- ‘Logs’ as evaluation data for information literacy education in academic libraries
- Log analysis of e-resources usage
- Lifelog through Videos
- An analysis example of a web site in conjunction with a free magazine
- A study of privacy preserving technologies for log data utilization
Ryo KIKUCHI, Katsumi TAKAHASHI………69
- Series: Standardization of representation(12)
- Seminar report
- INFOSTA Forum (266)
- INFOSTA News
- Editor’s note
‘Logs’ as Evaluation Data for Information Literacy Education in Academic Libraries
Department of Education, Aoyama Gakuin University
4-4-25 Shibuya, Shibuya-ku, Tokyo, 150-8366, JAPAN
Abstract: This paper discusses the evaluation of information literacy education in academic libraries. It is suggested that ‘logs’ such as statistical data and documents generated in daily work can be used efficiently and effectively as data for evaluation of not only outputs but also outcomes although the costs of data analyses must be taken into consideration; in particular, qualitative data and approaches should be emphasised in addition to qualitative data and approaches.
Keywords： academic library / document / evaluation / information literacy education / log / statistical data
Log analysis of e-resources usage
Graduate School of Library, Information and Media Studies, University of Tsukuba
1-2 Kasuga, Tsukuba-shi, Ibaraki 305-8550 JAPAN
Abstract: With the growth of e-resources including e-journals, the log analysis has increasingly been used as a valid research method. Although it is useful to grasp (understand) the user behaviors that analyzing the usage log data with its comprehensive record of user access, it is difficult to explore the users’ intention or motivation. So the combination with other methods is desirable. Bearing different characteristics from citation data, the log data also have come to draw the attention in the field of bibliometrics. However, it’s not suitable for research assessment because intentional data manipulation can be easily performed. In Japan, unlike some other countries, large-scale log analysis studies on e-journals have not yet been carried out, which remains a task to be addressed in future.
Keywords： e-resources / e-journal / scholarly communication / bibliometrics / usage log analysis
Lifelog through Videos
Academic Center for Computing and Media Studies, Kyoto University
Sakyo, Kyoto,606-8501 JAPAN
Abstract: Videos are good lifelog media that can capture various kinds of rich information. Videos have,however, certain drawbacks, e.g., reviewing is time consuming, browsing is not easy, etc. Media processing is essential to overcome those problems.This paper introduces media processing techniques for supporting better utilization of lifelog videos for various kinds of purposes such as memory aids,analysis of group activities, etc.
Keywords： lifelog / video / first person vision / group-log / view reconstruction
An analysis example of a web site in conjunction with a free magazine
Kanagawa Institute of Technology
1030 Shimo-ogino, Atsugi-shi, Kanagawa, 243-0292, JAPAN
Abstract: In this paper, we analyze web access logs of a web site that synchronize with free magazine for working woman in Tokyo, in order to investigate browsing behavior of these webpages. In general, it is difficult to identify gender and age of the users by analyzing web access logs. We try to extract browse behavior of specific users by analyzing web access logs that synchronize with free magazine. As analysis results, we discover characteristic behaviors of users.
Keywords： access log analysis / web browsing behavior / web-real world relationship / free magazine / free paper / web analysis
A study of privacy preserving technologies for log data utilization
NTT Secure Platform Laboratories
3-9-11, Midori-Cho, Musashino, Tokyo, 180-8585 JAPAN
Abstract: To utilize log data appropriately, it is important to apply suitable technologies to log data with a correct comprehension of privacy risk. We study privacy preserving technologies for utilizing log data. We classify the process of log data into three participants, “providers”, “processors”, and “users”, and define three privacies, “input privacy”, “process privacy”, and “output privacy” among them. We introduce some factors such as a processing form of log data and background knowledge, which increase the privacy risk, and also introduce risk control technologies.
Keywords： privacy / log processing / anonymity / statistic / cryptography / information security