Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Search and use of information among final year Computer Science and Information Technology undergraduates. Sharif

88 views

Published on

Presented at LILAC 2008

Published in: Education
  • Be the first to comment

  • Be the first to like this

Search and use of information among final year Computer Science and Information Technology undergraduates. Sharif

  1. 1. Search and Use of Information among Computer Science and Information Technology Undergraduates Mohd Sharif Mohd Saad Faculty of Information Management University Teknologi Mara, Shah Alam MALAYSIA mohd.sharif@gmail.com
  2. 2. Part of a study to investigate Information Seeking Behavior of 14 Final year undergraduate at the faculty of Computer Science and Information Technology, University of Malaya-while conducting their final year project proposal. Introduction
  3. 3. bjectives of thebjectives of the studystudy the decision when choosing research topics by final year students the sources and channels of information they use and prefer the utility of libraries and librarians the use of the Internet the search strategies used their thoughts on ethical issues when searching and using information.
  4. 4. Background : Why CS & IT FinalBackground : Why CS & IT Final Year UndergraduatesYear Undergraduates  Expected to be computer and Internet literate  Have taken Information Skills Course – offered by the library  Past 2 years being doing assignments, projects
  5. 5. MethodologyMethodology 14 students volunteers (3 males, 11 females)  Complete their Information Search Diaries  Response to email questionnaire  Face to face interview
  6. 6. Choosing the project titleChoosing the project title 8 – Depend on titles provided by lecturers 8 – Discuss with their lecturer 3 – Propose own topic 6 – Discuss with friends/seniors
  7. 7. Respondents R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 Total Information Sources Internet X X X X X X X X X X X X X X 14 Past years Final Yr Projects X X X X X X X X X X X X X X 14 Lecturers X X X X X X X X X X X X 12 Friends X X X X X X X X X X X X 12 Books X X X X X X X X X X X 11 Interview/Survey /Questionnaires X X X X X X X X 8 Journal Article X X X X X 5 OPAC X X X X 4 Buy Books X X X X 4 Visits X X X X 4 Information Sources Used
  8. 8. Respondents R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 Total Electronic Full Text X X X 3 Brochures X X 2 CD Rom X 1 Newspaper & Television X 1 Seminar Papers X 1 Attended Seminar X 1 Reference Librarian X 1 Online Index/Abstract - Government Reports - nformation Sources Used…cont
  9. 9. Why?Why? Lecturer/supervisors Friends/seniors
  10. 10. Search PatternSearch Pattern
  11. 11. Search Pattern of the Internet
  12. 12. Information Search Subject System Familiarity Method of Access Know the Report Do not Know the Report Recommended Recommended Browsing By Friend by Lecturers Outcome Needs Met Partially Met Not Met Further Action Problems 1. Cannot find the required Information. 2. Limited Opening Hours Continue Seeking & Evaluating Information Search and Use of Past Years Reports
  13. 13. Information Search Subject System Familiarity Method of Access Know the Book Do not Know the Book Recommended Recommended OPAC Book Store By Friend by Lecturers Outcome Needs Met Partially Met Not Met Further Action Problems 1. Book not in the Library 2. Books borrowed by others 3. Too few titles in the Library 4. Books are expensive Continue Seeking & Evaluating Information Search and Use of Books
  14. 14. Information Search Subject System Methodology Survey Interview Visit Electronic Manual Electronic Face to Sites Exhibition Face Outcome Needs Met Partially Met Not Met Further Action Problems 1. Poor response 2. Difficulty in Scheduling appointments 3. Some information are Confidential Continue Seeking & Evaluating Search Patterns for Survey/Interview/Visit
  15. 15. Evaluation Method R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 Tota l Compare with other sources X X X X X X X X X X X X X X 14 Lecturers/Supervisor X X X X X X X X X X X X X 13 Friends X X X X X X X X X X X 11 Integrity/authority of authors, editors, publishers X X X X X X X X X X 10 Check the date X X X X X X 6 Compare with lecture notes X X X X 4 Compare with well known projects X X X 3 Information contains references X X 2 Refer to authentic sources like reference text, reference given X 1 Try the coding (programming) X 1 Own Analysis X 1 EVALUATION OF INFORMATION
  16. 16. 4 – did not find the lib. services useful to them4 – did not find the lib. services useful to them 3 – the lib. fulfill their needs3 – the lib. fulfill their needs 1 – approach the librarian for assistance1 – approach the librarian for assistance Are aware of inter-lib. loan but never use themAre aware of inter-lib. loan but never use them A good place to study and readA good place to study and read Librarian looks busyLibrarian looks busy Librarian cannot help them because their subjectsLibrarian cannot help them because their subjects are very technicalare very technical Libraries and Librarians
  17. 17.  Able to explain the term “plagiarism”  Cited the references used  All 14 information are “Aware” and “Agreed” the importance of IP, but admitted to using pirate software Ethical use of Information and Intellectual Property
  18. 18. Why?Why?  “Original software are too expensive, if I fully depend on the original one, a student like me can never afford them. I have to use it or I will never learn Computer Science” (R1)  “We cannot afford original software, after all it is not being use professionally” (R4)  “Cheap and it is normal to use in education” (R4)  “I think it dos not matter when compared to if use by a company” (R13)  “As long as it is not for commercial use “(R10)  “Students are not developing actual system” (R12).
  19. 19. PROBLEMS SOLUTIONS

×