Page 343 -
P. 343

12.2  Existing tools  333




                  Interfaces (APIs), often following the Representational State Transfer (REST) con-
                  ventions (Fielding and Taylor, 2002). Essentially, REST (and similar) APIs define
                  structured web requests to return data suitable for extraction and manipulation by
                  third-party web sites and other programs. As these APIs can be used to provide data
                  to mobile apps and stand-alone desktop programs—as well as web pages—any such
                  accesses will be included in web logs, and can therefore be analyzed to track usage
                  patterns.
                  12.2.1.2   Web usability/design research
                  By telling us which pages were accessed and when, web access logs can provide
                  valuable information for usability evaluations and understanding of usage patterns.
                  Relatively simple page access counts tell us which pages are accessed frequently,
                  and which are not. When coupled with an understanding of page layout informa-
                  tion, this can help identify opportunities for improving usability. Aggregate counts of
                  timestamps, referrers, and user agents can be used to understand when a site is being
                  used, how people are getting to links within a site (external referrers are particularly
                  interesting in this regard), and which browsers they are using—all potentially useful
                  information in the context of evaluating a site design. Interactive visualizations of
                  this data at multiple granularities—particularly when coordinated with views of the
                  site—can provide guidance for improving site design (Hochheiser and Shneiderman,
                  2001). For example, if important areas of the site are infrequently accessed, links
                  might be moved to more prominent locations or be made more visually distinctive.
                  Postmodification analysis can be used to evaluate the success (or lack thereof) of
                  such measures.
                     Web access logs also provide the intriguing possibility of extracting information
                  about the actions of specific users as they navigate a website. This information can
                  be very useful for understanding which path users take through a site and where they
                  might run into problems.
                     As each entry in an access log can contain an Internet address, a timestamp, the
                  requested URL, the referring URL, and a user agent, we might be tempted to com-
                  bine this information with knowledge of a site's layout to infer the path of specific
                  users through a site. If we see that an access to “index.html” is soon followed by a
                  request for “help.html,” with both requests originating from the same network ad-
                  dress, we might think that these requests came from the same user. Matching user
                  agents and an entry indicating that the referrer page for the “index.html” page was
                  the “help.html” page might increase our confidence in this theory. Judiciously used
                  web cookies can provide additional useful information.
                     Unfortunately, things are not necessarily that simple. Firewalls and other network
                  address schemes may make requests that come from multiple users appear as if they
                  all come from the same machine. Web browsers can easily be configured to provide
                  misleading information for the user agent fields and referrer fields. Web redirects
                  may create misleading requests, appearing as if a user intended to visit a site, when
                  they had no such interest. Cookies may be disabled by some users and browsers.
                     Despite the problems, access logs can be used to generate useful models of user
                  paths (Pirolli and Pitkow, 1999). Augmenting these records with additional information
   338   339   340   341   342   343   344   345   346   347   348