I wrote an article on a project I did in this area back 5 years ago
when I worked for SUNY Cortland. The citation is Coombs, K. A (2005)
Lessons Learned From Analyzing Library Database Usage Data Library
Hi Tech 23(4), 598-609.
We were looking at paths users were taking to get to electronic
Wayne,
You might want to ask this of the EZProzy list. I can tell you what we do
here. First, we have the following options open:
Option LogUser
LogFormat %h %l %u %t %r %s %b %u
Basically the LogUser option was added to track possible abuse. It also,
combined with the LogFormat, allows me