Google Scholar provides a simple way to search scholarly literature across many disciplines and sources, including theses, books, abstracts and articles. However since the update of the Google homepage with its new minimalist look, it is not so high profile. It’s probably quicker just searching for Google Scholar to get to it! Once there you can search for literature and now can save useful and relevant articles to your own library.
Enter your search words as usual. You can choose to define the year of publication. Once you have clicked search you will see the option of Save under each item found. The Scholar Library allows you to save your personal collection of articles in Scholar. You can save articles right from the search page, organize them by topic, and use the power of Scholar’s full-text search & ranking to quickly find just the one you want – at any time and from anywhere.
Click “Save” below a chosen search result to save it to your library. To view your saved items simply click “My library” where you can then see all the articles in your library and search their full text. You can also use labels to organize your articles. To get you started two labels have been created: “My Citations” and “Cited by me”, based on your Scholar profile, if you have one. “My Citations” contains your profile articles and “Cited by me” contains articles you have cited.
If you click on Cite below an item, a pop up box will appear offering you formatted citations (which you will need to edit if you use Harvard). You also have the option to import a citation using one of the bibliography management tools such RefWorks.
See the Google Scholar help page for more details.
Getting to grips with Facebook settings is an important part of being in control of your online presence. We all love sharing updates and photos, but are you sharing them more publicly than you think? Take a look at who can see your past posts and limit the audience if you’re not comfortable with anything.
You can review the audience for your past posts in your activity log.
To quickly limit the audience of old posts to Friends, visit your privacy settings.
Consider who you’re sharing with today. Each time you post a new photo, status update, link or other content, you get to set the privacy for it. Just look for the audience selector:
If you want to:
• Share big ideas for anyone in the world, set the post to Public.
• Reserve personal pictures for the people you know the best, set the post to Friends, Close Friends or Custom.
• Share something with someone specific, you can also send it as a message instead of posting it.
To review or change who can see your stuff, any time, visit your privacy shortcuts. Just click the lock at the top of any page of Facebook.
Adapted from a personal email from Facebook on how to manage privacy.
In previous posts I wrote about how to find images that have a Creative Commons licence and how to choose and apply a Creative Commons to your work It is important to remember that other people’s images must always be attributed and those which have copyright must not be used without permission. By searching for images that have a Creative Commons licence you will save yourself a lot of time.
The infographic below from Foter is a clear and useful visual guide which captures why a Creative Commons is important and explains what each of the licences represent.
Towards the end of infographic it also shows you how to attribute Creative Commons images that you may wish to use. Attributions can either be placed immediately below the image or within a blog or presentation for example, could be listed at the end.
How To Attribute Creative Commons Photos by Foter – CC BY SA
Having just watched an excellent screencast on how to spot a phishing scam created by Nik Peachey, I wanted to share his excellent tips.
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Nik’s screencast takes you through a real example of a fraudulent email which looks as if it has been sent by BT Yahoo. The short video points out the important things to look for to check for authenticity. I recommend you taking a look.
Nik advises that the key pointers to look out for are as follows:
- The information in the message. I used Google to check out the content and the name of the sender to see if they were genuine.
- Use of English. Grammatical mistakes and use of either too formal or very informal language are often a give away.
- The look and design of the message. This is often very poor and at best has some kind of attempt to link to a logo from the company.
- Mouse over the hyperlinks and look to see where they go, if they go anywhere. Dead links or non-existent ones are a give away as are ones that are random numbers or letters or which have an odd suffix. The one in my message led to sngsnfjswrsad and had a suffix of .p.ht so that’s very suspicious.
- The return address. Although it looked like customer services, it’s very easy to set up an email that shows anything you want it to in the reply, but checking the true address showed this to be a random email account and quite possibly not even the one that belonged to the sender.
To add, Microsoft warn about the misuse of web addresses by Cybercriminals. This is where they re-create an address that resembles the names of well-known companies but are slightly altered by adding, omitting, or transposing letters. For example, the address ‘www.microsoft.com’ could appear instead as:
This is called “typo-squatting” or “cybersquatting.”
Emails that sound too good to be true very often are. Taking care to check the points above will help to minimise risks. Microsoft offer further advice on how to protect yourself from email and webscams.
This is a very useful sizing guide for selecting images for Facebook, Twitter, Google+ and YouTube. Thank you Ashleigh Lay for sharing this infographic and the embed code for others to share on their blogs.
LinkedIn maps is a great app which allows you to create an interactive map of all of your connections on LinkedIn. You can click on each node and view the profile of that connection as well as zoom in to see how your connections are connected to each other. You will see groups of connections in different colours. When you hover over the nodes you will find that there are commonalities, such as groups of people you have worked with. In the bottom left hand corner of the map you can give names to these colour coded groups. As you will see on my map, I have identified colleagues from Sheffield Hallam University, colleagues in Higher Education from other countries and those with social media specialisms to name just a few. Continue reading