0
Upcoming SlideShare
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Standard text messaging rates apply

# Library tutorial For NM3210

1,036

Published on

NM3210 tutorial 27 & 28 August 2009

NM3210 tutorial 27 & 28 August 2009

Published in: Education, Technology
2 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

Views
Total Views
1,036
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
6
0
Likes
2
Embeds 0
No embeds

No notes for slide
• &amp;lt;number&amp;gt;
• &amp;lt;number&amp;gt;
• &amp;lt;number&amp;gt;
InfoGate displays a maximum of 40 hits from the databases. Clicking on a hyperlinked result will bring you to that database.
• ### Transcript

• 1. Searching Library Resources NM3210 – Cybercrime and Society Gan Kim Hong Rahimah Md Moasi clbgkh@nus.edu.sg clbrmm@nus.edu.sg August 2009
• 2. 2 What we will cover  Boolean Logic  Database Searching  Proxy Bookmarklet  NUS Libraries’ InfoGate
• 3. 3 Topic : Cybercrime Possible search queries: 1. cybercrime 2. cyber crime 3. cyber crimes 4. internet crimes 5. computer crimes
• 4. 4 Boolean Operators  or = any of the terms may be present  and = all terms must be present  not = excludes specific search term using “and” operator narrows the search
• 5. 5 Truncation & Wildcard Truncation:Truncation:  crimecrime** retrieves “crime”, “crimeretrieves “crime”, “crimess”” (anything that comes after “crime”)(anything that comes after “crime”) Wildcard:Wildcard:  womwom??nn retrieves “womretrieves “womaan” and “womn” and “womeen”n” (symbol(symbol ?? replaces one character)replaces one character)
• 6. 6 [topic] Monitoring cybercrime in Singapore (concept 1) monitoring (concept 3) Singapore Singaporemonitor* (concept 2) cybercrime (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*) monitor* and (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*)) and Singapore
• 7. 7 Keyword Search using Boolean Logic  Identify the key concepts  enclose each concept in parenthesis  string the concepts using and  Within each concept  list as many synonyms as possible  string the synonyms using or  Use truncation  to capture variant forms of a search term  Phrase search  use quotation marks to group words into a phrase
• 8. 8 Mechanics of Database Searching  Formulate search query using Boolean logic  Sort by relevance  Refine search (e.g. narrow down the results)  Mark  Save
• 10. 10 Specify source: Singapore
• 11. Sort by relevance Mark records Save records: Print, email or download
• 13. 13 Specify source: Hong Kong
• 14. 14 Search Straits Times
• 15. 15 Searching for Journal Articles in LINC Hinduja, Sameer, and Patchin, Justin W. (2008). Personal information of adolescents on the Internet: a quantitative content analysis of MySpace. Journal of Adolescence, 31 (1). 125-146. title of article title of journal In LINC, which title do we search? journal title
• 16. 16 EbscoHost InformaWorld Project Muse Proquest Sage ScienceDirect See Library portal for a complete list Searching Full-text Databases
• 17. 17 ScienceDirect
• 18. 18 Library Proxy Bookmarklet  Inserts the NUS library proxy stem (libproxy1.nus.edu.sg) into the URL of the article  Connects you to the library proxy and allows you to view the full-text of the article straightaway if it is subscribed by NUS Libraries
• 19. 19 From URL links in Websites