Behavioral Targeting Online Advertising

Author(s):  
Jun Yan ◽  
Dou Shen ◽  
Teresa Mah ◽  
Ning Liu ◽  
Zheng Chen ◽  
...  

With the rapid growth of the online advertising market, Behavioral Targeting (BT), which delivers advertisements to users based on understanding of their needs through their behaviors, is attracting more attention. The amount of spend on behaviorally targeted ad spending in the US is projected to reach $4.4 billion in 2012 (Hallerman, 2008). BT is a complex technology, which involves data collection, data mining, audience segmentation, contextual page analysis, predictive modeling and so on. This chapter gives an overview of Behavioral Targeting by introducing the Behavioral Targeting business, followed by classic BT research challenges and solution proposals. We will also point out BT research challenges which are currently under-explored in both industry and academia.

Data Mining ◽  
2013 ◽  
pp. 1320-1338
Author(s):  
Jun Yan ◽  
Dou Shen ◽  
Teresa Mah ◽  
Ning Liu ◽  
Zheng Chen ◽  
...  

With the rapid growth of the online advertising market, Behavioral Targeting (BT), which delivers advertisements to users based on understanding of their needs through their behaviors, is attracting more attention. The amount of spend on behaviorally targeted ad spending in the US is projected to reach $4.4 billion in 2012 (Hallerman, 2008). BT is a complex technology, which involves data collection, data mining, audience segmentation, contextual page analysis, predictive modeling and so on. This chapter gives an overview of Behavioral Targeting by introducing the Behavioral Targeting business, followed by classic BT research challenges and solution proposals. We will also point out BT research challenges which are currently under-explored in both industry and academia.


2008 ◽  
pp. 2850-2855
Author(s):  
Yücel Saygin

Data regarding people and their activities have been collected over the years, which has become more pervasive with widespread usage of the Internet. Collected data usually are stored in data warehouses, and powerful data mining tools are used to turn it into competitive advantage. Besides businesses, government agencies are among the most ambitious data collectors, especially in regard to the increase of safety threats coming from global terrorist organizations. For example, CAPPS (Computer Assisted Passenger Prescreening System) collects flight reservation information as well as commercial information about passengers. This data, in turn, can be utilized by government security agencies. Although CAPPS represents US national data collection efforts, it also has an effect on other countries. The following sign at the KLM ticket desk in Amsterdam International Airport illustrates the international level of data collection efforts: “Please note that KLM Royal Dutch Airlines and other airlines are required by new security laws in the US and several other countries to give security customs and immigration authorities access to passenger data. Accordingly, any information we hold about you and your travel arrangements may be disclosed to the concerning authorities of these countries in your itinerary.” This is a very striking example of how the confidential data belonging to citizens of one country could be handed over to authorities of some other country via newly enforced security laws. In fact, some of the largest airline companies in the US, including American, United, and Northwest, turned over millions of passenger records to the FBI, according to the New York Times (Schwartz & Maynard, 2004).


Author(s):  
Diana Luck

In recent times, customer relationship management (CRM) has been defined as relating to sales, marketing, and even services automation. Additionally, the concept is increasingly associated with cost savings and streamline processes as well as with the engendering, nurturing and tracking of relationships with customers. Much less associations appear to be attributed to the creation, storage and mining of data. Although successful CRM is in evidence based on a triad combination of technology, people and processes, the importance of data is unquestionable. Accordingly, this chapter seeks to illustrate how, although the product and service elements as well as organizational structure and strategies are central to CRM, data is the pivotal dimension around which the concept revolves in contemporary terms. Consequently, this chapter seeks to illustrate how the processes associated with data management, namely: data collection, data collation, data storage and data mining, are essential components of CRM in both theoretical and practical terms.


Author(s):  
Yücel Saygin

Data regarding people and their activities have been collected over the years, which has become more pervasive with widespread usage of the Internet. Collected data usually are stored in data warehouses, and powerful data mining tools are used to turn it into competitive advantage. Besides businesses, government agencies are among the most ambitious data collectors, especially in regard to the increase of safety threats coming from global terrorist organizations. For example, CAPPS (Computer Assisted Passenger Prescreening System) collects flight reservation information as well as commercial information about passengers. This data, in turn, can be utilized by government security agencies. Although CAPPS represents US national data collection efforts, it also has an effect on other countries. The following sign at the KLM ticket desk in Amsterdam International Airport illustrates the international level of data collection efforts: “Please note that KLM Royal Dutch Airlines and other airlines are required by new security laws in the US and several other countries to give security customs and immigration authorities access to passenger data. Accordingly, any information we hold about you and your travel arrangements may be disclosed to the concerning authorities of these countries in your itinerary.” This is a very striking example of how the confidential data belonging to citizens of one country could be handed over to authorities of some other country via newly enforced security laws. In fact, some of the largest airline companies in the US, including American, United, and Northwest, turned over millions of passenger records to the FBI, according to the New York Times (Schwartz & Maynard, 2004).


2010 ◽  
pp. 2041-2054
Author(s):  
Diana Luck

In recent times, customer relationship management (CRM) has been defined as relating to sales, marketing, and even services automation. Additionally, the concept is increasingly associated with cost savings and streamline processes as well as with the engendering, nurturing and tracking of relationships with customers. Much less associations appear to be attributed to the creation, storage and mining of data. Although successful CRM is in evidence based on a triad combination of technology, people and processes, the importance of data is unquestionable. Accordingly, this chapter seeks to illustrate how, although the product and service elements as well as organizational structure and strategies are central to CRM, data is the pivotal dimension around which the concept revolves in contemporary terms. Consequently, this chapter seeks to illustrate how the processes associated with data management, namely: data collection, data collation, data storage and data mining, are essential components of CRM in both theoretical and practical terms.


Author(s):  
Yücel Saygin

Data regarding people and their activities have been collected over the years, which has become more pervasive with widespread usage of the Internet. Collected data usually are stored in data warehouses, and powerful data mining tools are used to turn it into competitive advantage. Besides businesses, government agencies are among the most ambitious data collectors, especially in regard to the increase of safety threats coming from global terrorist organizations. For example, CAPPS (Computer Assisted Passenger Prescreening System) collects flight reservation information as well as commercial information about passengers. This data, in turn, can be utilized by government security agencies. Although CAPPS represents US national data collection efforts, it also has an effect on other countries. The following sign at the KLM ticket desk in Amsterdam International Airport illustrates the international level of data collection efforts: “Please note that KLM Royal Dutch Airlines and other airlines are required by new security laws in the US and several other countries to give security customs and immigration authorities access to passenger data. Accordingly, any information we hold about you and your travel arrangements may be disclosed to the concerning authorities of these countries in your itinerary.” This is a very striking example of how the confidential data belonging to citizens of one country could be handed over to authorities of some other country via newly enforced security laws. In fact, some of the largest airline companies in the US, including American, United, and Northwest, turned over millions of passenger records to the FBI, according to the New York Times (Schwartz & Maynard, 2004).


2018 ◽  
Vol 3 (2) ◽  
pp. 369 ◽  
Author(s):  
Zhukov A. N. ◽  
Leonov P.Y.

Determining threshold values of key economic security indices describing an economic situation in any country is an important stage in the assessment of the country’s economic stability. A research was undertaken to determine how this problem can be effectively solved with such Data Mining algorithm as decision trees. According to the results of the research the effectiveness of the method was proved, but only with sufficient amount of data available. However, such data collection has a number of significant problems. These problems can be attributed to the following factors: the data for the analysis are presented with varying frequency, there is no possibility to use data over longer time intervals, the lack of a common list of indicators of economic security, which are used in different countries. The purpose of this paper is to analyze the existing problems of the data collection and to submit proposals of solving them. Keywords: Economic security, Issues of data collection, Data Mining, thresholds.


2019 ◽  
Vol 3 (4) ◽  
pp. 772
Author(s):  
Leni Suryani

This research is motivated by the competence of teachers in preparing poor learning outcomes tests and has not been able to measure high-level thinking skills, especially critical thinking skills. Therefore the researcher seeks to improve teacher competence in compiling tests on student learning outcomes based on critical thinking skills through academic supervision. This study uses a school action research design that has stages of planning, implementation, observation, and reflection. This research was conducted for 2 months starting April 9 to May 17, 2019 for Physics teachers in the 7 target schools. Data is sourced from interviews with teachers and test documents prepared by the teacher. Data collection techniques include observation, interviews and documentation. Data analysis through the stages of data collection, data simplification, data presentation, conclusion drawing. Data were analyzed using assessment rubrics adjusted to indicators of critical thinking skills. The results of this study conclude that teacher competence in preparing tests of learning outcomes based on critical thinking skills has increased from the first cycle with a percentage of 61% with sufficient categories to 76% with good categories in cycle II.


Author(s):  
Nur Aini

<p>The purpose of this study was to determine: (1) Suitability of 2013<br />Curriculum Annual Program Preparation, (2) Suitability of Compilation of<br />the 2013 Curriculum Semester Program. (3) Appropriate components of<br />the Learning Implementation Plan (RPP) based on Permendikbud No.22<br />2016. The approach used in this study is a qualitative approach The data<br />analysis technique used is data collection, data reduction and data <br />presentation conclusions. The technique of guaranteeing the validity of the <br />data is done by checking trust, checking examination and checking<br />dependency. The results of the study can be concluded that the results of<br />the Analysis of Suitability of Annual Programming, Semester Program,<br />and Learning Implementation Plan can be categorized as "In Accordance"<br />because the results are obtained based on the scores of the Annual<br />Program, Semester Program and Learning Implementation Plan (RPP)<br />compiled by the teacher Islamic religious education in SMP Negeri 1<br />Percut Sei Tuan Deli Serdang.</p>


Sign in / Sign up

Export Citation Format

Share Document