BACKGROUND: Using appropriate research databases -- to find sources (journal articles, conference proceedings, etc.) -- is one of the best methods to ensure that you are selecting credible sources for your literature review.
1. This week, you'll learn more about the differences between research databases that will affect which ones you use for your research.
2. To prepare you for that, take a look at this research guide that the Library provides: Information Systems, Information Assurance, and Computer Science Resources Guide
BACKGROUND: This activity provides an overview of the information-seeking process that is needed to create a literature review. It's focused mostly on steps 1 & 2 of the "literature review process" described in your textbook [Machi LA & McEvoy BT, (2012). The Literature Review: Six Steps to Success. Thousand Oaks, CA: Corwin].
1. Read Literature Review Steps
2. If you skimmed through the above Literature Review Steps, go back and read more closely the section "Develop a Strategy."
3. You were asked to take a look at this research guide that the Library provides: Information Systems, Information Assurance, and Computer Science Resources Guide
4. Use the guide to select a research database for finding patents.
5. Find the patent for a device called the "amulet" whose inventor is David Kotz. Answer these questions.
a. What is this patent application's publication number? Provide both the US publication number and the WO (short for WIPO) publication number.
b. What is the device?
6. When using Information Systems, Information Assurance, and Computer Science Resources Guide read the descriptions of the databases to understand the scope and content of each in order to better select which ones to use.
7. When selecting a research database there are some basic but critical questions to ask yourself. Does it:
BACKGROUND: In a research field that changes rapidly, conference papers are critical for getting the most recent research. Organizations typically hold conferences annually (although frequency can vary), and all of the papers presented at the conference are bundled together as "conference proceedings." The proceedings appear on an organization's website grouped together by the conference such as the 30th Annual Conference of Whatever. If the conference proceedings are printed, they form a book-length publication. Research databases aimed at professionals in a specific field may provide access only to journal articles or may include other types of material that are important to researchers in the discipline, including individual papers from conferences. That's a timesaver for you, because you will get both journal articles and conference papers in your search results (and ideally with the full text of the papers and journal articles).
For example, if you search ACM Digital Library or IEEE XPlore, you will retrieve journal articles and conference papers.
It can be a bit complicated, however, to figure out where to look for conference papers when you are given only a citation and want to find either the entire proceedings from a conference or a single paper in a proceedings. Where should you search? In this activity, you'll learn about finding conference proceedings.
1. If you know that it's an ACM or an IEEE conference, I hope by now you know that the Mundt Library pays for your access to ACM Digital Library and IEEE XPlore. You can be fairly sure that you'll be able to get the complete papers by going directly to the research databases from the Mundt Library's website.
2. If it's not ACM or IEEE, you might search Google Scholar for the specific paper or search Google for the conference proceedings site. That can work if the papers are made available in full on the web without payment.
3. If you're unable to get to the full article for free, what are your options?
4. To learn how to find conference publications using the Library Catalog.
5. Conference proceedings are treated as books or ebooks, so you may search for a proceedings from a conference in the Library Catalog to see if we have it.
6. Use the Library Catalog to answer the questions below.
a. Search for the proceedings for the following conference.
Park, I., Lee, Y., Jeong, J. (2013). Improved Identity Management Protocol for Secure Mobile Cloud Computing.
Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), 4958-4965. doi:10.1109/HICSS.2013.262
b. Click the "Online Access" button. Where did you end up (that is, which of the Library's research databases has the proceedings)?
c. Now that you've arrived at the proceedings web page, use the filters on the left side to find the specific article within the proceedings. Is the full text of the article available to you without payment?
BACKGROUND: In this activity, you will practice using the Library Catalog and be reminded that a search's effectiveness can be impacted by how you enter terms and refine searches.
1. Find books and e-books using the Library Catalog on the topic of cybersecurity. Do each of the following searches and compare the number of results for each search:
a. How many results do you get if you search for: cybersecurity
b. How many results do you get if you put a space between cyber and security and search for: cyber security
c. How many results do you get if you set up a search on the Advanced Search screen as follows:
1) enter in the top search box: cybersecurity {make sure that an all field search is selected on the left side of that search box} After you perform the search you may get a message on the top of your results that notes the search includes computer security as well. Limit to just cybersecurity.
2) enter in the second search box: cyber security {make sure that you have selected an all field search for this search phrase also}
3) Change the "AND" operator in front of the second search box to: OR
2. The Library Catalog provides additional functionality that helps you "refine" your search by using options on the left side of the results screen:
3. When I did the searches in #1 above on 10/1/2020, I found 1a) 249 items, 1b) 504 items, and 1c) 674 items. (Note after doing the search, the catalog may try to expand your search to include computer security. I limited it just to cyber security,)
4. Use the Library Catalog to answer these questions.
a. What is the title of the most recent book that provides information on the topic: IoT security? (Tip use the Sort by feature on the left side of the page)
b. What year was it published?
c. What is the permalink for the book? (You will need to click on the title to get the full record. Look at the Send it section for the permalink. This is the URL to use in order to get back to the book rather than the one in the address bar.)
BACKGROUND: In this activity you will explore research database differences by searching and comparing results in a few databases.
1. Research databases differ in what they select to include:
a. ACM Digital Library is focused on journals and proceedings published by ACM. IEEE XPlore is focused on journals and proceedings of IEEE and IET.
b. Web of Science (WofS) is not limited to a single publisher but instead includes top quality journals from a range of publishers. That expands the breadth of your searching across multiple publishers.
c. ABI/INFORM Complete is is not limited to a single publisher but includes material from many publishers.
d. Google Scholar aims to collect as much scholarly material as possible by scouring the web. It is a search engine *not* a structured research database. It doesn't create the metadata or control quality of the metadata for the items it includes in search results.
2. Research databases differ in functionality and quality of the metadata.
3. When you use research databases and search engines, look for what options are offered for fine-tuning searches with "advanced" search options and with options for refining to improve results.
4. Search in ABI/INFORM, ACM Digital Library, IEEE XPlore, and Web of Science for scholarly publications in which "behavioral biometrics" appears in the title of each journal or proceedings article. Answer the questions below.
a. Scan the results of your searches in each database, compare the results, and briefly describe any differences you notice. In your brief comparison, consider:
b. In each research database, what is the title of the most recent item found?
c. Look at the publication dates of each of the items found in answer to b. Did any of the databases standout as being particularly up-to-date (if so, which ones) or were they all fairly similar in the currency of results?
The library instruction for CSC803 will finish next week with a focus on the ethics of information use and on author rights.