Reference Hub16
Research and Methodological Foundations of Transaction Log Analysis

Research and Methodological Foundations of Transaction Log Analysis

Bernard J. Jansen, Isak Taksa, Amanda Spink
Copyright: © 2009 |Pages: 16
ISBN13: 9781599049748|ISBN10: 1599049740|EISBN13: 9781599049755
DOI: 10.4018/978-1-59904-974-8.ch001
Cite Chapter Cite Chapter

MLA

Jansen, Bernard J., et al. "Research and Methodological Foundations of Transaction Log Analysis." Handbook of Research on Web Log Analysis, edited by Bernard J. Jansen, et al., IGI Global, 2009, pp. 1-16. https://doi.org/10.4018/978-1-59904-974-8.ch001

APA

Jansen, B. J., Taksa, I., & Spink, A. (2009). Research and Methodological Foundations of Transaction Log Analysis. In B. Jansen, A. Spink, & I. Taksa (Eds.), Handbook of Research on Web Log Analysis (pp. 1-16). IGI Global. https://doi.org/10.4018/978-1-59904-974-8.ch001

Chicago

Jansen, Bernard J., Isak Taksa, and Amanda Spink. "Research and Methodological Foundations of Transaction Log Analysis." In Handbook of Research on Web Log Analysis, edited by Bernard J. Jansen, Amanda Spink, and Isak Taksa , 1-16. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-974-8.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter outlines and discusses theoretical and methodological foundations for transaction log analysis. We first address the fundamentals of transaction log analysis from a research viewpoint and the concept of transaction logs as a data collection technique from the perspective of behaviorism. From this research foundation, we move to the methodological aspects of transaction log analysis and examine the strengths and limitations of transaction logs as trace data. We then review the conceptualization of transaction log analysis as an unobtrusive approach to research, and present the power and deficiency of the unobtrusive methodological concept, including benefits and risks of transaction log analysis specifically from the perspective of an unobtrusive method. Some of the ethical questions concerning the collection of data via transaction log applications are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.