Executive Summary
This report was create to evaluate the web analytics of YouProtect during 25 July 2013 to 23 March 2014. The aim was to provide useful recommendations for the website improvement based on the use of Google analytics.
The result of data analysis has demonstrated that YouProtect was in a bad position as apparently the visitors’ tend to leave their website rather than stay. The reasons behind all of this might come from unprofessional page design layout, outdate material, lack of quality content, lack of behaviour's understanding and irrelevant keywords.
It is recommended that YouProtect should :
Redesign the website layout.
Update new engaging content daily in both website and social media.
Use keywords which related to the core merchandise.
Compress some image, HTML, Javascript, PHP and CSS files to increase speed.
Further visitors’ behaviour research is essential to follow-up the conclusion.
Introduction
The aim of this report was to evaluate the web analytics of YouProtect and provide appropriate recommendations so as to improve the website. The information was based on the use of Google Analytics which provide data and many aspects of insight from the Internet users.
The analysis in this report will focus on the whole period of data, from 25 July 2013 to 23 March 2014 and specific only on the important part of the statistics, in order to predict the direction and trends that might have an impact on the website in the near future.
The different type of data such as table and graph will be used to showcase the performance, positive feedback, negative reaction and some meaningful change of YouProtect's website.
Finding and Analysis
1. Audience Overview
According to the statis...
... middle of paper ...
...what-is-a-good-bounce-rate-for-a-website/ [Accessed 22 March]
Smith B., 2013. Best Time To Post On Social Media [INFOGRAPHIC]. [Online] http://socialmediatoday.com/brianna5mith/1453951/best-times-post-social-media-infographic [Accessed 26 March]
Summerfield L., 2012. Long Tail Keyword Research for SEO: What To Know. [Online] https://savvypanda.com/blog/long-tail-keyword-research-for-seo.html [Accessed 25 March]
Thompson D., 2013. Digital Trends 2013: Digital Living [Online] http://www.experian.co.uk/blogs/latest-thinking/2013/03/digital-trends-2013-digital-living/ [Accessed 21 March]
Webconfs, n.d. II. Keywords – The Most Important Item In SEO. [Online] http://www.webconfs.com/seo-tutorial/seo-and-keywords.php [Accessed 22 March]
Wood I., 2013. The Important Of Keywords. [Online] http://www.bluewren.co.uk/2013/06/importance-keywords/ [Accessed 23 March]
The day to day process of managing a small company comes in a natural manner to nearly every business manager, however, expanding, sustaining and tracking the company’s website can be an overwhelming task [3]. A number of questions may arise, for example, How do I target the right audience? How can I drive sales in a particular region? Why do I see many hits and little sales? [3].Google has come up with a list of clarifications to these problems with free web analytics service known as Google analytics, which can be used to utilize online business efforts and campaign and turn the
Various web-based companies have developed techniques to document their customer’s data, enabling them to provide a more enhanced web experience. One such method called “cookies,” employs Microsoft’s web browser, Internet Explorer. It traces the user’s habits. Cookies are pieces of text stored by the web browser that are sent back and forth every time the user accesses a web page. These can be tracked to follow web surfers’ actions. Cookies are used to store the user’s passwords making your life easier on banking sites and email accounts. Another technique used by popular search engines is to personalize the search results. Search engines such as Google sell the top search results to advertisers and are only paid when the search results are clicked on by users. Therefore, Google tries to produce the most relevant search results for their users with a feature called web history. Web history h...
Currently, the SEO clients are strictly advising the SEO firms to avoid using Blackhat SEO-techniques and automating the complete process. Following list of SEO tools for the Keyword research or analysis are the best answers to these clients.
Johnson, T. (2011). S.P.I.D.E.R. A strategy for evaluating websites. Library Media Connection, 29(6), 58-59. Retrieved from http://web.b.ebscohost.com.proxy.devry.edu/ehost/pdfviewer/pdfviewer?sid=a1fe208a-6fb8-4e68-8191-7ef041e2d483%40sessionmgr111&vid=25&hid=113
This paper will concentrate on two web sites. The fundamental difference between the two is how much one advertises, and how the other sets the viewer in the right direction. The better of the web sites, in my opinion, is the one without all the bells and whistles.
Provos, Niels. "Google Online Security Blog." : Safe Browsing. N.p., 19 June 2012. Web. 12 Apr. 2014. .
The two meta tags of primary interest to search engines are the “Description” and “Keywords” tags. These tags describe the contents and key words for the search engine.
Websites that rank high in Google searches are not there by accident. There is a definite game plan that gets them there through the optimization of SEO (Search engine optimization) methods. We will go into what SEO is, why it’s important, along with Alexa ranking and touch on how social media can use a marketing strategy to promote the website. You will finally understand what an optimized website can do for your website business.
In this report author has presented various levels of end to end security on B2C web site. Number of security threats has been informed along with recommended technical controls that can be put in place in order to provide counter measures against web security threats to B2C web sites. Further, customer side measures have also been informed, that can be easily monitored and setup by the customer in order to protect themselves while using B2C web site. Finally, author wants to add that security issues do occur and they clearly a threat but by performing security threat analysis and but educating customer regularly about changes on website and additional protection features, trust in shopping on B2C web site can be maintained that eventually generates revenues.
After visiting and examining the PBS Web site, I was able to conclude that it is an extremely successful entertainment and educational site. The Web site has won many substantial awards, including the prestigious "Webbie Award" in 1998 and 1999. According to a recent survey, fifty-six percent of users at the PBS Web site are male and sixty percent are between the ages of eighteen and forty-four. Forty-four percent of the Web site users have children and fifty-seven percent make online purchases. (Gallup/Plaw Release: Survey of 40,000 Internet Users. Fall 1998.)
Everyday tech users are increasingly engaged with web and mobile applications. These programs have many uses and can be very helpful in progressive usage. However, these applications also serve as the most accessible point of entry for malicious attackers to wreak havoc. The continual growth and usage of web-applications makes the infrastructure one that is susceptible to attack due to lack of thorough security implementation. The Open Web Application Security Project (OWASP) is a community-based non-profit organization that concentrates on increasing the safety in the realm of web applications. It was started in 2001 and ever since then its primary goal has been to create a high level of transparency in the web applications and software in order to allow society to make informed decisions. They have a very open and collaborative mentality when it comes to the sharing of knowledge to include and empower the masses. Each year OWASP publishes a list of most common web application vulnerabilities. The top three have remained relatively dominant over the past few years, regardless of which place they fall into. In 2013 they were: injection, broken authentication and session management, and cross-site scripting. The purpose of this paper is to delve further into three of the top web application vulnerabilities from the past few years and evaluate their impact.
Improvement of the Web Application safety measures were challenged since last few decades. The security ch...
In the day and age of the 21st century, technology has revolutionised and assisted the planet, providing humanity with knowledge and experiences that twenty years ago would not be thought possible. Due to the ever - modernising world, people must adapt to these new advances, to be able to coexist and understand how to utilise, maintain and improve the use of technology. The Internet plays a significant role in the contribution of knowledge, education, information and entertainment. For this reason, the Internet must be accessible and readable to all audiences, websites must be easy to navigate, and adhere to the needs of users. The intent of this essay is to analyse a website in terms of its purpose, context, communication techniques and whether it meets the needs of the intended audience.
...f visitors. This information would serve to guide content development, partnerships, positioning, branding and communications.
There are different types of websites and when using internet to support a paper it is important to check the authenticity of the website and the background of the authors. The use of internet is increasing rapidly from educational, governmental, personal and commercial websites. The plurality of websites led to inaccuracy of some that do not provide accurate information for users, however if users checked the website accuracy, some errors could have been avoided. Researchers must conduct evaluation for accurate research by checking the background of the authors and the topic, the authenticity of the website, the purpose of the website and who the expected users are.