Identifying “sloppy” users in TMS through operation logs

被引:0
|
作者
Zhang S. [1 ]
Wen L. [2 ]
Torrisi G. [2 ]
Li J. [3 ]
机构
[1] School of Information Engineering, Chang’an University, Xi’an
[2] School of ICT, Griffith University, Brisbane
[3] Computer Science and Engineering, New South Wales University, Sydney
关键词
Data mining; Machine learning; Operation log; Outliers identification; TMS;
D O I
10.1007/s41870-023-01489-z
中图分类号
学科分类号
摘要
A transportation management system (TMS) is an integral software system for modern logistics and transportation companies. It is crucial to evaluate the quality of a TMS objectively, a task that currently presents significant challenges to both the IT and logistics sectors. One approach to this evaluation is usage analysis. However, usage analysis is complicated by the presence of both diligent users who utilize the system correctly and 'sloppy' users who enter inaccurate data haphazardly. This inaccuracy hampers the success of the information system and obstructs effective decision-making. Thus, identifying and excluding data from such users is essential for an accurate and objective evaluation of a TMS. Yet, the focus has primarily been on identifying outliers, typically for security reasons, while the identification of 'sloppy' users has been overlooked. Against this context we propose a novel method—Log Evaluation through Operation Sequence Distribution (LEOSD). This method distinguishes between abnormal and normal usage of a TMS by analysing system-generated logs. LEOSD is highly efficient and lightweight, minimizing any disruption to ongoing operations. Our experiment, based on real logs gathered from the industry, supports our hypothesis, and shows that LEOSD is effective in identifying 'sloppy' users. The positive results attest to the efficacy and practicality of our proposed method. © The Author(s) 2023.
引用
收藏
页码:1319 / 1331
页数:12
相关论文
共 50 条
  • [1] Evaluation of users' adaptation by applying LZW compression algorithm to operation logs
    Hayama, H
    Ueda, K
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 625 - 631
  • [2] IDENTIFYING USERS THROUGH A SEGMENTATION STUDY
    TOLLEY, BS
    JOURNAL OF MARKETING, 1975, 39 (02) : 69 - 71
  • [3] GOOD-NEWS FOR SLOPPY FLOPPY USERS
    ZUPPARDO, J
    ELECTRONIC PRODUCTS MAGAZINE, 1984, 26 (13): : 20 - 20
  • [4] Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
    Amuchi, Faith
    Al-Nemrat, Ameer
    Alazab, Mamoun
    Layton, Robert
    2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 28 - 37
  • [5] Identifying Users' Emotional States through Keystroke Dynamics
    Marrone, Stefano
    Sansone, Carlo
    DELTA: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON DEEP LEARNING THEORY AND APPLICATIONS, 2022, : 207 - 214
  • [6] Geo-Identification of Web Users through Logs using ELK Stack
    Prakash, Tarun
    Kakkar, Misha
    Patel, Kritika
    2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 606 - 610
  • [7] Revising ready reference sites - Listening to users through server statistics and query logs
    Mudrock, T
    REFERENCE & USER SERVICES QUARTERLY, 2002, 42 (02) : 155 - 163
  • [8] Mining Users' Intents from Logs
    Khodabandelou, Ghazaleh
    Hug, Charlotte
    Salinesi, Camille
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2015, 6 (02) : 43 - 71
  • [9] Identifying Influential Users on Instagram Through Visual Content Analysis
    Hasan Alwan, Wafaa
    Fazl-Ersi, Ehsan
    Vahedian, Abedin
    IEEE ACCESS, 2020, 8 : 169594 - 169603
  • [10] Identifying Queries in Instant Search Logs
    Fischer, Markus
    Komlossy, Kristof
    Stein, Benno
    Potthast, Martin
    Hagen, Matthias
    SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 1692 - 1696