I wrote an article on a project I did in this area back 5 years ago
when I worked for SUNY Cortland. The citation is Coombs, K. A (2005)
"Lessons Learned From Analyzing Library Database Usage Data" Library
Hi Tech 23(4), 598-609.
We were looking at paths users were taking to get to electronic
resources as well as where (what computers) they were using to access
On Mon, Nov 15, 2010 at 9:12 PM, Wayne Lam <[log in to unmask]> wrote:
> Just wonder if anyone use ezproxy or other mechanism that logs down the
> usage of journals, databases, etc.
> It seems customization of ezproxy log would not provide a "type" of users
> (ptype for III users). On the other hand if you use external authentication,
> you will have to
> combine ezproxy log and the log with user type.
> I would like to hear how the statistic work-flow is done in other institute.
> Wayne Lam
> Assistant Library Officer I
> Systems Development & Support
> Fong Sum Wood Library
> Lingnan University
> 8 Castle Peak Road
> Tuen Mun, New Territories
> Hong Kong SAR
> Phone: +852 26168585
> Email: [log in to unmask]
> Website: http://www.library.ln.edu.hk