Chapter 12: Automated data collection methods

Slides:



Advertisements
Similar presentations
Unknown/uncontrolled data applications Bad/broken end-user applications Inefficient business processes Backlog of IT requests No data access control/backup.
Advertisements

Testing Web Applications. Applications Architecture Client Server Architecture.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter 12: Web Usage Mining - An introduction
1 Chapter 12 Working With Access 2000 on the Internet.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Graphical User Interface (GUI) Nelson Padua-Perez Bill Pugh Department of Computer Science University of Maryland, College Park.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Graphical User Interface (GUI) Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
12/11/01 Matt Bridges Advisor: Ralph Morelli. What is Web Analytics? In traditional commerce, store owners can observe their customers habits: What time.
Analyzing Web Logs Sarah Waterson 18 April 2002 SIMS 213 Group for User Interface Research.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
© Prentice Hall CHAPTER 3 Computer Software.
1 Technology Readiness Maryland /2015 Admin Schedule 2 AssessmentOnline/CBT Testing Dates PARCC - PBAMarch 2 – May 8 MSA ScienceApril 13.
Data Mining & Data Warehousing PresentedBy: Group 4 Kirk Bishop Joe Draskovich Amber Hottenroth Brandon Lee Stephen Pesavento.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Web Based Applications
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
EUBA: The Emory User Behavior Analysis System Eugene Agichtein, Qi Guo and Ryan Kelly Intelligent Information Access Lab
Dr Lisa Wise 18/10/2002 Website Metrics Dr Lisa Wise.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
Creating Web Applications Using ASP.NET Chapter Microsoft Visual Basic.NET: Reloaded 1.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
Chapter 3: Computer Software. Stored Program Concept v The concept of preparing a precise list of exactly what the computer is to do (this list is called.
Sustainability: Web Site Statistics Marieke Napier UKOLN University of Bath Bath, BA2 7AY UKOLN is supported by: URL
Evaluating Web Software Reliability Based on Workload and Failure Data Extracted From Server Logs CSI518 – Group 1 By Zumrut Akcam, Kim Gero, Allen Chestoski,
Log files presented to : Sir Adnan presented by: SHAH RUKH.
Chapter 12: Web Usage Mining - An introduction Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher, M.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Secondary Evidence for User Satisfaction With Community Information Systems Gregory B. Newby University of North Carolina at Chapel Hill ASIS Midyear Meeting.
Microsoft Access 2003 Tutorial By: Juan Y7. What is Microsoft Office Access? Microsoft Access, also known as Microsoft Office Access, is a database management.
COMP 143 Web Development with Adobe Dreamweaver CC.
Zaap Visualization of web traffic from http server logs.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Evaluating Web Software Reliability Based on Workload and Failure Data Extracted From Server Logs CSI518 – Group 1.
Evaluating Web Software Reliability Based on Workload and Failure Data Extracted From Server Logs CSI518 – Group 1 By Zumrut Akcam, Kim Gero, Allen Chestoski,
CS 501: Software Engineering Fall 1999 Lecture 23 Design for Usability I.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Web Application for Home Energy Assistance Program
Managing, Storing, and Executing DTS Packages
Essential tools for implementing and testing websites
The Client-Server Model
Web Development Web Servers.
System Design Ashima Wadhwa.
Latest Updates on BlackHawk Mines Music : Privacy Policy
The Client/Server Database Environment
Created by Kamila zhakupova
Computer Concept What is a computer?
PHP / MySQL Introduction
Database Driven Websites
Extract and Correlate Evidences in Computer Forensics
The Application Lifecycle
Chapter 11-Business and Technology
Web Systems Development (CSC-215)
Model-View-Controller Patterns and Frameworks
Lecture 1: Multi-tier Architecture Overview
Near Real Time ETLs with Azure Serverless Architecture
Tiers vs. Layers.
DATABASES WHAT IS A DATABASE?
DATABASE DESIGN & DEVELOPMENT
Internet Basics and Information Literacy
Lecture 34: Testing II April 24, 2017 Selenium testing script 7/7/2019
Web Application Development Using PHP
Presentation transcript:

Chapter 12: Automated data collection methods

Data collection Use the Computer! Existing software Activity-logging tools Custom or instrumented tools

Tradeoff Power vs. ease of use

Web logs Which pages were requested When IP address of request Status Size (# of bytes) Referrer – where they came from User-Agent.. and more

Examples 10.55.10.14 - - [13/Jul/2007:13:42:10 -0400] "GET /homepage/classes/spring07/686/index.html HTTP/1.1" 200 8623 10.55.10.14 - - [13/Jul/2007:13:48:32 -0400] "GET /homepage/classes/spring07/686/schedule.html HTTP/1.1" 200 16095 10.55.10.14 - - [13/Jul/2007:13:48:33 -0400] "GET /homepage/classes/spring07/686/readings.html HTTP/1.1" 200 14652

Web usability & design Use Web logs to understand how your site is being used Counts of which pages are accessed Referrers tell which links (internal or external) are being followed Infer paths through the site May need to use web cookies Use insights to drive design

Web logs and empirical studies Time stamps track time between events Experimental tasks as links on web pages Web server runs locally machine used to administer tests Avoid network delays Turn off caching in browser Each page generates a new request

Capturing event timing Select starting link -> beginning of task Select final target -> end of task Task time is elapsed time between two events Extracting times Read server logs manually Use custom programs

Stored application data Measure keystrokes, mouse clicks, mouse movements Understand interaction patterns What do users do? How do they organize data? With whom do they communicate, and when?

Stored data examples File systems GUI Desktops Email Web bookmarks Social networking tools

Stored data – pros and cons “Ecologically valid” real computer use No need to define tasks Cons Extraction may be challenging Potential privacy concerns Interpretation might be difficult or time-consuming..

Observation/Recording software Software tools specifically used to collect data Proxies: intercept and record user actions before passing them on to end programs. Store info in log files Can be more fine-grained than web logs or stored application data

Proxies Direct user-application communication Proxy handles and logs requests Proxy handles, modifies, and logs requests

Web proxies Widely used for efficiency/security Handle requests from groups of users Add additional code for understanding interactions Javascript for mouse movements Squid – open source web proxy tool Need appropriate capacity (bandwidth & servers)

Keystroke and activity loggers Local proxies Record. Mouse movements Keyboard input Window operations Can invade privacy Very fine-grain

Instrumented software Modifiy software to collect data on its own usage Log each user action Advantage – can track specific menus, items, etc. Modify existing code Open source Macro packages? Office (Windows redesign)

Custom software Home-grown tools Present tasks and collect relevant data Task completion time Errors, etc.

Custom-built software: Fitts' Law and Children (Hourcade, et al. 2004)

Storing data Log files Databases Expect to do some data cleaning May require custom parsing Relatively easy to use Databases Up-front design and population challenges Flexible querying via SQL Expect to do some data cleaning

Analysis Frequency of Patterns? Visualization? Accessing various resources Menu/tab selections Patterns? Clicking “save” before “print” Infer “sessions” Data mining Visualization?

Hybrids Multiple forms of automated collection Proxies and instrumented software Automated capture + other approaches Observation Qualitative

Automated interface evaluation Automated inspection tools Assess compliance with guidelines Frequently used for web accessibility Combine multiple methods? Modeling and simulation?

Challenges Time scales – from milliseconds to years Individual actions to long-term projects Amount of data – granularity Related to specificity of questions How to infer higher-level task from low-level interaction? Don't collect data just “because you can”..