csci 6530 2015 fall_cli2
TRANSCRIPT
![Page 1: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/1.jpg)
LIBRARY RESEARCH FOR COMPUTER SCIENCE
Clarke IakovakisResearch & Instruction LibrarianNeumann Library
![Page 2: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/2.jpg)
http://libguides.uhcl.edu/CSCI6530
![Page 3: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/3.jpg)
Please turn your clicker ON
![Page 4: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/4.jpg)
HOW MUCH EXPERIENCE DO YOU HAVE USING SCHOLARLY ARTICLE DATABASES IN YOUR RESEARCH?a. I have not used scholarly article
databases before
b. I have a little experience using scholarly article databases
c. I have used scholarly article databases many times
![Page 5: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/5.jpg)
![Page 6: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/6.jpg)
OUTLINE FOR TODAY
• Academic Research• Principles of Good Searching • Searching in the Research
Databases & Library Catalog• Citing Sources & EndNote
![Page 7: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/7.jpg)
SECTION 1: ACADEMIC RESEARCH
![Page 8: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/8.jpg)
• A literature review is part of the published work referencing related research, theory, and background information
• A review of the literature (literature search) may be conducted to…
• understand a topic• help you form a problem statement• provide confirmation of an already
existing hypothesis• analyze and interpret your own data• gain exposure to past, current, and
ongoing research about a subject you are exploring for research of your own
REVIEWING LITERATURE
![Page 9: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/9.jpg)
“AUTHORITATIVE” INFORMATION
“Authority” is a type of influence recognized or exerted in a community
Disciplines have acknowledged authorities--scholars & publications
Approach “authoritative” perspectives with informed skepticism.
![Page 10: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/10.jpg)
WHAT IS PEER REVIEW? A process for establishing authority of scholarly research
Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C.
Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
![Page 11: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/11.jpg)
WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?
BooksReference worksPeer-reviewed journal articlesGray literature
Reports (government, non-governmental organizations)
Theses & dissertationsConference proceedings
Archival resources“Computer laptop” by Steve Hillebrand, licensed under public
domain
![Page 12: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/12.jpg)
PERIODICALS (JOURNALS, MAGAZINES)
Peer-reviewedRefereedScholarlyAcademic
TradeProfessiona
lPractitione
rIndustry
General
Popular
![Page 13: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/13.jpg)
![Page 14: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/14.jpg)
DISSECT THIS CITATION
What is the…
Journal name Volume number Issue number Authors
Article title Page number
range Year of
publication DOI
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
![Page 15: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/15.jpg)
HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?
A. GoogleB. OneSearch (library catalog)C. A subscription database, such
as INSPEC or ACM Digital Library
![Page 16: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/16.jpg)
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
![Page 17: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/17.jpg)
TRY IT
Age-Invariant Face RecognitionAuthor name?Journal name? Journal year?
![Page 18: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/18.jpg)
SECTION 2: PRINCIPLES OF GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen bowler.
![Page 19: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/19.jpg)
• Determine your research question1• Identify the key concepts2• List alternate keywords, synonyms, and
related words3• Join terms and concepts with appropriate
Boolean operators4• Make use of database’s limiters &
suggested subject terms 5• Organize and cite your sources6
SEARCH PROCESS
![Page 20: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/20.jpg)
One• What are some ways artificial intelligence
is used to prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
1. DETERMINE YOUR RESEARCH QUESTION
![Page 21: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/21.jpg)
2. IDENTIFY THE KEY CONCEPTS
•artificial intelligence•face recognition•crime solving
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
![Page 22: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/22.jpg)
artificial intellige
nce
Machine learning Neural
networks
Intelligent
agents
Self-adjusting systems
3. List alternate keywords, synonyms, and related words
OR
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
![Page 23: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/23.jpg)
Face recogniti
on
biometrics
Face detectio
n
pattern recognitio
niris
recognition
OR
3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve crimes?
![Page 24: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/24.jpg)
CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY”)
• A list of terms and term relationships designed too organize information about similar subjectso assist content authors in consistently classifying/tagging contento enable users to find the information they need by translating their
language into the language of the information store. Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
![Page 25: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/25.jpg)
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
![Page 26: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/26.jpg)
•ANDORNOT
4. Join terms and concepts with appropriate Boolean operators
![Page 27: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/27.jpg)
![Page 28: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/28.jpg)
Machine learning
Artificial intelligence Intelligent
agents
M EOR
Artificial intelligence OR machine learning OR intelligent agents
![Page 29: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/29.jpg)
Face recognition OR eigenfaces OR skin texture analysis
Artificial intelligence OR machine learning OR
intelligent agents
AND
![Page 30: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/30.jpg)
AND
![Page 31: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/31.jpg)
WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?
A.
B.
![Page 32: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/32.jpg)
WHICH SEARCH WILL FIND FEWER RESULTS?
A.B.
OR
artificial intelligence
artificial intelligence
crime
crime
![Page 33: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/33.jpg)
ANDORem
![Page 34: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/34.jpg)
TRUNCATION (WILDCARDS)
computecomputescomputing
computationcomputorcomputers
comput* * Search Tip
![Page 35: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/35.jpg)
• State your research topic1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6
SEARCH STRATEGIES
![Page 36: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/36.jpg)
SECTION 3: RESEARCH DATABASES & LIBRARY CATALOG
Screenshot from Wargames © United Artists. Retrieved from Tumblr
![Page 37: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/37.jpg)
Why use a library when I have Google?
But wait…
![Page 38: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/38.jpg)
tumblr
.gov Wikipedia
Subscription databases
Password-protected websites
restricted access
$$$
free access
Illegal content
Classified documents
Surface Web
Deep Web
Amazon
cnn
ads
![Page 39: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/39.jpg)
OFF CAMPUS ACCESS TO SUBSCRIPTION DATABASES
If you have problems accessing resources from off campus, call the Reference
Desk 281-283-3910
2001234567
![Page 40: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/40.jpg)
A.
B.
C.
D.
E.
TO CONNECT TO LIBRARY DATABASES FROM HOME
Log in using your UHCL ID and last name
Log in using your eservice account
Call the library and ask for a password
Google it
Log in using your Library barcode and last name
![Page 41: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/41.jpg)
![Page 42: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/42.jpg)
![Page 43: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/43.jpg)
![Page 44: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/44.jpg)
SECTION 4: CITING SOURCES
![Page 45: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/45.jpg)
Too much information?
![Page 46: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/46.jpg)
Ask a Librarian
Stop by the reference desk or schedule a research consultation!In person
281-283-3910Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM
![Page 47: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/47.jpg)
Please turn your clicker OFF
![Page 48: Csci 6530 2015 fall_cli2](https://reader035.vdocuments.us/reader035/viewer/2022062903/5899d9ed1a28ab4a0b8b61eb/html5/thumbnails/48.jpg)
FEEDBACK PLEASE!