Understanding User-Web Interactions via Web Analytics

Understanding User-Web Interactions via Web Analytics

Author: Bernard J. Jansen

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 101

ISBN-13: 3031022645

DOWNLOAD EBOOK

This lecture presents an overview of the Web analytics process, with a focus on providing insight and actionable outcomes from collecting and analyzing Internet data. The lecture first provides an overview of Web analytics, providing in essence, a condensed version of the entire lecture. The lecture then outlines the theoretical and methodological foundations of Web analytics in order to make obvious the strengths and shortcomings of Web analytics as an approach. These foundational elements include the psychological basis in behaviorism and methodological underpinning of trace data as an empirical method. These foundational elements are illuminated further through a brief history of Web analytics from the original transaction log studies in the 1960s through the information science investigations of library systems to the focus on Websites, systems, and applications. Following a discussion of on-going interaction data within the clickstream created using log files and page tagging for analytics of Website and search logs, the lecture then presents a Web analytic process to convert these basic data to meaningful key performance indicators in order to measure likely converts that are tailored to the organizational goals or potential opportunities. Supplementary data collection techniques are addressed, including surveys and laboratory studies. The overall goal of this lecture is to provide implementable information and a methodology for understanding Web analytics in order to improve Web systems, increase customer satisfaction, and target revenue through effective analysis of user–Website interactions. Table of Contents: Understanding Web Analytics / The Foundations of Web Analytics: Theory and Methods / The History of Web Analytics / Data Collection for Web Analytics / Web Analytics Fundamentals / Web Analytics Strategy / Web Analytics as Competitive Intelligence / Supplementary Methods for Augmenting Web Analytics / Search Log Analytics / Conclusion / Key Terms / Blogs for Further Reading / References


Understanding User-Web Interactions Via Web Analytics

Understanding User-Web Interactions Via Web Analytics

Author: Bernard J. Jansen

Publisher: Morgan & Claypool Publishers

Published: 2009

Total Pages: 117

ISBN-13: 1598298518

DOWNLOAD EBOOK

This lecture presents an overview of the Web analytics process, with a focus on providing insight and actionable outcomes from collecting and analyzing Internet data. The lecture first provides an overview of Web analytics, providing in essence, a condensed version of the entire lecture. The lecture then outlines the theoretical and methodological foundations of Web analytics in order to make obvious the strengths and shortcomings of Web analytics as an approach. These foundational elements include the psychological basis in behaviorism and methodological underpinning of trace data as an empirical method. These foundational elements are illuminated further through a brief history of Web analytics from the original transaction log studies in the 1960s through the information science investigations of library systems to the focus on Websites, systems, and applications. Following a discussion of on-going interaction data within the clickstream created using log files and page tagging for analytics of Website and search logs, the lecture then presents a Web analytic process to convert these basic data to meaningful key performance indicators in order to measure likely converts that are tailored to the organizational goals or potential opportunities. Supplementary data collection techniques are addressed, including surveys and laboratory studies. The overall goal of this lecture is to provide implementable information and a methodology for understanding Web analytics in order to improve Web systems, increase customer satisfaction, and target revenue through effective analysis of user-Website interactions. Table of Contents: Understanding Web Analytics / The Foundations of Web Analytics: Theory and Methods / The History of Web Analytics / Data Collection for Web Analytics / Web Analytics Fundamentals / Web Analytics Strategy / Web Analytics as Competitive Intelligence / Supplementary Methods for Augmenting Web Analytics / Search Log Analytics / Conclusion / Key Terms / Blogs for Further Reading / References


Understanding Your Users

Understanding Your Users

Author: Kathy Baxter

Publisher: Morgan Kaufmann

Published: 2015-05-20

Total Pages: 569

ISBN-13: 0128006099

DOWNLOAD EBOOK

This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. For each method, you'll understand how to prepare for and conduct the activity, as well as analyze and present the data - all in a practical and hands-on way. Each method presented provides different information about the users and their requirements (e.g., functional requirements, information architecture). The techniques can be used together to form a complete picture of the users' needs or they can be used separately throughout the product development lifecycle to address specific product questions. These techniques have helped product teams understand the value of user experience research by providing insight into how users behave and what they need to be successful. You will find brand new case studies from leaders in industry and academia that demonstrate each method in action. This book has something to offer whether you are new to user experience or a seasoned UX professional. After reading this book, you'll be able to choose the right user research method for your research question and conduct a user research study. Then, you will be able to apply your findings to your own products. - Completely new and revised edition includes 30+% new content! - Discover the foundation you need to prepare for any user research activity and ensure that the results are incorporated into your products - Includes all new case studies for each method from leaders in industry and academia


Quantifying Research Integrity

Quantifying Research Integrity

Author: Michael Seadle

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 121

ISBN-13: 3031023064

DOWNLOAD EBOOK

Institutions typically treat research integrity violations as black and white, right or wrong. The result is that the wide range of grayscale nuances that separate accident, carelessness, and bad practice from deliberate fraud and malpractice often get lost. This lecture looks at how to quantify the grayscale range in three kinds of research integrity violations: plagiarism, data falsification, and image manipulation. Quantification works best with plagiarism, because the essential one-to-one matching algorithms are well known and established tools for detecting when matches exist. Questions remain, however, of how many matching words of what kind in what location in which discipline constitute reasonable suspicion of fraudulent intent. Different disciplines take different perspectives on quantity and location. Quantification is harder with data falsification, because the original data are often not available, and because experimental replication remains surprisingly difficult. The same is true with image manipulation, where tools exist for detecting certain kinds of manipulations, but where the tools are also easily defeated. This lecture looks at how to prevent violations of research integrity from a pragmatic viewpoint, and at what steps can institutions and publishers take to discourage problems beyond the usual ethical admonitions. There are no simple answers, but two measures can help: the systematic use of detection tools and requiring original data and images. These alone do not suffice, but they represent a start. The scholarly community needs a better awareness of the complexity of research integrity decisions. Only an open and wide-spread international discussion can bring about a consensus on where the boundary lines are and when grayscale problems shade into black. One goal of this work is to move that discussion forward.


Information Architecture

Information Architecture

Author: Wei Ding

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 164

ISBN-13: 3031023080

DOWNLOAD EBOOK

Information Architecture is about organizing and simplifying information, designing and integrating information spaces/systems, and creating ways for people to find and interact with information content. Its goal is to help people understand and manage information and make the right decisions accordingly. This updated and revised edition of the book looks at integrated information spaces in the web context and beyond, with a focus on putting theories and principles into practice. In the ever-changing social, organizational, and technological contexts, information architects not only design individual information spaces (e.g., websites, software applications, and mobile devices), but also tackle strategic aggregation and integration of multiple information spaces across websites, channels, modalities, and platforms. Not only do they create predetermined navigation pathways, but they also provide tools and rules for people to organize information on their own and get connected with others. Information architects work with multi-disciplinary teams to determine the user experience strategy based on user needs and business goals, and make sure the strategy gets carried out by following the user-centered design (UCD) process via close collaboration with others. Drawing on the authors’ extensive experience as HCI researchers, User Experience Design practitioners, and Information Architecture instructors, this book provides a balanced view of the IA discipline by applying theories, design principles, and guidelines to IA and UX practices. It also covers advanced topics such as iterative design, UX decision support, and global and mobile IA considerations. Major revisions include moving away from a web-centric view toward multi-channel, multi-device experiences. Concepts such as responsive design, emerging design principles, and user-centered methods such as Agile, Lean UX, and Design Thinking are discussed and related to IA processes and practices.


Trustworthy Policies for Distributed Repositories

Trustworthy Policies for Distributed Repositories

Author: Reagan W. Moore

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 133

ISBN-13: 303102303X

DOWNLOAD EBOOK

A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly. The assurance includes plans for the sustainability of the repository, the accession of digital records, the management of technology evolution, and the mitigation of the risk of data loss. A detailed assessment is provided by the ISO-16363:2012 standard, "Space data and information transfer systems—Audit and certification of trustworthy digital repositories." This book examines whether the ISO specification for trustworthiness can be enforced by computer actionable policies. An implementation of the policies is provided and the policies are sorted into categories for procedures to manage externally generated documents, specify repository parameters, specify preservation metadata attributes, specify audit mechanisms for all preservation actions, specify control of preservation operations, and control preservation properties as technology evolves. An application of the resulting procedures is made to enforce trustworthiness within National Science Foundation data management plans.


Framing Privacy in Digital Collections with Ethical Decision Making

Framing Privacy in Digital Collections with Ethical Decision Making

Author: Virginia Dressler

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 85

ISBN-13: 3031023161

DOWNLOAD EBOOK

As digital collections continue to grow, the underlying technologies to serve up content also continue to expand and develop. As such, new challenges are presented which continue to test ethical ideologies in everyday environs of the practitioner. There are currently no solid guidelines or overarching codes of ethics to address such issues. The digitization of modern archival collections, in particular, presents interesting conundrums when factors of privacy are weighed and reviewed in both small and mass digitization initiatives. Ethical decision making needs to be present at the onset of project planning in digital projects of all sizes, and we also need to identify the role and responsibility of the practitioner to make more virtuous decisions on behalf of those with no voice or awareness of potential privacy breaches. In this book, notions of what constitutes private information are discussed, as is the potential presence of such information in both analog and digital collections. This book lays groundwork to introduce the topic of privacy within digital collections by providing some examples from documented real-world scenarios and making recommendations for future research. A discussion of the notion privacy as concept will be included, as well as some historical perspective (with perhaps one the most cited work on this topic, for example, Warren and Brandeis' "Right to Privacy," 1890). Concepts from the The Right to Be Forgotten case in 2014 (Google Spain SL, Google Inc. v Agencia Españla de Protección de Datos, Mario Costeja González) are discussed as to how some lessons may be drawn from the response in Europe and also how European data privacy laws have been applied. The European ideologies are contrasted with the Right to Free Speech in the First Amendment in the U.S., highlighting the complexities in setting guidelines and practices revolving around privacy issues when applied to real life scenarios. Two ethical theories are explored: Consequentialism and Deontological. Finally, ethical decision making models will also be applied to our framework of digital collections. Three case studies are presented to illustrate how privacy can be defined within digital collections in some real-world examples.


Information Retrieval Evaluation

Information Retrieval Evaluation

Author: Donna Harman

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 107

ISBN-13: 3031022769

DOWNLOAD EBOOK

Evaluation has always played a major role in information retrieval, with the early pioneers such as Cyril Cleverdon and Gerard Salton laying the foundations for most of the evaluation methodologies in use today. The retrieval community has been extremely fortunate to have such a well-grounded evaluation paradigm during a period when most of the human language technologies were just developing. This lecture has the goal of explaining where these evaluation methodologies came from and how they have continued to adapt to the vastly changed environment in the search engine world today. The lecture starts with a discussion of the early evaluation of information retrieval systems, starting with the Cranfield testing in the early 1960s, continuing with the Lancaster "user" study for MEDLARS, and presenting the various test collection investigations by the SMART project and by groups in Britain. The emphasis in this chapter is on the how and the why of the various methodologies developed. The second chapter covers the more recent "batch" evaluations, examining the methodologies used in the various open evaluation campaigns such as TREC, NTCIR (emphasis on Asian languages), CLEF (emphasis on European languages), INEX (emphasis on semi-structured data), etc. Here again the focus is on the how and why, and in particular on the evolving of the older evaluation methodologies to handle new information access techniques. This includes how the test collection techniques were modified and how the metrics were changed to better reflect operational environments. The final chapters look at evaluation issues in user studies -- the interactive part of information retrieval, including a look at the search log studies mainly done by the commercial search engines. Here the goal is to show, via case studies, how the high-level issues of experimental design affect the final evaluations. Table of Contents: Introduction and Early History / "Batch" Evaluation Since 1992 / Interactive Evaluation / Conclusion


The Future of Personal Information Management, Part I

The Future of Personal Information Management, Part I

Author: William Jones

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 183

ISBN-13: 3031022785

DOWNLOAD EBOOK

We are well into a second age of digital information. Our information is moving from the desktop to the laptop to the "palmtop" and up into an amorphous cloud on the Web. How can one manage both the challenges and opportunities of this new world of digital information? What does the future hold? This book provides an important update on the rapidly expanding field of personal information management (PIM). Part I (Always and Forever) introduces the essentials of PIM. Information is personal for many reasons. It's the information on our hard drives we couldn't bear to lose. It's the information about us that we don't want to share. It's the distracting information demanding our attention even as we try to do something else. It's the information we don't know about but need to. Through PIM, we control personal information. We integrate information into our lives in useful ways. We make it "ours." With basics established, Part I proceeds to explore a critical interplay between personal information "always" at hand through mobile devices and "forever" on the Web. How does information stay "ours" in such a world? Part II (Building Places of Our Own for Digital Information) will be available in the Summer of 2012, and will consist of the following chapters: Chapter 5. Technologies to eliminate PIM?: We have seen astonishing advances in the technologies of information management -- in particular, to aid in the storing, structuring and searching of information. These technologies will certainly change the way we do PIM; will they eliminate the need for PIM altogether? Chapter 6. GIM and the social fabric of PIM: We don't (and shouldn't) manage our information in isolation. Group information management (GIM) -- especially the kind practiced more informally in households and smaller project teams -- goes hand in glove with good PIM. Chapter 7. PIM by design: Methodologies, principles, questions and considerations as we seek to understand PIM better and to build PIM into our tools, techniques and training. Chapter 8. To each of us, our own.: Just as we must each be a student of our own practice of PIM, we must also be a designer of this practice. This concluding chapter looks at tips, traps and tradeoffs as we work to build a practice of PIM and "places" of our own for personal information. Table of Contents: A New Age of Information / The Basics of PIM / Our Information, Always at Hand / Our Information, Forever on the Web


Mobile Search Behaviors

Mobile Search Behaviors

Author: Dan Wu

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 159

ISBN-13: 3031023153

DOWNLOAD EBOOK

With the rapid development of mobile Internet and smart personal devices in recent years, mobile search has gradually emerged as a key method with which users seek online information. In addition, cross-device search also has been regarded recently as an important research topic. As more mobile applications (APPs) integrate search functions, a user's mobile search behavior on different APPs becomes more significant. This book provides a systematic review of current mobile search analysis and studies user mobile search behavior from several perspectives, including mobile search context, APP usage, and different devices. Two different user experiments to collect user behavior data were conducted. Then, through the data from user mobile phone usage logs in natural settings, we analyze the mobile search strategies employed and offer a context-based mobile search task collection, which then can be used to evaluate the mobile search engine. In addition, we combine mobile search with APP usage to give more in-depth analysis, such as APP transition in mobile search and follow-up actions triggered by mobile search. The study, combining the mobile search with APP usage, can contribute to the interaction design of APPs, such as the search recommendation and APP recommendation. Addressing the phenomenon of users owning more smart devices today than ever before, we focus on user cross device search behavior. We model the information preparation behavior and information resumption behavior in cross-device search and evaluate the search performance in cross-device search. Research on mobile search behaviors across different devices can help to understand online user information behavior comprehensively and help users resume their search tasks on different devices.