Categories
Digital literacies Information literacies Skills Team TechItUpTuesday Visual literacies

Managing your social network

#TechItUpTuesday

I’m sure most of you already know what social networks are so I’ll just go over this briefly. Social networks and/or social media services allow you to network with people who share interests, professions, hobbies, backgrounds, or real-life connections. These services are based online and often have mobile apps to allow users to access the service on the go. If you don’t know much about social networks you can check out our SkillsGuide on social media.

How to manage your social network?

Managing your social network websites can feel like a massive task if not done efficiently and correctly. This is especially the case if you are using multiple social networks and communication apps. The volume of information from social network sites can overwhelm people and make it easy to miss valuable messages and notifications. This can have major consequences if someone posts something inappropriate on your profile or you miss an important message from a potential employer on a professional network. We will be discussing what would be considered inappropriate for your social media when we look into digital employability. Below we have some useful oh wait…..

Ryan Reynolds Marvel GIF - Find & Share on GIPHY

Now as I was saying here are some tips and tools to help you master social networking, so distractions like this don’t get in the way.

Useful Tips

  • Avoid signing up for email alerts. While useful, these will quickly take over your email inbox. 
  • Some of you may need more accounts for various reasons but if you know you don’t really use some of them perhaps consider deleting them.
  • Think about what you really need to post. Unless your posts add unique value or stands out in some manner, it may go unnoticed.

If This Then That (IFTTT)

IFTTT is an internet service that allows users to create chains of simple conditional statements, called “recipes”, which are triggered based on changes to other web services such as Twitter and Facebook. An example recipe might consist of sending an e-mail message if the IFTTT user tweets using a certain hashtag. There are also Android and iOS apps that enable phone or tablet changes to trigger other activities.

There is also a new companion app called ‘Do’ that can automate tasks on the press of a button. You can use this to automate a lot of your social media management. For example, if you post something to Twitter, you can also get it posted to your Facebook or Google+ account. These kinds of recipes can save you a lot of time. IFTTT also works with productivity apps like calendars, Evernote and OneNote so you can trigger events based on activity on social networks.

IFTTT logo with a link to the site

Buffer

Buffer is a software application designed to manage social networks, by enabling you to schedule posts to social networks including Pinterest, Facebook and Twitter. With tools like Buffer, you can limit the need to log in to your social networks by scheduling posts ahead of time.

Buffer logo with a link to the site

Pocket

Pocket is a save-for-later service. The service allows users to save interesting articles, videos and more from the web and other apps for later enjoyment. This means that when you see something you want to view or read later, you can save it into Pocket. This allows you to glance quickly through social networks, apps and websites and save items to read properly later.

Pocket,logo with a link to the site

Social network for work/bussiness

Now we have looked at managing your social network in your day to day life and as a student. However, if you are interested in managing your social network from a business point of view this is a good video for you.

Categories
Digital literacies Information literacies Skills Team TechItUpTuesday

Data literacy

#TechItUpTuesday

Data literacy is all about how you handle data as a special form of information. Data is used in many ways from monitoring key performance indicators to generating new theories. Our own data – personal and organisational – can also be used, sometimes in ways, we might not want. We all need a basic understanding of legal, ethical, and security issues when we handle data and good habits of personal data security.

Jisc defines data literacy as:

The capacity to collate, manage, access and use digital data in spreadsheets, databases and other formats, and to interpret data by running queries, data analyses and reports. The practices of personal data security.

An understanding of: how data is used in professional and public life; legal, ethical and security guidelines in data collection and use; the nature of algorithms; of how personal data may be collected and used.

Jisc, Data Literacy
Analyzing Toy Story Gif By Gif - Find & Share on GIPHY

Data is a bit like marmite it is usually either loved or hated. Data is, however, an important aspect of most job roles or courses of study. The importance of data goes beyond just work and studies. In our daily lives, we are often presented with data on a regular basis. Data literacy is important whether you are comparing data for bills you have to pay, your student loan repayments, or looking at figures related to the coronavirus pandemic.

When considering data in the context of digital literacy, the focus is often on data management, analysis and visualisation.

Things to consider when using data

Accesibilty

Data can be very difficult to make accessible particularly if it is raw data (essentially just a series of numbers or information). For accessibility purposes, the focus has to be on interpreting, presenting, and summarising data. Just a hint the gif below is not a good way to make your data accessible or as you will see below the best way to store it.

Season 2 Nbc GIF by The Office - Find & Share on GIPHY

Storage

Data sorted, arranged, presented and explained with a story. You see bricks become more ordered and assembled as the model develops.

This may not be as much of an issue as a student but can be incredibly important in the working world. Whenever we create, use, or produce data we need to consider where it is stored. There are many legal, ethical, and security issues in how data is stored, accessed, and shared. These dimensions of data management are driven based on the type of data you are working with, and whether it contains any personal, sensitive, or commercially sensitive data. If you do have any sensitive information, make sure it is protected by a password or stored in a safe place. Here are some useful ways you can store data.

  1. Store it in the Cloud.
  2. Save to an External Hard Drive.
  3. Burn it to a CD, DVD, or Blu-ray.
  4. Put it on a USB Flash Drive.
  5. Save it to a NAS Device.

Data communication and presentation

Often, data is poorly communicated. The diagram on the left well represents the difference between raw data, and data that has been sorted, arranged, presented, and explained. We will now look through a few useful software tools to present and communicate your data.

Software tools to aid your data literacy

Here are a few useful tools for handling data with some links to tutorials and downloads. (Tutorials and guides are linked on the left and download links are on the right)

Data GIF by UpSteam - Find & Share on GIPHY

Microsoft Excel

Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation, graphing tools, pivot tables, and a programming language called Visual Basic for Applications. With a Microsoft 365 account, you can install Microsoft Excel on all your devices.

QSR NVivo

NVivo is a qualitative data analysis computer software produced by QSR International. It is designed for qualitative researchers working with very rich text-based and/or multimedia information, where deep levels of analysis on small or large volumes of data are required.

Microsoft Access

Access is probably the least well-known application in the MS Office suite. However, it is incredibly useful for a small number of student/staff researchers who need to store and manage large amounts of related data. You may use Access when the program you are using to keep track of something gradually becomes less fit for the task. 

ArcGIS

ArcGIS is a system used to make maps and for geographic information. It can create and use maps, compile geographic data, analyze mapped information, share and discover geographic information, use maps and geographic information in a range of applications, and manage geographic information in a database.

Microsoft Power BI

Power BI is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Power BI lets you easily connect to your data sources, visualize and discover what’s important, and share that with anyone or everyone you want.

R

R is a programming language and free software environment for statistical computing and graphics supported by the R Foundation for Statistical Computing. The R language is widely used among statisticians and data miners for developing statistical software and data analysis.

Categories
Digital literacies Information literacies Skills Team TechItUpTuesday

Personalise your digital work environment

#TechItUpTuesday

Having a good work environment is incredibly helpful for your studies as well as in your future employment. Customising your digital work environment is also an important aspect of managing your Identity. This page will introduce some of the ways in which you customise your Microsoft 365 and Windows experience. Your identity is also about your preferences. You want to make both the Windows operating system and the software you use as quick and easy to use as possible. This guide is designed to help you get started. 

Maximising your use of large screens or multiple monitors

As a student, you may often be using a laptop but when going into the workplace you are likely to either be working with one large monitor, or a multi/dual-screen set-up. This section is all about making the most of your setup.

The main benefit of a dual monitor setup is productivity. Research has shown an increase in productivity and a reduction in the time it takes to complete tasks. A study by Jon Peddie Research found a 42% increase in productivity when using multiple displays. For example when moving from one window to another on a single screen laptop or desktop not only do you need to take time to find the right tab or window to open, but you need more time to access the information. This can interrupt your flow and consequently make you lose your concentration.

However, when working with two screens we get a more natural flow and concentration levels remain high. Over a long period, this can add up to a significant amount of time. Consider how many times you use the process of switching between windows every day and it is probably quite a lot.

What if my digital work environment is just a laptop?

You might not know that you can actually split your screen which can greatly increase your productivity. It allows you much like dual monitors to look at two different programs or screens at the same time. You could have a web page open for reference on one side of your screen and a word document open for making notes on the other. This video explains how to go about splitting your screen on a Windows computer or you can visit here for instructions on a MAC.

This may seem obvious but keep your laptop/computer updated. Many of us often ignore updating our computer for days, weeks, or even months before actually updating the software that our laptop is recommending to us. Software updates are recommended for good reason. They not only ensure that you’re working with the most up-to-date and best quality version of the software that you need to complete your work, but they help your laptop to run as fast and as well as possible too.

Snl Update GIF by Saturday Night Live - Find & Share on GIPHY

Windows shortcuts

I thought it would also be useful just to finish things up with a few handy shortcuts to help increase your productivity. Practice these, and you’ll be a Windows ninja in no time:

  • Alt+Tab: Open task switcher.
  • Windows+Tab: Open Task View.
  • Windows+Down Arrow: Minimize window.
  • Windows+Up Arrow: Maximize window.
  • Windows+M: Minimize all windows.
  • Windows+D: Display desktop.
  • Windows+Home: Minimize all windows except the active one.
  • Windows+Shift+M: Restore all minimized windows.
  • Windows+Shift+Up Arrow: Stretch window to the top and bottom of the screen.
  • Windows+Left: Snap current window to the left side of the screen.
  • Windows+Right: Snap current window the the right side of the screen.
  • Windows+Up: Snap current window to the top of the screen.
  • Windows+Down: Snap current window to the bottom of the screen.
  • Windows+Shift+Left or Right Arrow: Move a window from one monitor to another.

Relevant Skills guide: Integrated sessions: Personalising Windows, using shortcuts and managing multiple screens

Categories
Digital literacies Information literacies Skills Team TechItUpTuesday Visual literacies

The importance of accessible content

#TechItUpTuesday

As a student, you may not have considered accessible content and adapting your work to make it accessible to everyone. However, this issue will likely become much more important when you enter the working world but even as a student, I think it’s still important to consider this. Perhaps you are making a presentation, you may want to consider if it’s easily accessible for everyone in the audience. Also, if you get in the habit of doing this now it will not only help in your future it will help those who view your work such as fellow students or tutors, especially those with disabilities or impairments. If the content isn’t accessible to everyone some viewers may be confused like this.

Animated GIF - Find & Share on GIPHY

Over 1 billion people have some form of accessibility requirement. So, the added bonus of ensuring that your content supports these individuals is that the changes will benefit everyone. Using Microsoft Office, Canvas, Teams, and other apps or software correctly directly benefits both you and the person reading them.

Accessible technology benefits everyone, including people with:

  • Permanent disabilities like those listed below
  • Temporary impairments like cataracts or a broken arm
  • Situational impairments like working hands-free and eyes-free while driving
Icons lisitng disabilities including visual, hearing, cognitive, speech, mobility and neural.

Common types of inaccessible content

Some types of content are more accessible than others. Below are some examples of types of content that can prevent people from understanding the information being conveyed and how to make them accessible. Don’t worry as a student you won’t be marked down for not including these in any assignments though it would be useful for those with impairments who may view your work. Again, it is more likely you will have to think more about this in the working world.

  • Images – Won’t be accessible to people with visual impairments so you need to provide meaningful alternative text.
  • Tables – Those who use screen readers cannot read tables in the same way that sighted users can. This assistive technology relies on the table being coded with HTML tags which can then be applied to the table headers.
  • Videos and audio files – To ensure accessibility to everyone, you need to include transcripts or captions. Remember to include descriptions of images included in video content. Captions will help those with hearing impairments to understand the video. Whereas for those with visual impairments transcripts can be read by a screen reader.
  • Links – You need descriptive, explanatory text to help those who use screen readers to be able to distinguish between one link and another.

Microsoft 365 tools for accessible content

Immersive Reader

Immersive Reader is a tool that lets you remove clutter and adjust the font, colours and spacing to aid reading comprehension. This can help all readers but can be particularly useful for anyone with dyslexia or visual stress. The video below tells you how to get started! You’ll find the Immersive Reader button in most Microsoft Office programs and on University Canvas pages too!

Magnifier and read aloud

This tells you how to use Windows 10 Magnifier read aloud & text cursor indicator. These are new Windows 10 Accessibility updates. Magnifier now has Read Aloud from anywhere, and there is an easy way to change your text cursor indicator colour and size 

Office Lens

Office Lens captures notes and information from projectors, whiteboards, documents, books, handwritten memos, or anything with a lot of text. It can also remove shadows and odd angles so that images are easier to read. You can upload document and whiteboard images to Word, PowerPoint, OneNote, OneDrive, and you can save them as PDFs or send them in email.

Dictation

Here is a useful step-by-step tutorial that shows you how to use the built-in Dictation in Word, OneNote, PowerPoint as well as Windows 10. Dictation (speech to text) especially helps those studying or working from home that need this inclusive capability.

How to create accessible content?

You may be wondering “so how do I know what I should or shouldn’t include to make my content more accessible?”. Well, the university has designed a very useful poster that guides you through what you should include or avoid to make your content more accessible. You can view it below or go to this link for a PDF copy.

This is a preview of the poster, please follow links to download PDF for screen-readable version.

Relevant skills guide: Digital Wellbeing – Accessible content for an inclusive workplace

Categories
Information literacies Skills Team TechItUpTuesday

That’s Fake News

What is Fake News?

Fake News is often linked with politics especially due to Donald Trump and the countless memes about “fake news” during his presidency. This association can sometimes be unhelpful as it narrows the focus of the issue. The term ‘false information’ is perhaps preferable as it can refer to a more diverse range of disinformation.

 GIF

Most of what you read online may appear to be true but often is not. False information can include news stories or hoaxes created to deliberately misinform or deceive readers. They can deceive people by looking like trusted websites or using similar names and web addresses to reputable news organisations.

As social media is a public platform, anyone can post anything without checking their facts. When we consider what is “fake news” there are two kinds of false information to be aware of – misinformation and disinformation.

Misinformation and Disinformation

Misinformation

This aims to shape and change people’s opinion by misleading them. A study from Indiana University classified misinformation as “false or misleading content including hoaxes, conspiracy theories, fabricated reports, click-bait headlines, and even satire.” 

Lying Nicole Power GIF by Kim's Convenience

Disinformation

Disinformation can be spread in similar ways to misinformation but is intended to deceive rather than mislead. There are many reasons why individual social media or business accounts might do this. They may wish to increase their social media marketing effectiveness, boost online traffic, gain more followers, incite an emotional response, or create distractions.

Disinformation can be dangerous on social media due to the vast amount of information and readers’ attention spans.

False Abraham Simpson GIF - Find & Share on GIPHY

Identifying False Information

Personal accounts

Social media platforms are designed to retain users and get engagement not to distinguish between real and “fake news”. If you want to know if something shared by a personal account is trustworthy here are a few questions to consider.

  • Does the person who shared the post have an emotional or professional investment in these claims? If either, they might not be completely unbiased, but it requires some judgement on your part and perhaps some research.
  • Is this information reasonable? Does what they are saying sound believable. Perhaps ask some people you trust whether they think it is reasonable as sometimes our own biases can influence us.
  • Does it come from a reputable source? For example: University, Government or Scholarly articles, most mainstream Magazines/Newspapers, and published works from reputable publishers. Places like Wikipedia and online blogs are not necessarily reliable. Even more reliable sources may have a political agenda or their own bias, so you need to exercise your own judgement.
Jeff Goldblum What GIF by The Late Late Show with James Corden - Find & Share on GIPHY

Business or professional accounts

This may not be as relevant as a student but when you go off into the working world these are things you need to be aware of. When you work for a professional organization where social media pages are tailored towards a particular audience there may be more motivation to fall into the categories of “fake news” to gain an edge. As well as the questions you’d ask of a personal account, you should also ask:

  • How it serves its audience? It should help its audience and advertise the business based on accurate information.
  • How it reflects on the business’s reputation or values? Should be trustworthy and reliable. Consider checking the reviews (not always reliable) or asking people who’ve interacted with the company.
  • Is this relevant to my clients? Our personal bias should not be involved. 

If you are found to be using false information or “fake news” with a professional or business account can have serious consequences and possible legal ramifications. This is especially relevant due to the speed at which false information spreads.

How False infomation spreads

Combating Fake News

Combating “fake news” on social media is about understanding other users’ motives as well as the platforms intention. Social media platforms make money by selling user data to ad companies. This is why ads you see are often based on your interests or search history.

The news that appears on your social media feed is filtered based on collected data. So, now you are aware of can help you be more conscious of your own inherent bias as some of what you see may be based on what you are conveying about yourself online. Whilst false information on social media is probably unavoidable by thinking critically and exercising a level of curiosity for what you read you can help sort the fact from the fiction.

As this video shows any news no matter how riciculous can be spread and msilead people.

Categories
Information literacies Skills Team TechItUpTuesday

Phishing, don’t take the bait

#TechItUpTuesday

What is phishing?

If you want to stay safe online you should always be on the lookout for scammers. Phishing is a form of social engineering attack or scam often used to steal user data, such as login details and credit card numbers. It often occurs when an attacker, masquerading as a trusted entity, possibly your bank, social media, or service provider tricking you into opening an email or message. 

Cartoon Fish GIF by Luis Ricardo - Find & Share on GIPHY

This video discusses many of the common examples of Phishing such as mass e-mail Phishing (often just referred to as Phishing), Spear Phishing and Smishing.

Other forms of phishing

HTTPS phishing

Often included as part of e-mail phishing this is something to be wary of when you are on any site. Most legitimate organizations use HTTPS instead of HTTP because it is considered safer and establishes legitimacy. If it’s posing as a site you already know, search for that site on a separate tab and compare the URLs to see that they match.

For example, the address for Canvas, if you clicked on a link and the address began with HTTP rather than HTTPS it could be unsafe:

Correct: https://canvas.hull.ac.uk/

Potentially unsafe: http://canvas.hull.co.uk/

They may also use hypertext which is a “clickable” link embedded into the text to hide the real URL. When checking the link make sure that it’s in its original, long-tail format and shows the whole URL, double click on the URL so the full format shows.

Search engine phishing

Sometimes known as SEO poisoning or SEO trojans, is where hackers work to become the top hit on a search using google or other engines. If they get you to click their link, it takes you to their website. When you interact with it and enter sensitive data, they have your information. Hacker sites can pose as any type of website but are usually banks, PayPal, social media, and shopping sites.

Vishing

This is when you may receive a call on your phone maybe claiming to be your bank or government authority demanding your details or payment with a threat of legal action if you don’t comply. This is to create a heightened sense of urgency that may make a person take actions against their best interests. This can also happen online as well maybe you will get a message, or a warning pop-up often on unsafe sites as previously mentioned, you should not click on these links.

Identity Fraud GIF by Team Coco - Find & Share on GIPHY

Prevention and protection against Phishing

Protection

The best protection is awareness and education, if you are aware and careful you will likely never fall victim to this scam. Don’t open attachments or links in unsolicited emails, even if the emails came from a recognized source. If the email is unexpected, be wary about opening the attachment and verify the URL.

Star Wars Tech GIF by UAB Information Technology - Find & Share on GIPHY

Protection

If you do fall victim to phishing, you can protect yourself through Two-factor authentication (2FA) which adds an extra verification layer when logging in to applications. 2FA relies on two verifiers: something you know, like a password and username, and something you have, such as a smartphone or credit card. If you lose one layer of protection or your phone is stolen, 2FA prevents the use of compromised data or credentials, since one verifier will not gain you entry. You may also sometimes have a third verifier something you are which is either a fingerprint, an iris scan, or a voiceprint. 

Other methods of protection against phishing include frequently changing your password and not reusing the same password for different applications. So stay safe online and don’t bite when phishers come phishing.

Categories
Digital literacies Information literacies Skills Team TechItUpTuesday

Digital identity – You’re leaving footprints

#TechItUpTuesday

Digital footprints

So, what is meant by your digital footprint, well whenever you use the internet you’re leaving a series of digital footprints. These footprints are the lasting impression of all the activities you perform online. Your digital footprints can be seen by others, particularly if you are using social networks like Facebook and Twitter.

Video Looking GIF by Polyvinyl Records - Find & Share on GIPHY

Sometimes these footprints can be hidden, such as your order history on Amazon, your PayPal purchases, or your searched terms on browsers like Google or Bing. Although most users on the internet cannot see these particular footprints, they are still lasting impressions about you stored online. Therefore, you need to ask yourself if you trust every website and service that you use to keep your data secure and use it appropriately.

Though it is impossible to have no footprint if you use the internet, there are ways to reduce your footprint. This video explains what your digital footprint is and how to reduce it.

Digital identity

All the information that you share online contributes to your digital identity. Your identity is made of what you share online, however, it may include things you didn’t consciously share. For this reason, you need to carefully manage your online activities and curate your online identity.

The Office GIF - Find & Share on GIPHY

Many individuals form multiple identities online. Sometimes this is to keep personal, business, and/or study in separate digital spheres to stop personal issues from blending into professional spaces. Others construct online identities as pseudonyms to isolate their true selves from their online activity. This can be to protect personal information about themselves, to hide something they think is embarrassing, or to cover up criminal activity.

Having multiple identities online in most cases (with the exception of criminal activity) is completely fine and often the services people use online encourage this. This doesn’t mean making yourself a completely different person online is okay for example Facebook encourages people to connect with friends and family whereas LinkedIn encourages people to act professionally and connect with colleagues and business professionals. This leads people to act differently on each service, creating unique identities for each service. This kind of isolation is useful as it ensures what you share is appropriate to the audience. However, just as you may be creating your own digital identities, you need to be aware that other users are also doing the same.

Check out this site for some more useful tips on managing their digital footprint.

Categories
Information literacies Skills Team TechItUpTuesday

Using databases

#TechItUpTuesday

Graphic with a pencil on paper

What are databases?

A database is a system that makes it easy to search, select and store information. These databases will usually contain journal articles, but might also hold legal cases, statistical datasets, news archives, videos, geological maps, and much more. In the case of The University Of Hull and many other universities, the Library buys subscriptions to hundreds of databases that are made available to students and staff through the library website

A picture of a hand pointing at a screen with text and various icons floating around the outside.

How do I use databases?

You could just search for your topic when using databases but it is much better to plan your search strategy. Otherwise, you may spend hours searching to find what you want. Here is an outline of how to carry out your strategy.

Visual representation of your search strategy with five key points

1. Identify key terms

The first step is to identify key terms. It is important to consider the keywords related to your search topic and establish the appropriate terms to search. Rather than entering a whole assignment/project title, you need to pick out the important words that describe your topic. The database will only look for what you type in, so for each keyword, you need to apply a few search tips.

  • Synonyms (a word or phrase that means exactly or nearly the same as another word or phrase) and related terms.
  • Consider American spellings and terminologies
  • Take into account Formal and informal terminology
  • Think about word endings and plurals for example instead of “Educate” maybe consider other endings like “Education”.
  • Acronyms and abbreviations can also be used for some words and phrases as well as some organisations
Trump Words GIF by moodman - Find & Share on GIPHY

2. Combine key terms

Next, you need to combine your terms using Boolean operators. Boolean consists of connectors that combine your search terms. Let’s take a look at how to use Boolean operators to help us get appropriate results.

This shows a venn diagram that demonstrates the use of the AND operator to link social media and teenagers. It only finds content that contain both. Content with only one will not appear in such a search

Use AND to combine and find information on all of your search terms. This will narrow your search. When using AND, you only receive pages including both of your search terms, though not next to each other. For your assignment, search for ‘social media AND teenagers’ to get results including social media specific to teenagers.

This shows a venn diagram that demonstrates the use of the OR operator to link teenagers and teens. It finds content that contain both teens, teenagers or both

Use OR to look for alternative terms, phrases or synonyms to broaden your search. When using OR, you receive pages containing one of or both of your search terms. For your assignment, search for ‘Teenagers OR Adolescents’ to get results including teenagers or adolescents, or both.

This shows a venn diagram that demonstrates the use of the OR operator to link teenagers and NOT pre-teens. It only finds content that contains teenagers alone. If content also included pre-teens it would be excluded

Use NOT to exclude a certain term and narrow your search. The NOT operator is used to find pages including only the first term and not the second term. For your assignment, search for ‘Teenagers NOT Adults’ to get results specific to teenagers only and not get any results related to adults.

3. Search techniques

You also need to consider some additional search techniques that can improve the relevancy and number of your results. These will consider things like different spellings, plural words, similar and related words, different words for the same concept. You do not want to miss a key paper because the author used “social networking” and you had only searched for “social media”! The main techniques to help with this are explained in the list below.

GIF showing a man searching for clues

Truncation

This ensures that all relevant articles are retrieved. It will often be an asterisk * which is placed at the stem of the word. Truncating will look for variant endings and plurals.

Phrase searching

Enclose your search terms within double quotation marks, i.e “social media”. This will avoid databases automatically inserting an “AND” between your search terms.

Wildcards

Use wildcards to improve your search. Different databases use different symbols. For example, on the EBSCOhost database, ? replaces one character, # replaces one or more.

Proximity

Narrow and focus your search, e.g. proximity searching. You can use operators NEAR (often N), Adjacent (ADJ) or SAME (in Web of Science). In some databases, you can specify the distances between search words, for example, in the EBSCOhost databases (such as Academic Search Premier, Business Source Premier and Cinahl).

4. Refine your search

The fourth stage is effectively repeating the other stages by further refining your search. If your search doesn’t find enough results consider adding more synonyms or a broader topic. For example instead of Henry VIII try searching for Tudors instead. Although if your search finds too many maybe combine more keywords or limit the date ranges or language to just English. You could also limit your search based on the material, so maybe just search for news archives or add more words to a proximity search.

Angry Jimmy Fallon GIF by The Tonight Show Starring Jimmy Fallon - Find & Share on GIPHY

5. Save your search strategy

The final stage is to save your strategy so you don’t have to repeat this process if you want to find your chosen article again.. The video below goes through the process of an advanced search for journal articles in the Ebsco database Academic Search Premier. The techniques seen in the video can be applied to all databases that the Library subscribes to.

Recommended databases

Now that we know what databases are and how to use them I just thought I’d give you a few recommendations. These are a few databases I think many of you will find most useful at university and beyond depending on your career path.

JSTOR logo
EBSCO logo
Oxford Journals logo