Your SlideShare is downloading. ×
0
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Library tutorial For NM3210
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Library tutorial For NM3210

1,036

Published on

NM3210 tutorial 27 & 28 August 2009

NM3210 tutorial 27 & 28 August 2009

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,036
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • <number>
  • <number>
  • <number>
    InfoGate displays a maximum of 40 hits from the databases. Clicking on a hyperlinked result will bring you to that database.
  • Transcript

    • 1. Searching Library Resources NM3210 – Cybercrime and Society Gan Kim Hong Rahimah Md Moasi clbgkh@nus.edu.sg clbrmm@nus.edu.sg August 2009
    • 2. 2 What we will cover  Boolean Logic  Database Searching  Proxy Bookmarklet  NUS Libraries’ InfoGate
    • 3. 3 Topic : Cybercrime Possible search queries: 1. cybercrime 2. cyber crime 3. cyber crimes 4. internet crimes 5. computer crimes
    • 4. 4 Boolean Operators  or = any of the terms may be present  and = all terms must be present  not = excludes specific search term using “and” operator narrows the search
    • 5. 5 Truncation & Wildcard Truncation:Truncation:  crimecrime** retrieves “crime”, “crimeretrieves “crime”, “crimess”” (anything that comes after “crime”)(anything that comes after “crime”) Wildcard:Wildcard:  womwom??nn retrieves “womretrieves “womaan” and “womn” and “womeen”n” (symbol(symbol ?? replaces one character)replaces one character)
    • 6. 6 [topic] Monitoring cybercrime in Singapore (concept 1) monitoring (concept 3) Singapore Singaporemonitor* (concept 2) cybercrime (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*) monitor* and (cybercrime* or (cyber crime*) or (internet crime*) or (computer crime*)) and Singapore
    • 7. 7 Keyword Search using Boolean Logic  Identify the key concepts  enclose each concept in parenthesis  string the concepts using and  Within each concept  list as many synonyms as possible  string the synonyms using or  Use truncation  to capture variant forms of a search term  Phrase search  use quotation marks to group words into a phrase
    • 8. 8 Mechanics of Database Searching  Formulate search query using Boolean logic  Sort by relevance  Refine search (e.g. narrow down the results)  Mark  Save
    • 9. 9 LexisNexis Academic
    • 10. 10 Specify source: Singapore
    • 11. Sort by relevance Mark records Save records: Print, email or download
    • 12. 12 Log In to Factiva
    • 13. 13 Specify source: Hong Kong
    • 14. 14 Search Straits Times
    • 15. 15 Searching for Journal Articles in LINC Hinduja, Sameer, and Patchin, Justin W. (2008). Personal information of adolescents on the Internet: a quantitative content analysis of MySpace. Journal of Adolescence, 31 (1). 125-146. title of article title of journal In LINC, which title do we search? journal title
    • 16. 16 EbscoHost InformaWorld Project Muse Proquest Sage ScienceDirect See Library portal for a complete list Searching Full-text Databases
    • 17. 17 ScienceDirect
    • 18. 18 Library Proxy Bookmarklet  Inserts the NUS library proxy stem (libproxy1.nus.edu.sg) into the URL of the article  Connects you to the library proxy and allows you to view the full-text of the article straightaway if it is subscribed by NUS Libraries
    • 19. 19 From URL links in Websites
    • 20. 20 From URL links in Email Alerts 20
    • 21. 21 How do I install the Proxy Bookmarklet in my browser? Click on the link below and follow the instructions: http://lib.nus.edu.sg/lion/d/proxybkmrklet_google.html
    • 22. 22 How to use the proxy bookmarklet? 1. Click on the URL of the article 2. Click on the library proxy bookmarklet In your Internet browser: Favorites  NUS Libraries Proxy Bookmarklet 3. You will be prompted for your NUSNET ID and password if you have not login previously during the session
    • 23. 23 Library InfoGate  Federated search engine  Searches multiple resources via one interface  Useful when:  you are not sure of which databases to choose when starting a search  you want to find out other databases are relevant to your research topic
    • 24. 24 InfoGate
    • 25. 25 CNM Subject Guide http://www.lib.nus.edu.sg/lion/sg/ss/cn/cnm.html
    • 26. 26 CNM Resource Librarians’ Contacts Gan Kim Hong (Ms) Librarian, Central Library clbgkh@nus.edu.sg 6516-2022 Rahimah (Ms) Assistant Librarian, Central Library clbrmm@nus.edu.sg 6516-2022

    ×