Browse Definitions :
Definition

click tracking

Contributor(s): Laura Fitzgibbons

Click tracking is a method used by companies to observe and analyze how many viewers visit a website, and digest its content, over a specific period of time. In addition to tracking the sheer amount of traffic and time spent on each page, companies can analyze how the visitors interact with their site. Every time a user clicks onto a webpage or piece of content with their mouse, the action is logged by the client using the click tracking technique. As the user continues to browse, these signals are gathered for further analysis.

Clicks can also be referred to as events, or actions that take place as a result of a click. Events can range from initiating a pop-up window, interacting with multimedia elements, downloading or printing a file and logging into an account.

This method can generate insights useful to sales and marketing staff to measure the effectiveness of a particular message or campaign, better understand the target audience and test user experience.

Examples of click tracking

It is possible to track whether a visitor to a site interacts with different kinds of content. Some examples include the following:

  • Buttons, tabs, scroll bars and pull-down menus are pressed.
  • External links are copied, hovered over or opened.
  • When online forms are started, abandoned, completed or submitted.
  • A video is started, stopped, replayed or paused.
  • A visitor begins a podcast and how far into the episode they listen.
  • Gadgets and widgets are hovered over or interacted with.
  • An image is clicked on, opened or saved.
  • The movement of the mouse is recorded over the period of time the visitor is on the webpage.
This was last updated in November 2018

Continue Reading About click tracking

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How can the granular level of click tracking detail available be used to improve a website for its visitors?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close