Conference Paper

Off the beaten tracks: exploring three aspects of web navigation.

DOI: 10.1145/1135777.1135802 Conference: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006
Source: DBLP

ABSTRACT This paper presents results of a long-term client-side Web usage study, updating previous studies that range in age from five to ten years. We focus on three aspects of Web navigation: changes in the distribution of navigation actions, speed of navigation and within-page navigation. "Navigation actions" corresponding to users' individual page re- quests are discussed by type. We reconfirm links to be the most important navigation element, while backtracking has lost more than half of its previously reported share and form submission has become far more common. Changes of the Web and the browser interfaces are candidates for causing these changes. Analyzing the time users stayed on pages, we confirm Web navi- gation to be a rapidly interactive activity. A breakdown of page characteristics shows that users often do not take the time to read the available text or consider all links. The performance of the Web is analyzed and reassessed against the resulting require- ments. Finally, habits of within-page navigation are presented. Although most selected hyperlinks are located in the top left corner of the screen, in nearly a quarter of all cases people choose links that require scrolling. We analyzed the available browser real estate to gain insights for the design of non-scrolling Web pages.

0 Bookmarks
 · 
87 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Personal Information Management (PIM) refers to the practice and the study of how people acquire, organize, maintain, retrieve, archive and discard information for various reasons in physical and digital worlds. Many PIM tools are available for managing information on our desktop computers while many research prototypes have tried to augment or replace them. The development of these tools was based on knowledge drawn from the fields of psychology, human-computer interaction, information retrieval, knowledge management and research in the PIM field. Different metaphors and ways of organizing were introduced. However, the prevailing beliefs are that most of these prototypes were not extensively tested and that the radical design (not addressing real-world issues) and quick abandonment of prototypes prevented transfer to mainstream products. This paper looks at what has been developed and learnt, what has been transferred to mainstream applications, discusses the possible reasons behind these trends and challenges some parts of the above-mentioned beliefs.
    Interacting with Computers 01/2013; 27(2):73-98. DOI:10.1093/iwc/iwt059 · 0.73 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A network covert channel is created that operates by modulating the time between web resource accesses, with an 'average web user' read-time used as a reference. While the covert channel may be classified as timing based, it does not operate by changing deterministic protocol attributes such as inter-packet delay, as do most timing based network covert channels. Instead, our channel communicates by modulating transaction level read-time, which in the web browsing case has significant non-deterministic components. The channel is thus immune to methods typically used to detect timing based network covert channels.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Long-term user preferences are a common target of personalized Web content and interfaces. However, it is also the user's information need at the very moment which is of essential importance. This paper deals with the recognition of a person's current task by the surfing behavior. The surfing behavior is represented by several attributes derived from an event log which contains user actions, such as mouse and scroll moves etc. The challenge is to select those attributes which best describe the behavior such that a conclusion on the user's task is possible. A pilot study was conducted where users performed exercises, each corresponding to one of the predefined user tasks Fact Finding, Information Gathering and Just Browsing. The detailed event logs we gained from the experiments allowed the consideration of stronger behavioral features which, moreover, formed a novel composition of attributes. Decision trees and Naive Bayes classification were applied on this composition, leading to accuracy values of up to 95% of correctly identified user tasks.

Full-text (2 Sources)

Download
54 Downloads
Available from
May 31, 2014