Executive Summary
This report was create to evaluate the web analytics of YouProtect during 25 July 2013 to 23 March 2014. The aim was to provide useful recommendations for the website improvement based on the use of Google analytics.
The result of data analysis has demonstrated that YouProtect was in a bad position as apparently the visitors’ tend to leave their website rather than stay. The reasons behind all of this might come from unprofessional page design layout, outdate material, lack of quality content, lack of behaviour's understanding and irrelevant keywords.
It is recommended that YouProtect should :
Redesign the website layout.
Update new engaging content daily in both website and social media.
Use keywords which related to the core merchandise.
Compress some image, HTML, Javascript, PHP and CSS files to increase speed.
Further visitors’ behaviour research is essential to follow-up the conclusion.
Introduction
The aim of this report was to evaluate the web analytics of YouProtect and provide appropriate recommendations so as to improve the website. The information was based on the use of Google Analytics which provide data and many aspects of insight from the Internet users.
The analysis in this report will focus on the whole period of data, from 25 July 2013 to 23 March 2014 and specific only on the important part of the statistics, in order to predict the direction and trends that might have an impact on the website in the near future.
The different type of data such as table and graph will be used to showcase the performance, positive feedback, negative reaction and some meaningful change of YouProtect's website.
Finding and Analysis
1. Audience Overview
According to the statis...
... middle of paper ...
...what-is-a-good-bounce-rate-for-a-website/ [Accessed 22 March]
Smith B., 2013. Best Time To Post On Social Media [INFOGRAPHIC]. [Online] http://socialmediatoday.com/brianna5mith/1453951/best-times-post-social-media-infographic [Accessed 26 March]
Summerfield L., 2012. Long Tail Keyword Research for SEO: What To Know. [Online] https://savvypanda.com/blog/long-tail-keyword-research-for-seo.html [Accessed 25 March]
Thompson D., 2013. Digital Trends 2013: Digital Living [Online] http://www.experian.co.uk/blogs/latest-thinking/2013/03/digital-trends-2013-digital-living/ [Accessed 21 March]
Webconfs, n.d. II. Keywords – The Most Important Item In SEO. [Online] http://www.webconfs.com/seo-tutorial/seo-and-keywords.php [Accessed 22 March]
Wood I., 2013. The Important Of Keywords. [Online] http://www.bluewren.co.uk/2013/06/importance-keywords/ [Accessed 23 March]
Web. The Web. The Web. 14 Nov. 2013. The "LIFE AND TIMES.
The day to day process of managing a small company comes in a natural manner to nearly every business manager, however, expanding, sustaining and tracking the company’s website can be an overwhelming task [3]. A number of questions may arise, for example, How do I target the right audience? How can I drive sales in a particular region? Why do I see many hits and little sales? [3].Google has come up with a list of clarifications to these problems with free web analytics service known as Google analytics, which can be used to utilize online business efforts and campaign and turn the
Johnson, T. (2011). S.P.I.D.E.R. A strategy for evaluating websites. Library Media Connection, 29(6), 58-59. Retrieved from http://web.b.ebscohost.com.proxy.devry.edu/ehost/pdfviewer/pdfviewer?sid=a1fe208a-6fb8-4e68-8191-7ef041e2d483%40sessionmgr111&vid=25&hid=113
Although this practice benefits the user as well, unrestricted profiling can become an alarming catastrophe. Unless the threat to internet users privacy are shown to exceed the benefits, we should not regulate the internet, rather we should educate the public how to be more responsible about their identities. Various web-based companies have developed techniques to document their customer’s data, enabling them to provide a more enhanced web experience. One such method called “cookies,” employs Microsoft’s web browser, Internet Explorer. It traces the user’s habits.
Yahoo! is the number-one destination of users of the Internet the world over. With over 110 million unique users and 485 million average daily page views during December 1999, Yahoo! has clearly proven its ability to attract Web users like moths to light. With Yahoo!'s customizable services available in the U.S. and in 21 countries in 12 languages, Yahoo! users worldwide can pay their bills, track their stock portfolios, purchase virtually any product imaginable, and find a host of other services including email and chat rooms, all within the virtual borders of the prime ...
The first thing most notable about this website was their sense of design. A black ebony background illuminated with old brush style text and decorative graphics, welcomes and invites the visitor to “Enter” their website. This particular idea is a very artistic way of getting people to interact with their website. It is studied that most people learn better by hands on interaction, instead of reading perhaps plain, boring text. The website is appealing and fairly easy to navigate within the various browsers....
After visiting and examining the PBS Web site, I was able to conclude that it is an extremely successful entertainment and educational site. The Web site has won many substantial awards, including the prestigious "Webbie Award" in 1998 and 1999. According to a recent survey, fifty-six percent of users at the PBS Web site are male and sixty percent are between the ages of eighteen and forty-four. Forty-four percent of the Web site users have children and fifty-seven percent make online purchases. (Gallup/Plaw Release: Survey of 40,000 Internet Users. Fall 1998.)
Now that we are living in an ever changing world, technology is viewed as the most resourceful tool in keeping up with the pace. Without the use of technology, communication would be limited to using mail for delivery and encyclopedias for research. Although technology has improved the way we communicate and find information for research, the information is not always valid. Unfortunately, for those of us who use the internet for shopping, research, or reading articles of personal interest the information is not treated the same as a your magazine or book. While such literature is reviewed by an editorial staff, internet literature or information can be published by anyone. In order to reap the full benefit of having the use of technology for any purpose, there are five basic criteria’s one must keep in mind as an evaluating tool for deciding whether or not the particular website is a reliable source for information.
Provos, Niels. "Google Online Security Blog." : Safe Browsing. N.p., 19 June 2012. Web. 12 Apr. 2014. .
Collaborative tagging is a new way to assign keywords to the internet resources by its users. It plays
Privacy and security of personal data is one of the most difficult challenges that businesses dealing in e-commerce venture face in today’s global world. Though these business sites have little or no interest in private and personal information of the users, but the information collected by them can however lead to risks. The personal information is often provided by users actively and voluntarily such as names, email ids, physical addresses or even credit card information. Though in some cases information is passively passed on by users and even sites to third party, for example some of site banner ads allow third party advertisers to track users browsing habits. But most often websites gather and use the data containing individual’s information without even their knowledge. Main concern of e-commerce business ventures in today’s world is lower the liability risk in regards to the site’s personal information collection practices. In order to achieve the desired success they should constantly determine and examine what kind of information is being collected by the site and should constantly develop privacy policy statement in order to protect the information. Among many aspects of crime on the information superhighway, electronic vandalism, theft, money laundering, electronic vandalism, illegal interception, electronic funds transfer crimes are some examples. In the following paper more insight on privacy issue. Some of these issues, available options and risks surrounded are further highlighted.
...f visitors. This information would serve to guide content development, partnerships, positioning, branding and communications.
The purpose of this research paper is to provide information that will help people understand different ways to protect themselves and their children while online. This research paper will inform readers with tips on how to avoid becoming a victim of identity theft. After reading this paper people will understand the different types of computer and cyber crimes, steps on how to protect kids online and recommendations when using a different computer network more safely.
Safety on the internet is very important it is a place where anything can happen, and if you’re not careful damage can happen in reality, such as identity theft, stolen banking information and physical harm.
Kleper, Michael. “What Makes Web Site Visitors Come Back?” The Handbook of Digital Publishing. Prentice Hall. 2001. Pages 194, 196.