Search results

1 – 10 of over 43000
Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 December 2005

Hamid R. Jamali, David Nicholas and Paul Huntington

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

3202

Abstract

Purpose

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

Design/methodology/approach

The advantages and limitations of log analysis are described and then past studies of e‐journals' use and users that applied this methodology are critiqued. The results of these studies will be very briefly compared with some survey studies. Those aspects of online journals' use and users studies that log analysis can investigate well and those aspects that log analysis can not disclose enough information about are highlighted.

Findings

The review indicates that although there is a debate about reliability of the results of log analysis, this methodology has great potential for studying online journals' use and their users' information seeking behaviour.

Originality/value

This paper highlights the strengths and weaknesses of log analysis for studying digital journals and raises a couple of questions to be investigated by further studies.

Details

Aslib Proceedings, vol. 57 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 1 October 2006

Gi Woong Yun, Jay Ford, Robert P. Hawkins, Suzanne Pingree, Fiona McTavish, David Gustafson and Haile Berhe

This paper seeks to discuss measurement units by comparing the internet use and the traditional media use, and to understand internet use from the traditional media use…

Abstract

Purpose

This paper seeks to discuss measurement units by comparing the internet use and the traditional media use, and to understand internet use from the traditional media use perspective.

Design/methodology/approach

Benefits and shortcomings of two log file types will be carefully and exhaustively examined. Client‐side and server‐side log files will be analyzed and compared with proposed units of analysis.

Findings

Server‐side session time calculation was remarkably reliable and valid based on the high correlation with the client‐side time calculation. The analysis result revealed that the server‐side log file session time measurement seems more promising than the researchers previously speculated.

Practical implications

An ability to identify each individual user and low caching problems were strong advantages for the analysis. Those web design implementations and web log data analysis scheme are recommended for future web log analysis research.

Originality/value

This paper examined the validity of the client‐side and the server‐side web log data. As a result of the triangulation of two datasets, research designs and propose analysis schemes could be recommended.

Details

Internet Research, vol. 16 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 February 2021

Ljubomir Paskali, Lidija Ivanovic and Dragan Ivanović

The purpose of this paper is to determine the digital library usage patterns as a means of improving the system, as well as the user experience, to give appropriate recognition to…

Abstract

Purpose

The purpose of this paper is to determine the digital library usage patterns as a means of improving the system, as well as the user experience, to give appropriate recognition to the most popular dissertations’ authors and to measure the interest of non-academic users for dissertations defended at the University of Novi Sad (UNS).

Design/methodology/approach

A logging module of the digital library of theses and dissertations of University of Novi Sad (PHD UNS) application has been implemented. The module recorded the messages relating to the search queries and downloads over a three-year period from 2017–2019. These logs are analysed using the Elasticsearch, Logstash and Kibana (ELK) technology stack and the results are shown using graphs and tables.

Findings

The analysis determined the perfect time for weekly maintenance of the system, defined a recommendation for improving the system and revealed the most popular dissertations. A significant number of downloads and queries originated from citizens, i.e. users outside the academic community.

Practical implications

The conducted analysis defined recommendations for the system improvement which can be used by PHD UNS research and development (R&D) team and revealed the most popular dissertations which are used for the promotion of its authors through faculties’ websites.

Originality/value

To the best of the authors’ knowledge, this is the first study of ELK based log analysis of a Serbian language documents’ repository. Besides, the value of results for the PHD UNS R&D team and UNS rector team, the study proves that PhD digital library presents an important Open Science communication channel for presenting scientific results to the citizens.

Article
Publication date: 30 December 2019

Tae-Young Kim, Ju-Yeon Gang and Hyo-Jung Oh

This study explored spatial usage of a public library based on activity logs produced by real users. The purpose of this paper is to provide preliminary data for decision-making…

Abstract

Purpose

This study explored spatial usage of a public library based on activity logs produced by real users. The purpose of this paper is to provide preliminary data for decision-making when establishing the library operation policy.

Design/methodology/approach

To achieve the goal, the author collected a variety of data including 274,242 seat reservations logs, 3,361,284 collection usage logs, and 96,098 user information for the four years in which the National Library of Korea, Sejong actually operated. The crawled data were analyzed statistically in terms of demography, month, day of week, time of day and room by room. The author conducted additional in-depth analysis according to the external factors such as weather or social demographic environment. Finally, the author discussed several issues and verified feasibility of the proposals to support decision-making in operating a library in conclusion with a secondary librarian interview.

Findings

The usage rate in all the spaces of the National Library of Korea, Sejong, has been increasing since its opening, and, in particular, the usage rate increases sharply in January, February, July and August. In addition, the usage rate during weekends was higher than that during weekdays, and all the four spaces had a high usage rate during the afternoon. These results seem to be related to weather, users’ life pattern, users’ age, and position of PCs and seats. Based on the circulation logs analysis of children’s collections, users in their 10s and 40s showed the same space usage pattern.

Originality/value

This study has significance in that it attempted to analyze logs produced by real users during the actual library operation period, which has not been frequently attempted in the previous studies on libraries. The findings will be provided as basic data to support decision-making for efficient operation of libraries.

Details

Library Hi Tech, vol. 38 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 April 2005

David Nicholas, Paul Huntington and Anthony Watkinson

To present the latest results of research conducted at University College London as part of the Virtual Scholar Research Programme, investigating the impact of the digital…

2480

Abstract

Purpose

To present the latest results of research conducted at University College London as part of the Virtual Scholar Research Programme, investigating the impact of the digital roll‐out of information services to academics and researchers. This is the second study to look at the information seeking behaviour of academics and researchers in regard to digital journal libraries, and concentrates on the users and usage of Blackwell Synergy.

Design/methodology/approach

Nearly a million users making ten million item requests were investigated employing deep log methods, developed by the authors to provide robust and big picture analyses of digital information consumers and their behaviour.

Findings

Usage data has been embellished with user data (for 500,000 people), so enabling comparisons to be made between the information seeking behaviour, for instance, of students and staff, academics and practitioners, scientists and social scientists. We believe this is the first time this type of analysis has been attempted with logs. Of particular note is the “repeat visitor” evaluation and the analysis of one and a quarter million search sessions which categorised sessions in terms of how “busy” they were for a whole range of user groups.

Research limitations/implications

Demonstrates a powerful and new method, deep log analysis, for mapping and evaluating information seeking behaviour.

Practical implications

Important data for publishers to enable them to target their services more effectively

Originality/value

Probably the first analysis of its type, hence showing an aspect of information seeking not previously seen.

Details

Journal of Documentation, vol. 61 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 15 February 2008

David Nicholas, Paul Huntington and Hamid R. Jamali

The purpose of this paper is to demonstrate a novel form of deep log analysis by linking questionnaire data with transactional server log data generated by the same users; and to…

1768

Abstract

Purpose

The purpose of this paper is to demonstrate a novel form of deep log analysis by linking questionnaire data with transactional server log data generated by the same users; and to provide a richer understanding of the information‐seeking behaviour of a strategic community of virtual scholars.

Design/methodology/approach

Usage statistics were obtained from logs for an 18‐month period: 16,865 sessions were covered and 110,029 pages were viewed. Searching behaviour was studied in regard to number of returned hits and number of searches in a session. A questionnaire survey was also conducted to identify ScienceDirect users according to the subject/discipline to which they belonged and attitude towards some scholarly communication issues. The answers of more than 750 ScienceDirect users to the questionnaire were linked to the usage logs of the same users through matching internet protocol (IP) addresses.

Findings

The study reveals large differences between scholars in different subjects in terms of information‐seeking behaviour and their interaction with electronic journal systems.

Practical implications

The findings can be utilised to improve electronic journal systems such as ScienceDirect in order to provide more suitable service for users in different subjects.

Originality/value

The originality of the paper lies in its methodology that links questionnaire attitudinal data to the web log data of the same users at individual level to gain a better understanding of users' behaviour.

Details

The Electronic Library, vol. 26 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 2 October 2017

Mohamed Gamal Rezk and A.A. Abdelwaly

This paper aims to analyze the pressure behavior in dual porosity reservoirs using different techniques in an attempt to correctly characterize reservoir properties. Pressure…

Abstract

Purpose

This paper aims to analyze the pressure behavior in dual porosity reservoirs using different techniques in an attempt to correctly characterize reservoir properties. Pressure transient tests in naturally fractured reservoirs often exhibit non-uniform responses.

Design/methodology/approach

The pressure transient tests in naturally fractured reservoirs were analyzed using conventional semi-log analysis, type curve matching (using commercial software) and Tiab’s direct synthesis (TDS) technique. In addition, the TDS method was applied in case of a naturally fractured formation with a vertical hydraulic fracture. These techniques were applied to a single-layer, naturally fractured reservoir under pseudosteady state matrix flow. By studying the unique characteristics of the different flow regimes appear on the pressure and pressure derivative curves, various reservoir characteristics can be obtained such as permeability, skin factor and fracture properties.

Findings

For naturally fractured reservoirs, a comparison between the results semi-log analysis, software matching and TDS method is presented. In case of wellbore storage, early time flow regime can be obscured that lead to incomplete semi-log analysis. Furthermore, the type curve matching usually gives a non-uniqueness solution, as it needs all the flow regimes to be observed. However, the direct synthesis method used analytical equation to calculate reservoir and well parameters without type curve matching. For naturally fractured reservoirs with a vertical fracture, the pressure behavior of wells crossed by a uniform flux and infinite conductivity fracture is analyzed using TDS technique. The different flow regimes on the pressure derivative curve were used to calculate the fracture half-length in addition to other reservoir properties.

Originality/value

The results of different field cases showed that TDS technique offers several advantages compared to semi-log analysis and type curve matching. It can be used even if some flow regimes are not observed. Direct synthesis results are accurate compared to the available core data and the software matching results. It can be used to confirm the software matching results and to give reliable reservoir characteristics when there is lack of data.

Details

World Journal of Engineering, vol. 14 no. 5
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 February 1993

Thomas A. Peters, Martin Kurth, Patricia Flaherty, Beth Sandore and Neal K. Kaske

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces…

Abstract

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces some of the issues involved in the methodology.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

1 – 10 of over 43000