Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Like this? Share it with your network

Share

Library tutorial For NM3210

on

  • 1,689 views

NM3210 tutorial 27 & 28 August 2009

NM3210 tutorial 27 & 28 August 2009

Statistics

Views

Total Views
1,689
Views on SlideShare
1,671
Embed Views
18

Actions

Likes
2
Downloads
4
Comments
0

4 Embeds 18

http://www.lib.nus.edu.sg 12
http://libguides.nus.edu.sg 3
http://www.slideshare.net 2
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • InfoGate displays a maximum of 40 hits from the databases. Clicking on a hyperlinked result will bring you to that database.

Library tutorial For NM3210 Presentation Transcript

  • 1. Searching Library Resources NM3210 – Cybercrime and Society Gan Kim Hong Rahimah Md Moasi [email_address] [email_address] August 2009
  • 2. What we will cover
    • Boolean Logic
    • Database Searching
    • Proxy Bookmarklet
    • NUS Libraries’ InfoGate
  • 3. Topic : Cybercrime
    • Possible search queries:
    • 1. cybercrime
    • 2. cyber crime
    • 3. cyber crimes
    • 4. internet crimes
    • 5. computer crimes
  • 4. Boolean Operators
    • or = any of the terms may be present
    • and = all terms must be present
    • not = excludes specific search term
    using “and” operator narrows the search
  • 5. Truncation & Wildcard
    • Truncation:
    • crime * retrieves “crime”, “crime s ” (anything that comes after “crime”)
    • Wildcard:
    • wom ? n retrieves “wom a n” and “wom e n”
    • (symbol ? replaces one character)
  • 6. monitor* and (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*)) and Singapore [topic] Monitoring cybercrime in Singapore (concept 1) monitoring (concept 3) Singapore Singapore monitor* (concept 2) cybercrime (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*)
  • 7. Keyword Search using Boolean Logic
    • Identify the key concepts
        • enclose each concept in parenthesis
        • string the concepts using and
    • Within each concept
        • list as many synonyms as possible
        • string the synonyms using or
    • Use truncation
        • to capture variant forms of a search term
    • Phrase search
        • use quotation marks to group words into a phrase
  • 8. Mechanics of Database Searching
    • Formulate search query using Boolean logic
    • Sort by relevance
    • Refine search (e.g. narrow down the results)
    • Mark
    • Save
  • 9. LexisNexis Academic
  • 10. Specify source: Singapore
  • 11. Sort by relevance Mark records Save records: Print, email or download
  • 12. Log In to Factiva
  • 13. Specify source: Hong Kong
  • 14. Search Straits Times
  • 15. Searching for Journal Articles in LINC
    • Hinduja, Sameer, and Patchin, Justin W. (2008). Personal information of adolescents on the Internet: a quantitative content analysis of MySpace. Journal of Adolescence , 31 (1). 125-146.
    title of article title of journal In LINC, which title do we search? journal title
  • 16.
    • EbscoHost
    • InformaWorld
    • Project Muse
    • Proquest
    • Sage
    • ScienceDirect
    • See Library portal for a complete list
    Searching Full-text Databases
  • 17. ScienceDirect
  • 18. Library Proxy Bookmarklet
    • Inserts the NUS library proxy stem (libproxy1.nus.edu.sg) into the URL of the article
    • Connects you to the library proxy and allows you to view the full-text of the article straightaway if it is subscribed by NUS Libraries
  • 19. From URL links in Websites
  • 20. From URL links in Email Alerts
  • 21. How do I install the Proxy Bookmarklet in my browser?
    • Click on the link below and follow the instructions:
    • http:// lib.nus.edu.sg/lion/d/proxybkmrklet_google.html
  • 22. How to use the proxy bookmarklet?
    • Click on the URL of the article
    • Click on the library proxy bookmarklet
      • In your Internet browser: Favorites  NUS Libraries Proxy Bookmarklet
    • You will be prompted for your NUSNET ID and password if you have not login previously during the session
  • 23. Library InfoGate
    • Federated search engine
    • Searches multiple resources via one interface
    • Useful when:
      • you are not sure of which databases to choose when starting a search
      • you want to find out other databases are relevant to your research topic
  • 24. InfoGate
  • 25. CNM Subject Guide
    • http://www.lib.nus.edu.sg/lion/sg/ss/cn/cnm.html
  • 26. CNM Resource Librarians’ Contacts
    • Gan Kim Hong (Ms)
    • Librarian, Central Library
    • [email_address]
    • 6516-2022
    • Rahimah (Ms)
    • Assistant Librarian, Central Library
    • [email_address]
    • 6516-2022