed in particular in this paper the analysis of the data collected according to three main aspects: basic analytics showing the time, places, destinations and tools of Web communication, trust and data criticality exposing the user to his own behavior in terms of data exchange, and the use of search as a way to access the Web and to derive information about the user s interest. An interesting element about such analyses is that, with the exception maybe of the trust model, similar studies are usually realized from the perspective of websites, systems or organizations, considering the logs of accesses and interactions of their whole communities of users. In contrast, we show here how some forms of log analysis can be used on a the traces of the user s Web interactions with thousands of websites and services, to be used directly by the user as a way of personal monitoring. To further refine these studies, an obvious next step is to extend them with more ways of investigating the data. Indeed, the collected logs represent large scale, rich information, which representation using semantic technologies makes flexible enough so that a variety of models can be applied to derive more information. We could for example think about analyzing the navigational graph of the user based in the referrer relation recorded as part of the HTTP requests in our logs. It would then be interesting to see if models such as Hub and Authority would apply to such data, therefore showing to the user what are the webpages that are most influential in his Web life. Analyzing the content of such pages would also help in building a more accurate interest profile, compared to what is realized here on the search history. While the data we collected is already very sophisticated and can lead to many more analyses on its own, another interesting further step is to integrate such data with external sources of information. Indeed, some of our tools already require to integrate external information, such as networkbased information and location of servers to build the map of the destinations of Web requests, or the use of available Semantic Web-based text annotation tools for deriving relevant topics to the user s interest, which are directly interlinked with the Web of Data. An additional step in this direction would be to use automatic data linking methods to relate, for example, the identification of the websites accessed or the tools used to their description in DBPedia 9, making possible to automatically categorize these elements and provide further ways to explore the data for the user. Despite the large amounts of data collected in a relatively short period of time, the experiment presented here is limited in the sense that it focuses on one particular user, representing one type of usage of the Web. This helps understanding the types of analysis that can be realized over such data. However, as future work, we plan to investigate comparing the results of the same types of analysis in a group of users of different backgrounds, interests and uses of the Web. This would allow us not only to understand how individual users behave on the Web, but also to see what are the common aspects in their Web lifelogs and how these can be used to relate users with each other. Ultimately, they are many possible ways for the users to exploit these logs for their own purpose, including the possibility to share what they have learnt about themselves within their social network, to make new connections and help other benefit from the analysis of their own interactions with various websites. 6. REFERENCES [1] Andrei Broder. A taxonomy of web search. SIGIR Forum, 36(2):3 10, [2] Robert R. Hoffman, John D. Lee, David D. Woods, Nigel Shadbolt, Janet Miller, and Jeffrey M. Bradshaw. The dynamics of trust in cyberdomains. IEEE Intelligent Systems, 24:5 11, [3] K. O Hara. Trust from Socrates to Spin. Icon Books, [4] K. O Hara, M. Tuffield, and N. Shadbolt. Lifelogging: Privacy and Empowerment with Memories for Life. Identity in the Information Society, 1(2), [5] Mark Sanderson and Susan Dumais. Examining repetition in user search behavior. In Advances in Information Retrieval. 29th European Conference on IR Research, ECIR 2007,

Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy

Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy Mathieu d Aquin, Salman Elahi, Enrico Motta Knowledge Media Institute, The Open University, Milton Keynes, UK

More information

Multichannel Customer Listening and Social Media Analytics

Multichannel Customer Listening and Social Media Analytics ( Multichannel Customer Listening and Social Media Analytics KANA Experience Analytics Lite is a multichannel customer listening and social media analytics solution that delivers sentiment, meaning and

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

Short Paper: Enabling Lightweight Semantic Sensor Networks on Android Devices

Short Paper: Enabling Lightweight Semantic Sensor Networks on Android Devices Short Paper: Enabling Lightweight Semantic Sensor Networks on Android Devices Mathieu d Aquin, Andriy Nikolov, Enrico Motta Knowledge Media Institute, The Open University, Milton Keynes, UK {m.daquin,

More information

Characterizing Knowledge on the Semantic Web with Watson

Characterizing Knowledge on the Semantic Web with Watson Characterizing Knowledge on the Semantic Web with Watson Mathieu d Aquin, Claudio Baldassarre, Laurian Gridinoc, Sofia Angeletou, Marta Sabou, and Enrico Motta Knowledge Media Institute (KMi), The Open

More information

Web Analytics. FAQs MONITOR, ANALYZE, TRACK. Page 1

Web Analytics. FAQs MONITOR, ANALYZE, TRACK. Page 1 Web Analytics FAQs MONITOR, ANALYZE, TRACK Page 1 Web Analytics FAQs Monitor, Analyze, Track This document contains a list of frequently asked questions on the following areas of the Web Analytics system:

More information

AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS

AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS ZORAN JEREMIĆ, VLADAN DEVEDŽIĆ, DRAGAN GAŠEVIĆ FON School of Business Administration, University of Belgrade Jove Ilića 154, POB 52, 11000 Belgrade,

More information

LinkZoo: A linked data platform for collaborative management of heterogeneous resources

LinkZoo: A linked data platform for collaborative management of heterogeneous resources LinkZoo: A linked data platform for collaborative management of heterogeneous resources Marios Meimaris, George Alexiou, George Papastefanatos Institute for the Management of Information Systems, Research

More information

Fogbeam Vision Series - The Modern Intranet

Fogbeam Vision Series - The Modern Intranet Fogbeam Labs Cut Through The Information Fog http://www.fogbeam.com Fogbeam Vision Series - The Modern Intranet Where It All Started Intranets began to appear as a venue for collaboration and knowledge

More information

PrinterOn Mobile App for ios and Android

PrinterOn Mobile App for ios and Android PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer

More information

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground Last Updated: 08/27/2013 Measuring Social Media for Social Change A Guide for Search for Common Ground Table of Contents What is Social Media?... 3 Structure of Paper... 4 Social Media Data... 4 Social

More information

Semantic Data Management. Xavier Lopez, Ph.D., Director, Spatial & Semantic Technologies

Semantic Data Management. Xavier Lopez, Ph.D., Director, Spatial & Semantic Technologies Semantic Data Management Xavier Lopez, Ph.D., Director, Spatial & Semantic Technologies 1 Enterprise Information Challenge Source: Oracle customer 2 Vision of Semantically Linked Data The Network of Collaborative

More information

User research for information architecture projects

User research for information architecture projects Donna Maurer Maadmob Interaction Design http://maadmob.com.au/ Unpublished article User research provides a vital input to information architecture projects. It helps us to understand what information

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1157-1162 3 rd World Conference on Information Technology (WCIT-2012) Webification of Software Development: General Outline and the

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

Don t Build the Zoo: Discover Content in its Natural Habitat Written By: Chris McKinzie CEO & Co-Founder

Don t Build the Zoo: Discover Content in its Natural Habitat Written By: Chris McKinzie CEO & Co-Founder White Paper Don t Build the Zoo: Discover Content in its Natural Habitat Written By: Chris McKinzie CEO & Co-Founder Enlyton Reinvents Search Technology for the Speed and Simplicity Enterprise Workers

More information

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology Attracting Buyers with Search, Semantic, and Recommendation Technology Learning Objectives Using Search Technology for Business Success Organic Search and Search Engine Optimization Recommendation Engines

More information

Revealing Trends and Insights in Online Hiring Market Using Linking Open Data Cloud: Active Hiring a Use Case Study

Revealing Trends and Insights in Online Hiring Market Using Linking Open Data Cloud: Active Hiring a Use Case Study Revealing Trends and Insights in Online Hiring Market Using Linking Open Data Cloud: Active Hiring a Use Case Study Amar-Djalil Mezaour 1, Julien Law-To 1, Robert Isele 3, Thomas Schandl 2, and Gerd Zechmeister

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

How To Make Sense Of Data With Altilia

How To Make Sense Of Data With Altilia HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to

More information

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,

More information

Web Analytics Definitions Approved August 16, 2007

Web Analytics Definitions Approved August 16, 2007 Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation

More information

Search Engine Strategies

Search Engine Strategies Search Engine Strategies Fundamental Steps to Ensure Success Advertising... Web Development... Lead Management... Sales Support... Search Engine Strategies Overview of the Search Engine Environment Search

More information

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

IEEE IoT IoT Scenario & Use Cases: Social Sensors

IEEE IoT IoT Scenario & Use Cases: Social Sensors IEEE IoT IoT Scenario & Use Cases: Social Sensors Service Description More and more, people have the possibility to monitor important parameters in their home or in their surrounding environment. As an

More information

Healthcare, transportation,

Healthcare, transportation, Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental

More information

Geovisualization. Geovisualization, cartographic transformation, cartograms, dasymetric maps, scientific visualization (ViSC), PPGIS

Geovisualization. Geovisualization, cartographic transformation, cartograms, dasymetric maps, scientific visualization (ViSC), PPGIS 13 Geovisualization OVERVIEW Using techniques of geovisualization, GIS provides a far richer and more flexible medium for portraying attribute distributions than the paper mapping which is covered in Chapter

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

María Elena Alvarado gnoss.com* elenaalvarado@gnoss.com Susana López-Sola gnoss.com* susanalopez@gnoss.com

María Elena Alvarado gnoss.com* elenaalvarado@gnoss.com Susana López-Sola gnoss.com* susanalopez@gnoss.com Linked Data based applications for Learning Analytics Research: faceted searches, enriched contexts, graph browsing and dynamic graphic visualisation of data Ricardo Alonso Maturana gnoss.com *Piqueras

More information

Big Data and Analytics: Challenges and Opportunities

Big Data and Analytics: Challenges and Opportunities Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored? Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy

More information

K@ A collaborative platform for knowledge management

K@ A collaborative platform for knowledge management White Paper K@ A collaborative platform for knowledge management Quinary SpA www.quinary.com via Pietrasanta 14 20141 Milano Italia t +39 02 3090 1500 f +39 02 3090 1501 Copyright 2004 Quinary SpA Index

More information

Data-Gov Wiki: Towards Linked Government Data

Data-Gov Wiki: Towards Linked Government Data Data-Gov Wiki: Towards Linked Government Data Li Ding 1, Dominic DiFranzo 1, Sarah Magidson 2, Deborah L. McGuinness 1, and Jim Hendler 1 1 Tetherless World Constellation Rensselaer Polytechnic Institute

More information

Profile Based Personalized Web Search and Download Blocker

Profile Based Personalized Web Search and Download Blocker Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,

More information

US Patent and Trademark Office Department of Commerce

US Patent and Trademark Office Department of Commerce US Patent and Trademark Office Department of Commerce Request for Comments Regarding Prior Art Resources for Use in the Examination of Software-Related Patent Applications [Docket No.: PTO-P-2013-0064]

More information

Remote Usability Evaluation of Mobile Web Applications

Remote Usability Evaluation of Mobile Web Applications Remote Usability Evaluation of Mobile Web Applications Paolo Burzacca and Fabio Paternò CNR-ISTI, HIIS Laboratory, via G. Moruzzi 1, 56124 Pisa, Italy {paolo.burzacca,fabio.paterno}@isti.cnr.it Abstract.

More information

Data Discovery, Analytics, and the Enterprise Data Hub

Data Discovery, Analytics, and the Enterprise Data Hub Data Discovery, Analytics, and the Enterprise Data Hub Version: 101 Table of Contents Summary 3 Used Data and Limitations of Legacy Analytic Architecture 3 The Meaning of Data Discovery & Analytics 4 Machine

More information

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES

More information

Semantically Enhanced Web Personalization Approaches and Techniques

Semantically Enhanced Web Personalization Approaches and Techniques Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,

More information

LDIF - Linked Data Integration Framework

LDIF - Linked Data Integration Framework LDIF - Linked Data Integration Framework Andreas Schultz 1, Andrea Matteini 2, Robert Isele 1, Christian Bizer 1, and Christian Becker 2 1. Web-based Systems Group, Freie Universität Berlin, Germany a.schultz@fu-berlin.de,

More information

Discover the best keywords for your online marketing campaign

Discover the best keywords for your online marketing campaign Discover the best keywords for your online marketing campaign Index n... 3 Keyword discovery using manual methodology... 5 Step 1: Keyword analysis and search... 6 Step 2... 10 Additional tools... 11 Competitors...

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Pizza SEO: Effective Web. Effective Web Audit. Effective Web Audit. Copyright 2007+ Pizza SEO Ltd. info@pizzaseo.com http://pizzaseo.

Pizza SEO: Effective Web. Effective Web Audit. Effective Web Audit. Copyright 2007+ Pizza SEO Ltd. info@pizzaseo.com http://pizzaseo. 1 Table of Contents 1 (X)HTML Code / CSS Code 1.1 Valid code 1.2 Layout 1.3 CSS & JavaScript 1.4 TITLE element 1.5 META Description element 1.6 Structure of pages 2 Structure of URL addresses 2.1 Friendly

More information

Microsoft Dynamics NAV

Microsoft Dynamics NAV Microsoft Dynamics NAV Maximizing value through business insight Business Intelligence White Paper November 2011 The information contained in this document represents the current view of Microsoft Corporation

More information

Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM

Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM Volume 2, No. 5, May 2011 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM Sheilini

More information

CitationBase: A social tagging management portal for references

CitationBase: A social tagging management portal for references CitationBase: A social tagging management portal for references Martin Hofmann Department of Computer Science, University of Innsbruck, Austria m_ho@aon.at Ying Ding School of Library and Information Science,

More information

It s all around the domain ontologies - Ten benefits of a Subject-centric Information Architecture for the future of Social Networking

It s all around the domain ontologies - Ten benefits of a Subject-centric Information Architecture for the future of Social Networking It s all around the domain ontologies - Ten benefits of a Subject-centric Information Architecture for the future of Social Networking Lutz Maicher and Benjamin Bock, Topic Maps Lab at University of Leipzig,

More information

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with

More information

The Ontology and Architecture for an Academic Social Network

The Ontology and Architecture for an Academic Social Network www.ijcsi.org 22 The Ontology and Architecture for an Academic Social Network Moharram Challenger Computer Engineering Department, Islamic Azad University Shabestar Branch, Shabestar, East Azerbaijan,

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

Advanced Preprocessing using Distinct User Identification in web log usage data

Advanced Preprocessing using Distinct User Identification in web log usage data Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of

More information

FLASH DELIVERY SERVICE

FLASH DELIVERY SERVICE Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong

More information

Qlik s Associative Model

Qlik s Associative Model White Paper Qlik s Associative Model See the Whole Story that Lives Within Your Data August, 2015 qlik.com Table of Contents Introduction 3 Qlik s associative model 3 Query-based visualization tools only

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411

More information

CiteSeer x in the Cloud

CiteSeer x in the Cloud Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Best Practice Search Engine Optimisation

Best Practice Search Engine Optimisation Best Practice Search Engine Optimisation October 2007 Lead Hitwise Analyst: Australia Heather Hopkins, Hitwise UK Search Marketing Services Contents 1 Introduction 1 2 Search Engines 101 2 2.1 2.2 2.3

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

EVILSEED: A Guided Approach to Finding Malicious Web Pages

EVILSEED: A Guided Approach to Finding Malicious Web Pages + EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of

More information

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research SEO 360: The Essentials of Search Engine Optimization By Chris Adams, Director of Online Marketing & Research INTRODUCTION Effective Search Engine Optimization is not a highly technical or complex task,

More information

SCIENCE TIME SEARCH MARKETING TRENDS 2014

SCIENCE TIME SEARCH MARKETING TRENDS 2014 SEARCH MARKETING TRENDS 2014 137 Mizyurkina Galina Ivanovna, Tomsk Polytechnical University Institute of Humanities, Social Sciences and Technologies Language adviser: Zeremkaya Yulia Aleksandrovna E-mail:

More information

Advanced Meta-search of News in the Web

Advanced Meta-search of News in the Web Advanced Meta-search of News in the Web Rubén Tous, Jaime Delgado Universitat Pompeu Fabra (UPF), Departament de Tecnologia, Pg. Circumval lació, 8. E-08003 Barcelona, Spain {ruben.tous, Jaime.delgado}@tecn.upf.es

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

Artificial Intelligence & Knowledge Management

Artificial Intelligence & Knowledge Management Artificial Intelligence & Knowledge Management Nick Bassiliades, Ioannis Vlahavas, Fotis Kokkoras Aristotle University of Thessaloniki Department of Informatics Programming Languages and Software Engineering

More information

Study Guide #2 for MKTG 469 Advertising Types of online advertising:

Study Guide #2 for MKTG 469 Advertising Types of online advertising: Study Guide #2 for MKTG 469 Advertising Types of online advertising: Display (banner) ads, Search ads Paid search, Ads on social networks, Mobile ads Direct response is growing faster, Not all ads are

More information

Spreadsheet Programming:

Spreadsheet Programming: Spreadsheet Programming: The New Paradigm in Rapid Application Development Contact: Info@KnowledgeDynamics.com www.knowledgedynamics.com Spreadsheet Programming: The New Paradigm in Rapid Application Development

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and

More information

An Ontology Based Text Analytics on Social Media

An Ontology Based Text Analytics on Social Media , pp.233-240 http://dx.doi.org/10.14257/ijdta.2015.8.5.20 An Ontology Based Text Analytics on Social Media Pankajdeep Kaur, Pallavi Sharma and Nikhil Vohra GNDU, Regional Campus, GNDU, Regional Campus,

More information

Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://hdl.handle.net/11245/2.122992

Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://hdl.handle.net/11245/2.122992 Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://hdl.handle.net/11245/2.122992 File ID Filename Version uvapub:122992 1: Introduction unknown SOURCE (OR

More information

EXTENDING JMETER TO ALLOW FOR WEB STRUCTURE MINING

EXTENDING JMETER TO ALLOW FOR WEB STRUCTURE MINING EXTENDING JMETER TO ALLOW FOR WEB STRUCTURE MINING Agustín Sabater, Carlos Guerrero, Isaac Lera, Carlos Juiz Computer Science Department, University of the Balearic Islands, SPAIN pinyeiro@gmail.com, carlos.guerrero@uib.es,

More information

Business Benefits From Microsoft SQL Server Business Intelligence Solutions How Can Business Intelligence Help You? PTR Associates Limited

Business Benefits From Microsoft SQL Server Business Intelligence Solutions How Can Business Intelligence Help You? PTR Associates Limited Business Benefits From Microsoft SQL Server Business Intelligence Solutions How Can Business Intelligence Help You? www.ptr.co.uk Business Benefits From Microsoft SQL Server Business Intelligence (September

More information

Visualization methods for patent data

Visualization methods for patent data Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes

More information

SAS Customer Intelligence 360: Creating a Consistent Customer Experience in an Omni-channel Environment

SAS Customer Intelligence 360: Creating a Consistent Customer Experience in an Omni-channel Environment Paper SAS 6435-2016 SAS Customer Intelligence 360: Creating a Consistent Customer Experience in an Omni-channel Environment Mark Brown and Brian Chick, SAS Institute Inc., Cary, NC ABSTRACT SAS Customer

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

Digital Business Platform for SAP

Digital Business Platform for SAP BUSINESS WHITE PAPER Digital Business Platform for SAP SAP ERP is the foundation on which the enterprise runs. Software AG adds the missing agility component with a digital business platform. CONTENT 1

More information

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470 Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2 Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...

More information

Top 3 Marketing Metrics You Should Measure in Google Analytics

Top 3 Marketing Metrics You Should Measure in Google Analytics Top 3 Marketing Metrics You Should Measure in Google Analytics Presented By Table of Contents Overview 3 How to Use This Knowledge Brief 3 Metric to Measure: Traffic 4 Direct (Acquisition > All Traffic

More information

Visual Analysis of Statistical Data on Maps using Linked Open Data

Visual Analysis of Statistical Data on Maps using Linked Open Data Visual Analysis of Statistical Data on Maps using Linked Open Data Petar Ristoski and Heiko Paulheim University of Mannheim, Germany Research Group Data and Web Science {petar.ristoski,heiko}@informatik.uni-mannheim.de

More information

ONLINE QUICK REFERENCE CARD ENDNOTE

ONLINE QUICK REFERENCE CARD ENDNOTE QUICK REFERENCE CARD ENDNOTE ONLINE Access your password-protected reference library anywhere, at any time. Download references and full text from just about any online data source, such as PubMed, GoogleScholar

More information

Lecture Overview. Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Web 2.0 Definition. Web 2.

Lecture Overview. Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Web 2.0 Definition. Web 2. Lecture Overview Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Martin Halvey Introduction to Web 2.0 Overview of Tagging Systems Overview of tagging Design and attributes

More information

HP WebInspect Tutorial

HP WebInspect Tutorial HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the

More information

Socialprise: Leveraging Social Data in the Enterprise Rev 0109

Socialprise: Leveraging Social Data in the Enterprise Rev 0109 Socialprise: Leveraging Social Data in the Enterprise Rev 0109 Contents I. Socialprise: Capturing Smart Insights into Agile Relationships II. Socialprise Applications: Getting the Who, What and When of

More information

Digital Asset Management. Content Control for Valuable Media Assets

Digital Asset Management. Content Control for Valuable Media Assets Digital Asset Management Content Control for Valuable Media Assets Overview Digital asset management is a core infrastructure requirement for media organizations and marketing departments that need to

More information

An Artesian Whitepaper

An Artesian Whitepaper An Artesian Whitepaper This short paper talks about the subject of the semantic web, providing a definition and context and outlining how this can be exploited to drive commercial productivity particularly

More information

BUSINESS CHICKS, INC. Privacy Policy

BUSINESS CHICKS, INC. Privacy Policy BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,

More information