Need maps for your research? Check out Digimap!

By Aug.03, 2018

Tracy Breheny

Tracy talks about Digimap and all of the different types of maps you can get access to through Library Search.

The Library has access to a collection of databases provided by Digimap.  These contain a variety of different maps which you can access using Library Search.  Our subscriptions include access to various different types of maps, scans, satellite images and land coverage information, and  can all be accessed online.

We currently subscribe to the following Digimap collections:

Digimap Environment

Digimap Environment provides access to Land Cover Map data from the Centre for Ecology and Hydrology. This is a parcel-based classification of UK land cover derived from satellite images and digital cartography and gives land cover information for the entire UK. Land cover is based on UK Biodiversity Action Plan Broad Habitats. read more

 
Leave a comment

Information sources for building and quantity surveying

By Jul.30, 2018

Tracy Breheny

Tracy suggests some building surveying-related information sources that you can use.

Studying a building or quantity surveying-related subject?  There are lots of sources of information you can use to help with your research.  All of these sources can be accessed via Library Search.

Useful books include:

Useful reference sources include:

Dictionaries

Encyclopaedias

Key journals include:

  • Building Magazine
  • Building Research and Information
  • Built Environment
  • Construction Forecast
  • Construction News
  • Journal of Building Survey, Appraisal & Valuation
  • Structural Survey

Key databases include: 

More building surveying-related resources can be found here.

More quantity surveying-related resources can be found here.

Useful websites include:

RICS (Royal Institute of Chartered Surveyors)  read more

 
Leave a comment

How to use Medical Subject Headings (MeSH)…

By Jul.24, 2018

MeSH (Medical Subject Headings) is an organised list (or a controlled vocabulary) of medical and health care terms. You can use them like a thesaurus to identify new keywords and to find terms that are not commonly used or known. MeSH terms are best used in conjunction with your own keywords but remember that that a MeSH heading may not always be available for your topic.  This short video explains how to use MeSH in the Cinahl database.

https://youtu.be/P5YXNpAA_eM

 
Leave a comment

Information sources for architecture-related subjects

By Jul.10, 2018

Tracy Breheny

Tracy suggests some architecture-related information sources that you can use.

Studying architecture or an architecture-related subject?  There are lots of sources of information you can use to help with your research.  All of these sources can be accessed via Library Search.

Useful books include:

Useful reference works include:

Dictionaries

Encyclopaedias

Key journals include:

  • Abitare
  • Architect
  • Architecture Today
  • Architectural Review
  • Azure
  • Blueprint
  • Building Engineer
  • Building Magazine
  • Built Environment
  • Construction News
  • Design Intelligence
  • Detail
  • Domus
  • Dwell
  • El Croquis
  • Journal of Architecture
  • Journal of Architecture and Urbanism
  • L’Architecture d’aujourd’hui
  • Mark
  • Metropolis
  • Modulo
  • Urban Design

Key databases include: 

More architecture-related resources can be found here.

Useful websites include:

RIBA (Royal Institute of British Architects)

Don’t forget, you will also have your online reading lists which you can consult for more detailed lists of module-related textbooks and other sources of information. read more

 
Leave a comment

Email privacy

By Jul.05, 2018

Did you know that your email may not be private?

Google has recently confirmed that private Gmail messages can sometimes be read by staff at external companies. If you have a Gmail account, check out this video from the BBC on how to hide your Gmail account from prying eyes:

There are other times when your email communications may not be private. Find out more in these blogs:

Start protecting yourself
Change your behaviour
Hackers
Boost your digital security

 
Leave a comment

Good habits to stay safe online at University and beyond

By Jun.20, 2018

As a student, you’ll rely heavily on technology to create and store your academic work. It’s important to take the correct steps to protect and secure this information.

This is the last in a series of 4 blog posts in which we’ve been examining how you can protect your digital privacy. (The first three were protecting your digital privacy; changing your online behaviour; and dealing with hackers .)

Most often, security issues arise because of the way people behave online.

So get into these good habits to stay safe online at University and beyond: read more

 
Leave a comment

Your digital privacy: hackers

By Jun.18, 2018

Most people fear their email or social media accounts being hacked but don’t know about some simple steps to prevent this from happening.

Be aware: your digital privacy may be breached through hacking.

What you share by email or text may not be as private as you think. An email or text is like a letter that you send in the post. People shouldn’t read it, as they should respect your privacy, but someone could see it. These messages are transmitted from one device to another as a digital code, which can be scrambled, or encrypted, as it is sent. Your message goes first from the sender to a server and then to the recipient. In the process it’s possible for your message to seen by hackers or people who illegally access the code. Free public wifi sites are often not encrypted, so are not secure from hackers. Avoid them. (The University’s wifi is secure, however). read more

 
Leave a comment

Change your behaviour to protect your privacy online

By Jun.13, 2018

The most common way for your privacy to be breached online isn’t an unknown hacker. It’s your own behaviour.

This is the second in a series of blog posts about how to protect yourself online. (Read the first one here.)

Your own or other people’s online behaviour can breach your privacy.

If you’ve ever walked away from a shared computer without logging out of social media accounts or email, you’ve left yourself open to a breach of privacy. It’s like leaving the door of your house wide open. read more

 
Leave a comment

Your digital privacy: start protecting yourself

By Jun.11, 2018

We all expect a certain level of privacy when communicating online. However, you may have less privacy than you imagine. So how might your privacy be breached? And how can you protect yourself?

First up, remember this: some online communications are just not private.

Social media platforms are simply not private: Facebook, Twitter, Instagram and Snapchat, for example, are fantastic platforms for communicating and collaborating. What you share will be seen by others and may be seen by many thousands or millions of other social media users, through sharing or screenshots, even if you delete your original post. Students can sometimes be shocked that a post on social media will be seen by others at all. read more

 
Leave a comment

Getting the most out of Google Scholar.

By May.22, 2018

Do you want to know how to link Google Scholar to Library Search, find the most recent papers or see how an idea has developed over time? Do you want to save papers to your Google Library or set up alerts for your research topic? The Library has written a handy FAQ that covers all this and more.Google scholar logo

 
Leave a comment