Search results

1 – 10 of 209
Open Access
Article
Publication date: 20 March 2017

Patrick OBrien, Kenning Arlitsch, Jeff Mixter, Jonathan Wheeler and Leila Belle Sterman

The purpose of this paper is to present data that begin to detail the deficiencies of log file analytics reporting methods that are commonly built into institutional repository…

5434

Abstract

Purpose

The purpose of this paper is to present data that begin to detail the deficiencies of log file analytics reporting methods that are commonly built into institutional repository (IR) platforms. The authors propose a new method for collecting and reporting IR item download metrics. This paper introduces a web service prototype that captures activity that current analytics methods are likely to either miss or over-report.

Design/methodology/approach

Data were extracted from DSpace Solr logs of an IR and were cross-referenced with Google Analytics and Google Search Console data to directly compare Citable Content Downloads recorded by each method.

Findings

This study provides evidence that log file analytics data appear to grossly over-report due to traffic from robots that are difficult to identify and screen. The study also introduces a proof-of-concept prototype that makes the research method easily accessible to IR managers who seek accurate counts of Citable Content Downloads.

Research limitations/implications

The method described in this paper does not account for direct access to Citable Content Downloads that originate outside Google Search properties.

Originality/value

This paper proposes that IR managers adopt a new reporting framework that classifies IR page views and download activity into three categories that communicate metrics about user activity related to the research process. It also proposes that IR managers rely on a hybrid of existing Google Services to improve reporting of Citable Content Downloads and offers a prototype web service where IR managers can test results for their repositories.

Details

Library Hi Tech, vol. 35 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 20 August 2021

Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…

2196

Abstract

Purpose

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.

Design/methodology/approach

We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.

Findings

We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.

Research limitations/implications

Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.

Originality/value

In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 2 May 2017

Rosalina Rebucas Estacio and Rodolfo Callanta Raga Jr

The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from…

51190

Abstract

Purpose

The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from action logs recorded by Moodle. The paper also tried to show whether there is a correlation between the activity level of students in online environments and their academic performance with respect to final grade.

Design/methodology/approach

The analysis was carried out using log data obtained from various courses dispensed in a university using a Moodle platform. The study also collected demographic profiles of students and compared them with their activity level in order to analyze how these attributes affect students’ level of activity in the online environment.

Findings

This work has shown that data mining algorithm like vector space model can be used to aggregate the action logs of students and quantify it into a single numeric value that can be used to generate visualizations of students’ level of activity. The current investigation indicates that there is a lot of variability in terms of the correlation between these two variables.

Practical implications

The value presented in the study can help instructors monitor course progression and enable them to rapidly identify which students are not performing well and adjust their pedagogical strategies accordingly.

Originality/value

A plan to continue the work by developing a complete dashboard style interface that instructors can use is already underway. More data need to be collected and more advanced processing tools are necessary in order to obtain a better perspective on this issue.

Details

Asian Association of Open Universities Journal, vol. 12 no. 1
Type: Research Article
ISSN: 1858-3431

Keywords

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1080

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 12 November 2020

Kenning Arlitsch, Jonathan Wheeler, Minh Thi Ngoc Pham and Nikolaus Nova Parulian

This study demonstrates that aggregated data from the Repository Analytics and Metrics Portal (RAMP) have significant potential to analyze visibility and use of institutional…

2663

Abstract

Purpose

This study demonstrates that aggregated data from the Repository Analytics and Metrics Portal (RAMP) have significant potential to analyze visibility and use of institutional repositories (IR) as well as potential factors affecting their use, including repository size, platform, content, device and global location. The RAMP dataset is unique and public.

Design/methodology/approach

The webometrics methodology was followed to aggregate and analyze use and performance data from 35 institutional repositories in seven countries that were registered with the RAMP for a five-month period in 2019. The RAMP aggregates Google Search Console (GSC) data to show IR items that surfaced in search results from all Google properties.

Findings

The analyses demonstrate large performance variances across IR as well as low overall use. The findings also show that device use affects search behavior, that different content types such as electronic thesis and dissertation (ETD) may affect use and that searches originating in the Global South show much higher use of mobile devices than in the Global North.

Research limitations/implications

The RAMP relies on GSC as its sole data source, resulting in somewhat conservative overall numbers. However, the data are also expected to be as robot free as can be hoped.

Originality/value

This may be the first analysis of aggregate use and performance data derived from a global set of IR, using an openly published dataset. RAMP data offer significant research potential with regard to quantifying and characterizing variances in the discoverability and use of IR content.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-08-2020-0328

Details

Online Information Review, vol. 45 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 6 November 2017

Bee Leng Chew, Marnisya Abdul Rahim and Vighnarajah Vighnarajah

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management…

3567

Abstract

Purpose

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management System (LMS). Among the many measures employed is the integration of federated search engine into the LMS which allows for a more productive and wider scope of information retrieval through the provisions of library resources and services. The purpose of this paper is to report one such case study in Wawasan Open University exploring the integration of federated search engine (EBSCO Discovery Service (EDS) widget) into the learning spaces of LMS. Widgets resemble apps that enable the integration of EDS functionality in providing access for students to retrieve library learning resources from the convenience of the LMS, excluding the need to log onto the library.

Design/methodology/approach

This paper presents a discussion that highlights the development and conjectural implementation of a framework on the integration of the EDS widget into the University’s LMS. Data collection includes meta-analysis data from the micro- and macro-level infrastructure that make up the framework, namely, end-user layer, system layer and data management layer.

Findings

Findings from this study addressed significant importance to the library in promoting effective search and utilization of information needs. The findings will also make clear recommendations in developing effective collaborations between the library and faculties. Although the implementation of this framework is still in a developmental stage, this study still provides pertinent information in validating the integration of EDS into the University’s LMS.

Research limitations/implications

While serious limitations are not anticipated, possible concerns do exist with programming algorithms in the integration of EDS into the LMS. These challenges will be reported in the paper as reference for future replications of study

Practical implications

One key implication is the increase in the usage of the library resources and the potential to reach a larger audience of remote library users.

Originality/value

The primary advantage is to minimize the need for multiple gateway login while ensuring the library to monitor relevant library databases activities throughout the system check of the LMS.

Details

Asian Association of Open Universities Journal, vol. 12 no. 2
Type: Research Article
ISSN: 2414-6994

Keywords

Open Access
Article
Publication date: 7 August 2017

Myung-Joong Kim, Juil Kim and Sun-Young Park

This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.

3205

Abstract

Purpose

This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.

Design/methodology/approach

Based on the review of current literature, a research model is introduced to depict the effects of select independent variables on customer churning behavior. First of all, the two groups are compared in terms of predictor variables, including switching barriers, voice of customer (VOC), membership period and degree of contents usage. Then, a curvilinear regression was applied to understand the association relationship between the level of IPTV contents usage and variables of switching barriers, VOC and membership period. Third, a logit regression was performed to predict customer churning through the variables of switching barriers, VOC, membership period and level of IPTV contents usage.

Findings

Through the empirical analysis, this study analyzed the factors affecting customer churning behavior of IPTV service providers based on switching barriers, VOC and contents usage.

Originality/value

Although several studies on IPTV have been undertaken globally, they have largely depended on self-reporting surveys to examine dynamics between antecedent variables and IPTV performance in terms of customer satisfaction, usage intension and customer retention. This empirical study is performed to understand influential factors of IPTV service defection through the weblog analysis of 3,906 service users, who represented both service defectors and non-defectors during a specific month.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 2
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 1 June 2008

Zuhrieh Shana

The shift from paper portfolios to e-portfolios has arrived in educational institutions worldwide. This study investigates e-portfolio systems as a means of improving…

Abstract

The shift from paper portfolios to e-portfolios has arrived in educational institutions worldwide. This study investigates e-portfolio systems as a means of improving performance-centered assessment, enriching students’ learning experiences and documenting the students’ progress and achievements. The current study reveals the experience of implementing a course-level framework for e-portfolios and an approach taken in initiating student electronic portfolios in the Department of Educational Technology (DET) at Ajman University of Science and Technology, UAE. Data was obtained in several ways, including Likert scale responses and interviews with the participants; students’ journals and final reports; notes from the Practicum site supervisor and the DET lab technician; and analysis of the electronic portfolio product. The work and responses of the Practicum students were compared for three consecutive Practicum classes. Analysis of the results showed that developing formative and summative portfolios fluctuated extensively between the three Practicum classes of DET graduates, as did the outcomes. In spite of this fact, the findings suggested that the use of e-portfolios could serve as an influential learning and assessment tool when driven by a clear understanding of the desired outcome and the specific skills to be assessed, and when sufficiently mentored, peer-reviewed, and based on sensible principles.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 5 no. 1
Type: Research Article
ISSN: 2077-5504

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 20 July 2020

Mohd Faizan, Raees Ahmad Khan and Alka Agrawal

Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring…

1189

Abstract

Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring their anonymity. The easy availability of potentially harmful drugs has resulted in a significant impact on public health. Consequently, law enforcement agencies put a lot of effort and resources into shutting down online markets on the dark web. A lot of research work has also been conducted to understand the working of customers and vendors involved in the cryptomarkets that may help the law enforcement agencies. In this research, we present a ranking methodology to identify and rank top markets dealing in harmful illicit drugs. Using named entity recognition, a harm score of a drug market is calculated to indicate the degree of threat followed by the ranking of drug markets. The top-ranked markets are the ones selling the most harmful drugs. The rankings thus obtained can be helpful to law enforcement agencies by locating specific markets selling harmful illicit drugs and their further monitoring.

Details

Applied Computing and Informatics, vol. 18 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Access

Only Open Access

Year

All dates (209)

Content type

1 – 10 of 209