Search results

1 – 10 of over 40000
Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters, Martin Kurth, Patricia Flaherty, Beth Sandore and Neal K. Kaske

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces…

Abstract

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces some of the issues involved in the methodology.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1174

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 1 February 2008

R. Liddiard, P. Jones, A.R. Day and D. Kelly

This paper seeks to establish the level of usage and how building log books are perceived within the UK non‐domestic buildings sector, and to identify potential benefits resulting…

Abstract

Purpose

This paper seeks to establish the level of usage and how building log books are perceived within the UK non‐domestic buildings sector, and to identify potential benefits resulting from the use of building log books and internet‐based building information systems.

Design/methodology/approach

The method employed was the distribution and analysis of market survey questionnaires, distributed primarily via a professional body.

Findings

There is limited use of building log books, plus varying degrees of perceived usefulness, especially between the designer/contractor sector and the facilities management sector. Internet‐based information management systems appear to be largely acceptable. The quality of building information is likely to depend on who provides it. There is a significant perception within the designer/contractor sector that building regulations are not enforcing the availability of building log books in relevant buildings.

Research limitations/implications

Only a limited literature review was undertaken, and there may be limitations due to the nature of the distribution of the surveys and sample sizes. More research into the effective provision, management and utilisation of useful building information is required.

Practical implications

The paper demonstrates that regulations may not necessarily lead to practical implementation and that there is significant room for improvement in the provision and maintenance of building information which is useful to those operating buildings.

Originality/value

The paper expands understanding of the need for useful building information and proper management of that information, both for the facilities manager and as a means of feeding forward into new building designs.

Details

Facilities, vol. 26 no. 1/2
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 26 September 2008

Khaled A. Mohamed and Ahmed Hassan

This paper aims to examine the behaviour of the Egyptian scholars while accessing electronic resources through two federated search tools. The main purpose of this article is to…

Abstract

Purpose

This paper aims to examine the behaviour of the Egyptian scholars while accessing electronic resources through two federated search tools. The main purpose of this article is to provide guidance for federated search tool technicians and support teams about user issues, including the need for training.

Design/methodology/approach

Log files were exploited to examine the behaviour of users of information retrieval systems. This study examined two log files extracted from federated search tools available to the Egyptian scholars' community for accessing electronic resources. A data mining approach was implemented to investigate user behaviour through deep analysis of these logs.

Findings

Results show that: none of the available tools provide error messages for dummy queries; most of the Egyptian scholars had short queries; Boolean operators are not used in about 50 per cent of the queries; federated search tools do not provide techniques for query reformation; the optimal days for system maintenance are the non‐weekend vacations; and early morning is the best time for maintenance.

Practical implications

To maximise the value of the federated search tools by understanding user trends when utilising federated search tools. The study shows that more attention should be given to the search capabilities through ongoing training and awareness in order to maximise the benefit from the available resources and tools.

Originality/value

The hypothetical value of the federated search tools has not been previously examined and analysed to understand user trends.

Details

Program, vol. 42 no. 4
Type: Research Article
ISSN: 0033-0337

Keywords

Article
Publication date: 13 March 2007

Philip M. Hider

The purpose of this research is to discuss the methodological aspects of a study, the results of which are detailed in a second paper.

715

Abstract

Purpose

The purpose of this research is to discuss the methodological aspects of a study, the results of which are detailed in a second paper.

Design/methodology/approach

Indices of search goal revision (or redefinition) were constructed based on the chronological coding of queries logged on the OCLC FirstSearch service. Queries within search sessions were coded according to their conceptual relationships, based on a set of rules designed to identify possible revisions of search goals, as well as strategic reformulations. Given the same user interface, similar types of user, and large datasets, it was assumed that the number of strategic reformulations would be reasonably uniform across databases, so that the indices could be regarded as indicators of relative amounts of goal revision.

Findings

The reliability of the coding used to construct the indices of goal redefinition was tested through parallel coding, and confirmed. Differences between the indices for various databases, on the other hand, were found to be statistically significant, allowing for the conclusion that the indices were able to show differences in the amount of goal redefinition occurring, given the assumption of similar levels of strategic reformulations across databases.

Originality/value

Transaction log analysis has mostly focused on syntactic issues; few analyses have examined the semantic content of queries or contextualised individual queries as part of an evolving search session. However, this paper shows that although transaction log analysis is a relatively indirect means of examining users' thoughts and intentions during their interaction with an information retrieval system, logs that provide sufficiently rich data may, in certain controlled situations, be used to provide deeper insights into information retrieval behaviour.

Details

Journal of Documentation, vol. 63 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 25 November 2020

Deepali Arun Bhanage and Ambika Vishal Pawar

The purpose of this paper is to present the bibliometric study of articles IT Infrastructure Management to Avoid Failure Conditions. As in today’s era of IT Industries, IT…

Abstract

Purpose

The purpose of this paper is to present the bibliometric study of articles IT Infrastructure Management to Avoid Failure Conditions. As in today’s era of IT Industries, IT infrastructure management plays a crucial role. As a result, substantial research is going on to improve the reliability and availability of assets in IT infrastructure.

Design/methodology/approach

The paper analyzes and focuses the results acquired from articles accessed from Scopus for the past 15 years by examining in terms of frequently used keywords, the amount of work done in different countries and year-wise progression of the research, prolific authors, article citation frequencies, etc. Tools such as Gephi, Word Cloud, BiblioShiny, GPS visualizer, etc. are used for bibliometric analysis.

Findings

The study comes out with maximum publications of IT infrastructure management from conferences and journals. Anomaly detection, log analysis and learning system are the most frequently used keywords in the publications. Significant research has been done in the USA, followed by China under the area of Computer Science with an increase in publication since 2018.

Originality/value

This paper provides an accurate idea about the amount of work done in different countries and year-wise progression of the research. This bibliometric analysis will be useful for beginners to conduct a literature survey using appropriate literature available on the Scopus database.

Details

Information Discovery and Delivery, vol. 49 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 16 October 2018

Anna Kalenkova, Andrea Burattin, Massimiliano de Leoni, Wil van der Aalst and Alessandro Sperduti

The purpose of this paper is to demonstrate that process mining techniques can help to discover process models from event logs, using conventional high-level process modeling…

1081

Abstract

Purpose

The purpose of this paper is to demonstrate that process mining techniques can help to discover process models from event logs, using conventional high-level process modeling languages, such as Business Process Model and Notation (BPMN), leveraging their representational bias.

Design/methodology/approach

The integrated discovery approach presented in this work is aimed to mine: control, data and resource perspectives within one process diagram, and, if possible, construct a hierarchy of subprocesses improving the model readability. The proposed approach is defined as a sequence of steps, performed to discover a model, containing various perspectives and presenting a holistic view of a process. This approach was implemented within an open-source process mining framework called ProM and proved its applicability for the analysis of real-life event logs.

Findings

This paper shows that the proposed integrated approach can be applied to real-life event logs of information systems from different domains. The multi-perspective process diagrams obtained within the approach are of good quality and better than models discovered using a technique that does not consider hierarchy. Moreover, due to the decomposition methods applied, the proposed approach can deal with large event logs, which cannot be handled by methods that do not use decomposition.

Originality/value

The paper consolidates various process mining techniques, which were never integrated before and presents a novel approach for the discovery of multi-perspective hierarchical BPMN models. This approach bridges the gap between well-known process mining techniques and a wide range of BPMN-complaint tools.

Details

Business Process Management Journal, vol. 25 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 40000