Skip to main content

User Activity Investigation of a Web CRM System Based on the Log Analysis

  • Conference paper
Advances in Web Intelligence (AWIC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3528))

Included in the following conference series:

Abstract

There are many tools for the analysis of Web system log files based on statistical or web mining methods. However they do not always provide information specific for a given system. In the paper special method for investigation of the activity of web CRM system users is presented. The method has been designed and implemented in the web CRM system at a debt vindication company. There was basic foundation, that analysis should be carried in three time groups, i.e. working days in hours of work, working days beyond hours of work and idle days. Besides, system should make it possible to perform analysis for a chosen employee, position, day, hour and CRM system file. The results of investigation allowed to reveal anomalies in staff activity, what was not possible using common web log analyzer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajith, A.: Business Intelligence from Web Usage Mining. Journal of Information & Knowledge Management 2, 375–390 (2003)

    Article  Google Scholar 

  2. Eirinaki, M., Vazirgiannis, M.: Web mining for web personalization. ACM Transactions on Internet Technology 3, 1–27 (2003)

    Article  Google Scholar 

  3. Free powerful and featureful tool that generates advanced web, ftp or mail server statistics, graphically (2004), http://www.awstats.org/

  4. Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  5. Robertson, J.: The Value of Web Statistics (2001) , http://www.intranetjournal.com/articles/200202/km_02_27_02a.html

  6. Srivastava, J., Cooley, R., Deshpande, M., Tan, P.-T.: Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data. SIGKDD Explorations 1, 1–12 (2000)

    Article  Google Scholar 

  7. Wong, C., Shiu, S., Pal, S.: Mining Fuzzy Association Rules for web access case adaptation. In: Proceedings of the Workshop Program at the Fourth International Conference on Case-Based Reasoning (2001)

    Google Scholar 

  8. Wrbel, M.: CRM Systems. Design and Implementation for a Chosen Company. M.Sc. Thesis (in Polish). Wrocław University of Technology (2004)

    Google Scholar 

  9. Zawitz, M.W.: Web statistics - Measuring user activity. Bureau of Justice Statistics (1998), http://www.ojp.usdoj.gov/bjs

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Trawiński, B., Wróbel, M. (2005). User Activity Investigation of a Web CRM System Based on the Log Analysis. In: Szczepaniak, P.S., Kacprzyk, J., Niewiadomski, A. (eds) Advances in Web Intelligence. AWIC 2005. Lecture Notes in Computer Science(), vol 3528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11495772_66

Download citation

  • DOI: https://doi.org/10.1007/11495772_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26219-0

  • Online ISBN: 978-3-540-31900-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics