SlideShare a Scribd company logo
BIZ 2401 and the Library World of resources at your fingertips Professor Traci Welch Moritz Public Services Librarian/Assistant Professor Heterick Memorial Library
Who are you and how am I to remember all this stuff?
Goals for Today Overview of library information systems Specific tools for accessing information ,[object Object]
Databases
Internet
Bibliographic citation software3.   Accessing periodicals
Catalogs – for locating books, maps, musical scores, govt. documents, etc. Databases – usually for locating magazine and newspaper articles, but may cover other materials as well Internet – digital content, mostly in the public domain (not commercial materials) Accessing Information
Massive collections of data which allow for retrieval Organized Fully indexed Allows for sophisticated searching Target audience Shows access points Updated every second of every day Catalogs
Catalogs POLAR OhioLINK
Databases Massive collections of data which allow for retrieval Organized Fully indexed Allows for sophisticated searching Target audience Selected content Not free to the library but free to users Updated periodically
Search types
Accessing Information 9 Click here for more resources
Using Databases Select Marketing or Business
Off Campus Access Be sure to click on the “Off campus access tab” to the right of the database title to begin First and last name exactly as it appears on ONU ID + all 11 digits of university ID Click on “submit”
Library App now available
Finding Journals at HML If looking for a specific journal, type in title at library catalog Print Back issues on microfiche Back issues available electronically
Fortune, print Own title from 1969 to latest received copy. Click on “latest received” to find out where all issues are housed
Fortune, print BND PRP means these issues are at bindery and so unavailable ARRIVED means just that and because the location is “Reserve”, these are ones behind the desk. Copies from 1969 through September 2010 are on 2nd floor bound periodical collection or in microforms
Fortune, microfiche
Fortune, electronic access
Finding Journals at HML Also see what is accessible electronically through the “Electronic Journal Finder.”
Electronic Journal Finder Click on “Electronic Journals” and type in title or as much as you know of it.
Electronic Journal Finder
Electronic Journal Finder Able to search within specific journal for subject.
Electronic Journal Finder Click on html, pdf or “find it” icon to access the article.
Options for articles Save it Email it Print it Export it (check for citation information)
Bibliographic Citation Software REFWORKS
Internet Databases “Pay to Play” Usually created by a single publisher Content pre-arranged for easy use Quality/ content control thru editorial staff Content usually available only to subscribers Content source usually identified      and dated Internet (Search Engines) Material from numerous sources,  individual. Government, etc. Search engines must work with material prepared without regard for specific software Quality of material varies Generally do not access for-profit information Content often anonymous and undated
Unstructured Constantly changing Not fully indexed Appeals to no special audience No selection of content Content most often not free Updated every second of every day Internet
Internet Subject portals: ,[object Object]
WWW Virtual LibraryComprehensive search engines: ,[object Object]
Ask.com
Excite
Scholar.Google
Hotbot
Lycos
WisenutMulti-engine searching: MetaCrawler Vivisimo WIKIPEDIA
Internet Google and Wikipedia aren’t evil, just use them for the correct purpose in your research.
Internet ONU buys Full-text database Note: See the “Google Scholar” tab in Research Guide for off campus access Google asks to link to content OhioLINK Permits Google to link to full-text Run Google Scholar Search ONU user sees  licensed full-text articles
Critically evaluating websites Currency  * The timeliness of the information.   Relevance/Coverage   *The depth and importance of the information.   Authority  *The source of the information.  Accuracy  *The reliability of the information.   Purpose/Objectivity  *The possible bias present in the information.   *The CRAAP acronym and descriptions are from Meriam Library at California State University Chico.  Used with permission.
The Invisible Web Most searchers only locate 0.03% - 1 in 3,000 - of the Web pages available to them Even advanced searchers, using largest search engines, can only access about 16% of Web content Diagrams from http://brightplanet.com/technology/deepweb.asp
The Invisible Web
The Invisible Web WHY? Because 84% of the information available on the Internet is found only on the “invisible Web,” a.k.a. “deep Web,”  and is not  searchable using a general  search engine such as Google Statistics from The Deep Web: Surfacing Hidden Value,  http://www.press.umich.edu/jep/07-01/bergman.html
The Invisible Web Visible Web page exists in “static” or unchanging form Exists as a “physical” file on a computer Most in .htm or .html format Similar to a word processed document in .doc or .wpd format
The Invisible Web ,[object Object],[object Object]
The Invisible Web Invisible Web content is “dynamic” or changing Contains bits of information stored in a database and pulled together on-the-fly into a Web page at your request Page doesn’t exist until you request it Similar to a mail merged document
The Invisible Web ,[object Object],Dynamic Web Page Author      Title           Publication Your search results Searching Smarter Wisconsin  Lawyer  B. Shucha 1.  B. Shucha, “Searching Smarter,”  Wisconsin Lawyer. 2.  J.Q. Public, “Legal Tech Tips,” ABA Journal. Common Law Marquette Law Review J. Doe J.Q. Public Legal Tech Tips ABA Journal
The Invisible Web Because this content is dynamic, or “physically” nonexistent, most search engines are unable to retrieve it, thereby rendering it “invisible”.
Indexing & the Invisible Web Spider crawls Web starting with  already indexed static pages Spider encounters database Query is required to access “dynamic” data Spider incapable of generating query Spider stops and cannot index data in database Content rendered “invisible”
The Invisible Web Other types of Invisible Web Content Very recent static pages which haven’t yet been indexed Password protected data
The Invisible Web Content 95% of invisible Web content is free and available to the public Quality of content often exceeds that of visible Web content From The Deep Web: Surfacing Hidden Value,  http://www.press.umich.edu/jep/07-01/bergman.html
The Invisible Web Content Legal & Governmental Materials Available in the Public Domain Case law Statutes Bills Regulations Patents Briefs Census Data Government Reports
The Invisible Web Content All Databases owned by Heterick Memorial Library under the “Business” or “Marketing” links See MRKT Research Guide under “Invisible/Deep Web” Business Data SEC filings Stock quotes Company profiles, annual reports
The Invisible Web Content General Information Address & phone directories Flight schedules Dictionaries Maps
The Invisible Web Content NOT freely available on Web (usually) For Profit Publications  Public domain documents with editorial enhancements Other material that is someone’s intellectual property

More Related Content

What's hot

Internet Research Presentation
Internet Research PresentationInternet Research Presentation
Internet Research Presentation
adeason
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teayssagebennet
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible webYKNIB O
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Niña Guno
 
Modulo Instruccional Internet Ppt
Modulo Instruccional Internet PptModulo Instruccional Internet Ppt
Modulo Instruccional Internet Ppt
PDIT Biblioteca UPR-Carolina
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
carolyn oldham
 
How Web 2.0 Transforms Librarians
How Web 2.0 Transforms LibrariansHow Web 2.0 Transforms Librarians
How Web 2.0 Transforms Librarians
Maggie Verster
 
Advanced internet searching Autumn 2011
Advanced internet searching Autumn 2011Advanced internet searching Autumn 2011
Advanced internet searching Autumn 2011
Phil Bradley
 
Week 5
Week 5Week 5
I103 pp mod 8
I103 pp mod 8I103 pp mod 8
I103 pp mod 8
robbmill
 
Searching the internet information and assessment
Searching the internet information and assessmentSearching the internet information and assessment
Searching the internet information and assessmentnollyris
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014
Joyce Miller
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
jhannnii
 
Internet Search
Internet SearchInternet Search
Internet SearchTori Small
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power PointPhillip0582
 

What's hot (17)

Internet Research Presentation
Internet Research PresentationInternet Research Presentation
Internet Research Presentation
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Modulo Instruccional Internet Ppt
Modulo Instruccional Internet PptModulo Instruccional Internet Ppt
Modulo Instruccional Internet Ppt
 
Internet research
Internet researchInternet research
Internet research
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
How Web 2.0 Transforms Librarians
How Web 2.0 Transforms LibrariansHow Web 2.0 Transforms Librarians
How Web 2.0 Transforms Librarians
 
Advanced internet searching Autumn 2011
Advanced internet searching Autumn 2011Advanced internet searching Autumn 2011
Advanced internet searching Autumn 2011
 
Week 5
Week 5Week 5
Week 5
 
I103 pp mod 8
I103 pp mod 8I103 pp mod 8
I103 pp mod 8
 
Searching the internet information and assessment
Searching the internet information and assessmentSearching the internet information and assessment
Searching the internet information and assessment
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Internet Search
Internet SearchInternet Search
Internet Search
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
 

Similar to BIZ 2401 and the Library

Deep Web
Deep WebDeep Web
Deep WebSt John
 
Gathering sources.pptx
Gathering sources.pptxGathering sources.pptx
Gathering sources.pptx
zahraa Aamir
 
Invisible web
Invisible webInvisible web
Invisible webpflugi
 
How to find information on the internet
How to find information on the internetHow to find information on the internet
How to find information on the internet
Dalia El-Shafei
 
Rhet1302 Searching And Evaluating Resources Spring 2010
Rhet1302   Searching And Evaluating Resources   Spring 2010Rhet1302   Searching And Evaluating Resources   Spring 2010
Rhet1302 Searching And Evaluating Resources Spring 2010
Matt
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
Shannon Librarian
 
Think Like A Librarian
Think Like A LibrarianThink Like A Librarian
Think Like A Librarian
LeAnn
 
Lesson 4: Researching & The Internet
Lesson 4: Researching & The InternetLesson 4: Researching & The Internet
Lesson 4: Researching & The Internetbsimoneaux
 
Invisible web
Invisible webInvisible web
Think Like A Librarian
Think Like A LibrarianThink Like A Librarian
Think Like A Librarian
LeAnn
 
Academic Skills 4
Academic Skills 4Academic Skills 4
Academic Skills 4Hala Nur
 
Information update May 2010 Alternative Search engine
Information update May 2010 Alternative Search engineInformation update May 2010 Alternative Search engine
Information update May 2010 Alternative Search engine
Inbar Yasur ענבר יסעור
 
Internet Research: Finding Websites, Blogs, Wikis, and More
Internet Research: Finding Websites, Blogs, Wikis, and MoreInternet Research: Finding Websites, Blogs, Wikis, and More
Internet Research: Finding Websites, Blogs, Wikis, and More
eclark131
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
Lorri Mon
 
Chapter 10
Chapter 10Chapter 10
Chapter 10lynroe
 
The invisible-webppt4899
The invisible-webppt4899The invisible-webppt4899
The invisible-webppt4899Eriik_lobo
 

Similar to BIZ 2401 and the Library (20)

Deep Web
Deep WebDeep Web
Deep Web
 
Gathering sources.pptx
Gathering sources.pptxGathering sources.pptx
Gathering sources.pptx
 
Invisible web
Invisible webInvisible web
Invisible web
 
How to find information on the internet
How to find information on the internetHow to find information on the internet
How to find information on the internet
 
Rhet1302 Searching And Evaluating Resources Spring 2010
Rhet1302   Searching And Evaluating Resources   Spring 2010Rhet1302   Searching And Evaluating Resources   Spring 2010
Rhet1302 Searching And Evaluating Resources Spring 2010
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
 
Think Like A Librarian
Think Like A LibrarianThink Like A Librarian
Think Like A Librarian
 
Research
ResearchResearch
Research
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Tapping hiddenjobmarket
Tapping hiddenjobmarketTapping hiddenjobmarket
Tapping hiddenjobmarket
 
Lesson 4: Researching & The Internet
Lesson 4: Researching & The InternetLesson 4: Researching & The Internet
Lesson 4: Researching & The Internet
 
Invisible web
Invisible webInvisible web
Invisible web
 
Think Like A Librarian
Think Like A LibrarianThink Like A Librarian
Think Like A Librarian
 
Academic Skills 4
Academic Skills 4Academic Skills 4
Academic Skills 4
 
Information update May 2010 Alternative Search engine
Information update May 2010 Alternative Search engineInformation update May 2010 Alternative Search engine
Information update May 2010 Alternative Search engine
 
Internet Research: Finding Websites, Blogs, Wikis, and More
Internet Research: Finding Websites, Blogs, Wikis, and MoreInternet Research: Finding Websites, Blogs, Wikis, and More
Internet Research: Finding Websites, Blogs, Wikis, and More
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
The invisible-webppt4899
The invisible-webppt4899The invisible-webppt4899
The invisible-webppt4899
 

More from Traciwm

Transfer students and the library 2015
Transfer students and the library 2015Transfer students and the library 2015
Transfer students and the library 2015Traciwm
 
Sakae undergrad 2014
Sakae undergrad 2014Sakae undergrad 2014
Sakae undergrad 2014Traciwm
 
Biz 2401 industry information spring 2013
Biz 2401 industry information spring 2013Biz 2401 industry information spring 2013
Biz 2401 industry information spring 2013Traciwm
 
Ws spring 2014 rogers
Ws spring 2014 rogersWs spring 2014 rogers
Ws spring 2014 rogersTraciwm
 
Engl 1221 bauer spring 2014
Engl 1221 bauer spring 2014Engl 1221 bauer spring 2014
Engl 1221 bauer spring 2014Traciwm
 
Research Strategies
Research StrategiesResearch Strategies
Research StrategiesTraciwm
 
Bsn program
Bsn programBsn program
Bsn programTraciwm
 
Honr 1001 fall 2013
Honr 1001 fall 2013Honr 1001 fall 2013
Honr 1001 fall 2013Traciwm
 
Annotated bib and research strategies
Annotated bib and research strategiesAnnotated bib and research strategies
Annotated bib and research strategiesTraciwm
 
Hpsj orientation
Hpsj orientationHpsj orientation
Hpsj orientationTraciwm
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crimeTraciwm
 
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1Traciwm
 
Exds 2001/ENGL 2071 global short stories
Exds 2001/ENGL 2071 global short storiesExds 2001/ENGL 2071 global short stories
Exds 2001/ENGL 2071 global short storiesTraciwm
 
Engl 1221 anspach
Engl 1221 anspachEngl 1221 anspach
Engl 1221 anspachTraciwm
 
Exds 2001 international projects
Exds 2001 international projectsExds 2001 international projects
Exds 2001 international projectsTraciwm
 
Exds 2001 wilson4
Exds 2001 wilson4Exds 2001 wilson4
Exds 2001 wilson4Traciwm
 
Exph 3401 (2)
Exph 3401 (2)Exph 3401 (2)
Exph 3401 (2)Traciwm
 
Writing seminar putt fall 2013
Writing seminar putt fall 2013Writing seminar putt fall 2013
Writing seminar putt fall 2013Traciwm
 
Isr 2531
Isr 2531Isr 2531
Isr 2531Traciwm
 
Exds 2001 global mathematics
Exds 2001 global mathematicsExds 2001 global mathematics
Exds 2001 global mathematicsTraciwm
 

More from Traciwm (20)

Transfer students and the library 2015
Transfer students and the library 2015Transfer students and the library 2015
Transfer students and the library 2015
 
Sakae undergrad 2014
Sakae undergrad 2014Sakae undergrad 2014
Sakae undergrad 2014
 
Biz 2401 industry information spring 2013
Biz 2401 industry information spring 2013Biz 2401 industry information spring 2013
Biz 2401 industry information spring 2013
 
Ws spring 2014 rogers
Ws spring 2014 rogersWs spring 2014 rogers
Ws spring 2014 rogers
 
Engl 1221 bauer spring 2014
Engl 1221 bauer spring 2014Engl 1221 bauer spring 2014
Engl 1221 bauer spring 2014
 
Research Strategies
Research StrategiesResearch Strategies
Research Strategies
 
Bsn program
Bsn programBsn program
Bsn program
 
Honr 1001 fall 2013
Honr 1001 fall 2013Honr 1001 fall 2013
Honr 1001 fall 2013
 
Annotated bib and research strategies
Annotated bib and research strategiesAnnotated bib and research strategies
Annotated bib and research strategies
 
Hpsj orientation
Hpsj orientationHpsj orientation
Hpsj orientation
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crime
 
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1
 
Exds 2001/ENGL 2071 global short stories
Exds 2001/ENGL 2071 global short storiesExds 2001/ENGL 2071 global short stories
Exds 2001/ENGL 2071 global short stories
 
Engl 1221 anspach
Engl 1221 anspachEngl 1221 anspach
Engl 1221 anspach
 
Exds 2001 international projects
Exds 2001 international projectsExds 2001 international projects
Exds 2001 international projects
 
Exds 2001 wilson4
Exds 2001 wilson4Exds 2001 wilson4
Exds 2001 wilson4
 
Exph 3401 (2)
Exph 3401 (2)Exph 3401 (2)
Exph 3401 (2)
 
Writing seminar putt fall 2013
Writing seminar putt fall 2013Writing seminar putt fall 2013
Writing seminar putt fall 2013
 
Isr 2531
Isr 2531Isr 2531
Isr 2531
 
Exds 2001 global mathematics
Exds 2001 global mathematicsExds 2001 global mathematics
Exds 2001 global mathematics
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

BIZ 2401 and the Library

  • 1. BIZ 2401 and the Library World of resources at your fingertips Professor Traci Welch Moritz Public Services Librarian/Assistant Professor Heterick Memorial Library
  • 2. Who are you and how am I to remember all this stuff?
  • 3.
  • 6. Bibliographic citation software3. Accessing periodicals
  • 7. Catalogs – for locating books, maps, musical scores, govt. documents, etc. Databases – usually for locating magazine and newspaper articles, but may cover other materials as well Internet – digital content, mostly in the public domain (not commercial materials) Accessing Information
  • 8. Massive collections of data which allow for retrieval Organized Fully indexed Allows for sophisticated searching Target audience Shows access points Updated every second of every day Catalogs
  • 10. Databases Massive collections of data which allow for retrieval Organized Fully indexed Allows for sophisticated searching Target audience Selected content Not free to the library but free to users Updated periodically
  • 12. Accessing Information 9 Click here for more resources
  • 13. Using Databases Select Marketing or Business
  • 14. Off Campus Access Be sure to click on the “Off campus access tab” to the right of the database title to begin First and last name exactly as it appears on ONU ID + all 11 digits of university ID Click on “submit”
  • 15. Library App now available
  • 16. Finding Journals at HML If looking for a specific journal, type in title at library catalog Print Back issues on microfiche Back issues available electronically
  • 17. Fortune, print Own title from 1969 to latest received copy. Click on “latest received” to find out where all issues are housed
  • 18. Fortune, print BND PRP means these issues are at bindery and so unavailable ARRIVED means just that and because the location is “Reserve”, these are ones behind the desk. Copies from 1969 through September 2010 are on 2nd floor bound periodical collection or in microforms
  • 21. Finding Journals at HML Also see what is accessible electronically through the “Electronic Journal Finder.”
  • 22. Electronic Journal Finder Click on “Electronic Journals” and type in title or as much as you know of it.
  • 24. Electronic Journal Finder Able to search within specific journal for subject.
  • 25. Electronic Journal Finder Click on html, pdf or “find it” icon to access the article.
  • 26. Options for articles Save it Email it Print it Export it (check for citation information)
  • 28.
  • 29. Internet Databases “Pay to Play” Usually created by a single publisher Content pre-arranged for easy use Quality/ content control thru editorial staff Content usually available only to subscribers Content source usually identified and dated Internet (Search Engines) Material from numerous sources, individual. Government, etc. Search engines must work with material prepared without regard for specific software Quality of material varies Generally do not access for-profit information Content often anonymous and undated
  • 30. Unstructured Constantly changing Not fully indexed Appeals to no special audience No selection of content Content most often not free Updated every second of every day Internet
  • 31.
  • 32.
  • 37. Lycos
  • 39. Internet Google and Wikipedia aren’t evil, just use them for the correct purpose in your research.
  • 40. Internet ONU buys Full-text database Note: See the “Google Scholar” tab in Research Guide for off campus access Google asks to link to content OhioLINK Permits Google to link to full-text Run Google Scholar Search ONU user sees licensed full-text articles
  • 41. Critically evaluating websites Currency * The timeliness of the information. Relevance/Coverage *The depth and importance of the information. Authority *The source of the information. Accuracy *The reliability of the information. Purpose/Objectivity *The possible bias present in the information. *The CRAAP acronym and descriptions are from Meriam Library at California State University Chico. Used with permission.
  • 42. The Invisible Web Most searchers only locate 0.03% - 1 in 3,000 - of the Web pages available to them Even advanced searchers, using largest search engines, can only access about 16% of Web content Diagrams from http://brightplanet.com/technology/deepweb.asp
  • 44. The Invisible Web WHY? Because 84% of the information available on the Internet is found only on the “invisible Web,” a.k.a. “deep Web,” and is not searchable using a general search engine such as Google Statistics from The Deep Web: Surfacing Hidden Value, http://www.press.umich.edu/jep/07-01/bergman.html
  • 45. The Invisible Web Visible Web page exists in “static” or unchanging form Exists as a “physical” file on a computer Most in .htm or .html format Similar to a word processed document in .doc or .wpd format
  • 46.
  • 47. The Invisible Web Invisible Web content is “dynamic” or changing Contains bits of information stored in a database and pulled together on-the-fly into a Web page at your request Page doesn’t exist until you request it Similar to a mail merged document
  • 48.
  • 49. The Invisible Web Because this content is dynamic, or “physically” nonexistent, most search engines are unable to retrieve it, thereby rendering it “invisible”.
  • 50. Indexing & the Invisible Web Spider crawls Web starting with already indexed static pages Spider encounters database Query is required to access “dynamic” data Spider incapable of generating query Spider stops and cannot index data in database Content rendered “invisible”
  • 51. The Invisible Web Other types of Invisible Web Content Very recent static pages which haven’t yet been indexed Password protected data
  • 52. The Invisible Web Content 95% of invisible Web content is free and available to the public Quality of content often exceeds that of visible Web content From The Deep Web: Surfacing Hidden Value, http://www.press.umich.edu/jep/07-01/bergman.html
  • 53. The Invisible Web Content Legal & Governmental Materials Available in the Public Domain Case law Statutes Bills Regulations Patents Briefs Census Data Government Reports
  • 54. The Invisible Web Content All Databases owned by Heterick Memorial Library under the “Business” or “Marketing” links See MRKT Research Guide under “Invisible/Deep Web” Business Data SEC filings Stock quotes Company profiles, annual reports
  • 55. The Invisible Web Content General Information Address & phone directories Flight schedules Dictionaries Maps
  • 56. The Invisible Web Content NOT freely available on Web (usually) For Profit Publications Public domain documents with editorial enhancements Other material that is someone’s intellectual property
  • 57. Finding Invisible Web Content To find ANY information, consider where an authoritative source might be found Print? Visible Web? Invisible Web? Subscription Database? Phone Call? Next, consider the quickest, most cost-effective way to get the information
  • 58. Finding Invisible Web Content If you determine that it may be available on the invisible Web, how do you find it? By knowing where to look!
  • 59. Finding Invisible Web Content A great deal of excellent legal and business information is freely available on the Internet unfortunately Much of it is contained within databases and is, therefore, invisible to most conventional search engines
  • 60. Finding Invisible Web Content The most effective way to access this information is using the database’s own search box fortunately The search box is usually found on a static, visible Web page that is accessible using a conventional search engine
  • 61. Finding Invisible Web Content Search Strategy DON’Tsearch for specific information using a conventional search engine DO use a conventional search engine to search for a database that may contain the information you seek THEN use the search box for that database to search for the specific information
  • 62. Finding Invisible Web Content “The point is that often the key to the answer is not locating the answer itself as the first step, but locating the right database in which to search for it.” Diana Botluk, Mining Deeper into the Invisible Web, http://www.llrx.com/features/mining.htm
  • 63. Finding Invisible Web Content General Invisible Web Directories CompletePlanet, http://www.completeplanet.com Direct Search, http://www.freepint.com/gary/direct.htm ProFusion, http://www.profusion.com Librarian's Index to the Internet, http://lii.org See more under the BIZ 240 Research Guide.
  • 64. Acknowledgement Presentation based on the article: Bonnie Shucha, Searching Smarter: Finding Legal Resources on the Invisible Web, Wisconsin Lawyer, September 2004, at 19, at http://tinyurl.com/dthen. © Bonnie Shucha Reference & Electronic Services Librarian University of Wisconsin Law Library bjshucha@wisc.edu http://wisblawg.blogspot.com Used with permission of Bonnie Shucha 03/15/2011
  • 65. End of Library Class #1 Questions? Email t-moritz@onu.edu IM 8a-12:30p M-F Ext. 2473 Reference desk most days 8a-12:30p Professor Traci Welch Moritz Public Services Librarian/Assistant Professor Heterick Memorial Library