4. HOW MUCH EXPERIENCE DO YOU HAVE USING
SCHOLARLY ARTICLE DATABASES IN YOUR
RESEARCH?
a. I have not used scholarly article
databases before
b. I have a little experience using scholarly
article databases
c. I have used scholarly article databases
many times
5.
6. OUTLINE FOR
TODAY
• Academic Research
• Principles of Good
Searching
• Searching in the
Research Databases &
Library Catalog
8. • A literature review is part of the published work
referencing related research, theory, and
background information
• A review of the literature (literature search) may
be conducted to…
• understand a topic
• help you form a research question
• provide confirmation of an already existing
hypothesis
• analyze and interpret your own data
• gain exposure to past, current, and ongoing
research about a subject you are exploring
for research of your own
REVIEWING LITERATURE
9. PEER
REVIEW
A process for establishing
authority of scholarly research
Experts in the field/discipline
review the original ideas to certify
the accuracy, validity, and value
of the results
Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science,
Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from
http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=
2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
“AUTHORITATIVE”
INFORMATION:
10. WHAT ARE SOME SOURCES OF
SCHOLARLY INFORMATION?
•Peer-reviewed journal articles
•Books
•Reference works (encyclopedias, textbooks)
•Gray literature
• Reports (government, industry,
non-governmental organizations)
• Theses & dissertations
• Conference proceedings
•Archives
“Computer laptop” by Steve Hillebrand, licensed under public domain
13. DISSECT THIS CITATION
What is the…
Article title
Authors
Journal name
Volume number
Issue number
Page number
range
Year of
publication
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
14. HOW DO I FIND AN ARTICLE
WHEN I HAVE A CITATION?
A. Google
B. OneSearch
C. A subscription database, such as IEEE Xplore,
INSPEC or ACM Digital Library
15. B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
16. TRY IT
Title: Face Recognition Performance:
Role of Demographic Information
Lead Author: Klare
Journal name? Journal year?
17. SECTION 2: PRINCIPLES OF
GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen
bowler.
18. • Determine your research question1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH PROCESS
19. One
• What are some ways artificial intelligence is used to
prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent
crimes of spoofing, phishing, identity theft,
malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
1. DETERMINE YOUR RESEARCH
QUESTION
20. 2. IDENTIFY THE KEY CONCEPTS
•artificial
intelligence
•face recognition
•crime solving
In what ways is artificial intelligence
developed to recognize faces for
use in surveillance to prevent or
solve crimes?
23. CONTROLLED VOCABULARY
(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR
“THESAURUS”)
• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging
content
o enable users to find the information they need by
translating their language into the language of the
information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
24. • Identify the key concepts2
• List alternate keywords, synonyms, and related
words3
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
25. 4. Join terms and concepts with
appropriate Boolean operators
34. • State your research topic1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH STRATEGIES
39. TO CONNECT TO LIBRARY
DATABASES FROM HOME
Log in using your library barcode and last name
Log in using your eservice account
Call the library and ask for a password
Google it
Log in using your UHCL username and password
46. Ask a Librarian
Stop by the reference desk or schedule a
research consultation!In person
library@uhcl.edu
Email
281-283-3910
Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM