©2010 John Wiley and Sons www.wileyeurope.com/college/lazar Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.

Slides:



Advertisements
Similar presentations
Inktomi Confidential and Proprietary The Inktomi Climate Lab: An Integrated Environment for Analyzing and Simulating Customer Network Traffic Stephane.
Advertisements

Testing Web Applications. Applications Architecture Client Server Architecture.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Interception of User’s Interests on the Web Michal Barla Supervisor: prof. Mária Bieliková.
Lesson 17: Configuring Security Policies
  Copyright 2003 by SPAN Technologies. Performance Assessments of Internet Systems By Kishore G. Kamath SPAN Technologies Testing solutions for the enterprise.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter 12: Web Usage Mining - An introduction
1 Chapter 12 Working With Access 2000 on the Internet.
CS CS 5150 Software Engineering Lecture 12 Usability 2.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Graphical User Interface (GUI) Nelson Padua-Perez Bill Pugh Department of Computer Science University of Maryland, College Park.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Graphical User Interface (GUI) Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
1 Computing for Todays Lecture 22 Yumei Huo Fall 2006.
12/11/01 Matt Bridges Advisor: Ralph Morelli. What is Web Analytics? In traditional commerce, store owners can observe their customers habits: What time.
Analyzing Web Logs Sarah Waterson 18 April 2002 SIMS 213 Group for User Interface Research.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
© Prentice Hall CHAPTER 3 Computer Software.
Session Management A290/A590, Fall /25/2014.
1 Technology Readiness Maryland /2015 Admin Schedule 2 AssessmentOnline/CBT Testing Dates PARCC - PBAMarch 2 – May 8 MSA ScienceApril 13.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Introduction to Web Applications Instructor: Enoch E. Damson.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Dr Lisa Wise 18/10/2002 Website Metrics Dr Lisa Wise.
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Information Systems Chapter 5 Building the database Part 1. Unsing Access.
JavaScript, Fourth Edition
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
Creating Web Applications Using ASP.NET Chapter Microsoft Visual Basic.NET: Reloaded 1.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
Chapter 3: Computer Software. Stored Program Concept v The concept of preparing a precise list of exactly what the computer is to do (this list is called.
Sustainability: Web Site Statistics Marieke Napier UKOLN University of Bath Bath, BA2 7AY UKOLN is supported by: URL
Evaluating Web Software Reliability Based on Workload and Failure Data Extracted From Server Logs CSI518 – Group 1 By Zumrut Akcam, Kim Gero, Allen Chestoski,
Cohesion and Coupling CS 4311
Log files presented to : Sir Adnan presented by: SHAH RUKH.
Chapter 12: Web Usage Mining - An introduction Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher, M.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Microsoft Management Seminar Series SMS 2003 Change Management.
The Problem of State. We will look at… Sometimes web development is just plain weird! Internet / World Wide Web Aspects of their operation The role of.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Web Measurement. The Web is Different from other Commuication Media More precise measurement of activity on Web sites is available More precise measurement.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Microsoft Access 2003 Tutorial By: Juan Y7. What is Microsoft Office Access? Microsoft Access, also known as Microsoft Office Access, is a database management.
Wednesday NI Vision Sessions
XP Creating Web Pages with Microsoft Office
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
CS 501: Software Engineering Fall 1999 Lecture 23 Design for Usability I.
Automated ad placement
Latest Updates on BlackHawk Mines Music : Privacy Policy
Chapter 12: Automated data collection methods
Presentation transcript:

©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection Methods

©2010 John Wiley and Sons Chapter 12 Data Collection Use the Computer! Existing software Activity-logging tools Custom or instrumented tools

©2010 John Wiley and Sons Chapter 12 Tradeoff Power vs. ease of use

©2010 John Wiley and Sons Chapter 12 Web logs Log files indicate Which pages were requested When IP address of request Status Size (# of bytes) Referer – where they came from User-Agent.. and more

©2010 John Wiley and Sons Chapter 12 Examples [13/Jul/2007:13:42: ] "GET /homepage/classes/spring07/686/index.html HTTP/1.1" [13/Jul/2007:13:48: ] "GET /homepage/classes/spring07/686/schedule.html HTTP/1.1" [13/Jul/2007:13:48: ] "GET /homepage/classes/spring07/686/readings.html HTTP/1.1"

©2010 John Wiley and Sons Chapter 12 Web Usability & Design Use Web logs to understand how your site is being used Counts of which pages are accessed Referers tell which links (internal or external) are being followed Infer paths through the site – May need to use web cookies Use insights to drive design

©2010 John Wiley and Sons Chapter 12 Web Logs & Empirical Studies Time stamps in logs can be used to track time between events Present experimental tasks as links on web pages Run server locally on machine used to administer tests – Avoid network delays Turn of caching in browser – So each page generates a new request

©2010 John Wiley and Sons Chapter 12 Capturing event timing Selection of some starting link indicates beginning of task Selection of final target is end of task Elapsed time between those two events is the task time. Read server logs manually or use custom programs to extract timing information.

©2010 John Wiley and Sons Chapter 12 Stored Application Data Ongoing computer use creates metadata Useful for understanding and analyzing interaction patterns What do users do? How do they organize data? With whom do they communicate, and when?

©2010 John Wiley and Sons Chapter 12 Stored Data Examples File systems GUI Desktops Web bookmarks Social networking tools

©2010 John Wiley and Sons Chapter 12 Stored Data – Pros and Cons Pros – “Ecologically valid” information about real computer use – No need to define tasks Cons – Data extraction may be challenging – Potential privacy concerns – Not fine-grained

©2010 John Wiley and Sons Chapter 12 Observation/Recording Software Software tools specifically used to collect data Proxies: programs that intercept and record user actions before passing them on to end programs. Store info in log file Can be more fine-grained than “built-in” data collection and web logs.

©2010 John Wiley and Sons Chapter 12 Proxies

©2010 John Wiley and Sons Chapter 12 Web Proxies Widely used for efficiency Also for research Handle requests from groups of users Add additional code for understanding interactions – Javascript for mouse movements Squid – open source web proxy tool – Need appropriate capacity (bandwidth & servers)

©2010 John Wiley and Sons Chapter 12 Instrumented Software Modifiy software to collect data on its own usage Log each mouse movement and menu selection Modify existing code – Open source? Ingimp (Terry, et al.) – Macro packages? – Office (Windows 2007 redesign)

©2010 John Wiley and Sons Chapter 12 Custom-built software Write your own software to present tasks and collect relevant data – Task completion time – errors,etc

©2010 John Wiley and Sons Chapter 12 Custom-built software: Fitts' Law and Children Hourcade, et al. 2004

©2010 John Wiley and Sons Chapter 12 Keystroke & Activity Loggers Local proxies Run in the background, recording – Mouse movements – Keyboard input – Window operations Spyware? Or legitimate user by employers? Can invade privacy Very fine-grain

©2010 John Wiley and Sons Chapter 12 Storing &Analyzing Data Log files – May require custom parsing – Relatively easy to use Databases – Up-front design and population challenges – Flexible querying via SQL Either way, expect to do some data cleaning

©2010 John Wiley and Sons Chapter 12 Analysis Goals Frequency of access of various resources Frequency of actions? Patterns? – Clicking “save” before “print” – Infer “sessions” – Data mining Visualization?

©2010 John Wiley and Sons Chapter 12 Hybrid Multiple forms of automated collection – Proxies and instrumented software Automated capture + other approaches – Observation – Qualitative

©2010 John Wiley and Sons Chapter 12 Automated Interface Evaluation Automated inspection tools – Assess compliance with guidelines – Frequently used for web accessibility – Combine multiple methods? Modeling and simulation?

©2010 John Wiley and Sons Chapter 12 Challenges Time scales – from milliseconds to years – Individual actions to long-term projects Amount of data – granularity – Related to specificity of questions – How to infer higher-level task from low- level interaction? Don't collect data just “because you can”..

©2010 John Wiley and Sons Chapter 12 End-of-chapter Summary Discussion questions Research design exercise