Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.

Slides:



Advertisements
Similar presentations
Web Mining.
Advertisements

The Internet and the Web
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Monitoring a web sites health. Web Analytics - Definition Measurement of the behavior of visitors to a website Which aspects of the website work towards.
Back to Table of Contents
Chapter 21 Successfully Implementing The Information System
Copyright © 2002 Pearson Education, Inc. Slide 7-1.
Web Communication Client attempts to “pull” information from server – http message sent across Internet by TCP/IP* – packet switching used to route message.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 9 e-Commerce Systems.
Measuring and Monitoring Social Media Presence Measuring and Monitoring Social Media Presence Rim Dakelbab.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Hands-on: Capturing an Image with AccessData FTK Imager
Behavior Tracking Dhaval Patel.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
Presentation By Deepak Katta
1.Understand the decision-making process of consumer purchasing online. 2.Describe how companies are building one-to-one relationships with customers.
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
What is FORENSICS? Why do we need Network Forensics?
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Project Proposal Interface Design Website Coding Website Testing & Launching Website Maintenance.
Using audience metrics to grow revenue January 2010.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Web Analytics Unit 4-1(2005 Fall) Managing the Digital Enterprise By Professor Michael Rappa.
What is ? Free service offered by Google The most widely used website statistics service* Provides statistics and reports about visitors and transactions.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Copyright © 2010 Pearson Education, Inc.Copyright © 2007 Pearson Education, Inc. Slide 1-1 ELC 200 Day 14.
Log files presented to : Sir Adnan presented by: SHAH RUKH.
Srivastava J., Cooley R., Deshpande M, Tan P.N.
ASP.Net, Web Forms and Web Controls 1 Outline Session Tracking Cookies Session Tracking with HttpSessionState.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Network Security Introduction
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Hotspot Shield Protect Your Online Identity
Automated ad placement
Securing the Network Perimeter with ISA 2004
Latest Updates on BlackHawk Mines Music : Privacy Policy
Guide: How to Set, Get, and Delete Cookies in WordPress? Guided By: wpglobalsupportwpglobalsupport.
IIS.
ISMS Information Security Management System
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Copyright © 2002 Pearson Education, Inc.
E-Commerce and Social Networks
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Personal Privacy and the Public Internet
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across the entire web Web server log files, page tagging, cookies, network packet sniffing, route tracing Web usage mining

Cookies Cookies are unique identifiers, usually text files placed on users’ computers by web servers hosting web sites ‘Stateful’ HTTP Used to authenticate users, optimize and personalize the presented information, to serve custom advertisements or just to make browsing more convenient for the user

Log files Web servers record their transactions in log files Information available includes click streams, page views and visits Other useful information - number of unique visitors, least and most visited pages, average length per visit, top referring sites, top search words Log files mined to provide data for analysis

Page tagging “Web bugs” or “web beacons” Information retrieved from log files may not be accurate in the presence of web caches A web bug or web beacon is a small object, usually a transparent graphic image which is embedded in a web page to track the users visiting the web page and identify them Usually used by third‐party servers

Network packet sniffing Similar to a wiretapping device The sniffer is passive device that can capture each packet as data streams flow across the network decode and analyze its content Network management advantages - analyzing network problems, detecting intrusion attempts, debug network protocols and filter suspected content from network traffic Vulnerable to misuse - monitoring network usage, reporting statistics and collecting sensitive information

Uses - Personalization ‘Personalization is the provision to an individual of tailored products, services, information or information relating to products or services’ Information gathered implicitly or explicitly and aggregated Memorization and Customization Applications - customizing access to information sources, filtering news or e‐mails, targeted marketing and advertising, recommendation services for the browsing process

Uses - Advertising Custom advertising based on information gathered Example – DoubleClick A user’s “profile” includes demographic attributes (age, income etc.) and preferences that may be gathered explicitly or implicitly Marketing Web analysis data can be analyzed to determine how visitors to the web site react to marketing offers and improve marketing strategies

Privacy Implications Privacy is the control of personal information Anonymity on the web Privacy Vs. convenience Many websites do not take user’s permission before placing a tracking device, this is the default behavior and functionality is affected if this feature is disabled Example - Toysmart, AOL Third-party cookies, web bugs, route tracing and identity theft

Technological support Secure cookies - encryption of the messages passed through SSL clients to prevent web bugs Platform for Privacy Preferences Project (P3P) Anonymizing tools Anonymous proxy (Anonymizer) Lucent Personalized Web Assistant (LPWA) Crowds Anonymous Routing (Onion routers) – provide layers of encryption

Thank you