Skip to main content

Research Repository

Advanced Search

Outputs (179)

Perspectives (2013)
Journal Article
Research and Enterprise. (2013). Perspectives

Perspectives sets out to demonstrate the
impact of the University of Salford’s research and
enterprise activity on the communities we serve,
while also highlighting our engagement with,
and relevance to, issues of direct concern to you.

It is... Read More about Perspectives.

Blogging in context: reviewing the academic library blogosphere (2013)
Journal Article
Adams, R. (2013). Blogging in context: reviewing the academic library blogosphere. Electronic Library, 31(5), 664-677. https://doi.org/10.1108/EL-05-2012-0054

Purpose – This article aims to set a context for blogging within academic libraries in order to identify key themes and examples of good practice for others considering blogging as a future activity.

Design/methodology/approach – The study encompa... Read More about Blogging in context: reviewing the academic library blogosphere.

Flipping the classroom: Revolutionising legal research training (2013)
Journal Article
Sales, N. (2013). Flipping the classroom: Revolutionising legal research training. Legal Information Management, 13(4), 231-235. https://doi.org/10.1017/S1472669613000534

At the University of Salford it is a struggle to find sufficient timetable space to deliver in-depth legal research training to new first year students. The training delivered often alienated students due to the information overload they experienced.... Read More about Flipping the classroom: Revolutionising legal research training.

Current trends in UK university libraries (2013)
Journal Article
Hurst, S. (2013). Current trends in UK university libraries. New Library World, 114(9), 398-407. https://doi.org/10.1108/NLW-04-2013-0032

Purpose – The paper aims to describe the effect of changes in UK higher education policy on services and staff in university libraries.

Design/methodology/approach – A survey of academic literature, higher education statistics and news pieces was... Read More about Current trends in UK university libraries.

Developing information literacy skills in re-registration nurses: An experimental study of teaching methods (2012)
Journal Article
Brettle, A., & Raynor, M. (2012). Developing information literacy skills in re-registration nurses: An experimental study of teaching methods. Nurse Education Today, 33(2), 103-109. https://doi.org/10.1016/j.nedt.2011.12.003

Aim

To compare the effectiveness of an online information literacy tutorial with a face-to-face session for teaching information literacy skills to nurses.
Design

Randomised control trial.
Participants

Seventy-seven first year undergraduat... Read More about Developing information literacy skills in re-registration nurses: An experimental study of teaching methods.

‘I didn’t know this was possible’ : reflections on a variety of Web 2.0, classroom-based and online technologies (2011)
Journal Article

This case study reports on the Engaging and Enhancing Student Learning (EESL) module which forms the core module of the newly HEA and Nursing and Midwifery Council (NMC) accredited blended Postgraduate Certificate in Academic Practice (PGCAP) offered... Read More about ‘I didn’t know this was possible’ : reflections on a variety of Web 2.0, classroom-based and online technologies.

Hooked on coaching (2011)
Journal Article

Coaching is widely used and recognised in Business as a driver for improved performance for some time now. Coaching has also been introduced to the Education sector and especially Further Education has embraced it through National Initiatives such as... Read More about Hooked on coaching.

Steganalysis of compressed speech to detect covert voice over Internet protocol channels (2011)
Journal Article
Huang, Y., Tang, S., Bao, C., & Yip, Y. (2011). Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Information Security, 5(1), 26-32. https://doi.org/10.1049/iet-ifs.2010.0032

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are ?un... Read More about Steganalysis of compressed speech to detect covert voice over Internet protocol channels.