Research methodologies and transaction log analysis: Issues, questions, and a proposed model

DOIhttps://doi.org/10.1108/eb047886
Published date01 February 1993
Pages79-86
Date01 February 1993
AuthorNeal K. Kaske
Subject MatterInformation & knowledge management,Library & information science
RESEARCH METHODOLOGIES AND
TRANSACTION LOG ANALYSIS:
ISSUES,
QUESTIONS, AND A PROPOSED MODEL
Neal K. Kaske
CONTENTS
Introduction
Basic Constraints
Proposed General Model
Research or Management?
Quantitative or Qualitative Methods?
Micro or Macro Evaluation?
Sample or Population?
Controlled or Uncontrolled Experiments?
Ethics and Transaction Logs
Future Transaction Log Research Efforts
Introduction
The central goal of transaction log analysis is to
acquire new knowledge, which will help library
managers,
systems designers/developers, and research-
ers better understand how online information systems
are
used
by
library patrons and staffs. This knowledge
can then be used to improve library services and
operations through better designed systems and better
allocation (or reallocation) of library resources. An
example of reallocation of resources is changing
schedules of public service staff to more closely match
when
and
where patrons
need help
(e.g.,
in
nonfiction,
on
weekends) and the relocation of terminals to where
they
are
needed
the
most (e.g., to
the science
reference
area).
The system's resources (access points, online
storage, databases) can
also
be distributed for the most
effective and efficient operations through the use of
transaction log data. A clearer understanding of
human/computer interaction within the library setting
can also be used to improve the design and utilization
of other online systems and services used within
libraries and other organizations.
The purpose of this article in this series is to
address a number of the issues/questions that need to
be confronted before selecting a method or more than
one method for analyzing transaction logs today and
to propose
a
model accounting for the major variables
in
this
human/computer interaction
setting.
The method-
ologies that have been used
to
investigate online library
systems via transaction logs will also be noted.
The discussion presented here will not report upon
the specific or general findings of past transaction log
Kaske is program officer, Office of Library Pro-
grams, U.S. Department of Education.
Disclaimer: This article
was
written by the author
in his private capacity. No official support or endorsement
by the U.S. Department of Education is intended or
should be inferred.
RESEARCH METHODOLOGIES AND TLA ISSUE 42 - 11:2 (1993) 79

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT