CSCI6530: Library Instruction for Research Methods in Computer Science
Transcript of CSCI6530: Library Instruction for Research Methods in Computer Science
LIBRARY RESEARCH FOR COMPUTER SCIENCE
Clarke IakovakisResearch & Instruction LibrarianNeumann Library
FOR ME, THE HARDEST PART OF RESEARCH IS…
a. Getting started
b. Finding relevant information
c. Writing the paper
d. Citing sources
e. None – research is easy
OUTLINE FOR TODAY
• Academic Research
• Principles of Good Searching
• Searching in the Research Databases & Library Catalog
• Citing Sources & EndNote
• A literature review is part of the published work referencing related research, theory, and background information
• A review of the literature (literature search) may be conducted to…
• understand a topic
• help you form a problem statement
• provide confirmation of an already existing hypothesis
• analyze and interpret your own data
• gain exposure to past, current, and ongoing research about a subject you are exploring for research of your own
REVIEWING LITERATURE
“AUTHORITATIVE” INFORMATION
“Authority” is a type of influence recognized or exerted in a community
Disciplines have acknowledged authorities--scholars & publications
Approach “authoritative” perspectives with informed skepticism.
WHAT IS PEER REVIEW?
A process for establishing authority of scholarly research
Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C.
Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?
Books
Reference works
Peer-reviewed journal articles
Gray literatureReports (government,
non-governmental organizations)
Theses & dissertations
Conference proceedings
Archival resources“Computer laptop” by Steve Hillebrand, licensed under public
domain
PERIODICALS (JOURNALS, MAGAZINES)
Peer-reviewedRefereedScholarlyAcademic
TradeProfessiona
lPractitione
rIndustry
General
Popular
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.
article title
publication title
volume number
page number
publication year
authors
How do I find an article when I have a citation?
HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?
A. Google
B. OneSearch (library catalog)
C. A subscription database, such
as INSPEC or ACM Digital
Library
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.
SECTION 2: PRINCIPLES OF GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen bowler.
• Determine your research question1• Identify the key concepts2• List alternate keywords, synonyms, and
related words3• Join terms and concepts with appropriate
Boolean operators4• Make use of database’s limiters &
suggested subject terms 5• Organize and cite your sources6
SEARCH PROCESS
One
• What are some ways artificial intelligence is used to prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
1. DETERMINE YOUR RESEARCH QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial intelligence
•face recognition
•crime solving
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
artificial intellige
nce
Machine learning
Neural network
s
Intelligent
agents
Markov Decision Processe
s
3. List alternate keywords, synonyms, and related words
OR
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
Face recogniti
on
Computer vision
eigenfaces
biometrics
Face detection
OR
3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve crimes?
CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY”)
• A list of terms and term relationships designed too organize information about similar subjects
o assist content authors in consistently classifying/tagging content
o enable users to find the information they need by translating their language into the language of the information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
Machine learning
Artificial intelligence Intelligent
agents
M EOR
Artificial intelligence OR machine learning OR intelligent agents
Face recognition OR eigenfaces OR skin texture analysis
Artificial intelligence OR machine learning OR
intelligent agents
AND
WHICH SEARCH WILL FIND FEWER RESULTS?
A.B.
OR
artificial intelligence
artificial intelligence
crime
crime
TRUNCATION (WILDCARDS)
compute
computes
computing
computation
computor
computers
comput* *Search
Tip
• State your research topic1• Identify the key concepts2• List alternate keywords, synonyms, and
related words3• Join terms and concepts with appropriate
Boolean operators4• Make use of database’s limiters &
suggested subject terms 5• Organize and cite your sources6
SEARCH STRATEGIES
SECTION 3: RESEARCH DATABASES & LIBRARY CATALOG
Screenshot from Wargames © United Artists. Retrieved from Tumblr
tumblr
.gov Wikipedia
Subscription databases
Password-protected websites
restricted access
$$$
free
access
Illegal content
Classified documents
Surface Web
Deep Web
Amazon
cnn
ads
OFF CAMPUS ACCESS TO SUBSCRIPTION DATABASES
If you have problems accessing resources from off campus, call the Reference
Desk 281-283-3910
2001234567
A.
B.
C.
D.
E.
TO CONNECT TO LIBRARY DATABASES FROM HOME
Log in using your UHCL ID and last name
Log in using your eservice account
Call the library and ask for a password
Google it
Log in using your Library barcode and last name
Ask a Librarian
Stop by the reference desk or schedule a research consultation!In person
281-283-3910Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM