Cookie Synchronization: Everything You Always Wanted to Know but Were Afraid to Ask Panagiotis Papadopoulos Nicolas Kourtellis Evangelos P

Total Page:16

File Type:pdf, Size:1020Kb

Cookie Synchronization: Everything You Always Wanted to Know but Were Afraid to Ask Panagiotis Papadopoulos Nicolas Kourtellis Evangelos P Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask Panagiotis Papadopoulos Nicolas Kourtellis Evangelos P. Markatos Brave Software Telefonica Research, Spain FORTH-ICS, Greece panpap@brave:com nicolas:kourtellis@telefonica:com markatos@ics:forth:gr ABSTRACT 1 INTRODUCTION User data is the primary input of digital advertising, fueling the In the online era, where behavioural advertising fuels the major- free Internet as we know it. As a result, web companies invest a lot ity of Internet, user privacy has become a commodity that is be- in elaborate tracking mechanisms to acquire user data that can sell ing bought and sold in a complex, and often ad-hoc, data ecosys- to data markets and advertisers. However, with same-origin policy tem [17, 24, 35, 38]. Users’ personal data collected by IT companies and cookies as a primary identification mechanism on the web, each constitute a valuable asset, whose quality and quantity significantly tracker knows the same user with a different ID. To mitigate this, affect each company’s overall market value [40]. As a consequence, Cookie Synchronization (CSync) came to the rescue, facilitating an it is of no doubt that in order to gain advantage over their competi- information sharing channel between 3rd-parties that may or not tors, web companies such as advertisers and trackers participate have direct access to the website the user visits. In the background, in a user data collecting spree, aiming to retrieve as much infor- with CSync, they merge user data they own, but also reconstruct a mation as possible and form user profiles. These detailed profiles user’s browsing history, bypassing the same origin policy. contain personal data [12] such as interests, preferences, personal In this paper, we perform a first to our knowledge in-depth study identifying information, geolocations, etc. [5, 31, 44], and could be of CSync in the wild, using a year-long weblog from 850 real mobile sold to 3rd-parties for advertising or other purposes beyond the users. Through our study, we aim to understand the characteristics control of the user [30, 36, 37]. of the CSync protocol and the impact it has on web users’ privacy. Highlighting the importance of this data collection, web compa- For this, we design and implement CONRAD, a holistic mechanism nies have invested a lot in elaborate user tracking mechanisms. The to detect CSync events at real time, and the privacy loss on the user most traditional one includes the use of cookies: they have been side, even when the synced IDs are obfuscated. Using CONRAD, we commonly used in the Web to save and maintain some kind of state find that 97% of the regular web users are exposed to CSync: most on the web client’s side. This state has been used as an identifier to of them within the first week of their browsing, and the median authenticate users across different sessions and domains. Initially, userID gets leaked, on average, to 3.5 different domains. Finally, we 1st-party cookies were used to track users when they repeatedly see that CSync increases the number of domains that track the user visited the same site, and later, 3rd-party cookies were invented by a factor of 6.75. to track users when they move from one website to another. The same-origin policy (SOP) was invented a few years later [45] to CCS CONCEPTS restrict the potential amount of information trackers can collect about a user and share with other 3rd-party platforms. • Security and privacy → Web protocol security; • Networks To overcome this restriction, and create unified identifiers for → Network privacy and anonymity; • Social and professional each user, the ad-industry invented the Cookie Synchronization topics → Surveillance; (CSync) process [19]: a mechanism that can practically “circumvent” the same-origin policy, and allow web companies to share (syn- KEYWORDS chronize) cookies, and match the different IDs they assign for the Cookie Synchronization, Cross-domain tracking, HTTP Cookies same user while they browse the web. Sadly, recent results show that most of the 3rd-parties are involved in CSync: 157 of top 200 websites (i.e. 78%) have 3rd-parties which synchronize cookies with arXiv:1805.10505v3 [cs.IR] 25 Feb 2020 ACM Reference Format: Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P. Markatos. at least one other party, and they can reconstruct 62-73% of a user’s 2019. Cookie Synchronization: Everything You Always Wanted to Know But browsing history [11]. Furthermore, 95% of pages visited contain Were Afraid to Ask. In Proceedings of the 2019 World Wide Web Conference 3rd-party requests to potential trackers and 78% attempt to transfer (WWW ’19), May 13–17, 2019, San Francisco, CA, USA. ACM, New York, NY, unsafe data [46]. Finally, a mechanism for respawing cookies has USA, 11 pages. https://doi:org/10:1145/3308558:3313542 been identified, with consequences in the reconstruction of users’ browsing history, even if they delete their cookies [1]. Although past works highlight the use of CSync across the most This paper is published under the Creative Commons Attribution 4.0 International popular sites worldwide, they avoid diving into the details and (CC BY 4.0) license. Authors reserve their rights to disseminate the work on their fail to thoroughly explore this increasingly popular technique. In personal and corporate Web sites with the appropriate attribution. fact, the majority of related works perform their analysis using WWW ’19, May 13–17, 2019, San Francisco, CA, USA © 2019 IW3C2 (International World Wide Web Conference Committee), published crawled data by fetching the top Alexa websites. Consequently, under Creative Commons CC BY 4.0 License. little is known on how CSync works in the wild, how many of real ACM ISBN 978-1-4503-6674-8/19/05. users’ cookies are getting synced during their everyday browsing, https://doi:org/10:1145/3308558:3313542 and to what extend it affects the end users’ privacy. Importantly, website1.com new cookie (1) cookie sync (3) (1) GET new cookie (1) existing studies focus solely on desktop web; however, today more Browser (1) GET tracker.com/script.js Browser tracker.com/beacon.gif than 52.2% of all web traffic is generated through mobile phones (up Cookie: {cookie_ID=user123} from 50.3% in the previous year [42]). This traffic points to a whole new, unexplored ecosystem of mobile Web, where users browse (2) Response through their very personal devices, while employing a variety of Set-cookie: user123 tracker.com sensors to experience a highly personalized content, but always at tracker.com the expense of privacy. Thus, what is the impact of CSync in this website2.com newnew cookie ( cookie (2)2) Browser (1) GET new mobile ecosystem? Which are the basic characteristics of CSync, advertiser.com/adBanner.png and the mechanics used? How does CSync impact the user’s privacy (3) GET and anonymity on the mobile web? advertiser.com?syncID=user123&publisher=website3 Cookie: {cookie_ID=userABC} In this paper, we aim to answer these questions, by studying (2) Response advertiser.com Cookie Synchronization using a large, year-long dataset of 850 real Set-cookie: userABC advertiser.com mobile users, and exploring in depth its use and growth through time, dominant companies, along with its side-effects on user pri- new cookie (1) cookie sync (3) Browser (1) GET website3.com (1) GET cookie sync (3) vacy. The contributions of this work are as follows: tracker.com/script.js Browser tracker.com/beacon.gif Cookie: {cookie_ID=user123} • We design and implement CONRAD: (COokie syNchRonizA- (2) Response tion Detector) a holistic mechanism to detect at real time CSyncSet-cookie: user123 tracker.com events and the privacy loss on the user side, even when synced tracker.com new cookie (2) IDs are concealed or obfuscated by participating companiesBrowser aim-(1) GET advertiser.com/adBanner.png ing to reduce identifiability from traditional, heuristic-based (3) GET advertiser.com?syncID=user123&publisher=website3 detection algorithms. In such cases, when non-ID related fea- Cookie: {cookie_ID=userABC} (2) Response advertiser.com tures are used, our approach achieves high accuracy (84%-90%)Set-cookie: userABC advertiser.com and AUC (0.89-0.97). Figure 1: Example of advertiser.com and tracker.com synchronizing their cookieIDs. Interestingly, and without having any code in web- • We perform the first of its kind, large-scale, longitudinal study site3, advertiser.com learns that: (i) cookieIDs userABC==user123 of Cookie Synchronization on mobile users in the wild. We per- and (ii) userABC has just visited the given website. Finally, both do- form a passive data collection of the activity of 850 volunteering mains can conduct server-to-server user data merges. mobile users, lasting an entire year. This means that the data collected are not crawled, like in past studies, and therefore tracker.com but not from advertiser.com. Thus, advertiser.com does do not capture a distorted or biased picture of CSync on the not (and cannot) know which users visit website3.com. How- Web. Instead, these data provide a rare glimpse of CSync in the ever, as soon as the code of tracker.com is called, a GET request is mobile space, and an opportunity to study CSync and its impact issued by the browser to tracker.com (step 1), and it responds back on real mobile users’ privacy and anonymity. with a REDIRECT request (step 2), instructing the user’s browser • Using the proposed detection mechanism, we conduct an in- to issue another GET request to its collaborator advertiser.com this depth privacy analysis of CSync. Our results show that 97% of time, using a specifically crafted URL (step 3): regular web users are exposed to CSync.
Recommended publications
  • Towards Understanding Modern Web Traffic”
    Towards Understanding Modern Web Traffic Sunghwan Ihm† Vivek S. Pai Department of Computer Science Department of Computer Science Princeton University Princeton University [email protected] [email protected] ABSTRACT popularity of social networking, file hosting, and video streaming As Web sites move from relatively static displays of simple pages sites [29]. These changes and growth of Web traffic are expected to rich media applications with heavy client-side interaction, the to continue, not only as the Web becomes a de facto front-end for nature of the resulting Web traffic changes as well. Understanding many emerging cloud-based services [47], but also as applications this change is necessary in order to improve response time, evalu- getmigratedtotheWeb[34]. ate caching effectiveness, and design intermediary systems, such as Understanding these changes is important for overall system de- firewalls, security analyzers, and reporting/management systems. sign. For example, analyzing end-user browsing behavior can lead Unfortunately, we have little understanding of the underlying na- to a Web traffic model, which in turn can be used to generate a syn- ture of today’s Web traffic. thetic workload for benchmarking or simulation. In addition, ana- In this paper, we analyze five years (2006-2010) of real Web traf- lyzing the redundancy and effectiveness of caching could shape the fic from a globally-distributed proxy system, which captures the design of Web servers, proxies, and browsers to improve response browsing behavior of over 70,000 daily users from 187 countries. times. In particular, since content-based caching approaches [28, Using this data set, we examine major changes in Web traffic char- 49, 50] are a promising alternative to traditional HTTP object-based acteristics that occurred during this period.
    [Show full text]
  • Auditing Offline Data Brokers Via Facebook's Advertising Platform
    Auditing Offline Data Brokers via Facebook’s Advertising Platform Giridhari Venkatadri Piotr Sapiezynski Elissa M. Redmiles Northeastern University Northeastern University University of Maryland Alan Mislove Oana Goga Michelle L. Mazurek Northeastern University Univ. Grenoble Alpes, CNRS, University of Maryland Grenoble INP, LIG Krishna P. Gummadi MPI-SWS ABSTRACT then selling this information to third-parties such as banks, insur- Data brokers such as Acxiom and Experian are in the business of ance companies, political campaigns, and marketers. The collection collecting and selling data on people; the data they sell is commonly practices of data brokers have been the subject of an ongoing pri- used to feed marketing as well as political campaigns. Despite the vacy debate. For example, data brokers typically only make data ongoing privacy debate, there is still very limited visibility into data available to clients who purchase it, and not to the users who it is collection by data brokers. Recently, however, online advertising actually about [20]. Even worse, public-facing web sites run by data services such as Facebook have begun to partner with data brokers— brokers [10] that purport to reveal the data only report a fraction to add additional targeting features to their platform— providing of what they actually have [19, 47]. In fact, outside of a few niche avenues to gain insight into data broker information. areas (e.g., credit reports), people in the U.S. have limited if any In this paper, we leverage the Facebook advertising system—and rights to determine the provenance of, correct, or even view the their partnership with six data brokers across seven countries—in data these companies have on them [38].
    [Show full text]
  • The Rise of Data Capital
    MIT TECHNOLOGY REVIEW CUSTOM Produced in partnership with The Rise of Data Capital “For most companies, their data is their single biggest asset. Many CEOs in the Fortune 500 don’t fully appreciate this fact.” – Andrew W. Lo, Director, MIT Laboratory for Financial Engineering “Computing hardware used to be a capital asset, while data wasn’t thought of as an asset in the same way. Now, hardware is becoming a service people buy in real time, and the lasting asset is the data.” – Erik Brynjolfsson, Director, MIT Initiative on the Digital Economy as retailers can’t enter new markets and security. The pursuit of these Executive Summary without the necessary financing, they characteristics drives the reinvention Data is now a form of capital, on the can’t create new pricing algorithms of enterprise computing into a set of same level as financial capital in terms without the data to feed them. In services that are easier to buy and of generating new digital products nearly all industries, companies are use. Some will be delivered over the and services. This development has in a race to create unique stocks of Internet as public cloud services. implications for every company’s data capital—and ways of using it— Some corporate data centers will be competitive strategy, as well as for before their rivals outmaneuver them. reconfigured as private clouds. Both the computing architecture that Firms that have yet to see data as a raw must work together. supports it. material are at risk. New capabilities based on this new Contrary to conventional wisdom, The vast diversity of data captured architecture, such as data-driven data is not an abundant resource.
    [Show full text]
  • Search Engine Optimization (SEO)
    SEO 360: The Essentials of Search Engine Optimization By Chris Adams, Director of Online Marketing & Research INTRODUCTION Effective Search Engine Optimization is not a highly technical or complex task, if you get the basics right: Invest in relevant, quality content Follow best practices in optimizing the content Update your site frequently with relevant content Leverage social media and Search Engine Marketing (SEM) efforts Manage the entire process with analytics, refining and improving the process based on results We call it SEO 360⁰; whatever you call it, it is likely to be your lowest-cost, highest-quality site traffic. Strong organic web traffic comes from great, well-optimized content so search engines and travelers can easily find and understand it. This whitepaper focuses on the essential best practices. CONTENTS A. THE IMPORTANCE OF SEARCH ENGINE TRAFFIC B. THE ESSENTIAL SIX BUILDING BLOCKS OF SEO C. WHY SEO 360⁰? D. THE SIX BUILDING BLOCKS OF SEO EXPLAINED E. WHAT'S NEXT? F. THE ESSENTIAL SEO TOOL KIT Figure 1. Strong organic traffic (from search engine referrals) underpins the reach and audience of most travel and tourism websites milespartnership.com | Whitepaper ©2012 Miles Media Group, LLLP Measure & Market: An Online Analytics Framework 2 By Chris Adams, Director of Online Media A. The Importance of Search Engine Traffic Search Engine Optimization (SEO) is the process of making your website and its content highly visible to search engines, ranking well in relevant searches, and boosting organic traffic to your Figure 2. Search engine traffic dominates the way in which travelers find destination (and other tourism) web sites.
    [Show full text]
  • E Cost of Ad Blocking Pagefair and Adobe 2015 Ad Blocking Report
    !e cost of ad blocking PageFair and Adobe 2015 Ad Blocking Report Introduction In the third annual ad blocking report, PageFair, with the help of Adobe, provides updated data on the scale and growth of ad blocking so"ware usage and highlights the global and regional economic impact associated with it. Additionally, this report explores the early indications surrounding the impact of ad blocking within the mobile advertising space and how mobile will change the ad blocking landscape. Table of Contents 3. Key insights 8. Effect of ad blocking by industry 13. A"erword 4. Global ad blocking growth 9. Google Chrome still the main driver of ad 14. Background 5. Usage of ad blocking so"ware in the United block growth 15. Methodology States 10. Mobile is yet to be a factor in ad blocking 16. Tables 6. Usage of ad blocking so"ware in Europe growth 17. Tables 7. !e cost of blocking ads 11. Mobile will facilitate future ad blocking growth 12. Reasons to start using an ad blocker PAGEFAIR AND ADOBE | 2015 Ad Blocking Report 2 Key Insights More consumers block ads, continuing the strong growth rates seen during 2013 and 2014. 41% YoY global growth Q2 2014 - Q2 2015 !e "ndings • Globally, the number of people using ad blocking so"ware grew by 41% year over year. • 16% of the US online population blocked ads during Q2 2015. • Ad block usage in the United States grew 48% during the past year, increasing to 45 million monthly active 45 million users (MAUs) during Q2 2015. Average MAUs in the United • Ad block usage in Europe grew by 35% during the past year, increasing to 77 million monthly active users States Q2 2015 during Q2 2015.
    [Show full text]
  • The Impact of Ad-Blockers on Online Consumer Behavior
    Marketing Science Institute Working Paper Series 2021 Report No. 21-119 The Impact of Ad-blockers on Online Consumer Behavior Vilma Todri “The Impact of Ad-blockers on Online Consumer Behavior” © 2021 Vilma Todri MSI Working Papers are Distributed for the benefit of MSI corporate and academic members and the general public. Reports are not to be reproduced or published in any form or by any means, electronic or mechanical, without written permission. Marketing Science Institute Working Paper Series The Impact of Ad-blockers on Online Consumer Behavior Vilma Todri Goizueta Business School, Emory University, Atlanta, GA 30322 [email protected] Digital advertising is on track to become the dominant form of advertising but ad-blocking technologies have recently emerged posing a potential threat to the online advertising ecosystem. A significant and increasing fraction of Internet users has indeed already started employing ad-blockers. However, surprisingly little is known yet about the effects of ad-blockers on consumers. This paper investigates the impact of ad- blockers on online search and purchasing behaviors by empirically analyzing a consumer-level panel dataset. Interestingly, the analyses reveal that ad-blockers have a significant effect on online purchasing behavior: online consumer spending decreases due to ad-blockers by approximately $14:2 billion a year in total. In examining the underlying mechanism of the ad-blocker effects, I find that ad-blockers significantly decrease spending for brands consumers have not experienced before, partially shifting spending towards brands they have experienced in the past. I also find that ad-blockers spur additional unintended consequences as they reduce consumers' search activities across information channels.
    [Show full text]
  • A Survey on Search Engine Optimization (SEO)
    Int'l Journal of Computing, Communications & Instrumentation Engg. (IJCCIE) Vol. 4, Issue 1 (2017) ISSN 2349-1469 EISSN 2349-1477 A Survey on Search Engine Optimization (SEO) Anis ISMAIL and Firas ABDALLAH Abstract— With the growth of Internet in the recent years, search engine such as Google, Bing and Yahoo are becoming more and more important. The role of the search engines is to index billions of web pages and display only the most relevant results for a given search query. When creating the website, many webmasters forget to take into consideration an essential factor, which is making the world aware of their website. Most of times, main focus is set on making the website as user-friendly as possible, stable, fast and secure. In this paper, we present may techniques that are sometimes useless. The aim of these techniques is to verify if the website does not have visitors or simply not found. Fig. 1.Different SEO Techniques [3] Most of the times, SEO is just simply a method of building Keywords—Internet, Google, Bing, Yahoo, search engines, the structure of the website in a way that it will allow search SEO. engines to understand what the website is all about. The majority of the web visitors are driven to websites by search I. INTRODUCTION engines such as Google, Bing and Yahoo. Despite the fact that Search engine is an application used to help find information social media such as Facebook, Twitter and even Youtube and on the internet. The search engine is usually accessed through a many others can still be the source of visitors to a website, page on a website that allows a user to search the content of search engines remains the primary method of locating and billions of websites on the web by entering a set of keywords into a search textbox [1].
    [Show full text]
  • From Legi(Macy to Informed Consent: Mapping Best Prac(Ces and Iden
    From legimacy to informed consent: mapping best pracces and idenfying risks A report from the Working Group on Consumer Consent May 2009 PEN paper 3 About the Working Group The Working Group on Consumer Consent is a project convened by the Information Systems & Innovation Group of the London School of Economics and Political Science and administered by 80/20 Thinking Ltd, based in London UK. The Working Group aims to bring together key industry players, consumer experts and regulators to achieve the following goals: • To better understand the implications of the Article 29 Working Party Opinion on data protection issues related to search engines (April 2008) and its potential impact on the processing of personal information in the non-search sectors. • To foster dialogue between key stakeholders to map current practices relating to notification and consent. • To inform regulators about limitations and opportunities in models and techniques for informed consent for the processing of personal information. • To help inform all stakeholders on aspects of the pending Article 29 Opinion on targeted advertising planned in 2009. Membership The members of the Working Group included: AOL, BT, Covington & Burling, eBay, Enterprise Privacy Group, Facebook, the Future of Privacy Forum, Garlik, Microsoft, Speechly Bircham, Vodafone, and Yahoo! We also sought comments from a number of privacy commissioners and regulators from across Europe. Methodology, Meetings, and Outreach We have been actively engaging with policy-makers and regulators since the creation of the group. This networking not only enhances the quality of the research, but also goes some way to identify and prepare the audience for our discussion papers.
    [Show full text]
  • Will Ad Blocking Break the Internet?
    NBER WORKING PAPER SERIES WILL AD BLOCKING BREAK THE INTERNET? Ben Shiller Joel Waldfogel Johnny Ryan Working Paper 23058 http://www.nber.org/papers/w23058 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts Avenue Cambridge, MA 02138 January 2017 Johnny Ryan is an employee of PageFair, a firm that measures the extent of ad blocking and offers ad-recovery technologies that enable publishers to display ads in a manner that adblockers cannot block. Neither Shiller nor Waldfogel has received any compensation for the research in the paper. PageFair was allowed to review the paper for accuracy but did not have control over the paper's findings nor conclusions. The views expressed herein are those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research. NBER working papers are circulated for discussion and comment purposes. They have not been peer-reviewed or been subject to the review by the NBER Board of Directors that accompanies official NBER publications. © 2017 by Ben Shiller, Joel Waldfogel, and Johnny Ryan. All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit, including © notice, is given to the source. Will Ad Blocking Break the Internet? Ben Shiller, Joel Waldfogel, and Johnny Ryan NBER Working Paper No. 23058 January 2017 JEL No. L81,L82 ABSTRACT Ad blockers allow Internet users to obtain information without generating ad revenue for site owners; and by 2016 they were used by roughly a quarter of site visitors. Given the ad-supported nature of much of the web, ad blocking poses a threat to site revenue and, if revenue losses undermine investment, a possible threat to consumers' access to appealing content.
    [Show full text]
  • Secret Consumer Scores and Segmentations: Separating Consumer 'Haves' from 'Have-Nots' Amy J
    University of Missouri School of Law Scholarship Repository Faculty Publications 2014 Secret Consumer Scores and Segmentations: Separating Consumer 'Haves' from 'Have-Nots' Amy J. Schmitz University of Missouri School of Law, [email protected] Follow this and additional works at: http://scholarship.law.missouri.edu/facpubs Part of the Law and Society Commons, and the Legal Remedies Commons Recommended Citation Amy J. Schmitz, Secret Consumer Scores and Segmentations: Separating "Haves" from "Have-Nots", 2014 Mich. St. L. Rev. 1411 (2014) This Article is brought to you for free and open access by University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of University of Missouri School of Law Scholarship Repository. SECRET CONSUMER SCORES AND SEGMENTATIONS: SEPARATING "HAVES" FROM "HAVE-NOTS" Amy J Schmitz* 2014 MICH. ST. L. REV. 1411 ABSTRACT "Big Data" is big business. Data brokers profit by tracking consumers' information and behavior both on- and offline and using this collected data to assign consumers evaluative scores and classify consumers into segments. Companies then use these consumer scores and segmentationsfor marketing and to determine what deals, offers, and remedies they provide to different individuals. These valuations and classifications are based on not only consumers 'financial histories and relevant interests, but also their race, gender, ZIP Code, social status, education,familial ties, and a wide range of additional data. Nonetheless, consumers are largely unaware of these scores and segmentations, and generally have no way to challenge their veracity because they usually fall outside the purview of the Fair Credit Reporting Act (FCRA).
    [Show full text]
  • Google Analytics User Guide
    Page | 1 What is Google Analytics? Google Analytics is a cloud-based analytics tool that measures and reports website traffic. It is the most widely used web analytics service on the Internet. Why should we all use it? Google Analytics helps you analyze visitor traffic and paint a complete picture of your audience and their needs. It gives actionable insights into how visitors find and use your site, and how to keep them coming back. In a nutshell, Google Analytics provides information about: • What kind of traffic does your website generate – number of sessions, users and new users • How your users interact with your website & how engaged they are – pages per session, average time spent on the website, bounce rate, how many people click on a specific link, watch a video, time spent on the webpage • What are the most and least interesting pages – landing and exit pages, most and least visited pages • Who visits your website – user`s geo location (i.e. city, state, country), the language they speak, the browser they are using, the screen resolution of their device • What users do once they are on your website – how long do users stay on the website, which page is causing users to leave most often, how many pages on average users view • When users visit your website – date & time of their visits, you can see how the user found you. • Whether visitors came to your website through a search engine (Google, Bing, Yahoo, etc.), social networks (Facebook, Twitter, etc.), a link from another website, or a direct type-in.
    [Show full text]
  • Web Analytics Tools and Benefits for Entrepreneurs
    Web analytics tools and benefits for entrepreneurs LAHTI UNIVERSITY OF APPLIED SCIENCES Degree programme in Business Information Technology Bachelor’s Thesis Autumn 2017 Cao Truong Hoang Phuong Nguyen Thi Huyen Trang Lahti University of Applied Sciences Degree programme in Business Information Technology Cao Truong, Hoang Phuong Nguyen Thi, Huyen Trang: Web analytics tools and benefits for entrepreneurs Bachelor’s Thesis in Business Information Technology, 79 pages Autumn 2017 ABSTRACT Online marketing nowadays is not an unfamiliar phenomenon anymore but entrepreneurs may not utilize it to bring out the best in their business. All business companies have their own website but most of them only use it as an advertisement tools or a news tools. However, web analytics tools are designed to change that and help entrepreneurs gathering useful data from their websites. The purpose of the thesis is to provide understanding about what web analytics tools are and they can use them to enhance their business strategy. The thesis will focus on deductive approach and make a conclusion through qualitative research. Google analytics tools and Woopra analytics tools will be used as a demonstration to how to use web analytics tools and how the analysis process can help making proper adjustment to the business. Keywords: Online marketing, data analysis, web analytics, web analytics tools, Google Analytics, Woopra TABLE OF CONTENTS 1 INTRODUCTION 1 1.2 Thesis structure 2 2 RESEARCH METHODS 4 2.1 Objectives 4 2.2 Research approach 4 2.3 Research methodology
    [Show full text]