Search results
1 – 10 of 209Patrick OBrien, Kenning Arlitsch, Jeff Mixter, Jonathan Wheeler and Leila Belle Sterman
The purpose of this paper is to present data that begin to detail the deficiencies of log file analytics reporting methods that are commonly built into institutional repository…
Abstract
Purpose
The purpose of this paper is to present data that begin to detail the deficiencies of log file analytics reporting methods that are commonly built into institutional repository (IR) platforms. The authors propose a new method for collecting and reporting IR item download metrics. This paper introduces a web service prototype that captures activity that current analytics methods are likely to either miss or over-report.
Design/methodology/approach
Data were extracted from DSpace Solr logs of an IR and were cross-referenced with Google Analytics and Google Search Console data to directly compare Citable Content Downloads recorded by each method.
Findings
This study provides evidence that log file analytics data appear to grossly over-report due to traffic from robots that are difficult to identify and screen. The study also introduces a proof-of-concept prototype that makes the research method easily accessible to IR managers who seek accurate counts of Citable Content Downloads.
Research limitations/implications
The method described in this paper does not account for direct access to Citable Content Downloads that originate outside Google Search properties.
Originality/value
This paper proposes that IR managers adopt a new reporting framework that classifies IR page views and download activity into three categories that communicate metrics about user activity related to the research process. It also proposes that IR managers rely on a hybrid of existing Google Services to improve reporting of Citable Content Downloads and offers a prototype web service where IR managers can test results for their repositories.
Details
Keywords
Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng
For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…
Abstract
Purpose
For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.
Design/methodology/approach
We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.
Findings
We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.
Research limitations/implications
Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.
Originality/value
In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
Details
Keywords
Rosalina Rebucas Estacio and Rodolfo Callanta Raga Jr
The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from…
Abstract
Purpose
The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from action logs recorded by Moodle. The paper also tried to show whether there is a correlation between the activity level of students in online environments and their academic performance with respect to final grade.
Design/methodology/approach
The analysis was carried out using log data obtained from various courses dispensed in a university using a Moodle platform. The study also collected demographic profiles of students and compared them with their activity level in order to analyze how these attributes affect students’ level of activity in the online environment.
Findings
This work has shown that data mining algorithm like vector space model can be used to aggregate the action logs of students and quantify it into a single numeric value that can be used to generate visualizations of students’ level of activity. The current investigation indicates that there is a lot of variability in terms of the correlation between these two variables.
Practical implications
The value presented in the study can help instructors monitor course progression and enable them to rapidly identify which students are not performing well and adjust their pedagogical strategies accordingly.
Originality/value
A plan to continue the work by developing a complete dashboard style interface that instructors can use is already underway. More data need to be collected and more advanced processing tools are necessary in order to obtain a better perspective on this issue.
Details
Keywords
Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…
Abstract
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.
Details
Keywords
Kenning Arlitsch, Jonathan Wheeler, Minh Thi Ngoc Pham and Nikolaus Nova Parulian
This study demonstrates that aggregated data from the Repository Analytics and Metrics Portal (RAMP) have significant potential to analyze visibility and use of institutional…
Abstract
Purpose
This study demonstrates that aggregated data from the Repository Analytics and Metrics Portal (RAMP) have significant potential to analyze visibility and use of institutional repositories (IR) as well as potential factors affecting their use, including repository size, platform, content, device and global location. The RAMP dataset is unique and public.
Design/methodology/approach
The webometrics methodology was followed to aggregate and analyze use and performance data from 35 institutional repositories in seven countries that were registered with the RAMP for a five-month period in 2019. The RAMP aggregates Google Search Console (GSC) data to show IR items that surfaced in search results from all Google properties.
Findings
The analyses demonstrate large performance variances across IR as well as low overall use. The findings also show that device use affects search behavior, that different content types such as electronic thesis and dissertation (ETD) may affect use and that searches originating in the Global South show much higher use of mobile devices than in the Global North.
Research limitations/implications
The RAMP relies on GSC as its sole data source, resulting in somewhat conservative overall numbers. However, the data are also expected to be as robot free as can be hoped.
Originality/value
This may be the first analysis of aggregate use and performance data derived from a global set of IR, using an openly published dataset. RAMP data offer significant research potential with regard to quantifying and characterizing variances in the discoverability and use of IR content.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-08-2020-0328
Details
Keywords
Bee Leng Chew, Marnisya Abdul Rahim and Vighnarajah Vighnarajah
Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management…
Abstract
Purpose
Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management System (LMS). Among the many measures employed is the integration of federated search engine into the LMS which allows for a more productive and wider scope of information retrieval through the provisions of library resources and services. The purpose of this paper is to report one such case study in Wawasan Open University exploring the integration of federated search engine (EBSCO Discovery Service (EDS) widget) into the learning spaces of LMS. Widgets resemble apps that enable the integration of EDS functionality in providing access for students to retrieve library learning resources from the convenience of the LMS, excluding the need to log onto the library.
Design/methodology/approach
This paper presents a discussion that highlights the development and conjectural implementation of a framework on the integration of the EDS widget into the University’s LMS. Data collection includes meta-analysis data from the micro- and macro-level infrastructure that make up the framework, namely, end-user layer, system layer and data management layer.
Findings
Findings from this study addressed significant importance to the library in promoting effective search and utilization of information needs. The findings will also make clear recommendations in developing effective collaborations between the library and faculties. Although the implementation of this framework is still in a developmental stage, this study still provides pertinent information in validating the integration of EDS into the University’s LMS.
Research limitations/implications
While serious limitations are not anticipated, possible concerns do exist with programming algorithms in the integration of EDS into the LMS. These challenges will be reported in the paper as reference for future replications of study
Practical implications
One key implication is the increase in the usage of the library resources and the potential to reach a larger audience of remote library users.
Originality/value
The primary advantage is to minimize the need for multiple gateway login while ensuring the library to monitor relevant library databases activities throughout the system check of the LMS.
Details
Keywords
Myung-Joong Kim, Juil Kim and Sun-Young Park
This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.
Abstract
Purpose
This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.
Design/methodology/approach
Based on the review of current literature, a research model is introduced to depict the effects of select independent variables on customer churning behavior. First of all, the two groups are compared in terms of predictor variables, including switching barriers, voice of customer (VOC), membership period and degree of contents usage. Then, a curvilinear regression was applied to understand the association relationship between the level of IPTV contents usage and variables of switching barriers, VOC and membership period. Third, a logit regression was performed to predict customer churning through the variables of switching barriers, VOC, membership period and level of IPTV contents usage.
Findings
Through the empirical analysis, this study analyzed the factors affecting customer churning behavior of IPTV service providers based on switching barriers, VOC and contents usage.
Originality/value
Although several studies on IPTV have been undertaken globally, they have largely depended on self-reporting surveys to examine dynamics between antecedent variables and IPTV performance in terms of customer satisfaction, usage intension and customer retention. This empirical study is performed to understand influential factors of IPTV service defection through the weblog analysis of 3,906 service users, who represented both service defectors and non-defectors during a specific month.
Details
Keywords
The shift from paper portfolios to e-portfolios has arrived in educational institutions worldwide. This study investigates e-portfolio systems as a means of improving…
Abstract
The shift from paper portfolios to e-portfolios has arrived in educational institutions worldwide. This study investigates e-portfolio systems as a means of improving performance-centered assessment, enriching students’ learning experiences and documenting the students’ progress and achievements. The current study reveals the experience of implementing a course-level framework for e-portfolios and an approach taken in initiating student electronic portfolios in the Department of Educational Technology (DET) at Ajman University of Science and Technology, UAE. Data was obtained in several ways, including Likert scale responses and interviews with the participants; students’ journals and final reports; notes from the Practicum site supervisor and the DET lab technician; and analysis of the electronic portfolio product. The work and responses of the Practicum students were compared for three consecutive Practicum classes. Analysis of the results showed that developing formative and summative portfolios fluctuated extensively between the three Practicum classes of DET graduates, as did the outcomes. In spite of this fact, the findings suggested that the use of e-portfolios could serve as an influential learning and assessment tool when driven by a clear understanding of the desired outcome and the specific skills to be assessed, and when sufficiently mentored, peer-reviewed, and based on sensible principles.
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Mohd Faizan, Raees Ahmad Khan and Alka Agrawal
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring…
Abstract
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring their anonymity. The easy availability of potentially harmful drugs has resulted in a significant impact on public health. Consequently, law enforcement agencies put a lot of effort and resources into shutting down online markets on the dark web. A lot of research work has also been conducted to understand the working of customers and vendors involved in the cryptomarkets that may help the law enforcement agencies. In this research, we present a ranking methodology to identify and rank top markets dealing in harmful illicit drugs. Using named entity recognition, a harm score of a drug market is calculated to indicate the degree of threat followed by the ranking of drug markets. The top-ranked markets are the ones selling the most harmful drugs. The rankings thus obtained can be helpful to law enforcement agencies by locating specific markets selling harmful illicit drugs and their further monitoring.
Details