SlideShare a Scribd company logo
LIBRARY
RESEARCH
FOR
COMPUTER
SCIENCE
Clarke Iakovakis
Research &
Instruction Librarian
Neumann Library
http://libguides.uhcl.edu/CSCI6530
Please turn
your clicker
ON
FOR ME, THE HARDEST PART OF
RESEARCH IS…
a. Getting started
b. Finding relevant information
c. Writing the paper
d. Citing sources
e. None – research is easy
CSCI6530: Library Instruction for Research Methods in Computer Science
OUTLINE FOR
TODAY
• Academic Research
• Principles of Good
Searching
• Searching in the
Research Databases &
Library Catalog
SECTION 1: ACADEMIC
RESEARCH
• A literature review is part of the
published work referencing related
research, theory, and background
information
• A review of the literature (literature
search) may be conducted to…
• understand a topic
• help you form a problem
statement
• provide confirmation of an already
existing hypothesis
• analyze and interpret your own
data
• gain exposure to past, current,
REVIEWING LITERATURE
“AUTHORITATIVE” INFORMATION
“Authority” is a type of influence recognized
or exerted in a community
Disciplines have acknowledged authorities--
scholars & publications
Approach “authoritative” perspectives with
informed skepticism.
WHAT IS PEER REVIEW?
 A process for establishing
authority of scholarly research
 Experts in the field/discipline
review the original ideas to certify
the accuracy, validity, and value
of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C.
Mitcham (Ed.), Encyclopedia of Science, Technology, and
Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan
Reference USA. Retrieved from
http://libproxy.uhcl.edu/login?url=http://go.galegroup.co
m/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshrac
d2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a
67ba637722e45c
WHAT ARE SOME SOURCES OF
SCHOLARLY INFORMATION?
Books
Reference works
Peer-reviewed journal articles
Gray literature
Reports (government,
non-governmental organizations)
Theses & dissertations
Conference proceedings
Archival resources
“Computer laptop” by Steve Hillebrand, licensed under public domain
PERIODICALS (JOURNALS,
MAGAZINES)
Peer-reviewed
Refereed
Scholarly
Academic
Trade
Professional
Practitioner
Industry
General
Popular
CSCI6530: Library Instruction for Research Methods in Computer Science
B. Grobauer, T. Walloschek, and E. Stocker,
"Understanding Cloud Computing Vulnerabilities,"
Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.
article title
publication
title
volume number
page number
publication year
authors
How do I find an article
when I have a citation?
HOW DO I FIND AN ARTICLE
WHEN I HAVE A CITATION?
A. Google
B. OneSearch (library catalog)
C. A subscription database, such as
INSPEC or ACM Digital Library
B. Grobauer, T. Walloschek, and E. Stocker,
"Understanding Cloud Computing Vulnerabilities,"
Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.
CSCI6530: Library Instruction for Research Methods in Computer Science
TRY IT
Age-Invariant Face Recognition
Author name?
Journal name? Journal year?
SECTION 2: PRINCIPLES OF
GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen
bowler.
• Determine your research question1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH PROCESS
One
• What are some ways artificial intelligence is used to
prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent
crimes of spoofing, phishing, identity theft,
malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
1. DETERMINE YOUR RESEARCH
QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial
intelligence
•face recognition
•crime solving
In what ways is artificial intelligence
developed to recognize faces for
use in surveillance to prevent or
solve crimes?
artificial
intelligenc
e
Machine
learning Neural
networks
Intelligent
agents
Markov
Decision
Processes
3. List alternate keywords,
synonyms, and related words
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve
crimes?
Face
recognition
Computer
vision
eigenface
s
biometricsFace
detection
3. List alternate keywords,
synonyms, and related
wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
CONTROLLED VOCABULARY
(ALSO CALLED “TAXONOMY” OR
“HIERARCHY”)
• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging content
o enable users to find the information they need by translating their
language into the language of the information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
• Identify the key concepts2
• List alternate keywords, synonyms, and related
words3
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
4. Join terms and concepts with
appropriate Boolean operators
CSCI6530: Library Instruction for Research Methods in Computer Science
Machine
learning
Artificial
intelligence Intelligent
agents
Artificial intelligence OR machine
learning OR intelligent agents
Face recognition OR
eigenfaces OR skin
texture analysis
Artificial intelligence
OR machine
learning OR
intelligent agents
CSCI6530: Library Instruction for Research Methods in Computer Science
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
WHICH SEARCH WILL FIND
FEWER RESULTS?
A.
B.
OR
artificial intelligence
artificial intelligence
crime
crime
m
TRUNCATION (WILDCARDS)
compute
computes
computing
computation
computor
computers
comput*
*
• State your research topic1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH STRATEGIES
SECTION 3: RESEARCH
DATABASES &
LIBRARY CATALOG
Screenshot from Wargames © United Artists. Retrieved from Tumblr
Why use a library when I have Google?
But wait…
tumblr
.gov Wikipedia
Subscription
databases
Password-protected
websites
restricted
access
$$$
Illegal
content
Classified
documents
Surface Web
Deep Web
Amazon
cnn
Google
ads
OFF CAMPUS ACCESS TO
SUBSCRIPTION DATABASES
If you have problems accessing
resources from off campus,
call the Reference Desk 281-
283-3910
2001234567
TO CONNECT TO LIBRARY
DATABASES FROM HOME
Log in using your UHCL ID and last name
Log in using your eservice account
Call the library and ask for a password
Google it
Log in using your Library barcode and last name
CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Science
SECTION 4: CITING SOURCES
Too much
information?
Ask a Librarian
Stop by the reference desk or schedule a
research consultation!In person
library@uhcl.edu
Email
281-283-3910
Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM
Please turn
your clicker
OFF
FEEDBACK PLEASE!

More Related Content

PPTX
Csci 6530 2015 fall_cli2
PPTX
Csci 6530 2016 fall presentation
PPTX
Csci 6530 2016 spring presentation
PPTX
Information retrieval s
PPTX
How to do things with metadata: From rights statements to speech acts.
PPT
Information retrieval
PPT
Ljhs cyberbullying
PDF
CS6007 information retrieval - 5 units notes
Csci 6530 2015 fall_cli2
Csci 6530 2016 fall presentation
Csci 6530 2016 spring presentation
Information retrieval s
How to do things with metadata: From rights statements to speech acts.
Information retrieval
Ljhs cyberbullying
CS6007 information retrieval - 5 units notes

What's hot (8)

PPTX
Information retrieval introduction
PPTX
Poli125 guide
PPTX
Sls guide2018
PPTX
POLI 122 Library Research Guide
PDF
Information Retrieval Fundamentals - An introduction
PDF
Reference Management and Avoiding Plagiarism
PPT
Tovek Presentation by Livio Costantini
PPT
Super Searching 3
Information retrieval introduction
Poli125 guide
Sls guide2018
POLI 122 Library Research Guide
Information Retrieval Fundamentals - An introduction
Reference Management and Avoiding Plagiarism
Tovek Presentation by Livio Costantini
Super Searching 3
Ad

Similar to CSCI6530: Library Instruction for Research Methods in Computer Science (20)

PPTX
Information literacy
PPTX
Crim 4391 homeland security fall15
PPTX
SOC 111 (Fall 2012)
PPTX
Genetics hons training
PPTX
Crim 4385 undergraduate research methods spr15
PPTX
Connected Data for Machine Learning | Paul Groth
PPTX
SILC5931: Intro to STEM Education Library Instruction
PPTX
Writing Seminar Surface
PPTX
Geog 4311 historical geography
PPTX
Lecture_One
PPTX
Writing Seminar Rogers Spring 2012
PPT
Information Literacy Orientation (Fall, 2012)
PPTX
Writing Seminar Rogers
PPTX
S17 biot6838 santiago
PPT
Content Analysis Overview for Persona Development
PPTX
Module 1_Introduction to ILS for Science
PPTX
Flames summer school 2016 slides
DOCX
Infolitigpart1
PPTX
Qualitative data analysis
Information literacy
Crim 4391 homeland security fall15
SOC 111 (Fall 2012)
Genetics hons training
Crim 4385 undergraduate research methods spr15
Connected Data for Machine Learning | Paul Groth
SILC5931: Intro to STEM Education Library Instruction
Writing Seminar Surface
Geog 4311 historical geography
Lecture_One
Writing Seminar Rogers Spring 2012
Information Literacy Orientation (Fall, 2012)
Writing Seminar Rogers
S17 biot6838 santiago
Content Analysis Overview for Persona Development
Module 1_Introduction to ILS for Science
Flames summer school 2016 slides
Infolitigpart1
Qualitative data analysis
Ad

More from ciakov (20)

PPTX
Copyright in Higher Education
PPTX
Open Access: Increase the Visibility of your Scholarship
PPTX
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
PPTX
Pols 4903 presentation
PPTX
Pols 3103 fall presentation 2
PPTX
Ensc 5530 jan2018 ci
PPTX
Open data: Enhancing preservation, reproducibility, and innovation
PPTX
Ensc 5530 jan2017 ci my draft
PPTX
Ensc 5530 jan2017 ci
PPTX
Geol4391 2016 fall presentation
PPTX
Crim5036 2016 fall presentation
PPTX
Biot6838 2016 fall presentation
PPTX
Edci7137 2016 spring presentation
PPTX
Edci7137 2016 spring presentation
PPTX
Soci 4385 mcmullen fall15 cli
PPTX
Crim 5331 advanced criminology fall15
PPTX
Crim 4384 statistics
PPTX
Gis for library staff
PPTX
WRIT1301 Library Instruction: Finding & Understanding Statistics
PPTX
Altmetrics: What is it and how is it relevant to librarians?
Copyright in Higher Education
Open Access: Increase the Visibility of your Scholarship
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
Pols 4903 presentation
Pols 3103 fall presentation 2
Ensc 5530 jan2018 ci
Open data: Enhancing preservation, reproducibility, and innovation
Ensc 5530 jan2017 ci my draft
Ensc 5530 jan2017 ci
Geol4391 2016 fall presentation
Crim5036 2016 fall presentation
Biot6838 2016 fall presentation
Edci7137 2016 spring presentation
Edci7137 2016 spring presentation
Soci 4385 mcmullen fall15 cli
Crim 5331 advanced criminology fall15
Crim 4384 statistics
Gis for library staff
WRIT1301 Library Instruction: Finding & Understanding Statistics
Altmetrics: What is it and how is it relevant to librarians?

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pharma ospi slides which help in ospi learning
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
GDM (1) (1).pptx small presentation for students
Microbial diseases, their pathogenesis and prophylaxis
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

CSCI6530: Library Instruction for Research Methods in Computer Science