Top Banner
LIBRARY RESEARCH FOR COMPUTER SCIENCE Clarke Iakovakis Research & Instruction Librarian Neumann Library
48

Csci 6530 2015 fall_cli2

Apr 13, 2017

Download

Education

ciakov
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Csci 6530 2015 fall_cli2

LIBRARY RESEARCH FOR COMPUTER SCIENCE

Clarke IakovakisResearch & Instruction LibrarianNeumann Library

Page 2: Csci 6530 2015 fall_cli2

http://libguides.uhcl.edu/CSCI6530

Page 3: Csci 6530 2015 fall_cli2

Please turn your clicker ON

Page 4: Csci 6530 2015 fall_cli2

HOW MUCH EXPERIENCE DO YOU HAVE USING SCHOLARLY ARTICLE DATABASES IN YOUR RESEARCH?a. I have not used scholarly article

databases before

b. I have a little experience using scholarly article databases

c. I have used scholarly article databases many times

Page 5: Csci 6530 2015 fall_cli2
Page 6: Csci 6530 2015 fall_cli2

OUTLINE FOR TODAY

• Academic Research• Principles of Good Searching • Searching in the Research

Databases & Library Catalog• Citing Sources & EndNote

Page 7: Csci 6530 2015 fall_cli2

SECTION 1: ACADEMIC RESEARCH

Page 8: Csci 6530 2015 fall_cli2

• A literature review is part of the published work referencing related research, theory, and background information

• A review of the literature (literature search) may be conducted to…

• understand a topic• help you form a problem statement• provide confirmation of an already

existing hypothesis• analyze and interpret your own data• gain exposure to past, current, and

ongoing research about a subject you are exploring for research of your own

REVIEWING LITERATURE

Page 9: Csci 6530 2015 fall_cli2

“AUTHORITATIVE” INFORMATION

“Authority” is a type of influence recognized or exerted in a community

Disciplines have acknowledged authorities--scholars & publications

Approach “authoritative” perspectives with informed skepticism.

Page 10: Csci 6530 2015 fall_cli2

WHAT IS PEER REVIEW? A process for establishing authority of scholarly research

Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C.

Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c

Page 11: Csci 6530 2015 fall_cli2

WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?

BooksReference worksPeer-reviewed journal articlesGray literature

Reports (government, non-governmental organizations)

Theses & dissertationsConference proceedings

Archival resources“Computer laptop” by Steve Hillebrand, licensed under public

domain

Page 12: Csci 6530 2015 fall_cli2

PERIODICALS (JOURNALS, MAGAZINES)

Peer-reviewedRefereedScholarlyAcademic

TradeProfessiona

lPractitione

rIndustry

General

Popular

Page 13: Csci 6530 2015 fall_cli2
Page 14: Csci 6530 2015 fall_cli2

DISSECT THIS CITATION

What is the…

Journal name Volume number Issue number Authors

Article title Page number

range Year of

publication DOI

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115

Page 15: Csci 6530 2015 fall_cli2

HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?

A. GoogleB. OneSearch (library catalog)C. A subscription database, such

as INSPEC or ACM Digital Library

Page 16: Csci 6530 2015 fall_cli2

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115

Page 17: Csci 6530 2015 fall_cli2

TRY IT

Age-Invariant Face RecognitionAuthor name?Journal name? Journal year?

Page 18: Csci 6530 2015 fall_cli2

SECTION 2: PRINCIPLES OF GOOD SEARCHING

On the Scent. Image licensed CC-BY on Flickr by stephen bowler.

Page 19: Csci 6530 2015 fall_cli2

• Determine your research question1• Identify the key concepts2• List alternate keywords, synonyms, and

related words3• Join terms and concepts with appropriate

Boolean operators4• Make use of database’s limiters &

suggested subject terms 5• Organize and cite your sources6

SEARCH PROCESS

Page 20: Csci 6530 2015 fall_cli2

One• What are some ways artificial intelligence

is used to prevent or solve crimes?

Two

• How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?

Three

• In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

1. DETERMINE YOUR RESEARCH QUESTION

Page 21: Csci 6530 2015 fall_cli2

2. IDENTIFY THE KEY CONCEPTS

•artificial intelligence•face recognition•crime solving

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Page 22: Csci 6530 2015 fall_cli2

artificial intellige

nce

Machine learning Neural

networks

Intelligent

agents

Self-adjusting systems

3. List alternate keywords, synonyms, and related words

OR

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Page 23: Csci 6530 2015 fall_cli2

Face recogniti

on

biometrics

Face detectio

n

pattern recognitio

niris

recognition

OR

3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to

recognize faces for use in surveillance to prevent or solve crimes?

Page 24: Csci 6530 2015 fall_cli2

CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY”)

• A list of terms and term relationships designed too organize information about similar subjectso assist content authors in consistently classifying/tagging contento enable users to find the information they need by translating their

language into the language of the information store. Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.

Page 25: Csci 6530 2015 fall_cli2

• Identify the key concepts2

• List alternate keywords, synonyms, and related words3

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Page 26: Csci 6530 2015 fall_cli2

•ANDORNOT

4. Join terms and concepts with appropriate Boolean operators

Page 27: Csci 6530 2015 fall_cli2
Page 28: Csci 6530 2015 fall_cli2

Machine learning

Artificial intelligence Intelligent

agents

M EOR

Artificial intelligence OR machine learning OR intelligent agents

Page 29: Csci 6530 2015 fall_cli2

Face recognition OR eigenfaces OR skin texture analysis

Artificial intelligence OR machine learning OR

intelligent agents

AND

Page 30: Csci 6530 2015 fall_cli2

AND

Page 31: Csci 6530 2015 fall_cli2

WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?

A.

B.

Page 32: Csci 6530 2015 fall_cli2

WHICH SEARCH WILL FIND FEWER RESULTS?

A.B.

OR

artificial intelligence

artificial intelligence

crime

crime

Page 33: Csci 6530 2015 fall_cli2

ANDORem

Page 34: Csci 6530 2015 fall_cli2

TRUNCATION (WILDCARDS)

computecomputescomputing

computationcomputorcomputers

comput* * Search Tip

Page 35: Csci 6530 2015 fall_cli2

• State your research topic1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6

SEARCH STRATEGIES

Page 37: Csci 6530 2015 fall_cli2

Why use a library when I have Google?

But wait…

Page 38: Csci 6530 2015 fall_cli2

tumblr

.gov Wikipedia

Subscription databases

Password-protected websites

restricted access

$$$

free access

Illegal content

Classified documents

Surface Web

Deep Web

Amazon

cnn

Google

ads

Page 39: Csci 6530 2015 fall_cli2

OFF CAMPUS ACCESS TO SUBSCRIPTION DATABASES

If you have problems accessing resources from off campus, call the Reference

Desk 281-283-3910

2001234567

Page 40: Csci 6530 2015 fall_cli2

A.

B.

C.

D.

E.

TO CONNECT TO LIBRARY DATABASES FROM HOME

Log in using your UHCL ID and last name

Log in using your eservice account

Call the library and ask for a password

Google it

Log in using your Library barcode and last name

Page 41: Csci 6530 2015 fall_cli2
Page 42: Csci 6530 2015 fall_cli2
Page 43: Csci 6530 2015 fall_cli2
Page 44: Csci 6530 2015 fall_cli2

SECTION 4: CITING SOURCES

Page 45: Csci 6530 2015 fall_cli2

Too much information?

Page 46: Csci 6530 2015 fall_cli2

Ask a Librarian

Stop by the reference desk or schedule a research consultation!In person

[email protected]

281-283-3910Phone

Text

http://libanswers.uhcl.edu

281-816-4341

IM

Page 47: Csci 6530 2015 fall_cli2

Please turn your clicker OFF

Page 48: Csci 6530 2015 fall_cli2

FEEDBACK PLEASE!