EP1222544A2 - Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web - Google Patents

Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web

Info

Publication number
EP1222544A2
EP1222544A2 EP00974394A EP00974394A EP1222544A2 EP 1222544 A2 EP1222544 A2 EP 1222544A2 EP 00974394 A EP00974394 A EP 00974394A EP 00974394 A EP00974394 A EP 00974394A EP 1222544 A2 EP1222544 A2 EP 1222544A2
Authority
EP
European Patent Office
Prior art keywords
user behavior
web presence
optimize
computer networks
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00974394A
Other languages
German (de)
English (en)
Other versions
EP1222544A3 (fr
Inventor
Joachim Schlafke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1222544A2 publication Critical patent/EP1222544A2/fr
Publication of EP1222544A3 publication Critical patent/EP1222544A3/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Definitions

  • the invention relates to a method for analyzing user behavior in computer networks to optimize the web presence, which can be used in particular to obtain qualified and future-oriented data about user behavior on the Internet and intranet in order to be able to influence one's own Internet Presence as a means of production and sales planning.
  • the log file is a format for the temporal documentation of the web server. It is not for the analysis of user behavior directly conceived. For this reason, the result of the log file is not wrong, but is rather interpreted incorrectly.
  • the invention is therefore based on the object of developing a method with which the deficiencies of the known methods are avoided, which in particular provides data corrected for errors, a separate representation of data which have an error tolerance, including the representation of the Tolerance range, a distinction between new and old customers as well as clustering in customer segments allows, - supplies future-oriented data and planning data, which can be determined by analysis intervals of your choice, and also provides the user with an advanced technical performance such as Language, screen resolution, color depth, etc. and through the historical documentation of the website gives the user a control instrument for the communication process, which enables him to quickly analyze the user behavior on the Internet and to use it to successfully carry out planning measures.
  • a particular advantage of the invention is that the method analyzes the user behavior in computer networks and, based on this, optimizes one's own web presence by optimizing the source code of the domain after implementation of the method, recording and logging user activities from at least one server computer, the recorded activities are corrected from interpretation errors, the data available after the cleansing are analyzed and compared with data from an experience database and the results of the comparison are used for optimization by actively influencing the server computer by means of a feedback and thereby by closing one Control loop is realized.
  • a method for optimizing the web presence in computer networks is provided, by means of which the user behavior is recorded and analyzed, faulty influencing factors are eliminated and the web presence is optimized with the aim of increasing the economic effectiveness of the web presence in such a way that a rule value for the realization of a closed control loop is formed from the recorded, cleaned user activities and statements from an experience database, which influences the design of the web presence.
  • the method according to the invention allows an operator of a server for Internet domains (home pages) to automatically analyze all visits, activities and environmental parameters of the visitors (users) of these domains, to compare and evaluate this information with other data stored in databases and thereby automatically optimizing the internet presence of its domains.
  • HIT problem In the early days of controlling, the lines in the log file were simply counted. Every request from a visitor triggers a hit. However, a hit count is unsuitable at the present time.
  • a screen page that has been created in HTML format can contain multimedia elements such as images, sound files or video in addition to the text body. If this page is requested, the associated multimedia elements are loaded in parallel, which are also logged in the log file and trigger a hit.
  • a page with many multimedia elements generates a higher number of hits and therefore more hits than a page that is designed purely on a text basis.
  • only a subordinate status is assigned to the heat count, since this value only allows a clue about the traffic. In the process, the hits of a domain are therefore still counted. However, no great importance is attached to them. In contrast to the counts based on the usual analysis methods, the hits will be more precise. The more precise statements are made by temporarily switching off the proxy cache server and then calculating the unregistered accesses.
  • PageView The procedure allows the exact determination of PageViews.
  • the "PageView” unit is of course not presentative for an overall analysis, but today provides the basis for calculating the 1000 contact price for advertising space on the Internet. This unit gives the advertiser the impression that his advertising message was displayed more often than was actually the case.
  • the "PageView” unit is of course also counted by the process.
  • a CGI image of just a few BIT forces access to the domain server. The actual pages can be loaded from the cache server. This method maintains good performance, but it triggers a hit on the domain server. A subsequent calculation determines the necessary number of PageViews for this CGI pulse.
  • the quotient differs between the number of accesses (hit) and the screen pages viewed (content view). For this reason, the measurement of success using this method is inadequate.
  • the remaining HTML documents are stored in a table according to their purpose and provided with attributes, such as content-leading, navigation or advertising-leading
  • This assignment table makes it possible to correctly assign and count all HTML requirements from the log file, in combination with the CGI image method described above, which ensures the exact number of accesses to the individual HTML documents This means that for the first time it is possible to determine ContentViews 100%.
  • the dynamically generated pages are another challenge.
  • the page is generated on the server side from databases according to the preselection of the user and sent back to the user. For this reason, no HTML page is entered in the log file.
  • the pages generated in this way are particularly interesting for product and financial planning, since they usually contain a detailed statement about the wishes and interests of the visitor or customer through the pre-selection of the visitor.
  • the method enables another self-generated file to be created in parallel, where the request parameters are logged from the HTML document.
  • the request parameters are logged from the HTML document.
  • the HTML document frame it is possible, in addition to the HTML document frame, to also log the information content and to relate it.
  • the Contentview unit which also corresponds to the facts, is correctly recorded and displayed quantitatively, ie numerically and qualitatively, ie content-related, about the information content of dynamically generated HTML documents.
  • Proxy - cache server - problem
  • Proxy cache servers serve to make better use of the existing bandwidth of the Internet. This is achieved through the use of cache servers by temporarily storing these Internet pages. If a user connected to the proxy server requests a website, the server checks whether the page is already available locally. Only if the page is not available, is the server of the page provider accessed and an entry made in the log file. In most cases, however, this entry contains the IP address of the proxy cache server and not that of the user who requested the page. In the other case, the user receives the page from the cache server, which means that no entry is made in the log file of the page provider. For precise evaluation, it is necessary that a page that the user requests is recorded on the server side and is not sent to the user by the proxy cache without being noticed and unregistered.
  • the overall performance improved by the proxy cache server method also has some disadvantages. Frequently updated content pages must not be in one Cache exist, otherwise it cannot be ensured that the data contained therein is actually up to date. Normally the command "NOCACHE”, ie "caching not allowed” is entered in the programming. However, there are providers who deliberately suppress this command, otherwise the service limit of the provider would be exceeded. The insertion of the "NOCACHE" command does not guarantee 100% that the information is retrieved directly from the domain server and thus logged in the log file.
  • the method counters this problem by introducing forced access to the domain server for content or advertising pages.
  • a command set generated by CGI of only 50 kb forces the transfer of a 1-pixel image from the domain server each time a page is accessed by the browser, even if this page already exists in the local cache of the user or that of the proxy server. If desired, the page itself is still subject to the advantages of the cache mechanism.
  • the network load is only increased by that 50 kb per counted page access. This value is irrelevant in today's network bandwidth and does not have a negative impact on the overall performance of the site.
  • a comparable effect is triggered by the local cache memory that is present on the user's computer. All pages that have already been transferred once are saved in the cache directory on the user's computer. This leads to an accelerated construction of the page and is supported by all common browsers today. This process also leads to a reduced counting of visits to the website provider's server.
  • a command set of only 50 kb generated by CGI forces the transfer of a 1-pixel image from the domain server each time a page is accessed by the browser, even if this page already exists in the local cache of the users.
  • the method also solves the local cache problem.
  • Type 1 When dialing into the Internet, the user receives a dynamic IP address which he keeps for the entire online session.
  • Type 2 The user receives a new IP address each time a screen element (picture, text, etc.) is requested. In the event of heavy data traffic at the service provider, this IP is released again if the element has been answered successfully.
  • the advantages of the method are based on the knowledge of differentiating between safe and unsafe data, filtering it and presenting this data in a bandwidth. This procedure can even solve this problem up to 98% of the time. The results of the procedure are therefore so precise that planning data conforming to standards can be calculated. A deviation of 2% from the real value does not play a decisive role for the strategic development.
  • the solution is based on two fundamentally different user behavior patterns.
  • Case 1 The user identifies himself (optionally also under a nickname)
  • Case 2 The user definitely wants to remain undetected
  • case 1 In this case, the user has activated the cookies in his browser. In this case, a variable is entered in the cookie. If the visitor now visits the homepage, he can be identified during the session by means of his cookie entry. If he now visits the domain again at a later time, this visitor is assigned a new visit, even if he appears under a new IP address. With this method (under the premise that 100% of the users have activated cookies) a clear statement, which could look like this, can be made.
  • firewall computers are used for security in the company.
  • a "bottleneck" is created through which all information must flow inwards and outwards. This bottleneck is much easier to monitor than many open interfaces to the outside.
  • This firewall sets all the IP used in the company to a single external IP In the event that this company does not use a proxy cache server, only this firewall IP will appear in the log file, which means that different users in the company will appear under the same IP address and make a differentiation without additional information Procedure impossible.
  • Search engines visit the website at regular intervals to look for new features and updates. These visits are done fully automatically by so-called search robots. Search robots are the small software spies that search the net and write all innovations in the database system of the search engine operator. Of course, these visits also trigger access to the server log, which could incorrectly be considered a visit. These visits are definitely the easiest to filter out, but should not go unnoticed. The aim must be to filter the visits of search engines on a domain from the logile so that they do not falsify the evaluation data. Furthermore, these visits are to be shown in a separate evaluation in order to obtain information about the search engines used and the associated search words.
  • the goal must be that when a content page is called up directly, the entire frame structure is built up and the user is looped through to this page.
  • the measure described above is of great importance for the overall process. Firstly, quality assurance is satisfied and secondly, the data of the meta tag and thus the information for the search engine are available in a suitable form in a database. It is now possible for the first time to carry out a target / actual comparison between the most searched keywords, the search engine brands and the information actually available on a website. The results of this comparative study enable the targeted optimization of the meta tags for customer-oriented search results and thus for the success of a domain.
  • the aim is that the site provider receives only the data that is valid and meaningful for planning and assessment purposes.
  • the data which are based solely on presumption, are to be eliminated in the analysis so that they cannot falsify the evaluation.
  • Uncertain data or empirically determined data are to be checked for their accuracy and probability and to be presented in the resulting tolerance ranges.
  • the user can choose between three variants of the display.
  • Forma t problem em ti k More than 30 different log file formats are currently in use. Depending on the operating system, server architecture and provider, there are not only 30 different basic formats, but also a wide variety of combinations. Another problem is the management of this data. Many providers delete historical data or compress it and store it in appropriate subdirectories. In this case, of course, the knowledge of the internet administrator about handling the log files is of great importance. There can no longer be any question of independent management decision-making. This large number of basic formats of the log file, different combinations and inconsistent management of the historical data on the provider side have so far made it impossible to measure the performance of Internet activities in a uniform, complete and comparable manner.
  • the process completely supports the different formats.
  • a log file is downloaded and analyzed, among other things.
  • the information content is determined from this analysis and compared with the controller's requirement profile.
  • Special additional information such as screen resolutions, "Cookies active / not active" and the determination of new / old customers and the elimination of proxy cache Problems are saved in an extension of the log file.
  • the elimination of the different handling of log files on the provider side is solved by the automatic downloading of the log file.
  • the adjusted results are then saved locally in a specially created database system on the computer of the controller. All other displays are generated from this data management system. With this method it is possible to select different time intervals for the analysis or to compare different time intervals.
  • the database can be logically linked to other databases (target / actual comparison); Individual additional information (e.g. updates) can be saved; - Independent from the handling of the provider is guaranteed;
  • Interfaces to other applications e.g. merchandise management systems
  • arbitrary determination of the analysis periods is permitted
  • the presentation must therefore be prepared in such a way that a group of people without excellent knowledge of the Internet can understand the results.
  • the basis is the clear structuring of the content, which is independent of the technical structuring.
  • the form of representation "text" as a carrier of information should not be underestimated and should work in addition to the graphic representation.
  • the procedure therefore provides freely configurable measurement periods and an individual reduction of the data to the information needs of the interested party.
  • a prerequisite for an easily understandable presentation is the exact representation of the presentation structure of a website. This means that the structure must correspond to what is shown to the user on the monitor. This In most cases, the structure corresponds to the technical structure on the server. For this reason, it is imperative to create a "translation" between the technical and the representation structure. This "translation" also brings the names of the files into a language that laypersons can understand.
  • the download of the complete internet structure is available as an offline version at the beginning of the process. The process now filters out all images, since these are irrelevant to user behavior. All HTML pages that form the framework for the content, ie call a frameset, are also irrelevant.
  • the controller assigns the files to the navigation, content and advertising space items by displaying them one after the other. After this procedure, the content-bearing pages are fixed and are structured in chapters and sub-chapters. This information is also stored in the database system and serves as the basis for the evaluation and presentation of the analysis. A further query systematics analyzes the individual information needs of the controller. This data is also stored in the database system. With this method, a strong degree of visualization is achieved, which serves the required requirements and captures the essentials.
  • the procedure includes the classic log file analysis to document the chronological processes on the server side, such as the documentation of the hits and the errors of the individual HTML pages in a time context Representation of various page access statistics in the form of bar and pie charts and the determination of the browser type used by the visitor.
  • the classic analysis is expanded by a web analysis system for meaningful documentation of the actual user behavior on the Internet.
  • This web analysis system includes the program optimization of the Internet presence, the presentation of corrected information about user behavior, such as.
  • Another part of the process is the tool for optimizing existing websites, which automatically creates a Code optimization and frame correction as well as keyword and meta tag optimization. There is also a tool for updating the search engine entries and the entry itself. Another component is made available in a training tool. This enables web-based training, analysis for learning success measurement and evaluation of the efficiency of the training program.
  • a training program for effective web controlling taking legal aspects and technical requirements into account conveys the basics and standard methods and offers a strategically structured controlling system to optimize the interactive communication chain.
  • the process is supplemented by an extension to include the typical functionalities of e-commerce (PAP programming, CGI programming)
  • the process as a whole thus represents a control loop that can be described as follows using the example of an Internet presence with a homepage.
  • the user activities are then recorded and analyzed, which are corrected for errors in recording and interpretation.
  • the subsequent comparison with information provided by an experience database is then used to optimize and adapt the website with the aim of achieving the specifications of the target control functions.
  • PageViews Display of all HTML pages - the loading of images is not counted. This value is used today as a parameter for calculating advertising medium output;
  • Errors Errors when pages are requested that are not available on the server or cannot be found
  • Operating system numerical recording of which operating system the user works with
  • Search engines Statistical survey with which search engine the domain was found; Keywords: Statistical survey with which keywords the domain was found;
  • Origin of the user recording the country from which the visitor of the domain comes; User paths: recording the click sequence within the
  • the method can generate further information that is of interest to the controller.
  • the R.T.F.I. Procedure using the following additional functions:
  • Contentviews Number of page contacts that can be described as content-leading, i.e. actually have relevant content, and are not used for navigation. Another secondary side effect is the analysis of banner advertising and the resulting billing of advertising costs. These are currently being determined from the incorrectly recorded PageViews; Pages statistics: How is the visitor frequency distributed on the individual pages to the entire content? What does the page look like and how long was it visited on average? Downloads: Which and how often were certain files downloaded?
  • Cookies Has the user actually activated the cookies or does he only have a cookie-enabled browser?
  • Subdomain How many users come to the main domain via a possibly subordinate domain? This option is often used to evaluate the success of an action.
  • New / old customer Has the visitor been to the domain before, how often does he come back at what time intervals? What profile does he have and what are his information needs?
  • Actions The evaluation of actions is an essential factor of the procedure. With this evaluation, All actions that are supposed to trigger an improvement process are logged and then checked for success.
  • Mail listings logging of all incoming mails
  • Alarm system The intervention limits are defined in this module. It is to be avoided here that pages refer and do not receive the necessary attention in the evaluation process.
  • Target control This module is used for target control. Here, the desired targets are compared with the achieved goals and adjusted for the normally expected rate of increase. The result is an over- or under-coverage of the targets.
  • e-commerce This comparative tool measures the relationship between viewing information and actual orders. This ratio is a decisive planning factor for further optimization measures in the communication mix.
  • Picanalysis Picanalysis shows all processes that are outside of a trend. By examining unusual rashes, conclusions can be drawn about advertising measures outside the web.
  • Comparison of any time period When comparing any time period, all overview data are displayed in the corresponding time intervals. The resulting results show the success of various measures. The results have been cleared of the updates and possible misinterpretations associated with them. Rate of increase compensation: Every internet domain experiences a natural rate of increase. This is often due to the increasing number of old customers who visit the domain again and again or the increasing number of Internet users. This natural rate of increase, which does not necessarily reflect the increase in success, is determined and compensated for in the process. This is how the exact success is determined, which is cleared of possible misinterpretations. Analysis of the users 'information needs: The comparative analysis makes it possible to determine changes in the users' information needs.
  • Search engines Submitting to search engines is very important. This is often the only way to get information. It is not enough to place advertisements with www. Address or mention it on the business card. An entry in the front places is of immense importance. To do this, the success of the search engines and the search words must be analyzed and the changes saved. Links: How many new visitors to your site result from a link? Is the advertising medium suitable for placing advertising messages? This and other questions are answered with this module.
  • Old / new customer The changes in the new / old customer relationship are very interesting. Is it possible to permanently bind customers to the domain through a special service? A balanced relationship between new / old customers is very important ness. It shows how much trust you can build in your customer over the Internet. Dwell times: How do dwell times change, particularly in the legacy customer segment? The answer to this question expresses relaxation and confidence in the information content. Changes in the user paths are also important for customer-oriented design of the domain. Rise rates in e-commerce: The changes between obtaining information and actually ordering services, information or products are important key figures for sales planning. The resulting results can be used directly in the corresponding planning tools.
  • Comparative picanal analysis deviations in normal access behavior, e.g. triggered by ads or other actions can be followed closely here.
  • An example is a series of advertisements that appear unchanged in the same newspaper every 14 days. After a certain period of time, the rashes on the Internet decrease. This can be seen as a clear sign of the "wear" of the advertisement. The consequence: Have the ad action paused or design a new ad.
  • the webmaster also needs a reference point in order to determine his own position. For example, the question arises: "Is the ratio of 36: 1 of obtaining information to an actual order to be evaluated positively or negatively?
  • This calibration is carried out by an external experience database.
  • the know-how of many domains is shown in compressed form in the external experience database
  • Data has been cleaned up from identifying features of the companies. This data is made available to the users of the method online.
  • Information about trends on the Internet, experiences in the field of e-commerce, typical user profiles and information about user behavior are stored. From these experiences result in various optimization options for the existing Internet domain.
  • Various tools are available for optimizing the domain, which can be divided into three general categories:
  • Category 1 contains static modules. These modules optimize the code of the domain in two ways. On the one hand, the modules are integrated for exact analysis. On the other hand, possible errors are compensated for and corrected. A "translator” is integrated, who transfers the technical information into a descriptive form of presentation that corresponds to the content. In this section, the parameters and targets are set, questions are asked about the limits of intervention and the process is thus initialized.
  • the static modules in Category 1 are: - Code optimization
  • Category 2 contains dynamic modules that provide information during the operation of the Internet domain. These modules include the implemented statistical modules and a so-called error messenger. If an error occurs on the server, the latter sends an email to the webmaster stating which error has occurred with the user. In return, the user receives the message that this error will be eliminated as soon as possible. This measure is a decisive step towards customer orientation.
  • Category 3 contains dynamic administrative modules.
  • the search word optimizer analyzes from the content ten words that have a high frequency and compiles a list of suggestions from them. This list of suggestions is accepted or improved by the webmaster. These words are then programmed into the Meta Optimization module. The result is a meta tag that meets all search engine requirements and guarantees the greatest possible success.
  • the changes are saved in the search engine entry module. This module automatically contacts the selected search engines and prompts the search robots to visit the updated domain. This measure makes it possible for the first time to partially automate this task. This makes it possible to significantly improve the ranking and to permanently maintain one of the top positions. Additional modules generate suggestion lists for all actions that have to be carried out offline. These include, for example, a suggestion system for advertising.
  • the internal control loop is now closed: measurement, comparison, trend calculation, optimization, transfer and renewed success measurement. This process enables a continuous improvement process to be initiated step by step, which is required by DIN ISO 9000.
  • the central data pool a backup of the domain is created against any changes.
  • the now modified structure is created there.
  • the parameters and the historical changes are saved. This makes it possible to integrate further developments in the comparative analysis. Misinterpretations are almost impossible.
  • a second log file is established in parallel to the classic log file. This log file is saved next to the external log file. All data are now to be kept independently of the provider; Automatic downloading of log files enables the seamless recording of user data.
  • All analysis evaluations are saved and displayed in an understandable form in the analysis area in a way that is webmaster-friendly. This information can also be integrated into existing planning tools via the universal interface. Of course, this data can also be used in individual expansion modules.
  • the open platform that represents the process allows further tools to be created. These modules are manufactured individually according to customer requirements. These possible products include mail controlling, communication mix controlling or administration controlling.
  • the rapid progress in modern communication technologies such as ADSL, HDSL and power line communication enable unimagined multimedia capabilities on the Internet.
  • the content is geared more towards target group-specific aspects. Interactivity promotes dialogue with the individual customer segments. Service and service features can thus be better emphasized.
  • the Internet enables a cost-effective, continuous communication chain to the customer and forms a broad information base without immediate buying pressure.
  • the calculation of the success or return on investment (ROI) of a website is crucial for the strategic and content-related further development of content, customer approach and customer proximity.
  • the aim of the process - in the sense of a high-quality reporting system - is to increase the interactivity with the customer.
  • Simple website statistics can be generated through standard analyzes. However, these generally remain unspecific, since they do not allow any identification of the user and the user paths and no analysis of the depth of the query, the pauses, the length of stay, etc. However, attractive content and communication tools can only be realized through a personalized analysis of user needs. Therefore, the target group analysis, i.e. the subdivision according to typical behavioral characteristics, is of immense importance.
  • the private provider provides personal information on a virtual web space. Like the private provider, the local provider often does not have its own server. His profile of requirements thus largely corresponds to that of the private provider. Both will only need a few of the modules described to meet their requirements.
  • the regional provider provides a much more extensive range of information, since it usually has several branches in one region. It can be assumed that this customer has more sophisticated technical options to obtain verified data about user behavior. He is therefore a potential user of the method in full.
  • the national / multinational companies mostly have their own server and are therefore able to use the entire Internet spectrum. They are potential customers of the entire process, including the training tools. Depending on the size of the company, it is also advisable to individually program interfaces to other commercially available ERP programs and planning tools.
  • the service concept begins with the as-is analysis of the customer's website. Here, a strengths / weaknesses analysis is carried out, which shows customer improvement potential.
  • An optimal service concept includes the following components:
  • the current state of the domain is determined by an actual analysis and all usable information is taken from the log file. A potential is then determined in a workshop in cooperation with the Customers. Furthermore, the target status as well as the short and long-term goals are defined.
  • the implementation of the individual modules of the process, meta-optimization and structural optimization enables the first error-corrected analysis of user behavior. Based on historical data, trend calculations are carried out, which serve as the basis for further planning. Then the data is prepared in a customer-friendly manner and the resulting optimization suggestions. These results are compared and evaluated with the data from the external database and with the data from the data pool created by the method. After presenting this information, the short and long-term goals and the resulting measures are compared again in cooperation with the customer. In accordance with these goals, the content and structure optimization as well as the development of the corporate identity and the optimization of the workflow now take place. This closes the control loop, which is repeated at any intervals of 1 - 3 months.
  • the procedure includes the following special services:
  • Optimization of the communication mix through targeted advertising effectiveness analyzes - establishment of sponsor concepts through exact analysis of visitor numbers and target groups online advertising incl. Success measurement and cost / benefit analysis Support of "star alliances" through interface programming to ERP systems and establishment of logistics concepts. Optimization of the workflow from ordering to delivery and invoicing in the respective partner company

Abstract

L'invention concerne un procédé d'analyse du comportement utilisateur dans des réseaux informatiques pour l'optimisation de la présence Web, pouvant notamment être utilisé afin de récupérer des données qualifiées et orientées vers le futur concernant le comportement utilisateur dans l'Internet et l'Intranet, et de s'en inspirer pour la propre présence Internet en tant que moyen de planification de la production et du chiffre d'affaires. Ce procédé met en oeuvre un circuit de régulation comportant une analyse réelle, la définition de fonctions cibles, le contrôle continu du comportement utilisateur, la comparaison réel/consigne, un calcul de la tendance, et l'optimisation du contenu et structurelle de la présence Web.
EP00974394A 1999-10-15 2000-10-13 Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web Withdrawn EP1222544A3 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19951209 1999-10-14
DE19951209 1999-10-15
PCT/EP2000/010136 WO2001027760A2 (fr) 1999-10-15 2000-10-13 Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web

Publications (2)

Publication Number Publication Date
EP1222544A2 true EP1222544A2 (fr) 2002-07-17
EP1222544A3 EP1222544A3 (fr) 2002-09-04

Family

ID=7926715

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00974394A Withdrawn EP1222544A3 (fr) 1999-10-15 2000-10-13 Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web

Country Status (3)

Country Link
EP (1) EP1222544A3 (fr)
AU (1) AU1272201A (fr)
WO (1) WO2001027760A2 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080140525A1 (en) * 2004-09-29 2008-06-12 1 & 1 Internet Ag Method For Targeting Control Of Online Advertising And Associated Method And System
CN102685224B (zh) 2012-04-28 2014-10-08 华为技术有限公司 用户行为分析方法及相关设备和系统
EP3809354A1 (fr) 2019-10-15 2021-04-21 Eisenbürger GmbH Procédé de génération d'au moins un contenu partiel d'un site web

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892917A (en) * 1995-09-27 1999-04-06 Microsoft Corporation System for log record and log expansion with inserted log records representing object request for specified object corresponding to cached object copies
US5960409A (en) * 1996-10-11 1999-09-28 Wexler; Daniel D. Third-party on-line accounting system and method therefor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0127760A2 *

Also Published As

Publication number Publication date
EP1222544A3 (fr) 2002-09-04
AU1272201A (en) 2001-04-23
WO2001027760A3 (fr) 2002-07-11
WO2001027760A2 (fr) 2001-04-19
WO2001027760A9 (fr) 2002-09-06

Similar Documents

Publication Publication Date Title
DE69733606T2 (de) Computernetzwerk und verfahren zur bestimmung des benutzerverhalten
EP1435148B1 (fr) Procede de sortie d'informations personnalisees sur un site web
EP1797699B1 (fr) Procede de commande ciblee de publicite en ligne, dispositif et systeme associes
DE60314275T2 (de) System zum abliefern von informationen auf der basis eines webseiteninhalts
DE10320615A1 (de) Verwendung erweiterbarer Markup-Sprache in einem System und Verfahren zum Beeinflussen einer Position auf einer Suchergebnisliste, die von einer Computernetzwerksuchmaschine erzeugt wird
DE112012003376T5 (de) Seitenberichterstattung
DE10115586A1 (de) Verfahren zur Erzeugung von Internetinformationen
EP1131752A1 (fr) Procede pour la selection de produits, assistee par une banque de donnees, pour des applications de commerce electronique dans internet
WO2007076897A1 (fr) Procede pour le suivi de transactions reseau
WO2005091184A1 (fr) Systeme d'information
DE19813884B4 (de) System und Verfahren zur Ermittlung und Darstellung von verbindungsbezogenen Leistungsdaten in Netzwerken
AT5506U1 (de) Einrichtung und verfahren zum versenden von werbeinformation
EP1222544A2 (fr) Procede d'analyse du comportement utilisateur dans des reseaux informatiques pour l'optimisation de la presence web
DE10325998A1 (de) Verfahren zum Optimieren eines auf eine erste Netzwerkseite verweisenden Verweises
DE10115895C1 (de) Verfahren zur Erzeugung einer Darstellung für das Wiederfinden einer bereits aufgerufenen Informationsseite
DE102004047815B4 (de) Verfahren zum gezielten Steuern von Werbung und System dafür
DE19959142A1 (de) Verfahren und Vorrichtung zum Übermitteln von Inhalten, insbesondere von Werbung
DE102004008493B4 (de) Internetgestütztes Informationssystem
DE10319887B4 (de) Verfahren zum Angleichen eines auf einer Client-Datenverarbeitungseinrichtung angezeigten Datenbestandes an einen auf einer Server-Datenverarbeitungseinrichtung gespeicherten Quelldatenbestand
DE10061470C2 (de) Verfahren und Anordnung zur Auskunftserteilung über ein Kommunikationsnetz
DE69910352T2 (de) Verfahren zum Kontrollieren der Arbeitsumgebung von Betriebsangestellten
WO2024067920A1 (fr) Base de données d'un ordinateur
DE102020126572A1 (de) Tracking Verfahren
DE10061469C2 (de) Verfahren und System zur Auskunftserteilung über ein Kommunikationsnetz
DE19964253A1 (de) Verfahren, Computerprogramm, Vorrichtung und System zum Übermitteln von Inhalten, insbesondere von Werbung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

PUAK Availability of information related to the publication of the international search report

Free format text: ORIGINAL CODE: 0009015

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030114