CSCI6530: Library Instruction for Research Methods in Computer Science

48
LIBRARY RESEARCH FOR COMPUTER SCIENCE Clarke Iakovakis Research & Instruction Librarian Neumann Library

Transcript of CSCI6530: Library Instruction for Research Methods in Computer Science

LIBRARY RESEARCH FOR COMPUTER SCIENCE

Clarke IakovakisResearch & Instruction LibrarianNeumann Library

http://libguides.uhcl.edu/CSCI6530

Please turn your clicker ON

FOR ME, THE HARDEST PART OF RESEARCH IS…

a. Getting started

b. Finding relevant information

c. Writing the paper

d. Citing sources

e. None – research is easy

OUTLINE FOR TODAY

• Academic Research

• Principles of Good Searching

• Searching in the Research Databases & Library Catalog

• Citing Sources & EndNote

SECTION 1: ACADEMIC RESEARCH

• A literature review is part of the published work referencing related research, theory, and background information

• A review of the literature (literature search) may be conducted to…

• understand a topic

• help you form a problem statement

• provide confirmation of an already existing hypothesis

• analyze and interpret your own data

• gain exposure to past, current, and ongoing research about a subject you are exploring for research of your own

REVIEWING LITERATURE

“AUTHORITATIVE” INFORMATION

“Authority” is a type of influence recognized or exerted in a community

Disciplines have acknowledged authorities--scholars & publications

Approach “authoritative” perspectives with informed skepticism.

WHAT IS PEER REVIEW?

A process for establishing authority of scholarly research

Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C.

Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c

WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?

Books

Reference works

Peer-reviewed journal articles

Gray literatureReports (government,

non-governmental organizations)

Theses & dissertations

Conference proceedings

Archival resources“Computer laptop” by Steve Hillebrand, licensed under public

domain

PERIODICALS (JOURNALS, MAGAZINES)

Peer-reviewedRefereedScholarlyAcademic

TradeProfessiona

lPractitione

rIndustry

General

Popular

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.

article title

publication title

volume number

page number

publication year

authors

How do I find an article when I have a citation?

HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?

A. Google

B. OneSearch (library catalog)

C. A subscription database, such

as INSPEC or ACM Digital

Library

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.

TRY IT

Age-Invariant Face RecognitionAuthor name?

Journal name? Journal year?

SECTION 2: PRINCIPLES OF GOOD SEARCHING

On the Scent. Image licensed CC-BY on Flickr by stephen bowler.

• Determine your research question1• Identify the key concepts2• List alternate keywords, synonyms, and

related words3• Join terms and concepts with appropriate

Boolean operators4• Make use of database’s limiters &

suggested subject terms 5• Organize and cite your sources6

SEARCH PROCESS

One

• What are some ways artificial intelligence is used to prevent or solve crimes?

Two

• How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?

Three

• In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

1. DETERMINE YOUR RESEARCH QUESTION

2. IDENTIFY THE KEY CONCEPTS

•artificial intelligence

•face recognition

•crime solving

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

artificial intellige

nce

Machine learning

Neural network

s

Intelligent

agents

Markov Decision Processe

s

3. List alternate keywords, synonyms, and related words

OR

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Face recogniti

on

Computer vision

eigenfaces

biometrics

Face detection

OR

3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to

recognize faces for use in surveillance to prevent or solve crimes?

CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY”)

• A list of terms and term relationships designed too organize information about similar subjects

o assist content authors in consistently classifying/tagging content

o enable users to find the information they need by translating their language into the language of the information store.

Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.

• Identify the key concepts2

• List alternate keywords, synonyms, and related words3

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

•AND

OR

NOT

4. Join terms and concepts with appropriate Boolean operators

Machine learning

Artificial intelligence Intelligent

agents

M EOR

Artificial intelligence OR machine learning OR intelligent agents

Face recognition OR eigenfaces OR skin texture analysis

Artificial intelligence OR machine learning OR

intelligent agents

AND

AND

WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?

A.

B.

WHICH SEARCH WILL FIND FEWER RESULTS?

A.B.

OR

artificial intelligence

artificial intelligence

crime

crime

ANDORem

TRUNCATION (WILDCARDS)

compute

computes

computing

computation

computor

computers

comput* *Search

Tip

• State your research topic1• Identify the key concepts2• List alternate keywords, synonyms, and

related words3• Join terms and concepts with appropriate

Boolean operators4• Make use of database’s limiters &

suggested subject terms 5• Organize and cite your sources6

SEARCH STRATEGIES

Why use a library when I have Google?

But wait…

tumblr

.gov Wikipedia

Subscription databases

Password-protected websites

restricted access

$$$

free

access

Illegal content

Classified documents

Surface Web

Deep Web

Amazon

cnn

Google

ads

OFF CAMPUS ACCESS TO SUBSCRIPTION DATABASES

If you have problems accessing resources from off campus, call the Reference

Desk 281-283-3910

2001234567

A.

B.

C.

D.

E.

TO CONNECT TO LIBRARY DATABASES FROM HOME

Log in using your UHCL ID and last name

Log in using your eservice account

Call the library and ask for a password

Google it

Log in using your Library barcode and last name

SECTION 4: CITING SOURCES

Too much information?

Ask a Librarian

Stop by the reference desk or schedule a research consultation!In person

[email protected]

281-283-3910Phone

Text

http://libanswers.uhcl.edu

281-816-4341

IM

Please turn your clicker OFF

FEEDBACK PLEASE!