What are Web transaction logs, and how do they work in combination with registration forms, shopping cart databases, and tracking files to help firms understand how customers behave online?

What will be an ideal response?


Transaction logs, which are built into Web server software, record user activity at a Web site. Log file analysis tools cull information from these files, which can contain tens to hundreds of entries for each user. Transaction log data becomes more useful when it is combined with registration form data and shopping cart data. Registration forms and shopping cart database are two other visitor generated data trails. Merchants use registration forms to gather personal data such as the name, address, phone number, zip code, e-mail address, and other optional information on the tastes and interests of the consumer. The shopping cart database captures all the item selection, purchase, and payment data. The data from transaction logs, registration forms, and the shopping cart database can also be combined with other information that users submit on product forms, contribute in chat rooms, or submit via e-mail messages to a firm to produce a veritable treasure trove of information for both individual merchant sites and for the industry as a whole.

Although the transaction log represents the foundation of online data collection, it is supplemented by the use of cookies that are placed on a user's hard drive when he or she visits a site. Cookies allow a Web site to store data on a user's machine that can be retrieved later. Cookies provide Web marketers with a very quick means to identify each customer and to understand his or her prior behavior at the site. Cookies can be used to determine how many people are visiting a site, how many are repeat visitors, and how often they have visited. They also make shopping cart and quick checkout possible by allowing a site to keep track of a user as he or she adds to the shopping cart. Cookies can be combined with Web bugs to create cross-site profiles. Web beacons (sometimes called Web bugs) are graphic files that are embedded in e-mails and on Web sites. When a user opens an HTML format e-mail with an embedded Web beacon, a request is sent to the server for the graphic data. Web beacons are used to automatically transmit information about the user and the page being viewed to a monitoring server in order to collect personal browsing behavior and other personal information.

Business

You might also like to view...

To ____________________ means to obtain substitute goods elsewhere when the seller breaches the sales contract

Fill in the blank(s) with correct word

Business

The salary paid to the president of a company would be classified on the income statement as a(n):

A. direct labor cost. B. administrative expense. C. selling expense. D. manufacturing overhead cost.

Business

In a "Type A" merger, the acquiring corporation may select which liabilities of the target it assumes, but in a "Type A" consolidation, all of the liabilities (known and contingent) must be assumed by the new corporation

a. True b. False Indicate whether the statement is true or false

Business

The Nike swoosh and the golden arches of McDonald's are examples of a

A. trademark. B. copyright. C. submarine patent. D. commercially protected symbol.

Business