Usage Analysis of University of Manitoba Licensed Databases via EZproxy’s Logs


Database Usage Analysis
Transaction Log Analysis

How to Cite

Xuan, W. (2019). Usage Analysis of University of Manitoba Licensed Databases via EZproxy’s Logs. International Journal of Librarianship, 4(2), 76–93.
Received 2019-07-31
Accepted 2019-10-06
Published 2019-12-29


Compared to vendor-provided data, Transaction Log Analysis (TLA) can provide unique benefits to a library in analyzing database usage. Meanwhile, it also requires librarians to have a broad knowledge of Information Technology in order to implement a TLA. This article will present an in-house database system developed at the University of Manitoba Libraries to analyze EZProxy’s Starting Point Uniform Resource Locator logs. The database visits that happened in the past two years have been imported into this system and are split into two categories, on-campus and off-campus visits. Unique statistical information from each category is also discussed.


Baker, G., & Read, E. J. (2008). Vendor‐supplied usage data for electronic resources: a survey of academic libraries. Learned Publishing, 21(1), 48–57.

Blecic, D., Fiscella, J., & Wiberley, S. (2001). The measurement of use of Web-based information resources: An early look at vendor-supplied data. College & Research Libraries, 62(5), 434–453.

Blecic, D., Fiscella, J., & Wiberley, S. (2007). Measurement of Use of Electronic Resources: Advances in Use Statistics and Innovations in Resource Functionality. College & Research Libraries, 68(1), 26–44.

Coombs, K. A. (2005). Lessons learned from analyzing library database usage data. Library Hi Tech, 23(4), 598–609.

COUNTER. (2019). What is COUNTER? Retrieved July 25, 2019, from

Duy, J., & Vaughan, L. (2003). Usage data for electronic resources: A comparison between locally collected and vendor-provided statistics. Journal of Academic Librarianship, 29(1), 16–22.

Gonzales, B. M. (2018). Analyzing EZproxy SPU Logs Using Python Data Analysis Tools. Code4Lib Journal, (42).

Liu, G., & Fu, P. (2018). Shared Next Generation ILSs and Academic Library Consortia: Trends, Opportunities and Challenges. International Journal of Librarianship (IJoL), 3(2), 53–71.

NISO. (2019). SUSHI History/Origins. Retrieved July 25, 2019, from

OCLC. (2018a). LogSPU. Retrieved from

OCLC. (2018b). Starting point URLs and config.txt.

OCLC. (2019). Log files overview. Retrieved July 24, 2019, from

OED, O. (2019). database, n. Retrieved from

Peters, T. A. (1993). The history and development of transaction log analysis. Library Hi Tech, 11(2), 41–66.

Shibboleth. (2019). Shibboleth. Retrieved July 25, 2019, from

Wan, G., & Liu, Z. (2010). Knowing your users: The value of article database usage analysis. Learned Publishing, 23(3), 225–236.

Authors who publish with this journal agree to the following terms:         

Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and the initial publication in this journal.      

Authors are able to enter into separate, additional contractual arrangements for the nonexclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.      

Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to  productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


Download data is not yet available.