Handbook of Research on Web Log Analysis

Layla Hasan , Steve Probets (Loughborough University, Loughborough, UK)

Library Hi Tech

ISSN: 0737-8831

Article publication date: 9 March 2010

252

Keywords

Citation

Hasan, L. and Probets, S. (2010), "Handbook of Research on Web Log Analysis", Library Hi Tech, Vol. 28 No. 1, pp. 176-177. https://doi.org/10.1108/07378831011026788

Publisher

:

Emerald Group Publishing Limited

Copyright © 2010, Emerald Group Publishing Limited


The Handbook of Research on Web Log Analysis reviews the impact of web log analysis as a method for analysing web use. As the popularity of the web grows, so does the desire to investigate the ways in which websites are used. This book considers a variety of ways in which electronic logs of the interactions between users and web‐based systems can be analysed and the issues that arise from the approaches taken. The handbook covers various themes, categorising 25 chapters into five main sections; perspectives and directions, methodology and metrics, behaviour analysis, query log analysis and contextual and specialized analysis.

The first two sections (ten chapters) highlight historical and methodological aspects of web log analysis. These chapters provide a historical overview of transaction log analysis methods and go on to discuss the strengths and limitations of transaction log analysis as an unobtrusive method for research, subsidiary methods of analysis such as search log analysis and page‐tagging approaches, and a discussion of the epistemological nature of log‐based research.

A few chapters recommend or provide a detailed discussion of the actual measures or web metrics that can be obtained through analysis of usage data. In these chapters a description of the metrics is provided, and suggestions and best practice for selecting appropriate web metrics are discussed. These issues can be found in alternative literature; however, this information is relevant to the topic and these issues are covered to a suitable extent within the book. Furthermore, validity, reliability, privacy and ethical concerns related to the analysis of transaction log files are discussed, and recommendations to address these issues are provided.

Some case studies are included in later sections of the book; however, in the first two sections it would be beneficial to include one or two case studies that describe practical or applied research into the use of transaction log analysis on e‐commerce or service‐based websites. More empirical case studies would show how these methods have been practically deployed. This limitation means that the first two sections of the book are best viewed as a good theoretical reference. The only chapter in the first two sections that does include a case study is actually a discussion of surveys as a complementary method for web analysis. Although this includes a case study, this chapter focuses mainly on surveys rather than web log analysis.

The next section is titled “Behaviour analysis” and discusses how analysis of usage data can be used for social network analysis, interaction design, designing adaptive systems and information‐seeking behaviour research. The next section considers query log analysis and contains five chapters that focus on the specifics of search log analysis. The final section contains some specific applications of log analysis relating to contemporary sites such as social networking sites. It also includes an interesting final chapter that summarises the diversity of approaches covered in earlier chapters in the book; although slightly repetitive, this chapter provides a thought‐provoking recap of the ways in which log analysis can be used.

Some of the chapters are only peripherally related to web log analysis, and it is unlikely that many readers will be interested in all chapters. However, the book contains a number of interesting and relevant chapters and is highly appropriate for researchers or students who are interested in transaction log analysis methods and need one reference that covers historical information, the strengths and weaknesses of these methods and a thorough coverage of the potential of web log analysis.

Related articles