Search results
1 – 10 of 33The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…
Abstract
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.
Martin Kurth, David Ruddy and Nathan Rupp
Metadata and information technology staff in libraries that are building digital collections typically extract and manipulate MARC metadata sets to provide access to digital…
Abstract
Metadata and information technology staff in libraries that are building digital collections typically extract and manipulate MARC metadata sets to provide access to digital content via non‐MARC schemes. Metadata processing in these libraries involves defining the relationships between metadata schemes, moving metadata between schemes, and coordinating the intellectual activity and physical resources required to create and manipulate metadata. Actively managing the non‐MARC metadata resources used to build digital collections is something most of these libraries have only begun to do. This article proposes strategies for managing MARC metadata repurposing efforts as the first step in a coordinated approach to library metadata management. Guided by lessons learned from Cornell University library mapping and transformation activities, the authors apply the literature of data resource management to library metadata management and propose a model for managing MARC metadata repurposing processes through the implementation of a metadata management design.
Details
Keywords
Hamid R. Jamali, David Nicholas and Paul Huntington
To provide a review of the log analysis studies of use and users of scholarly electronic journals.
Abstract
Purpose
To provide a review of the log analysis studies of use and users of scholarly electronic journals.
Design/methodology/approach
The advantages and limitations of log analysis are described and then past studies of e‐journals' use and users that applied this methodology are critiqued. The results of these studies will be very briefly compared with some survey studies. Those aspects of online journals' use and users studies that log analysis can investigate well and those aspects that log analysis can not disclose enough information about are highlighted.
Findings
The review indicates that although there is a debate about reliability of the results of log analysis, this methodology has great potential for studying online journals' use and their users' information seeking behaviour.
Originality/value
This paper highlights the strengths and weaknesses of log analysis for studying digital journals and raises a couple of questions to be investigated by further studies.
Details
Keywords
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis…
Abstract
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis (TLA). Transaction logs supply unequivocal information about what a user typed while searching. All other methods rely on self‐reporting, which, as Nielsen points out, is not always corroborated by the logs. Regardless of where in an institution information retrieval (IR) system evaluation takes place, TLA is a method that enables library staff at all levels to examine a variety of system and user‐related activities that are recorded on the log. Dominick suggested that TLA can enable the examination of three broad categories of activity: 1) system performance and resource utilization, 2) information retrieval performance, and 3) user interaction with the IR system. This article has been divided into several sections corresponding to functional areas in a library to suggest useful applications of TLA.
The purpose of this article is to alert researchers to software for web tracking of information seeking behaviour, and to offer a list of criteria that will make it easier to…
Abstract
Purpose
The purpose of this article is to alert researchers to software for web tracking of information seeking behaviour, and to offer a list of criteria that will make it easier to select software. A selection of research projects based on web tracking as well as the benefits and disadvantages of web tracking are also explored.
Design/methodology/approach
An overview of the literature, including clarification of key concepts, a brief overview of studies of web information seeking behaviour based on web tracking, identification of software used, as well as the strengths and short‐comings noted for web tracking is used as a background to the identification of criteria for the selection of web tracking software.
Findings
Web tracking can offer very valuable information for the development of websites, portals, digital libraries, etc. It, however, needs to be supplemented by qualitative studies, and researchers need to ensure that the tracking software will collect the data required.
Research limitations/implications
The criteria is not applied to any software in particular.
Practical implications
The criteria can be used by researchers working on web usage and web information seeking behaviour to select suitable tracking software.
Originality/value
Although there are many reports on the use of web tracking (also reported in this article), nothing could be traced on criteria for the evaluation of web tracking software.
Details
Keywords
Evaluates changes in the welfare system in Sweden, the UK and the USA over a decade, basing arguments on the divergence of economic globalization and domestic forces. Presents…
Abstract
Evaluates changes in the welfare system in Sweden, the UK and the USA over a decade, basing arguments on the divergence of economic globalization and domestic forces. Presents brief economic snapshots of each country, stating quite categorically that the welfare state is an impediment to capitalist profit‐making, hence all three nations have retrenched welfare systems in the hope of remaining globally economically competitive. Lays the responsibility for retrenchment firmly at the door of conservative political parties. Takes into account public opinion, national institutional structures, multiculturalism and class issues. Explores domestic structures of accumulation (DSA) and refers to changes in the international economy, particularly the Bretton Woods system (Pax Americana), and notes how the economic health of nations mirrors that of the US. Investigates the roles of multinationals and direct foreign investment in the global economy, returning to how economic policy affects the welfare state. Points out the changes made to the welfare state through privatization, decentralization and modification of public sector financing. Concludes that the main result has been an increase in earnings inequality and poverty.
Details