SlideShare a Scribd company logo
1 of 13
9/29/2014 ISIM 2014. Budapest 2
9/29/2014 ISIM 2014. Budapest 3
9/29/2014 ISIM 2014. Budapest 4
9/29/2014 ISIM 2014. Budapest 5
9/29/2014 ISIM 2014. Budapest 6
9/29/2014 ISIM 2014. Budapest 7
9/29/2014 ISIM 2014. Budapest 8
TUDOMÁNYOS 
FOLYÓIRATOK 
1.2 MILLIÓ 
MEDICINA 
27.000 
FOLYÓIRAT 
PubMed 52.00 
indexel, 1.880 
nem része az 
EMBASE-nek 
EMBASE 4.800 
indexel, 1.800 
nincs a 
PubMed-ben 
9/29/2014 ISIM 2014. Budapest 9
10 
9 
8 
7 
6 
5 
4 
3 
2 
1 
0 
Költségvetés 
Előfizetési ár 
OA keresések 
OA források 
1995-1999 2000-2004 2005-2009 2010-2014 
9/29/2014 ISIM 2014. Budapest 10
9/29/2014 ISIM 2014. Budapest 11
OK 
TALÁLAT 
ELEMZÉS 
SZINTAKTIKA FELÉPÍTÉSE 
- ELLENŐRZÉSE 
MEGFELELŐ FORRÁSOK 
KIVÁLASZTÁS 
KERESÉSI STRATÉGIA 
MEGTERVEZÉSE 
9/29/2014 ISIM 2014. Budapest 12
9/29/2014 ISIM 2014. Budapest 13

More Related Content

Viewers also liked

Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Source Conference
 
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Source Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best PracticesSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 

Viewers also liked (8)

Im 2012
Im 2012Im 2012
Im 2012
 
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
 
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 

Informatio Scientifica et Informatio Medicata 2014. Budapest, Geges József dr.