The Journal of Information Science and Technology Association
(Johono Kagaku to Gijutsu)
Abstract

Vol. 63(2013), No.2

Logs for practical use

eLogsf as Evaluation Data for Information Literacy Education in Academic Libraries

Toshihiko NOZUE
Department of Education, Aoyama Gakuin University
4-4-25 Shibuya, Shibuya-ku, Tokyo, 150-8366, JAPAN

Abstract: This paper discusses the evaluation of information literacy education in academic libraries. It is suggested that elogsf such as statistical data and documents generated in daily work can be used efficiently and effectively as data for evaluation of not only outputs but also outcomes although the costs of data analyses must be taken into consideration; in particular, qualitative data and approaches should be emphasised in addition to qualitative data and approaches.

KeywordsF  academic library / document / evaluation / information literacy education / log / statistical data

Log analysis of e-resources usage

Sho SATO
Graduate School of Library, Information and Media Studies, University of Tsukuba
1-2 Kasuga, Tsukuba-shi, Ibaraki 305-8550 JAPAN

Abstract: With the growth of e-resources including e-journals, the log analysis has increasingly been used as a valid research method. Although it is useful to grasp (understand) the user behaviors that analyzing the usage log data with its comprehensive record of user access, it is difficult to explore the usersf intention or motivation. So the combination with other methods is desirable. Bearing different characteristics from citation data, the log data also have come to draw the attention in the field of bibliometrics. However, itfs not suitable for research assessment because intentional data manipulation can be easily performed. In Japan, unlike some other countries, large-scale log analysis studies on e-journals have not yet been carried out, which remains a task to be addressed in future.

KeywordsF  e-resources / e-journal / scholarly communication / bibliometrics / usage log analysis

Lifelog through Videos

Yuichi NAKAMURA
Academic Center for Computing and Media Studies, Kyoto University
Sakyo, Kyoto,606-8501 JAPAN

Abstract: Videos are good lifelog media that can capture various kinds of rich information. Videos have,however, certain drawbacks, e.g., reviewing is time consuming, browsing is not easy, etc. Media processing is essential to overcome those problems.This paper introduces media processing techniques for supporting better utilization of lifelog videos for various kinds of purposes such as memory aids,analysis of group activities, etc.

KeywordsF  lifelog / video / first person vision / group-log / view reconstruction

An analysis example of a web site in conjunction with a free magazine

Shingo OTSUKA
Kanagawa Institute of Technology
1030 Shimo-ogino, Atsugi-shi, Kanagawa, 243-0292, JAPAN

Abstract: In this paper, we analyze web access logs of a web site that synchronize with free magazine for working woman in Tokyo, in order to investigate browsing behavior of these webpages. In general, it is difficult to identify gender and age of the users by analyzing web access logs. We try to extract browse behavior of specific users by analyzing web access logs that synchronize with free magazine. As analysis results, we discover characteristic behaviors of users.

KeywordsF  access log analysis / web browsing behavior / web-real world relationship / free magazine / free paper / web analysis

A study of privacy preserving technologies for log data utilization

Ryo KIKUCHI, Katsumi TAKAHASHI
NTT Secure Platform Laboratories
3-9-11, Midori-Cho, Musashino, Tokyo, 180-8585 JAPAN

Abstract: To utilize log data appropriately, it is important to apply suitable technologies to log data with a correct comprehension of privacy risk. We study privacy preserving technologies for utilizing log data. We classify the process of log data into three participants, gprovidersh, gprocessorsh, and gusersh, and define three privacies, ginput privacyh, gprocess privacyh, and goutput privacyh among them. We introduce some factors such as a processing form of log data and background knowledge, which increase the privacy risk, and also introduce risk control technologies.

KeywordsF  privacy / log processing / anonymity / statistic / cryptography / information security
Page Top Copyright (C) 2013 INFOSTA. All rights reserved.