Constituencies for Users: How to Develop them by Interpreting Logs of Web Site Access

نویسنده

  • Michael J. Wright
چکیده

The number of electronic journals is growing as rapidly as the World Wide Web on which many are published. Readership of an electronic journal is important to quantify, just as it is for a printed journal. In maintaining the Journal of Interactive Media in Education (JIME), a scholarly electronic journal open to all, we require readership statistics more meaningful than the variations on the theme of "number of hits" given by many log analysis packages. Important aspects of JIME's open access are the decisions to not require subscription, nor the use of hidden tracking aids such as cookies. Readership information is acquired from the server log of client requests. We are investigating the identification of user sessions from such logs, and the development of classification of sessions into constituencies of readership. In this paper, we present the result of manual analysis from which we are developing automatic analysis mechanisms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Tagging with Queries: How and Why?

Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this work, we argue that not only a search engine can benefit from data stored in these logs, but also the web users. We first show how clickthrough logs can be collected in a distributed fashion using the http referer field ...

متن کامل

مقایسه وبلاگ های کتابخانه ها و کتابداران ایرانی با وبلاگ های برتر کتابداری؛1385

Introduction: Web logs are the evident tools for the librarians. There are three main ways for applying web logs in librarianship fields, as follows: personal use by librarian to upgrade their personal information, as a source of information in case of libraries, and for their services. The aim of this research is to comparison between Iranian libraries and librarians, and superior librarianshi...

متن کامل

Using Distinctive Information Channels for a Mission-based Web Recommender System

Web recommender systems anticipate the information needs of on-line users and provide them with recommendations to facilitate and personalize their navigation. There are many approaches to build such systems. Among them, using web access logs to generate users’ navigational models to build a web recommender system is a popular approach, given its non-intrusiveness. However, using only one infor...

متن کامل

Mission-Based Navigational Behaviour Modeling for Web Recommender Systems

Web recommender systems anticipate the information needs of on-line users and provide them with recommendations to facilitate and personalize their navigation. There are many approaches to building such systems. Among them, using web access logs to generate users’ navigational models capable of building a web recommender system is a popular approach, given its non-intrusiveness. However, using ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999