approximately 1kB of compacted logs. Therefore,
any participant using a connection that supports the
transmission of 1kB per second plus the average of
bandwidth connection used by the participant to surf
the Web will allow the model to behave accordingly
to the design and does not interfere with the use of
the website. If it is not the case, the accumulated
amount of log data will reach a configuration limit
and the tool will became inactive. The validation of
the model was performed capturing events during
real use of the website of a research group called
Todos Nós (www.todosnos.unicamp.br), since part
of its audience uses assistive technology. The data
captured during 60 days resulted 85 recorded
sessions, 6 of them coming from assistive
technology users. The data collected resulted in
more than 270 thousands of events.
5 CONCLUSIONS
The model proposed showed to be lightweight and
addressed requirements stated in Santana and
Baranauskas (2008). Also, it can supply data to other
applications to discover usage patterns.
During implementation and use of this model,
maintainers and developers must always keep
security and privacy in mind, since the information
being captured and transmitted can be critic if it is
not filtered and/or made in a safer way. Accordingly,
users must always be aware of what is happening in
their device and accept to participate before the
logger starts to record events, since the free record
of this kind of information without warning the user
would characterize the tool as a spyware.
The main advantages of the presented model in
comparison with the approaches presented in section
2 are: modularization and configurability of all
components, browser and plug-in independent, and
compaction, which was not cited in referred works.
Improvements may be obtained through different
data compression techniques and transmission plug-
in independent approaches allowing the inclusion of
security mechanisms.
ACKNOWLEDGEMENTS
Proesp/CAPES and FAPESP.
REFERENCES
Alur, D., Crupi, J. and Malks, D., 2003. Core J2EE
Patterns: Best Practices and Design Strategies. 2
nd
Edition. Prentice Hall PTR.
Arroyo, Ernesto; Selker, T. and Willy, W., 2006. Usability
Tool for Analysis of Web Designs Using Mouse
Tracks. Work-in-Progress In Proc. of CHI 2006.
Basham, B., Sierra, K., Bates, B. 2004. Head First
Servlets and JSP: Passing the Sun Certified Web
Component Developer Exam (SCWCD). O’Reilly.
Crockford, D., 2006a. JSONRequest. Available at:
http://json.org/JSONRequest.html
Crockford, D., 2006b. The <module> Tag. Available at:
http://www.json.org/module.html
Dojo Toolkit, 2006. Cross Domain XMLHttpRequest
using an IFrame Proxy. Available at:
http://dojotoolkit.org/node/87
Etgen, M. and Cantor, J., 1999. What does getting wet
(web event-logging tool) mean for web usability? In:
Proc. of 5th Conf. on Human Factors & the Web.
Gamma, E., Helm, R., Johnson, R. and Vlissides, J., 1995.
Design Patterns: Elements of Reusable Object
Oriented Software. Reading: Addison Wesley.
Hand, D., Mannila, H. and Smith, P., 2001. Principles of
Data Mining. MIT Press.
Hilbert, D.M. and Redmiles, D.F., 2000. Extracting
usability information from user interface events. ACM
Comput. Surv. 32(4). pp. 384–421.
Levitt, J., 2005a. Fixing AJAX: XMLHttpRequest
Considered Harmful. Available at:
http://www.xml.com/pub/a/2005/11/09/fixing-ajax-
xmlhttprequest-considered-harmful.html
Levitt, J., 2005b. JSON and the Dynamic Script Tag:
Easy, XML-less Web Services for JavaScript.
Available at: http://www.xml.com/pub/a/2005/12/21/
json-dynamic-script-tag.html
Levitt, J.,2006. Flash to the Rescue. Available at:
http://www.xml.com/pub/a/2006/06/28/flashxmlhttpre
quest-proxy-to-the-rescue.html
Netscape Communications Corporation, 1999. Client-Side
JavaScript Reference.
Paganelli, L. and Paternò, F., 2002. Intelligent analysis of
user interactions with web applications. In: IUI ’02:
Proc. of the 7th Int. Conf. on Intelligent User
Interfaces, ACM. pp. 111–118.
Ruderman, J., 2001. The Same Origin Policy. Available
at:http://www.mozilla.org/projects/security/component
s/same-origin.html
Ruderman, J., 2007. Signed Scripts in Mozilla. Available
at:http://www.mozilla.org/projects/security/component
s/signed-scripts.html
Santana, V.F. de and Baranauskas, M.C.C. (2008) A
Prospect of Websites Evaluation Tools Based on
Event Logs. In IFIP, Volume 272; Human-Computer
Interaction Symposium; Springer, pp. 99–104.
Skeen, D., 2007. Eye-Tracking Device Lets Billboards
Know When You Look at Them. Available at:
http://www.wired.com/gadgets/miscellaneous/news/20
07/06/eyetracking.
Woo, D. and Mori, J., 2004. Accessibility: A tool for
usability evaluation. In APCHI. Volume 3101 of
LNCS, Springer. pp. 531–539
ICEIS 2009 - International Conference on Enterprise Information Systems
168