educational

A Look at Common Sources of Traffic Leaks

When looking at the number of people visiting your website, it’s important to realize that not all of them are making it through your website and taking the desired actions — simply because they are leaking out of your site’s seams.

The following is a look at some of the more common sources of website traffic leaks (as well as some unexpected sources) along with some tips on how to fix them.

Keep your site fresh in their minds and these visitors may well return — plugging the leak through which they escaped.

Understanding the problem of traffic leaks means understanding the ideal navigation path that you wish visitors to your website to take and realizing that the more choices that you give to someone, the harder it is to get them to choose the option you want them to.

For example, do you want visitors to first click an enter link and then a join link? Anything that takes away from that path is taking a prospect one step further from a sale.

For site owners, traffic leaks take away potential sales, but may have other benefits, such as garnering new visitors in exchange. For affiliates, however, traffic leaks on their sponsor’s sites only serve to siphon sales with no benefit in exchange, making an analysis of the sponsor’s site imperative before sending hard-earned traffic the program, because what’s good for the goose may not always be good for the gander.

One example of a traffic leak that may be viewed differently by program owners and their affiliates is a telephone number. While this is not a concern for many adult content sites offering digital downloads (except perhaps when a phone charge is used for billing), tangible goods sites, such as those offering discs and novelties, may see extensive use of a toll-free number — without having to pay an affiliate for the referral…

Beyond phone numbers and snail mail, other surprises may be lurking for visitors.

One hidden source of traffic leaks could be forgotten or malformed redirects within a website’s .htaccess file or through a script. For example, some sponsors promote mobile redirect scripts that may be over-enthusiastic — redirecting the growing number of tablet users to the sponsor, skewing your stats and costing you virtual “desktop mode” visitors.

Country and language based redirects also play a role, since these tools send traffic to the specified location often before any analytics scripts come into play, so it’s important that you understand under what circumstances your site’s visitors are being redirected —and to where they are being redirected to.

It is the “where” in the above equation that makes all of the difference.

Some traffic leaks require a balancing act between their potential to bring traffic as well as their potential to lose it. For example, many sites include social media icons that are intended to encourage Likes, pluses, tweets and more — but they do so at the risk of sending visitors off to these notoriously addictive portals — something to consider when wondering just how many adult website visitors will actually share links to their favorite porn sites with their broader social circles, which could include family and coworkers.

One common traffic leak requires a balancing act between its potential to bring traffic and revenues, as well as its potential to lose visitors, sales and even much of your content — the “webmasters” or “affiliates wanted” link.

The line between affiliate and customer is often a very blurry one, with savvy surfers signing up to your program in order to glom its promotional content in one big bundle — and even using their status as a basis for requesting a free membership.

Other potential traffic leaks that can fall under the category of “distractions” include housekeeping items such as privacy and refund policies, terms and conditions statements, and links to other necessary legal documents and policy statements.

Be sure to include a “back” and/or “home” link on these pages so that visitors won’t have trouble getting back to the parts of your site you want them on.

Another hidden traffic leak that you may not have considered occurs after a visitor finishes viewing a specific piece of content, for example an article, image or video clip.

Here the leak is caused because the website visitor doesn’t know what to do next and will thus exit the site, or click blindly within it.

For some, by far the worst source of traffic leaks are reciprocal links on a homepage, since the visitor has a good chance of simply leaving your site for greener pastures, which is an especially problematic concern for affiliates, who receive no benefit for this traffic. Although the site owner should receive fresh visitors from this linking partner in return, just as with the social media icons, careful study of your analytics will reveal if the leak (and link) is a worthwhile exchange.

And then there’s those moments when your cup runneth over; when so many visitors arrive at your site at the same time that its infrastructure crumbles under the load, spilling traffic out over the top, only to be greeted by error pages and a non-loading website.

This situation arises when your site receives an unexpected surge in traffic, such as when a popular mainstream media source mentions your URL, or a high volume site lists a gallery or submitted video clip.

When you can plan these events, such as a scheduled ad buy or content placement, then arrangements can be made with your webhosting provider to accommodate the expected influx of visitors.

Finally, consider that email, newsletters and other followon communications can be used as a sponge to soak up traffic that leaks from your site, simply because they were done for the day. Keep your site fresh in their minds and these visitors may well return — plugging the leak through which they escaped.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Account-to-Account Payments: The New Banking Disruptor?

So much of our industry relies upon Visa and Mastercard to support consumer payments — and with that reliance comes increased scrutiny by both brands. From a compliance perspective, the bar keeps getting raised until it feels like we end up spending half our time making sure we are compliant rather than growing our business.

Cathy Beardsley ·
profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
opinion

Understanding the Latest Server Processors

Over the last decade, we mostly stopped talking about CPU performance. Recently, however, there has been a seismic and exciting change in the CPU landscape, due to innovation by a chip company called Advanced Micro Devices (AMD).

Brad Mitchell ·
Show More