I wrote an article on a project I did in this area back 5 years ago
when I worked for SUNY Cortland. The citation is Coombs, K. A (2005)
"Lessons Learned From Analyzing Library Database Usage Data" Library
Hi Tech 23(4), 598-609.
We were looking at paths users were taking to get to electronic
resources as well as where (what computers) they were using to access
the resources.
Karen
On Mon, Nov 15, 2010 at 9:12 PM, Wayne Lam <[log in to unmask]> wrote:
> Hi,
>
>
> Just wonder if anyone use ezproxy or other mechanism that logs down the
> usage of journals, databases, etc.
>
> It seems customization of ezproxy log would not provide a "type" of users
> (ptype for III users). On the other hand if you use external authentication,
> you will have to
> combine ezproxy log and the log with user type.
>
>
> I would like to hear how the statistic work-flow is done in other institute.
>
>
> Thanks
>
> Wayne
>
>
> --
> -----------------------------------------
> Wayne Lam
> Assistant Library Officer I
> Systems Development & Support
> Fong Sum Wood Library
> Lingnan University
> 8 Castle Peak Road
> Tuen Mun, New Territories
> Hong Kong SAR
> China
> Phone: +852 26168585
> Email: [log in to unmask]
> Website: http://www.library.ln.edu.hk
>
|