24/7 |
24 hours a day, seven days a week. |
Abandonment |
When a visitor exits or leaves a conversion process on a website and does not return later in the session. See also Conversion and Conversion Funnel. |
A/B Testing |
A method of comparing visitor response to two different versions of your website, typically two different landing pages for an advertising campaign, and measuring the effect that each makes on conversions. See also Conversion and Landing Page. |
Accuracy |
The ability of a measurement to match the actual value of the quantity being measured. Accuracy is the foundation upon which your marketing analytics should be built. If you can't trust that your data is accurate, you can't make confident decisions. In statistical terms, accuracy is the width of the confidence interval for a desired confidence level. See also Unique Visitors. |
Acknowledgement Page |
A page displayed after a visitor completes an action or transaction. For example, a thank-you or a receipt page. Acknowledgement pages are often important in Scenario Analysis, where it is an indicator of a completed scenario. |
Acquisition |
The process of gaining customers through the means of different marketing strategies. For the purposes of Web Analytics, it often refers specifically to the process of attracting visitors to a website. |
ACT |
After-Click Tracking is the recording the activity path of a visitor to a site after they have clicked on an email link. |
Actionable Data |
Information that allows you to make a decision or can be made use of in any way. |
Ad / Advert |
A link that takes a visitor to a website when clicked on, usually graphic or text. See also Banner Ad. |
Ad Click |
A click on an advertisement on a website which takes a user to another site. See also Ad View. |
Ad Hoc Query |
A non-standard inquiry posed to a database of information as the need arises. See also Query. |
Ad View |
A webpage that presents an ad. There may be more than one ad on an ad view. Once visitors have viewed an ad, they can click on it. |
Address |
The unique location of a specific webpage. See also URL. |
Address Book |
A software application that stores and manages personal contact information. Typically built into email packages. |
ADSL |
Asymmetric Digital Subscriber Line. High-speed, always-on internet access via standard domestic telephone lines, usually faster in one direction. See also DSL. |
Adware |
Software code on a computer that transmits or receives data to or from a remote host for the primary commercial purpose of delivering advertising content or performing other advertising functions. |
Affiliate Marketing / Affiliate Programme |
A method of promoting web businesses in which an affiliate is rewarded for providing customers. Compensation could be made based on a value for visits, subscriptions, leads, sales, and so on. See also PPC. |
Aggregate Data |
A summary of collected information which groups data together without individual-level statistics. |
Algorithm |
A mathematical formula used by search engines to determine which websites to present, in which order, in their search results. See also Search Engine. |
Analogue Signal |
A continuously-modulated waveform, such as that produced by a human voice or musical instrument. See also Digital Signal. |
Analytics |
See Web Analytics. |
Anti-Virus Programs |
Updatable software that scans and monitors your computer’s memory for viruses, usually includes removal and recovery tools. |
API |
Application Programming Interface is a system that a computer or application supplies in order to allow requests for service to be made of it by other computer programs. APIs allow data to be exchanged between computer programs, and a standard software API method includes Open Database Connectivity (ODBC). |
Applet |
A small program that can be embedded in an html page, for a specific purpose, for example to communicate with a host server. |
Application |
Any computer program, such as a word processor, email client, spreadsheet, database etc. |
ARPANET |
Advanced Research Projects Administration Network. A communications network developed in the 1960s by the US defence department as a network which could survive a nuclear attack – and later evolved into the Internet. |
ASCII |
American Standard Code for Information Interchange. The worldwide standard for the codes used by computer systems to represent all the upper and lower-case Latin letters, numbers, punctuation, etc. There are 128 standard ASCII codes each represented by a 7 digit binary number in the range 0000000 to 1111111. |
ASP |
Active Server Pages are a set of software components that run on a web server and let developers build dynamic webpages. |
Attachment |
A file sent together with a message, usually via email. |
Attrition |
The erosion of your customer base over time. The opposite of customer retention. |
Auth |
A transaction type in which a transaction is pre-authorised and post-authorised in one step. Auth is used only to process purchases of goods or services that do not require physical shipment, e.g., donations, registrations, or "soft" (digital) goods that are delivered electronically. |
Authentication |
The process by which a system validates a user's identity, such as comparing a log-in name and password with entries on a stored list before permitting access. |
Authorisation |
A request to the payment processor, to approve the reservation of funds in a customer's account. The request can involve several transaction types, including Auth, PreAuth and PostAuth. |
Autocomplete |
Software that keeps a record of previous contacts, web addresses, or text phrases, matching these to your keyboard input so that it can finish typing for you. |
Automated Reconciliations |
The process of passing data between electronic systems so that the completeness and integrity of the data is verified during the transfer. |
Autoresponder |
A software facility which can handle electronic requests for brochures, product information etc. and automatically generates an email response. |
Average Lifetime Value |
The average of the lifetime value of a visitor or multiple visitors during the reporting period, where each visitor's lifetime value is the total monetary value of a visitor's past orders since visitor tracking began. |
AVS |
Address Verification Service. A fraud-prevention service used to verify that the billing address and post code supplied by an online customer match the address registered with the card-issuing bank. |
B2B |
Business To Business. A business model for online trade between businesses. See also B2C and C2C. |
B2C |
Business To Consumer. A business model for online trade between organisations and individuals. See also B2B and C2C. |
Backbone |
A high-speed line or series of connections that forms a major pathway within a network, much as a motorway system comprises the major pathways in a road transport network. |
Bandwidth |
The maximum amount of data that can be handled by a given electronic connection, usually measured in megabits per second (Mbp/s). A page of English text requires about 16,000 bits (0.016Mb), while one second of full-screen video requires around 10,000,000 bits (10Mb). |
Banner Ad |
A banner is a standard-format advertisement placed on a website either above, below or on the side of the main content, usually linked to the advertiser's website. Banner ads may contain text, animated graphics, video and sound. The Interactive Advertising Bureau (IAB) has created a standard set of banner ad sizes (Medium Rectangle, Rectangle, Leaderboard, Wide Skyscraper) into a set of guidelines called the Universal Ad Package. |
Batch |
A group of transactions that have been captured and are waiting for processing. |
BCC |
Blind Carbon Copy. Facility within an email or messaging application to send multiple copies of a message, without revealing the list of addresses to each recipient. |
Benchmark |
A standard by which something can be measured or judged. Often used as a means to ensure everyone in your organization is measuring performance against the same goals. |
Billing Address |
The address to which a customer's credit card billing statement is mailed, used to verify that an online customer is the actual cardholder. |
Biometrics |
Methods of identifying unique human characteristics for security purposes, for example fingerprinting, iris scanning and dynamic signature verification. |
Bit |
The smallest measure of digital data, represented by a single binary digit, 0 or 1. |
Blog / Web Log |
A web diary. Initially, a blog was a personal web space for an individual, but is now also used as a media outlet for multi-national companies. |
Bluetooth |
A local wireless communications standard that allows electronic devices to share information, for instance to synchronise address books among PCs, PDAs and some mobile phones. |
Bookmark |
A means of storing and indexing information, typically used by browser applications to store visited web addresses. |
Bot |
See Robot. |
Bounce |
See Bounce Rate and Email Bounce. |
Bounce Rate |
Bounce rate is the percentage of single-page visits or visits in which the person left your site from the entrance (landing) page. |
BPS |
Bits Per Second. A measurement of how fast data is pushed through a communications link, for example a 56Kbps modem is designed to move data at 56,000 bits per second. |
Bricks And Mortar |
Of the physical world, as opposed to the online environment, usually refers to High Street retail outlets. |
Brochureware |
Website publicity material that is basically an adaptation of existing marketing tools, and not optimised for online interaction. |
Broken Link |
An incorrect HTML hyperlink that does not deliver the user to the specified location. |
Browser |
Software application that can access and view information stored on websites and organised into HTML pages (Microsoft Internet Explorer for example). |
Business Intelligence |
While some would claim it's an oxymoron, business intelligence refers to a category of software and tools designed to gather, store, analyse, and deliver data in a user-friendly format to help organizations make more informed business decisions. Software types include dashboarding, data mining, data warehouses, and other information systems. |
Business User |
An individual that uses electronic systems for business or commercial purposes. |
Byte |
A measurement of digital data, originally equivalent to 8 bits, although 16, 32 and 64-bit bytes are now common. Regardless of the byte length, a kilobyte (Kb) equals 1024 bytes, a megabyte (Mb) equals 1,024,000 bytes and a gigabyte (Gb) equals 1024,000,000 bytes. |
C2C |
Consumer to Consumer. A business model in which consumers transact with other consumers, e.g via eBay. See also B2B and B2C. |
Cable Modem |
A device that enables broadband internet connections over cable TV networks. |
Cache |
A type of local memory built into a PC or software that stores information in order to speed up processing. Web browsers store webpage content in a cache and the next time a user visits the same page, any elements that haven't changed are loaded from the cache rather than from the site. |
Campaign Analysis |
the tracking of activity originating from a marketing campaign, so you can compare your campaigns and evaluate their effectiveness. |
Captcha |
Completely Automated Public Turing Test to Tell Computers and Human Apart. Webmasters employ this method to tell computers and humans apart requiring the user to view a code and type it in an entry box. See also Webmaster. |
Captured |
The status of a transaction that has gone through Auth or PostAuth and is awaiting processing. See also Auth and PostAuth. |
CAM |
Card Authentication Method. A method by which a plastic card is determined genuine and not counterfeit. Current chip cards provide the best CAM available. |
Card Issuer |
A financial institution that provides cards via a contractual relationship with a cardholder. |
Card Refund |
Refund to a customer, created by return of goods or services paid for by a payment card. |
Card Schemes |
Organisations that manage and control the operation and clearing of card transactions, e.g. MasterCard, Visa, Switch, American Express, Diners Club International. |
CVM |
Cardholder Verification Method. The means by which the presenter of the card may be identified as genuine, for example by a signature or PIN number. |
Card-Not-Present |
A type of credit card transaction that does not require the cardholder and card to be physically present. All online transactions are card-not-present transactions. |
Card-Present |
A type of credit card transaction in which the cardholder and the card are physically present, for example in a shop. Typically, the credit card passes through a card reader and the cardholder enters their PIN or signs a form. |
Carrier |
Organisation that provides delivery services direct to the consumer. |
CC |
Carbon Copy. Used to send a copy of an email message to more than one recipient. |
CA |
Certification Authority. A trusted third-party organisation or company that issues digital certificates used to create digital signatures and public-private key pairs. The role of the CA in this process is to guarantee that the individual granted a unique certificate is, in fact, who he or she claims to be. Usually, the CA has an arrangement with a financial institution, such as a credit card company, which provides information to confirm an individual's claimed identity. CAs are crucial to data security and electronic commerce because they guarantee that parties exchanging information are genuine. |
CGI |
Common Gateway Interface. Software protocols used by a web server to communicate with other applications hosted on the same machine. |
Change Controls |
Definition of a person who has the ability to make changes to data being stored and programs that are being used. |
Chargeback |
The reversal of a previously Settled transaction in which the merchant bank debits the amount of the sale from the merchant's account because the cardholder has disputed the charge. |
Chat Program |
An application that allows real-time text messaging between two or more users connected over a network. |
Chat Room |
A virtual location, hosted on an internet server, where users can ‘join’ a room and send real-time text messages to other visitors in the same room. |
Chip card |
A plastic payment card containing a microchip which has memory and processing capabilities, recognisable by a gold contact plate that allows communication with a card reader. Also known as integrated circuit cards (ICCs) or smart cards. |
Churn |
The tendency for subscribers to switch between service providers, whether prompted by costs, quality of service levels or suitability of subscription packages. |
CIFAS |
CIFAS is the UK's Fraud Prevention Service. They can be found at www.cifas.org.uk. |
Click-And-Mortar |
Click-and-mortar describes a store that exists both online and in the physical world, for example John Lewis. |
Click Fraud |
The act of purposefully clicking a paid search ad with the intention of incurring a charge for the advertiser. See also PPC. |
Clickstream |
A virtual trail that a user leaves behind while surfing the internet. A clickstream is a record of a user's activity on the internet, including every website and every page of every website that the user visits, how long the user was on a page or site, in what order the pages were visited, any newsgroups that the user participates in and even the e-mail addresses of mail that the user sends and receives. Both ISPs and individual websites are capable of tracking a user's clickstream. Such data is becoming increasingly valuable to internet marketers and advertisers. |
Client |
A software program, for example a web browser or FTP application that is designed to contact and communicate over a network from a SERVER program. |
Client Error |
An error that occurs because of an invalid request by the visitor's browser. See also Return Code. |
CMS |
Content Management System. A software platform that helps in the management of content on a website. |
CNAME |
A canonical name record makes one domain name an alias of another. |
Commerce Server |
Software that manages the main functions of an online store, such as product display, online ordering, and inventory management. The software works in conjunction with online systems to process card payments. |
Compression Programs |
Freeware or shareware applications that are able to read and reorganise one or more data files into a more compact form, usually recognised by a “.zip” or “.rar” suffix. To reduce connect time, downloadable applications and large file transfers are often compressed in this way. |
Consumer |
An individual who purchases products and/or services for private use. |
Content Provider |
An organisation or individual that devises content for an online enterprise, in the form of webpages, ads, audio, video, newswires, listings etc. The content may be available free of charge or for a fee. |
Conversion |
An action that signifies a completion of a specified activity. For many sites, a user converts if they buy a product, sign-up for a newsletter, or download a file. |
Conversion Funnel |
The series of steps that move a visitor towards a specified conversion event, such as an order or registration signup. See also Abandonment. |
Conversion Rate |
The Conversion Rate, or Conversion Ratio, is the percentage of visitors who do convert. Cookie deletion can have an impact on your conversion rate because if a cookie is being systematically deleted, repeat visitor rates will be under-counted and new visitor rates will be over-counted, thus skewing the conversion rate metric by which you analyse your site's overall effectiveness. |
Cookie |
Text file passed to a web browser by a web server. The main purpose of cookies is to identify users and prepare customized webpages for them. When you enter a website using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your web browser which stores it for later use. The next time you go to the same website, your browser will send the cookie to the web server. The server can use this information to present you with custom webpages. So, for example, instead of seeing just a generic welcome page you might see a personalised page.
Session Cookie: Also called a transient cookie. A cookie that is erased when the user closes the Web browser. The session cookie is stored in temporary memory and is not retained after the browser is closed. Session cookies do not collect information from the user’s computer. They typically will store information in the form of a session identification that does not personally identify the user.
Persistent Cookie: Also called a permanent cookie or a stored cookie. A cookie that is stored on a user’s hard drive until it expires (persistent cookies are set with expiration dates) or until the user deletes the cookie. Persistent cookies are used to collect identifying information about the user, such as Web surfing behaviour or user preferences for a specific website.
See also First and Third-Party Cookies. |
Counterfeit Card |
A fake credit or debit card which has been printed, embossed or encoded so as to appear legitimate, or a valid card that has been altered or re-encoded with fake data. |
CPC |
Cost Per Click. Advertisers pay for clicks to their websites through a medium. It is often used in the form Average CPC to so that advertisers know how much each lead is costing them. See also PPC. |
CPG |
Consumer Packaged Goods. |
CPM |
Cost Per Thousand (impressions). A system of advertising where an agreed amount is paid for the number of times an ad is seen, regardless of any subsequent action. |
Crawler |
An intelligent robot program that searches for information on the World Wide Web. It is designed to locate new documents and new sites by following hypertext links and indexing information based on predefined criteria. See also Robot. |
Creative |
For the purposes of Web Analytics, "creative" describes the characteristics of a marketing activity, such as colour, size and messaging-for example, a "Buy Now" graphic. |
Credit |
A transaction type that transfers funds to the cardholder's account, typically used to refund a customer's money for an order that was previously Settled, e.g., returns or overcharges. |
Credit Card Authorisation |
The process whereby a merchant (or a cardholder through an ATM) requests permissions for the card to be used for a particular transaction. |
Credit Card Processor |
A third party that processes credit card information. |
CRM |
Customer Relationship Management. CRM entails all aspects of interaction a company has with its customer, whether sales or service related. Computerisation and the proliferation of self-service channels like the web are leading to more of these relationships being managed electronically. |
Cross-Border Card Fraud |
Fraud perpetrated using a payment card, or card number, in a country other than the country of issue. |
CTR |
Clickthrough Rate. A clickthrough rate is the rate at which visitors "click through" from one website page or property to the next. A good indication of an ad's effectiveness. |
Customer Segment |
A powerful aspect of relationship marketing in which you target sub-section or group of customers who share a specific trait or set of behaviours. See also Demographics and Psychographics. |
CVC or CVV |
Card Verification Code (for MasterCard) or Card Verification Value (for Visa). Encrypted numeric value contained in the data on the magnetic stripe which can be checked to ensure that the information has not been altered in anyway. |
CVM |
Card Verification Method. A method used to ensure that a credit card being used in a purchase is in the possession of its owner. The CVM security code is a 3 or 4 digit code imprinted on the physical credit card, but not embedded or encrypted in the magnetic stripe. The code is a 3-digit number located on the signature strip on the back of Visa and MasterCard cards, after the card number. It is on the front of American Express cards, and 4 digits. |
Cyberspace |
Coined by science fiction writer William Gibson, this is the name for the virtual space you are navigating when you are negotiating the web. |
Dashboard |
A Web Analytics dashboard provides all of your critical metrics in one place to help you understand the health or performance of your business. |
Data Warehouse |
A logical collection of information gathered from many different operational databases used to create business intelligence that supports business analysis activities and decision-making tasks, primarily, a record of an enterprise's past transactional and operational information, stored in a database designed to favour efficient data analysis and reporting. |
Database |
A set of files containing data on products, services, customer details, purchasing history – organised in a way that allows extremely flexible manipulation. |
Data Mining |
The process of collecting and analysing data to provide information sorted in flexible ways. |
Demographics |
The physical characteristics of human populations and segments of populations, often used to identify consumer markets. Demographics can include information such as age, gender, marital status, education, and geographic location. See also Psychographics. |
Dial-up |
A low-speed, temporary connection to the internet using a modem over a standard, dialled telephone connection. |
Digital Cash |
A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real banknotes, digital cash numbers are unique. Each one is issued by a bank and represents a specific sum of money. Like real cash, it is anonymous and reusable, when digital cash is sent from a buyer to a vendor, no personal information is exchanged. |
Digital Certificate |
An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the addressee with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA). The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509. |
Digital Receipt |
An electronic (email / PDF / printable webpage) acknowledgement of an order placed from a commerce-enabled website. |
Digital Signal |
All digital data is represented by one of two binary states – off and on, corresponding to 0 or 1. Strings of 1s and 0s can be organised to represent text, images, audio and video information in efficient, non-degradable formats. Devices such as modems and codecs can translate digital to analogue signals and vice versa. See also Analogue Signal. |
Digital Signature |
An electronic signature that can be used to authenticate the identity of the sender of an email or of the signer of an electronic document. It can also be used to ensure that the original content of the message or document has been conveyed unchanged. |
Digital Wallet |
Encryption software that works like a physical wallet during electronic commerce transactions. A wallet can hold a user's payment information, a digital certificate to identify the user, and shipping information to speed transactions. The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input information at the merchant's site. Most wallets reside on the user's PC. |
Directory |
A website that lists addresses of other sites and online resources. Unlike search engines, they are maintained by humans and have a subject-based menu hierarchy to make it easy to find sites. Yahoo! (http://www.yahoo.com) is the most popular example of a directory site. |
Disaster Backup And Recovery |
Duplicated software and hardware that provide a backup copy of a computer system. Recovery procedures are predefined and used to re-establish the original environment in the event of a disaster. |
DNS |
Domain Name System. A management system for internet addresses. Every Domain Name corresponds to an IP address in the form of a series of digits, such as 194.217.172.1. These addresses are allocated and maintained by a network of registrars overseen by a central authority, ICANN. |
Domain |
An area in the Internet specified by a URL address. The top-level domain is at the end after the dot and the second-level domain comes before it, and shows where in the top-level domain the address can be found. For example in www.johnlewis.com, ".com" is the top-level domain and "johnlewis" is the second level domain. |
Domain Name |
A unique name given to every website. It is used to physically locate a website over the internet. A domain name consists of three different parts with each separated by a dot, for example www.johnlewis.com. These signify host server type, the unique name of the website and the purpose/type/country location. |
Download |
The process of making a copy of digital data over a network, i.e. transferring it from one computer to another. See also Upload. |
Downtime |
Period during which a computer system or network is not functioning due to a power, hardware or software failure. |
DRAM |
Dynamic random-access memory chips, typically used for temporary storage in a PC. RAMs lose their memory information when the power is switched off. |
DSL |
Digital Subscriber Line. A DSL circuit uses standard telephone subscriber cabling, but in addition to voice information, transmit digital pulses at inaudible high frequencies that are capable of providing broadband-speed internet access to the home. DSL systems are the basis of today’s broadband revolution. See also ADSL. |
DTI |
Department of Trade and Industry. UK government body that regulates national business operations, including e-commerce. |
E-Book |
A book that's been condensed into a special text format and available to download, usually at low cost. A special reader may be required to view e-books. |
EBPP |
Electronic Bill Presentment and Payment. EBPP is the process by which companies bill customers and receive payments electronically over the internet. |
eBusiness / E-Business / Ebusiness |
See eCommerce. |
ECN |
Electronic Communications Network. Electronic trading systems that automatically match buyers' and sellers' orders. |
eCommerce / E-commerce / Ecommerce |
The act of selling goods and services online via a standalone site or through an online auction centre. |
EDI |
Electronic Data Interchange. Transfer of data between different companies using private networks or the internet. EDI is becoming increasingly important as an easy mechanism for companies to buy, sell, and trade information. ANSI has approved a set of EDI standards known as the X.12 standards. |
Electronic Purse |
A means of storing electronic funds locally, for use in ecommerce transactions. |
Email |
Electronic mail, a means to send messages and files across the internet from one computer to another. |
Email Bounce |
The number of emails that were sent but never reach the intended receiver. |
Emoticons |
Otherwise known as smileys. These are shorthand ways of expressing emotion in email messages by using punctuation marks such as :) for I am happy and :( for I am sad. |
Encryption |
A method of using complex mathematical algorithms to scramble data so that only the intended recipient can decode it. |
End-To-End Verification |
A payment scheme in which credit card information is passed from the customer directly to the bank for verification, i.e. bypassing the retailer. |
Entry Page |
See Landing Page. |
EPoS |
Electronic Point of Sale. A smart till or other device for processing card payments. |
e-Retailer |
Individual or business selling goods or providing paid-for services online. |
ERP |
Enterprise Resource Planning. ERP is a business management system that integrates all facets of the business, including planning, manufacturing, sales, and marketing. |
Ethernet |
The most common protocol used to network computers in a LAN. Ethernet can transfer about 10,000,000 bits-per-second and is compatible with almost all computer systems. See also LAN. |
ETSI |
European Telecommunications Standards Institute, the governing body of telecoms standards within Europe. |
EVA |
Electronic Virtual Assistant, like MS Word’s paperclip or XP’s search dog – an avatar-like creature that helps a user to understand an application. |
Exit Page |
The last page viewed on a visitor's path through a site. |
Extranet |
An extension of an organisation's internal network to other locations or users external to the enterprise. |
E-zine / eZine |
An electronically-published magazine, available on the web. |
FAQ |
Frequently Asked Questions, a listing of common enquiries and responses on a particular subject, typically as a section of a website. |
Favorite |
A means of creating an index of local and internet documents, files and websites so that they are easily accessible. |
File |
Any named collection of data stored in a physical location on a PC or the web. Can be text, graphic, sound, video etc. |
Filters |
Filters are a system of rules that can be set up to automatically handle incoming electronic data, for example to channel email messages to a particular location or user. |
Filtering |
A means of narrowing the scope of a report or view by specifying ranges or types of data to include or exclude. |
Firewall |
An electronic security measure that can prevents unauthorised users from gaining entry to a private network. |
First Party Cookies |
For most business models, first-party cookies are regarded as the most reliable method to measure visitor activity. Whereas a third-party cookie is usually set by an analytics vendor, (an entity with whom the user does not have a relationship), a first-party cookie is set by the business, an organization with whom the website visitor has specifically chosen to do business. Because of this relationship, first-party cookies are deemed more secure by the user. Also see Cookies and Third Party Cookies. |
Floor Limit |
A limit agreed between the merchant and acquiring bank for each sale, above which authorisation must be obtained by the merchant. |
Form |
An HTML page which passes variables back to the server. These pages are used to gather information from users. |
Forward |
To send on or redirect an incoming message to another location or recipient. |
Frames |
Separate areas of a webpage that can be manipulated individually via scroll buttons. |
Freeware |
A software application that can be downloaded, used and distributed free of charge. See also Shareware. |
Frequency |
The number of times a visitor has visited a site during a reporting period. Average Frequency is the average of frequencies of all the visitors during the reporting period. Frequency is a retention metric and is part of RFM (Recency, Frequency, Monetary) analysis. See also Recency and Latency. |
FTP |
File Transfer Protocol. A set of standards for transferring files from one computer to another computer across a network. |
Funnel |
See Conversion Funnel. |
Hacker |
An individual who intentionally breaks into someone else's computer system or network, to bypass security measures and access private data. |
Hardware |
Computer machinery and equipment such as hard disks, printers, monitors, network cards etc. See also Software. |
HDSL |
High Speed Digital Subscriber Line, similar to ADSL, but operating at higher transfer speeds in both directions. See also DSL. |
Header |
Identifying information that precedes and describes the attached content. Emails messages contain an automatically-generated header that describes the when the message was sent, to whom, from whom, and which path it took through the Internet. |
History |
A record of a user’s progress while using an application. Web browsers track the history of sites visited, pages viewed etc. |
Hit |
A hit is a unit of measure of a visit to a webpage. In fact each element of a page (each image, banner, frame etc) generates a hit as the page is accessed, so page hits are an unreliable measure of visitor traffic. websites often display a hit count on their pages, but rarely how this count is calculated. |
Hit Counter |
A piece of web server software that racks up the number of file requests relating to a webpage or site. |
Home Page / Homepage |
Either the page your web browser automatically loads when you launch it, or the initial welcome page of a website. |
Home Page URL |
The local path or Internet URL to the default page of the website. |
Host |
A network computer that is a repository for services available to other computers on the network. |
Hosting |
The activity of housing, serving and maintaining files for one or more internet resources. Hosting is part of the core business of ISPs. |
HTML |
HyperText Markup Language. The code that underlies every webpage. Your browser reads the HTML and then generates the page on your screen. |
HTML Editors |
Word processor-like software applications that are used to design and construct web documents. |
HTTP |
HyperText Transfer Protocol. The protocol used for communication between a web browser and a website. |
HTTPS |
HyperText Transfer Protocol secure. A secure protocol that uses SSL to, for example, encrypt payment card data traffic between the browser and web server. See also SSL. |
Hypertext |
Text that contains links to other documents by means of clicking on a hot spot to load and view the related document. |
IAB |
Interactive Advertising Bureau, found at www.iab.net. |
IHCF |
Industry Hot Card File. List of lost or stolen cards, available for checking by merchants. |
Impression |
The exact number of times a specific webpage (or webpage element such as an online advertisement) displayed to a user, using a counter by which site owners can monitor traffic. See Hits. |
Information Security |
All-encompassing term that refers to the security of the information systems that are used and the data that is processed. |
Intelligent Detection Systems |
Computer systems developed by the banking industry to help identify fraudulent card use. Also known as knowledge-based systems and neural networks. |
Interactive TV |
Interactive TV gives the viewer more control over their television viewing in a variety of ways, by sending information to the broadcaster, to order a pay-per-view programme, buy or bid for sale items, select a different camera viewpoint, place a bet on a sports event etc. |
Internet |
The worldwide collection of linked networks that uses the TCP/IP suite of protocols to communicate with one another. At the heart of the internet is a backbone of high speed communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational, personal and other computer systems. |
IE |
Internet Explorer. Microsoft’s web browser application, currently the market leader. |
Intranet |
A private network inside a company or organisation generally using the same kinds of software found on the public internet, but for internal use only. |
IP |
Internet Protocol is a standard used for communicating data. |
IP Address |
A unique number used to identify a computer connected to the Internet consisting of 4 parts separated by dots, e.g. 123.234.56.2, where each part is in the range 0-255. Every computer on the internet has a unique IP address. |
IRC |
Internet Relay Chat. A system whereby users can connect via the internet to an IRC server to exchange real-time text messages and files. |
ISDN |
Integrated Services Digital Network. An early method of dial-up digital network access. ISDN provides two 64bps data channels and a 16bps control channel for voice and data communications over a telephone line. |
ISP |
Internet Service Provider. A company that provides access to the internet over a telephone, DSL, cable or leased line connection. ISPs have permanent connections to the net and banks of servers to handle the exchange of high volumes of data. |
ISPA |
The UK Association of Internet Service Providers. |
iTV |
See Interactive TV. |
Mac |
An abbreviation for Apple Macintosh or Apple Mac. A popular type of computer with an easy-to-use graphical interface. Macs are often used by designers, video editors and music producers. |
Mail Server |
The hardware and software used by your Internet Service Provider to send and receive your email. |
Mailbox |
The place where your messages are saved by your ISP until you decide to download them. When they arrive on your computer, they are downloaded to your inbox. |
Mailing List |
Subject-based forums whose messages are distributed by email. You send your email address to a central point from which broadcast messages are received. |
MPM |
Marketing Performance Management. Drives stronger customer relationships and higher lifetime value, based on a framework of established goals, consistent metrics, constant optimization across the entire marketing organization and across every customer touch point. |
M-Commerce |
The equivalent of e-commerce in the mobile environment. |
Megabyte |
1024 kilobytes. |
Merchant |
A person or enterprise that buys and sells products and services to businesses or consumers. |
Merchant Account |
A bank account required by a shop to receive payments through electronic media such as credit cards. It can be considered as a virtual bank account in that receives electronic money. |
Merchant ID |
A number issued to a merchant by their acquiring bank. The bank uses the Merchant ID to identify a specific merchant in credit card transactions. Each store must have its own Merchant ID. |
Metadata |
Data that describes data. Metadata describes how and when and by whom a particular set of data was collected, and how the data is formatted. Metadata is essential for understanding information stored in information repositories. |
Meta Tags |
Meta Tags are information inserted into the Header area of a webpage. Other than the Title Tag, information in the Header area of a webpage is not seen by those viewing the page with a Browser. Instead, Meta information in this area is used to communicate information that a human visitor may not be concerned with. Meta Tags, for example, can tell a browser what "character set" to use or help to identify a site in a search engine's indexing process. |
Metrics |
Metrics are a system of parameters or ways of quantitative assessment of a process that is to be measured, along with the processes to carry out such measurement. Metrics define what is to be measured. |
MIME |
Multi-purpose Internet Mail Extensions. A standard for attaching non-text files to standard internet mail messages. Non-text files include graphics, spreadsheets, formatted word-processor documents, sound files, etc. |
MODEM |
Modulator-Demodulator. Hardware required to access computer networks via a telephone line. The modem converts digital data into analogue audio pulses that travel across telephone networks, and vice versa. |
MP3 |
MPEG-1 Audio Layer-3. A standard technology and format for compression of audio information into a smaller, digital file while preserving the original quality and level of sound. |
P2P |
Peer-To-Peer. A network scheme in which individual computers communicate directly with each other to share files. |
Packet Switching |
The method used to move data around on TCP/IP networks. Data coming out of a machine is broken up into chunks, each chunk includes the address of where it came from, and where it is going. This enables chunks of data from many different sources to co-mingle on the same lines, and be sorted and directed to different routes by special machines along the way. This way many people can use the same lines at the same time. |
Page |
A document provided by the server, including HTML, scripts, and text files. Images, sound files and video are not considered pages. Documents are defined by the system administrator, but generally include all static content, such as complete html pages. Dynamic pages are created with variables and do not exist anywhere in a static form. Forms are scripted pages which get information from a visitor that gets passed back to the server. |
Page Impression |
See Impression. |
Page Tag |
A piece of JavaScript code embedded on a webpage and executed by the browser when the page is viewed. See also Log Files. |
Page View |
This is generally defined as a request to load a single page of a website. On the web, a page request would result from a web surfer clicking on a link on another page that points to the page in question. See also Hit. |
Paid Inclusion |
Marketing model in which a website pays a fee to a search engine, which guarantees that the website will be displayed in the returned search results for specifically-named search terms. |
Parameters |
These are located in the URL immediately after a question mark and followed by an equal sign and a return value, known as name=value. |
Partial Shipment |
A process in which a store ships / provides only some of the goods / services in a single order. Therefore, the PostAuth amount would be less than the amount of the approved PreAuth for the order. |
Password |
A secret word or unique combination of characters, usually alpha-numerical, that permits access to an application or system. Passwords enhance the security of a network by ensuring that only authorised users have access to specific files or data. |
Password Maintenance |
Procedures and processes used to establish and maintain the password portion of the authentication service that allows access to application systems. |
Path |
A path is the click pattern a visitor uses as they traverse through multiple pages. |
Payment Gateway |
Computer system that acts as a mediator between a merchant account and an online shop. The payment gateway authenticates payment card information and manages real-time charging from a payment card. |
PDA |
Personal Digital Assistant. A kind of electronic Filofax with email capability. |
PEF |
Personal Experience Factor is the customer's interaction with your website, advertising, or brand. |
Performance Indicators |
See KPI. |
PIE |
Persistent Identification Element is a type of tag that is attached a user's browser, providing a unique ID similar to traditional cookie coding. |
PIN |
A unique number used to authorise a bank or credit card. |
PKI |
Public Key Infrastructure. A mechanism for secure communications over a network or the internet. |
Platform |
The operating system (such as Microsoft Windows) used by a visitor to the site. |
Plug-In |
A plug-in is a piece of software that enhances the capabilities of an application. |
POA |
Point of Action is the location of a conversion event. |
POC |
Percentage of Completion or Proof of Concept. |
Point-Of-Sale |
A facility, such as a web form, through which an online merchant accepts new customer orders. |
POP3 |
Post Office Protocol 3. A protocol used by email systems to retrieve messages from a mail server. |
Portal |
A website which serves as a gateway or point of access for a user to access other sites. A portal gathers together on a single site a set of thematically arranged links to a range of other resources. |
POS |
Point of sale, the physical or virtual checkout. |
PostAuth |
A transaction that converts a PreAuth transaction into a Captured state for settlement. In the case of partial shipments, the PostAuth amount may be less than the PreAuth amount. PostAuths are usually initiated after purchased goods have been shipped. See also Auth and PreAuth. |
Postmaster |
The person at an ISP, or company, in charge of email services. |
PPC |
Pay Per Click or paid search uses search keywords that cost a certain amount for each customer click on that term in order to get to your site. See also Organic Search. |
PPP |
Pay-Per-Performance. A method of remuneration in online advertising. |
PPP |
Point to Point Protocol. A protocol that allows a computer to use a modem connection to make a TCP/IP connection to the internet. |
PreAuth |
A transaction type in which a cardholder's account is verified to be in good standing, that is, the card is valid, is within its limit, and any applicable Address Verification Service checks have been performed and approved. If the verifications are approved, the total amount of the order is reserved against the cardholder's account balance. PreAuths are used if goods are to be physically shipped or in other cases for which the merchant must first verify whether the order can be fulfilled. An approved PreAuth is followed by a PostAuth, which prepares it for settlement. See also Auth and PostAuth. |
Processing Controls And Edits |
Processing controls and edits are sections of application or operating system code that focus on ensuring the integrity of the "interaction" with the user. An example of this type of code would be code that would ensure that all required changes to a set of databases were made as part of a transaction. |
Protocol |
A set of rules governing the transmission and reception of data. |
Psychographics |
Data used to build customer segments based on attitudes, values, beliefs and opinions as opposed to the factual characteristics. See also Demographics. |
Public Domain |
Signifies that copyright holders have either donated their products to the public, or copyright has expired. If something is in a public domain, you can use it without infringing any rights. |
Reach |
The size of the audience reading, viewing, hearing, or interacting with a message in a given period of time. Reach can be understood as either an absolute number, or a fraction of a population. |
Rear-View Mirror Metrics |
Metrics that measure what has occurred. For example campaign response metrics are such metrics that tell you how a campaign performed. |
Recency |
The number of days since a visitor's most recent visit during a reporting period. See also Frequency and Latency. |
Referrals |
The location that visitors come from, particularly the sites, search engines or directories. See also Non-Referrals. |
Relationship Marketing |
Relationship marketing is a type of marketing that traces its roots to direct response marketing. It emphasizes building long-term relationships with customers rather than individual transactions. It requires understanding customer needs as they go through life cycles of interacting and purchasing from organizations, and requires that marketers accurately determine customer intent in order to provide them the right message at the right time. |
Retailer |
An organisation selling goods or services. |
Retention |
A corporate strategy to maintain a customer base by any cost-effective means. |
Return Code |
The return status of the request which specifies whether the transfer was successful and why. Numbers are three digits long and fall into the following groups:
100s - Information
200s - Success
300s - Redirection
400s - Client Error
500s - Server Error
|
RF-ID tags |
Radio Frequency Identity Tags. Smart tags on stock items that can be read by handheld devices for monitoring stock movements. |
RFM Analysis |
Recency, Frequency, Monetary analysis. |
Right Of Withdrawal |
The period within which a consumer can legally withdraw, or change their mind, about a purchase made or contract entered into. A new European directive defines this period as seven days. |
ROAS |
Return on Advertising Spending. |
Robot |
A robot program designed to perform pre-selected task over a network, for example to seek out and store certain types of information. Search engines typically use robots to scour the internet for new websites and appropriate keywords to include in their databases. Also known as Bots. |
ROI |
Return on Investment. |
ROMI |
Return on Marketing Investment. |
Router |
A device that routes a network connection to multiple computers on a network, and vice versa. |
RSA Encryption |
A public-key encryption technology developed by RSA Data Security, Inc, based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time. The RSA algorithm has become the de facto standard for industrial-strength encryption, especially for data sent over the internet. It is built into many software products, including web browsers. |
RSS |
Really Simple Syndication. A type of web syndication used by news sites and blogs which provides summaries of information with links to the complete content. |
Sampling |
In statistics, the selection of individual observations intended to yield knowledge about a population, especially for the purposes of statistical inference. |
Scalability |
The ability of a computer application or product - or indeed a website - to continue to function well (or even better) as it is altered in size to meet customers’ needs. |
Scenario Analysis |
A report showing the amount of activity at each step of a defined scenario, plus conversion rates for each transition from step to step as well as for the whole process. Examples of scenarios are check-out, registration, or application sequences. |
Script |
See JavaScript. |
Search Engine |
A search engine is a program that helps you find information on the web. |
Secure Server |
A computer that handles encrypted data for secure transactions so any communications are kept private, e.g. when sending credit card details to an e-retailer. |
Segment |
A grouping of customers, defined by website activity or other data, which can be used to target them effectively. |
SEM |
Search Engine Marketing. A means to increase the visibility of a website in search engine results pages. |
SEO |
Search Engine Optimization. The improvement of rankings for relevant keywords in search results by adjusting website structure and content to make them more easily read and understood by a search engine's software programs. |
Server |
A large and powerful computer which provides other computers with information. websites are stored on web servers, email is handled by mail servers and newsgroups are handled by news servers. |
Server Error |
A fault occurring at the computer hosting information. See also Return Code. |
Service Provider |
See ISP. |
Session |
A session is a record of one visitor browsing through a site. |
Sessionisation |
This is the process for creating a session. Sessionisation methods are ways in which you can define a session. Web Analytics solutions have multiple sessionisation methods such as cookies, IP Address, IP+ Agent and so on. These methods tell the Web Analytics system how they should count a series of page requests from the same individual or browsing machine. |
SET |
Secure Electronic Transaction. A standard that enables secure credit card transactions on the internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and MasterCard. SET provides secure communication of credit card numbers to card issuers. |
Settlement |
The process by which money is transferred between a merchant and a cardholder. |
Shareware |
A shareware program is one you can try free of charge, though often for a limited period, or with certain features disabled. A registration fee is usually payable to continue using it. See also Freeware. |
Shipper
(Carrier / Transporter) |
Organisation that handles all aspects of the delivery of physical goods. |
Shop Window Site |
A site that advertises a company's business and provides information about its products and services, but does not have payment facilities to sell products directly. |
Shopping Basket |
See Shopping Cart. |
Shopping Cart |
Software that accepts, manages and organises online orders. The interface between a company's website and its deeper infrastructure, that allows consumers to select merchandise, review selections, make modifications or additions, and purchase. |
Signature |
A few lines of text that are automatically added to the end of your email program. |
SIM |
Subscriber Identification Module. Code that identifies a user to a mobile network. |
Skimming |
Form of counterfeit fraud whereby a card's magnetic stripe details are electronically copied on to another card. |
SKU |
Stock Keeping Units. |
SLA |
Service level agreement,. |
Smart Card |
A credit-card-sized device that contains an electronic chip that can be read by another device to authorise transactions. |
SME |
Small/medium sized enterprise. |
S-MIME Encryption |
Secure/MIME, a version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA public key encryption technology. See also MIME. |
SMM |
Social Media Marketing. Describes the use of social networks, online communities, blogs, wikis or any other online collaborative media for marketing, sales, public relations and customer service. |
SMS |
Short Message Service. Enables text messaging on mobile phones. |
SMTP |
Simple Mail Transfer Protocol. A standard protocol for exchanging email. |
SOAP |
Simple Object Access Protocol. Microsoft's open standards-based interoperability protocol that uses XML to provide a common messaging format to link together applications and services anywhere on the internet regardless of operating system, object model, or programming language. |
Software |
As opposed to the hardware or equipment associated with computers, software is the instructions needed to make the system work. It provides a series of instructions that performs a particular task. These are also known as programs. See also Hardware. |
SOHO |
Small office, home office. |
Spam |
Unsolicited email, the electronic equivalent of junk mail. |
Spamglish |
Keyword-rich content which is often meaningless. Spamglish includes keyword repetition purely in an attempt to increase the page's position in the webpage. |
Spamming |
(1) The act of sending Spam.
(2) Abusing the normal search engine ranking techniques, such as using hidden text, excessive repetition of a keyword, over submission of webpages, and creating many pages or sites with the same content. Search engines penalize or ban pages and sites using these techniques. |
Spider |
A spider is a program that visits websites and reads their pages and other information in order to create entries for a search engine index. See also Robot. |
Spyware |
User-installed applications that may have hidden, malicious functions. These can include launching popup ads, tracking usage, capturing keystrokes and passwords and, sending this information over the internet – all without the owners consent or knowledge. Spyware is often concealed in free software, for example in security applications. |
SQL |
Structured Query Language. A specialised programming language for sending queries to databases. |
SSL |
Secure Socket Layer. Software built into a web browser application that encrypts data sent over the internet, designed to keep credit card numbers confidential. When a webpage URL starts with "https:", it is using SSL to encrypt both the web request and the response you see on your browser. |
SSL Encryption |
A system that uses two keys to encrypt data - a public key known to everyone and a private or secret key known only to the recipient of the message. Browsers support SSL, and websites use the protocol to receive confidential user information, such as credit card numbers. |
Sticky Sites |
So-called 'sticky' sites are those sites with enough attractive information, services or retail facilities to encourage visitors to return to that site. |
Store |
An merchant enterprise that offers products for sale and accepts and processes credit payments. |
Suffix |
The last part of a domain that can be used to identify the type of organization or location of a site. |
Surf |
To browse the web, searching for interesting pages, often in a random manner. |
System Security Patches |
Security updates in the form of digital code that are periodically downloaded to upgrade server and operating systems. |
Tag |
See Page Tag. |
TAT |
Time, attention and trust, a customer relations term. |
TCP / IP |
Transmission Control Protocol / Internet Protocol. A set of rules that govern communication over the internet. |
Temporary internet files |
A temporary storage area on a PC where copies of visited webpages are listed. |
Third Party Transaction Fees |
A percentage or per-transaction fee that is deducted from the merchant’s gross credit card receipts and paid to a third party credit card processor. |
Third-Party Cookie |
Hosted Web Analytics services track visitor behaviour by inserting a small piece of tracking code onto each page of a site. Because the cookie is served by an analytics vendor rather than your own site, the cookie is considered third-party. |
Thumbnail |
A term used by graphic designers and photographers for a small representation of a larger image. |
TID |
Terminal ID. A number assigned by an acquiring bank to identify a specific point -of-sale terminal. For online transactions, one TID is typically assigned to each merchant website or business unit. |
Tracking Facility |
A process which allows customers to track their order remotely. |
Traffic |
(1) The load on a communications device or system. One of the principal jobs of a system administrator is to monitor traffic levels and take appropriate action when traffic becomes heavy.
(2) A measurement of the amount of users that visit a website. |
Transaction |
A record of each action that is taken on an order. An order may have multiple transactions, e.g., a Sale and a Credit. |
Transaction Type |
A label identifying the nature of the transaction that determines how the transaction will be handled. For example, a PreAuth transaction reserves funds. The most common transaction types are Auth, PreAuth, PostAuth, Credit, and Void. |
Transporter |
Carrier or Shipper. Organisation that handles delivery of physical goods to specified address. |
Trojan |
A program which appears harmless, but contains malicious code that can be used to attack a system. |
Turnkey solution |
An ‘out of the box’ solution, usually a combination of hardware, software and training. |
W3 |
Alternative way to describe the World Wide Web. |
W3C |
World Wide Web Consortium develops interoperable technologies (specifications, guidelines, software, and tools) to lead the Web to its full potential. |
WAN |
Wide Area Network. A private network of computers spread over a large geographical area. |
WAP |
Wireless Application Protocol. Packaged internet content for handheld wireless devices, such as mobile phones, pagers, two-way radios, smartphones and PDAs. |
Web Analytics |
The measurement, analysis and interpretation of the behaviour of visitors to a website or web application in order to provide the necessary management insight to enable informed action to be taken to optimise the site’s performance in meeting its objectives. E-commerce companies often use Web Analytics software to measure such concrete details as how many people visited their site, how many of those visitors were unique visitors, how they came to the site (i.e., if they followed a link to get to the site or came there directly), what keywords were used to search for the site, how long spent viewing a given page or on the entire site, and what links were clicked to leave. Web Analytics software can also be used to monitor whether or not a site's navigation scheme is working properly. With this information, website administrators can determine which areas of the site are popular and which areas of the site do not get traffic and can then use this data to streamline the design to improve user experience. |
Web Browser |
See Browser. |
Webpage |
A single HTML document. Websites consist of a series of such pages. |
Web Space |
Hard disk space on a server dedicated to hosting websites. Internet Service Providers rent facilities for customers to build individual sites. |
Webmaster |
A person who maintains the information on a website. |
Website |
A website is a collection of webpages, on particular domain name or sub-domain on the World Wide Web on the Internet. Usually it is made up of a set of webpages created using HTML and accessible via HTTP. |
Website Traffic |
The number of visitors to a website. |
What If |
A type of analysis that allows an end-user to pose hypothetical situations against their data to model or predict outcomes. |
Wizard |
A helper utility within a software application that performs a particular task. For example, a letter wizard within a word processing program would guide you through the necessary steps to write different types of correspondence. |
WML |
Wireless mark-up language, the equivalent of HTML in the wireless environment. |
World Wide Web (WWW) |
A network of web servers connected by the Internet,that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files, permitting jumps from one document to another simply by clicking on hot spots. Some people use "internet" and "the web" interchangeably, even though the web is a service that operates over the internet. |
WYSIWYG |
‘What You See is What You Get’ is a feature of a computer application. Such applications are designed to display on screen the exact appearance of the desired output. |