SlideShare a Scribd company logo
1 of 23
Introduction
A clickstream is the recording of the parts of the
screen a computer user clicks on while web browsing
or using another software application.
As the user clicks anywhere in the webpage or
application, the action is logged on a client or inside
the web server, as well as possibly the web browser,
router, proxy server.
Introduction
Clickstream analysis is useful for web activity analysis,
software testing, market research, and for analyzing
employee productivity.
Clickstream as defined by Internet Advertising Bureau
(IAB) :
“The electronic path a user takes while navigating from site
to site, and from page to page within a site.
It is a comprehensive body of data describing the sequence of
activity between a user’s browser and any other Internet
resource, such as a Web site or third party ad server”
Methodology
The click stream data is analyzed to identify different
paths taken by the visitors and the sequence of pages that
lead to payment of membership fee.
Based on this analysis, specific strategies are
recommended to maximize the revenue for the website.
The main point of clickstream tracking is to give
webmasters insight into what visitors on their site are
doing.
Data
Data is obtained from the site in the form of click stream
records. Each record consists of the details of clicks by the
visitors and each record contains the following details:
Server IP
Client IP
Time stamp with Date
Status: HTTP Status code
URL requested: has three subfields namely The request
method, resource requested and the protocol used
No. of bytes transferred
The country of origin for a specific request is identified
using the IP address.
Data
URL is used to identify the information/web page browsed by
the visitors.
Time stamp of each click is used to sequence the movement of
the visitors across different pages in the website.
Identifying a unique user session is an important step in the
analysis of click stream data. Inactivity for more than 30
minutes is considered as a break of session.
This is an approximation since there could be multiple users
accessing from the same IP, or the same user accessing from
different IPs.
Due to lack of more data available we consider hits from each
unique IP as belonging to a unique user for a unique session.
Technology-Enabled Approaches
The Web provides marketers with huge amounts of
information about users
⇒This data is collected automatically
Server-side data collection
 Log file analysis - historical data
 Real-time profiling (tracking user Clickstream analysis)
Client-side data collection (cookies)
Data Mining
These techniques did not exist prior to the Internet.
⇒They allow marketers to make quick and responsive changes in
Web pages, promotions, and pricing.
⇒The main challenge is analysis and interpretation
Web server log files
• All web servers automatically log (record) each http request
• A server log is a log file (or several files) automatically
created and maintained by a server of activity performed by
it.
• A typical example is a web server log which maintains a
history of page requests.
• Most log file formats can be extended to include “cookie”
information
– This allows you to identify a user at the “visitor” level
9
Web Server Logging –
How Does it Work?
Web servers such as Apache or Microsoft IIS record
activity as they receive and fulfill requests.
Web servers provide general-purpose logging at a
very detailed level.
To prepare the data for analysis, the web team must
clean and organize log records – a big job!
Web Server Logging –
A Log Record Example
What log files can record includes:
Number of requests to the server (hits)
Number of page views
Total unique visitors (using “cookies”)
The referring web site
Number of repeat visits
Time spent on a page
Route through the site (click path)
Search terms used
Most/least popular pages
Software for log file analysis (web analytics)
• Market leader is Webtrends
How do you use log files effectively?
1. Identify leading indicators of business success
2. Identify the key performance metrics with which
to measure them
3. Establish benchmarks to track changes over time
4. Configure software and use settings consistently
Shortcomings of log file
analysis
Cannot identify individual people. The log file records
the computer IP address and/or the “cookie”, not the
user.
Information may be incomplete because of caching.
Assumptions made in defining “user sessions” may be
incorrect.
This is why benchmarking is so important
trends rather than absolute numbers
Log file analysis is a useful tool to:
identify what visitors are looking for
what content they find most interesting
which search and navigation tools they find most useful
whether promotions are being successful
identify normal volatility in usage levels
measure growth in site usage as compared to overall
web usage
Enhancing marketing tactics using web analytics - some
examples
Identify point of drop-off in registration or purchasing
process.
Pinpoint problem and concentrate efforts on the apparent
trouble spot to improve conversion rates.
Maximize cross-selling opportunities in an on-line
store
Identify the top non-purchased products that customers also
looked at before completing the purchasing process.
Add these products in as suggestions
Refine search engine placements by implementing
keyword strategy
Use referrer files to identify commonly used search terms and
the search engine or directory that sent the customer.
Improve web site structure using web analytics
- some examples
Analysis of search logs to improve findability on the
web site.
Do people search by “category” rather than “uniquely
identifying” search terms?
Redesign home page to enhance visibility of most
commonly used links and therefore promote usability.
Demote least used items to “below the fold”
Analyze “click paths”, entry and exit points to trace
most common routes around the site.
Identify areas where navigation seems unclear or confusing
Improve navigation to match demonstrated user preferences.
Clickstream monitoring and
personalization
How does Amazon.com do that?
This type of personalization is very complex and
expensive to achieve
Existing customers and order databases must be mined for
buying patterns
 People who bought a Nora Jones CD also bought a John Grisham
novel
 Called collaborative filtering
Real-time monitoring of customers on your site needed, so you
can make recommendations or special offers at the right time
Becomes even more complex when combined with
information actually provided by the customer
Data Analysis and Distribution
Data collected from all customer touch points are:
Stored in the data warehouse,
Available for analysis and distribution to marketing
decision makers.
Analysis for marketing decision making:
Data mining
Customer profiling
RFM analysis (recency, frequency, monetary
Data mining = extraction of hidden predictive
information in large databases through statistical
analysis.
Marketers are looking for patterns in the data such
as:
 Do more people buy in particular months
 Are there any purchases that tend to be made after a
particular life event
 Refine marketing mix strategies,
 Identify new product opportunities,
 Predict consumer behavior.
Real-Space Approaches
Real-space primary data collection occurs at offline
points of purchase with:
Smart card and credit card readers, interactive point
of sale machines (iPOS), and bar code scanners are
mechanisms for collecting real-space consumer data.
Offline data, when combined with online data, paint a
complete picture of consumer behavior for individual
retail firms.
Customer profiling
Customer profiling = uses data warehouse information to help
marketers understand the characteristics and behavior of specific
target groups.
 Understand who buys particular products,
 How customers react to promotional offers and pricing changes,
 Select target groups for promotional appeals,
 Find and keep customers with a higher lifetime value to the firm,
 Understand the important characteristics of heavy product users,
 Direct cross-selling activities to appropriate customers;
 Reduce direct mailing costs by targeting high-response customers.
RFM analysis
RFM analysis (recency, frequency, monetary) = scans
the database for three criteria.
When did the customer last purchase (recency)?
 How often has the customer purchased products
(frequency)?
 How much has the customer spent on product
purchases (monetary value)?
 => Allows firms to target offers to the customers who are
most responsive, saving promotional costs and increasing
sales.

More Related Content

What's hot (20)

Recommendation system
Recommendation system Recommendation system
Recommendation system
 
Web mining
Web mining Web mining
Web mining
 
Analytics with Descriptive, Predictive and Prescriptive Techniques
Analytics with Descriptive, Predictive and Prescriptive TechniquesAnalytics with Descriptive, Predictive and Prescriptive Techniques
Analytics with Descriptive, Predictive and Prescriptive Techniques
 
Cluster analysis
Cluster analysisCluster analysis
Cluster analysis
 
Data analytics
Data analyticsData analytics
Data analytics
 
Business analytics
Business analyticsBusiness analytics
Business analytics
 
Data Analytics Life Cycle
Data Analytics Life CycleData Analytics Life Cycle
Data Analytics Life Cycle
 
Web crawler
Web crawlerWeb crawler
Web crawler
 
1. Data Analytics-introduction
1. Data Analytics-introduction1. Data Analytics-introduction
1. Data Analytics-introduction
 
Classification in data mining
Classification in data mining Classification in data mining
Classification in data mining
 
Data mining
Data mining Data mining
Data mining
 
TYPES OF ANALYTICS.pptx
TYPES OF ANALYTICS.pptxTYPES OF ANALYTICS.pptx
TYPES OF ANALYTICS.pptx
 
Introduction to data analytics
Introduction to data analyticsIntroduction to data analytics
Introduction to data analytics
 
Social Media Analytics
Social Media AnalyticsSocial Media Analytics
Social Media Analytics
 
DI&A Slides: Descriptive, Prescriptive, and Predictive Analytics
DI&A Slides: Descriptive, Prescriptive, and Predictive AnalyticsDI&A Slides: Descriptive, Prescriptive, and Predictive Analytics
DI&A Slides: Descriptive, Prescriptive, and Predictive Analytics
 
Web Search and Mining
Web Search and MiningWeb Search and Mining
Web Search and Mining
 
Analytics in E-commerce
Analytics in E-commerceAnalytics in E-commerce
Analytics in E-commerce
 
Data mining tasks
Data mining tasksData mining tasks
Data mining tasks
 
Web spam
Web spamWeb spam
Web spam
 
Web Mining & Text Mining
Web Mining & Text MiningWeb Mining & Text Mining
Web Mining & Text Mining
 

Viewers also liked

ID 2013 - Inbound Marketing Competitor Analysis
ID 2013 - Inbound Marketing Competitor AnalysisID 2013 - Inbound Marketing Competitor Analysis
ID 2013 - Inbound Marketing Competitor AnalysisJohn Doherty
 
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...Spark Summit
 
Clickstream Analysis
Clickstream AnalysisClickstream Analysis
Clickstream Analysisintuitiv.de
 
Web log & clickstream
Web log & clickstream Web log & clickstream
Web log & clickstream Michel Bruley
 
Clickstream Analysis with Spark
Clickstream Analysis with Spark Clickstream Analysis with Spark
Clickstream Analysis with Spark Josef Adersberger
 

Viewers also liked (7)

Click Stream Analysis
Click Stream AnalysisClick Stream Analysis
Click Stream Analysis
 
ID 2013 - Inbound Marketing Competitor Analysis
ID 2013 - Inbound Marketing Competitor AnalysisID 2013 - Inbound Marketing Competitor Analysis
ID 2013 - Inbound Marketing Competitor Analysis
 
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...
Clickstream Analysis with Spark—Understanding Visitors in Realtime by Josef A...
 
Clickstream Analysis
Clickstream AnalysisClickstream Analysis
Clickstream Analysis
 
Clickstream ppt copy
Clickstream ppt   copyClickstream ppt   copy
Clickstream ppt copy
 
Web log & clickstream
Web log & clickstream Web log & clickstream
Web log & clickstream
 
Clickstream Analysis with Spark
Clickstream Analysis with Spark Clickstream Analysis with Spark
Clickstream Analysis with Spark
 

Similar to clickstream analysis

Web analytics an intro
Web analytics   an introWeb analytics   an intro
Web analytics an introAshokkumar T A
 
Ecommerce by bhawani nandan prasad
Ecommerce by bhawani nandan prasadEcommerce by bhawani nandan prasad
Ecommerce by bhawani nandan prasadBhawani N Prasad
 
How to Segment Your Customers and Target Their Needs
How to Segment Your Customers and Target Their NeedsHow to Segment Your Customers and Target Their Needs
How to Segment Your Customers and Target Their NeedsWebtrends
 
Module 2 onsite webanalytics
Module 2   onsite webanalyticsModule 2   onsite webanalytics
Module 2 onsite webanalyticsGayathri Choda
 
Data Driven Design: Using Web Analytics to Improve Information Architectures
Data Driven Design: Using Web Analytics to Improve Information ArchitecturesData Driven Design: Using Web Analytics to Improve Information Architectures
Data Driven Design: Using Web Analytics to Improve Information ArchitecturesAndrea Wiggins
 
ANALYSIS OF CLICKSTREAM DATA
ANALYSIS OF CLICKSTREAM DATAANALYSIS OF CLICKSTREAM DATA
ANALYSIS OF CLICKSTREAM DATAIRJET Journal
 
An Introduction to Web Analytics
An Introduction to Web AnalyticsAn Introduction to Web Analytics
An Introduction to Web Analyticsiexpertsforum
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesPalani Kumar
 
Web mining and social media mining
Web mining and social media miningWeb mining and social media mining
Web mining and social media miningRoxana Tadayon
 
AB1401-SEM5-GROUP4
AB1401-SEM5-GROUP4AB1401-SEM5-GROUP4
AB1401-SEM5-GROUP4Jeremy Chia
 
Module 1 introduction to web analytics
Module 1   introduction to web analyticsModule 1   introduction to web analytics
Module 1 introduction to web analyticsGayathri Choda
 
Module 1 introduction to web analytics
Module 1   introduction to web analyticsModule 1   introduction to web analytics
Module 1 introduction to web analyticsGayathri Choda
 
SharePoint Marketing Suite - Presentation from Intlock and Atidan
SharePoint Marketing Suite - Presentation from Intlock and AtidanSharePoint Marketing Suite - Presentation from Intlock and Atidan
SharePoint Marketing Suite - Presentation from Intlock and AtidanDavid J Rosenthal
 
Google Analytics & Web Masters Tools - GBG Mumbai
Google Analytics & Web Masters Tools - GBG MumbaiGoogle Analytics & Web Masters Tools - GBG Mumbai
Google Analytics & Web Masters Tools - GBG MumbaiGBG Mumbai
 
How Much Traffic Does This Website Get.pdf
How Much Traffic Does This Website Get.pdfHow Much Traffic Does This Website Get.pdf
How Much Traffic Does This Website Get.pdfHost It Smart
 

Similar to clickstream analysis (20)

Web analytics an intro
Web analytics   an introWeb analytics   an intro
Web analytics an intro
 
Ecommerce by bhawani nandan prasad
Ecommerce by bhawani nandan prasadEcommerce by bhawani nandan prasad
Ecommerce by bhawani nandan prasad
 
How to Segment Your Customers and Target Their Needs
How to Segment Your Customers and Target Their NeedsHow to Segment Your Customers and Target Their Needs
How to Segment Your Customers and Target Their Needs
 
Web analytics
Web analyticsWeb analytics
Web analytics
 
Web Analytics 101
Web Analytics 101Web Analytics 101
Web Analytics 101
 
Web usage mining
Web usage miningWeb usage mining
Web usage mining
 
Module 2 onsite webanalytics
Module 2   onsite webanalyticsModule 2   onsite webanalytics
Module 2 onsite webanalytics
 
Web Analytics
Web AnalyticsWeb Analytics
Web Analytics
 
Data Driven Design: Using Web Analytics to Improve Information Architectures
Data Driven Design: Using Web Analytics to Improve Information ArchitecturesData Driven Design: Using Web Analytics to Improve Information Architectures
Data Driven Design: Using Web Analytics to Improve Information Architectures
 
ANALYSIS OF CLICKSTREAM DATA
ANALYSIS OF CLICKSTREAM DATAANALYSIS OF CLICKSTREAM DATA
ANALYSIS OF CLICKSTREAM DATA
 
An Introduction to Web Analytics
An Introduction to Web AnalyticsAn Introduction to Web Analytics
An Introduction to Web Analytics
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
Web mining and social media mining
Web mining and social media miningWeb mining and social media mining
Web mining and social media mining
 
Web
WebWeb
Web
 
AB1401-SEM5-GROUP4
AB1401-SEM5-GROUP4AB1401-SEM5-GROUP4
AB1401-SEM5-GROUP4
 
Module 1 introduction to web analytics
Module 1   introduction to web analyticsModule 1   introduction to web analytics
Module 1 introduction to web analytics
 
Module 1 introduction to web analytics
Module 1   introduction to web analyticsModule 1   introduction to web analytics
Module 1 introduction to web analytics
 
SharePoint Marketing Suite - Presentation from Intlock and Atidan
SharePoint Marketing Suite - Presentation from Intlock and AtidanSharePoint Marketing Suite - Presentation from Intlock and Atidan
SharePoint Marketing Suite - Presentation from Intlock and Atidan
 
Google Analytics & Web Masters Tools - GBG Mumbai
Google Analytics & Web Masters Tools - GBG MumbaiGoogle Analytics & Web Masters Tools - GBG Mumbai
Google Analytics & Web Masters Tools - GBG Mumbai
 
How Much Traffic Does This Website Get.pdf
How Much Traffic Does This Website Get.pdfHow Much Traffic Does This Website Get.pdf
How Much Traffic Does This Website Get.pdf
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

clickstream analysis

  • 1.
  • 2. Introduction A clickstream is the recording of the parts of the screen a computer user clicks on while web browsing or using another software application. As the user clicks anywhere in the webpage or application, the action is logged on a client or inside the web server, as well as possibly the web browser, router, proxy server.
  • 3. Introduction Clickstream analysis is useful for web activity analysis, software testing, market research, and for analyzing employee productivity. Clickstream as defined by Internet Advertising Bureau (IAB) : “The electronic path a user takes while navigating from site to site, and from page to page within a site. It is a comprehensive body of data describing the sequence of activity between a user’s browser and any other Internet resource, such as a Web site or third party ad server”
  • 4. Methodology The click stream data is analyzed to identify different paths taken by the visitors and the sequence of pages that lead to payment of membership fee. Based on this analysis, specific strategies are recommended to maximize the revenue for the website. The main point of clickstream tracking is to give webmasters insight into what visitors on their site are doing.
  • 5. Data Data is obtained from the site in the form of click stream records. Each record consists of the details of clicks by the visitors and each record contains the following details: Server IP Client IP Time stamp with Date Status: HTTP Status code URL requested: has three subfields namely The request method, resource requested and the protocol used No. of bytes transferred The country of origin for a specific request is identified using the IP address.
  • 6. Data URL is used to identify the information/web page browsed by the visitors. Time stamp of each click is used to sequence the movement of the visitors across different pages in the website. Identifying a unique user session is an important step in the analysis of click stream data. Inactivity for more than 30 minutes is considered as a break of session. This is an approximation since there could be multiple users accessing from the same IP, or the same user accessing from different IPs. Due to lack of more data available we consider hits from each unique IP as belonging to a unique user for a unique session.
  • 7. Technology-Enabled Approaches The Web provides marketers with huge amounts of information about users ⇒This data is collected automatically Server-side data collection  Log file analysis - historical data  Real-time profiling (tracking user Clickstream analysis) Client-side data collection (cookies) Data Mining These techniques did not exist prior to the Internet. ⇒They allow marketers to make quick and responsive changes in Web pages, promotions, and pricing. ⇒The main challenge is analysis and interpretation
  • 8. Web server log files • All web servers automatically log (record) each http request • A server log is a log file (or several files) automatically created and maintained by a server of activity performed by it. • A typical example is a web server log which maintains a history of page requests. • Most log file formats can be extended to include “cookie” information – This allows you to identify a user at the “visitor” level
  • 9. 9 Web Server Logging – How Does it Work? Web servers such as Apache or Microsoft IIS record activity as they receive and fulfill requests. Web servers provide general-purpose logging at a very detailed level. To prepare the data for analysis, the web team must clean and organize log records – a big job!
  • 10. Web Server Logging – A Log Record Example
  • 11. What log files can record includes: Number of requests to the server (hits) Number of page views Total unique visitors (using “cookies”) The referring web site Number of repeat visits Time spent on a page Route through the site (click path) Search terms used Most/least popular pages
  • 12. Software for log file analysis (web analytics) • Market leader is Webtrends
  • 13. How do you use log files effectively? 1. Identify leading indicators of business success 2. Identify the key performance metrics with which to measure them 3. Establish benchmarks to track changes over time 4. Configure software and use settings consistently
  • 14. Shortcomings of log file analysis Cannot identify individual people. The log file records the computer IP address and/or the “cookie”, not the user. Information may be incomplete because of caching. Assumptions made in defining “user sessions” may be incorrect. This is why benchmarking is so important trends rather than absolute numbers
  • 15. Log file analysis is a useful tool to: identify what visitors are looking for what content they find most interesting which search and navigation tools they find most useful whether promotions are being successful identify normal volatility in usage levels measure growth in site usage as compared to overall web usage
  • 16. Enhancing marketing tactics using web analytics - some examples Identify point of drop-off in registration or purchasing process. Pinpoint problem and concentrate efforts on the apparent trouble spot to improve conversion rates. Maximize cross-selling opportunities in an on-line store Identify the top non-purchased products that customers also looked at before completing the purchasing process. Add these products in as suggestions Refine search engine placements by implementing keyword strategy Use referrer files to identify commonly used search terms and the search engine or directory that sent the customer.
  • 17. Improve web site structure using web analytics - some examples Analysis of search logs to improve findability on the web site. Do people search by “category” rather than “uniquely identifying” search terms? Redesign home page to enhance visibility of most commonly used links and therefore promote usability. Demote least used items to “below the fold” Analyze “click paths”, entry and exit points to trace most common routes around the site. Identify areas where navigation seems unclear or confusing Improve navigation to match demonstrated user preferences.
  • 18. Clickstream monitoring and personalization How does Amazon.com do that? This type of personalization is very complex and expensive to achieve Existing customers and order databases must be mined for buying patterns  People who bought a Nora Jones CD also bought a John Grisham novel  Called collaborative filtering Real-time monitoring of customers on your site needed, so you can make recommendations or special offers at the right time Becomes even more complex when combined with information actually provided by the customer
  • 19. Data Analysis and Distribution Data collected from all customer touch points are: Stored in the data warehouse, Available for analysis and distribution to marketing decision makers. Analysis for marketing decision making: Data mining Customer profiling RFM analysis (recency, frequency, monetary
  • 20. Data mining = extraction of hidden predictive information in large databases through statistical analysis. Marketers are looking for patterns in the data such as:  Do more people buy in particular months  Are there any purchases that tend to be made after a particular life event  Refine marketing mix strategies,  Identify new product opportunities,  Predict consumer behavior.
  • 21. Real-Space Approaches Real-space primary data collection occurs at offline points of purchase with: Smart card and credit card readers, interactive point of sale machines (iPOS), and bar code scanners are mechanisms for collecting real-space consumer data. Offline data, when combined with online data, paint a complete picture of consumer behavior for individual retail firms.
  • 22. Customer profiling Customer profiling = uses data warehouse information to help marketers understand the characteristics and behavior of specific target groups.  Understand who buys particular products,  How customers react to promotional offers and pricing changes,  Select target groups for promotional appeals,  Find and keep customers with a higher lifetime value to the firm,  Understand the important characteristics of heavy product users,  Direct cross-selling activities to appropriate customers;  Reduce direct mailing costs by targeting high-response customers.
  • 23. RFM analysis RFM analysis (recency, frequency, monetary) = scans the database for three criteria. When did the customer last purchase (recency)?  How often has the customer purchased products (frequency)?  How much has the customer spent on product purchases (monetary value)?  => Allows firms to target offers to the customers who are most responsive, saving promotional costs and increasing sales.