• Digital Manufacturing
• Smart Factory
Clearly defined research question(s) are the key elements which set the focus for study identification and data extraction [21] . These questions are formulated based on the PICOC criteria as presented in the example in Table 2 (PICOC keywords are underlined).
Research questions examples.
Research Questions examples |
---|
• : What are the current challenges of context-aware systems that support the decision-making of business processes in smart manufacturing? • : Which technique is most appropriate to support decision-making for business process management in smart factories? • : In which scenarios are semantic web and machine learning used to provide context-awareness in business process management for smart manufacturing? |
The validity of a study will depend on the proper selection of a database since it must adequately cover the area under investigation [19] . The Web of Science (WoS) is an international and multidisciplinary tool for accessing literature in science, technology, biomedicine, and other disciplines. Scopus is a database that today indexes 40,562 peer-reviewed journals, compared to 24,831 for WoS. Thus, Scopus is currently the largest existing multidisciplinary database. However, it may also be necessary to include sources relevant to computer science, such as EI Compendex, IEEE Xplore, and ACM. Table 3 compares the area of expertise of a selection of databases.
Planning Step 3 “Select digital libraries”. Description of digital libraries in computer science and software engineering.
Database | Description | URL | Area | Advanced Search Y/N |
---|---|---|---|---|
Scopus | From Elsevier. sOne of the largest databases. Very user-friendly interface | Interdisciplinary | Y | |
Web of Science | From Clarivate. Multidisciplinary database with wide ranging content. | Interdisciplinary | Y | |
EI Compendex | From Elsevier. Focused on engineering literature. | Engineering | Y (Query view not available) | |
IEEE Digital Library | Contains scientific and technical articles published by IEEE and its publishing partners. | Engineering and Technology | Y | |
ACM Digital Library | Complete collection of ACM publications. | Computing and information technology | Y |
Authors should define the inclusion and exclusion criteria before conducting the review to prevent bias, although these can be adjusted later, if necessary. The selection of primary studies will depend on these criteria. Articles are included or excluded in this first selection based on abstract and primary bibliographic data. When unsure, the article is skimmed to further decide the relevance for the review. Table 4 sets out some criteria types with descriptions and examples.
Planning Step 4 “Define inclusion and exclusion criteria”. Examples of criteria type.
Criteria Type | Description | Example |
---|---|---|
Period | Articles can be selected based on the time period to review, e.g., reviewing the technology under study from the year it emerged, or reviewing progress in the field since the publication of a prior literature review. | : From 2015 to 2021 Articles prior 2015 |
Language | Articles can be excluded based on language. | : Articles not in English |
Type of Literature | Articles can be excluded if they are fall into the category of grey literature. | Reports, policy literature, working papers, newsletters, government documents, speeches |
Type of source | Articles can be included or excluded by the type of origin, i.e., conference or journal articles or books. | : Articles from Conferences or Journals Articles from books |
Impact Source | Articles can be excluded if the author limits the impact factor or quartile of the source. | Articles from Q1, and Q2 sources : Articles with a Journal Impact Score (JIS) lower than |
Accessibility | Not accessible in specific databases. | : Not accessible |
Relevance to research questions | Articles can be excluded if they are not relevant to a particular question or to “ ” number of research questions. | Not relevant to at least 2 research questions |
Assessing the quality of an article requires an artifact which describes how to perform a detailed assessment. A typical quality assessment is a checklist that contains multiple factors to evaluate. A numerical scale is used to assess the criteria and quantify the QA [22] . Zhou et al. [25] presented a detailed description of assessment criteria in software engineering, classified into four main aspects of study quality: Reporting, Rigor, Credibility, and Relevance. Each of these criteria can be evaluated using, for instance, a Likert-type scale [17] , as shown in Table 5 . It is essential to select the same scale for all criteria established on the quality assessment.
Planning Step 5 “Define QA assessment checklist”. Examples of QA scales and questions.
Do the researchers discuss any problems (limitations, threats) with the validity of their results (reliability)? | 1 – No, and not considered (Score: 0) 2 – Partially (Score: 0.5) 3 – Yes (Score: 1) |
Is there a clear definition/ description/ statement of the aims/ goals/ purposes/ motivations/ objectives/ questions of the research? | 1 – Disagree (Score: 1) 2 – Somewhat disagree (Score: 2) 3 – Neither agree nor disagree (Score: 3) 4 – Somewhat agree (Score: 4) 5 – Agree (Score: 5) |
The data extraction form represents the information necessary to answer the research questions established for the review. Synthesizing the articles is a crucial step when conducting research. Ramesh et al. [15] presented a classification scheme for computer science research, based on topics, research methods, and levels of analysis that can be used to categorize the articles selected. Classification methods and fields to consider when conducting a review are presented in Table 6 .
Planning Step 6 “Define data extraction form”. Examples of fields.
Classification and fields to consider for data extraction | Description and examples |
---|---|
Research type | • focuses on abstract ideas, concepts, and theories built on literature reviews . • uses scientific data or case studies for explorative, descriptive, explanatory, or measurable findings . an SLR on context-awareness for S-PSS and categorized the articles in theoretical and empirical research. |
By process phases, stages | When analyzing a process or series of processes, an effective way to structure the data is to find a well-established framework of reference or architecture. : • an SLR on self-adaptive systems uses the MAPE-K model to understand how the authors tackle each module stage. • presented a context-awareness survey using the stages of context-aware lifecycle to review different methods. |
By technology, framework, or platform | When analyzing a computer science topic, it is important to know the technology currently employed to understand trends, benefits, or limitations. : • an SLR on the big data ecosystem in the manufacturing field that includes frameworks, tools, and platforms for each stage of the big data ecosystem. |
By application field and/or industry domain | If the review is not limited to a specific “Context” or “Population" (industry domain), it can be useful to identify the field of application : • an SLR on adaptive training using virtual reality (VR). The review presents an extensive description of multiple application domains and examines related work. |
Gaps and challenges | Identifying gaps and challenges is important in reviews to determine the research needs and further establish research directions that can help scholars act on the topic. |
Findings in research | Research in computer science can deliver multiple types of findings, e.g.: |
Evaluation method | Case studies, experiments, surveys, mathematical demonstrations, and performance indicators. |
The data extraction must be relevant to the research questions, and the relationship to each of the questions should be included in the form. Kitchenham & Charters [6] presented more pertinent data that can be captured, such as conclusions, recommendations, strengths, and weaknesses. Although the data extraction form can be updated if more information is needed, this should be treated with caution since it can be time-consuming. It can therefore be helpful to first have a general background in the research topic to determine better data extraction criteria.
After defining the protocol, conducting the review requires following each of the steps previously described. Using tools can help simplify the performance of this task. Standard tools such as Excel or Google sheets allow multiple researchers to work collaboratively. Another online tool specifically designed for performing SLRs is Parsif.al 1 . This tool allows researchers, especially in the context of software engineering, to define goals and objectives, import articles using BibTeX files, eliminate duplicates, define selection criteria, and generate reports.
Search strings are built considering the PICOC elements and synonyms to execute the search in each database library. A search string should separate the synonyms with the boolean operator OR. In comparison, the PICOC elements are separated with parentheses and the boolean operator AND. An example is presented next:
(“Smart Manufacturing” OR “Digital Manufacturing” OR “Smart Factory”) AND (“Business Process Management” OR “BPEL” OR “BPM” OR “BPMN”) AND (“Semantic Web” OR “Ontology” OR “Semantic” OR “Semantic Web Service”) AND (“Framework” OR “Extension” OR “Plugin” OR “Tool”
Databases that feature advanced searches enable researchers to perform search queries based on titles, abstracts, and keywords, as well as for years or areas of research. Fig. 1 presents the example of an advanced search in Scopus, using titles, abstracts, and keywords (TITLE-ABS-KEY). Most of the databases allow the use of logical operators (i.e., AND, OR). In the example, the search is for “BIG DATA” and “USER EXPERIENCE” or “UX” as a synonym.
Example of Advanced search on Scopus.
In general, bibliometric data of articles can be exported from the databases as a comma-separated-value file (CSV) or BibTeX file, which is helpful for data extraction and quantitative and qualitative analysis. In addition, researchers should take advantage of reference-management software such as Zotero, Mendeley, Endnote, or Jabref, which import bibliographic information onto the software easily.
The first step in this stage is to identify any duplicates that appear in the different searches in the selected databases. Some automatic procedures, tools like Excel formulas, or programming languages (i.e., Python) can be convenient here.
In the second step, articles are included or excluded according to the selection criteria, mainly by reading titles and abstracts. Finally, the quality is assessed using the predefined scale. Fig. 2 shows an example of an article QA evaluation in Parsif.al, using a simple scale. In this scenario, the scoring procedure is the following YES= 1, PARTIALLY= 0.5, and NO or UNKNOWN = 0 . A cut-off score should be defined to filter those articles that do not pass the QA. The QA will require a light review of the full text of the article.
Performing quality assessment (QA) in Parsif.al.
Those articles that pass the study selection are then thoroughly and critically read. Next, the researcher completes the information required using the “data extraction” form, as illustrated in Fig. 3 , in this scenario using Parsif.al tool.
Example of data extraction form using Parsif.al.
The information required (study characteristics and findings) from each included study must be acquired and documented through careful reading. Data extraction is valuable, especially if the data requires manipulation or assumptions and inferences. Thus, information can be synthesized from the extracted data for qualitative or quantitative analysis [16] . This documentation supports clarity, precise reporting, and the ability to scrutinize and replicate the examination.
The analysis phase examines the synthesized data and extracts meaningful information from the selected articles [10] . There are two main goals in this phase.
The first goal is to analyze the literature in terms of leading authors, journals, countries, and organizations. Furthermore, it helps identify correlations among topic s . Even when not mandatory, this activity can be constructive for researchers to position their work, find trends, and find collaboration opportunities. Next, data from the selected articles can be analyzed using bibliometric analysis (BA). BA summarizes large amounts of bibliometric data to present the state of intellectual structure and emerging trends in a topic or field of research [4] . Table 7 sets out some of the most common bibliometric analysis representations.
Techniques for bibliometric analysis and examples.
Publication-related analysis | Description | Example |
---|---|---|
Years of publications | Determine interest in the research topic by years or the period established by the SLR, by quantifying the number of papers published. Using this information, it is also possible to forecast the growth rate of research interest. | [ ] identified the growth rate of research interest and the yearly publication trend. |
Top contribution journals/conferences | Identify the leading journals and conferences in which authors can share their current and future work. | , |
Top countries' or affiliation contributions | Examine the impacts of countries or affiliations leading the research topic. | [ , ] identified the most influential countries. |
Leading authors | Identify the most significant authors in a research field. | - |
Keyword correlation analysis | Explore existing relationships between topics in a research field based on the written content of the publication or related keywords established in the articles. | using keyword clustering analysis ( ). using frequency analysis. |
Total and average citation | Identify the most relevant publications in a research field. | Scatter plot citation scores and journal factor impact |
Several tools can perform this type of analysis, such as Excel and Google Sheets for statistical graphs or using programming languages such as Python that has available multiple data visualization libraries (i.e. Matplotlib, Seaborn). Cluster maps based on bibliographic data(i.e keywords, authors) can be developed in VosViewer which makes it easy to identify clusters of related items [18] . In Fig. 4 , node size is representative of the number of papers related to the keyword, and lines represent the links among keyword terms.
[1] Keyword co-relationship analysis using clusterization in vos viewer.
This second and most important goal is to answer the formulated research questions, which should include a quantitative and qualitative analysis. The quantitative analysis can make use of data categorized, labelled, or coded in the extraction form (see Section 1.6). This data can be transformed into numerical values to perform statistical analysis. One of the most widely employed method is frequency analysis, which shows the recurrence of an event, and can also represent the percental distribution of the population (i.e., percentage by technology type, frequency of use of different frameworks, etc.). Q ualitative analysis includes the narration of the results, the discussion indicating the way forward in future research work, and inferring a conclusion.
Finally, the literature review report should state the protocol to ensure others researchers can replicate the process and understand how the analysis was performed. In the protocol, it is essential to present the inclusion and exclusion criteria, quality assessment, and rationality beyond these aspects.
The presentation and reporting of results will depend on the structure of the review given by the researchers conducting the SLR, there is no one answer. This structure should tie the studies together into key themes, characteristics, or subgroups [ 28 ].
SLR can be an extensive and demanding task, however the results are beneficial in providing a comprehensive overview of the available evidence on a given topic. For this reason, researchers should keep in mind that the entire process of the SLR is tailored to answer the research question(s). This article has detailed a practical guide with the essential steps to conducting an SLR in the context of computer science and software engineering while citing multiple helpful examples and tools. It is envisaged that this method will assist researchers, and particularly early-stage researchers, in following an algorithmic approach to fulfill this task. Finally, a quick checklist is presented in Appendix A as a companion of this article.
Angela Carrera-Rivera: Conceptualization, Methodology, Writing-Original. William Ochoa-Agurto : Methodology, Writing-Original. Felix Larrinaga : Reviewing and Supervision Ganix Lasa: Reviewing and Supervision.
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Funding : This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie Grant No. 814078.
Carrera-Rivera, A., Larrinaga, F., & Lasa, G. (2022). Context-awareness for the design of Smart-product service systems: Literature review. Computers in Industry, 142, 103730.
1 https://parsif.al/
Your literature review should be guided by a central research question. Remember, it is not a collection of loosely related studies in a field but instead represents background and research developments related to a specific research question, interpreted and analyzed by you in a synthesized way.
How many studies do you need to look at? How comprehensive should it be? How many years should it cover?
Tip: This may depend on your assignment. How many sources does the assignment require?
Make a list of the databases you will search.
Tips:
Some questions to help you analyze the research:
O nce you've settled on a general pattern of organization, you're ready to write each section. There are a few guidelines you should follow during the writing stage. Here is a sample paragraph from a literature review about sexism and language to illuminate the following discussion:
However, other studies have shown that even gender-neutral antecedents are more likely to produce masculine images than feminine ones (Gastil, 1990). Hamilton (1988) asked students to complete sentences that required them to fill in pronouns that agreed with gender-neutral antecedents such as "writer," "pedestrian," and "persons." The students were asked to describe any image they had when writing the sentence. Hamilton found that people imagined 3.3 men to each woman in the masculine "generic" condition and 1.5 men per woman in the unbiased condition. Thus, while ambient sexism accounted for some of the masculine bias, sexist language amplified the effect. (Source: Erika Falk and Jordan Mills, "Why Sexist Language Affects Persuasion: The Role of Homophily, Intended Audience, and Offense," Women and Language19:2.
In the example above, the writers refer to several other sources when making their point. A literature review in this sense is just like any other academic research paper. Your interpretation of the available sources must be backed up with evidence to show that what you are saying is valid.
Select only the most important points in each source to highlight in the review. The type of information you choose to mention should relate directly to the review's focus, whether it is thematic, methodological, or chronological.
Falk and Mills do not use any direct quotes. That is because the survey nature of the literature review does not allow for in-depth discussion or detailed quotes from the text. Some short quotes here and there are okay, though if you want to emphasize a point, or if what the author said just cannot be rewritten in your own words. Notice that Falk and Mills do quote certain terms that were coined by the author, not common knowledge, or taken directly from the study. But if you find yourself wanting to put in more quotes, check with your instructor.
Remember to summarize and synthesize your sources within each paragraph as well as throughout the review. The authors here recapitulate important features of Hamilton's study, but then synthesize it by rephrasing the study's significance and relating it to their own work.
While the literature review presents others' ideas, your voice (the writer's) should remain front and center. Notice that Falk and Mills weave references to other sources into their own text, but they still maintain their own voice by starting and ending the paragraph with their own ideas and their own words. The sources support what Falk and Mills are saying.
When paraphrasing a source that is not your own, be sure to represent the author's information or opinions accurately and in your own words. In the preceding example, Falk and Mills either directly refer in the text to the author of their source, such as Hamilton, or they provide ample notation in the text when the ideas they are mentioning are not their own, for example, Gastil's. For more information, please see our handout on plagiarism .
When seeking information for a literature review or for any purpose, it helps to understand information-seeking as a process that you can follow. 5 Each of the six (6) steps has its own section in this web page with more detail. Do (and re-do) the following six steps:
1. Define your topic. The first step is defining your task -- choosing a topic and noting the questions you have about the topic. This will provide a focus that guides your strategy in step II and will provide potential words to use in searches in step III.
2. Develop a strategy. Strategy involves figuring out where the information might be and identifying the best tools for finding those types of sources. The strategy section identifies specific types of research databases to use for specific purposes.
3. Locate the information . In this step, you implement the strategy developed in II in order to actually locate specific articles, books, technical reports, etc.
4. Use and Evaluate the information. Having located relevant and useful material, in step IV you read and analyze the items to determine whether they have value for your project and credibility as sources.
5. Synthesize. In step V, you will make sense of what you've learned and demonstrate your knowledge. You will thoroughly understand, organize and integrate the information --become knowledgeable-- so that you are able to use your own words to support and explain your research project and its relationship to existing research by others.
6. Evaluate your work. At every step along the way, you should evaluate your work. However, this final step is a last check to make sure your work is complete and of high quality.
Continue below to begin working through the process.
5. Eisenberg, M. B., & Berkowitz, R. E. (1990). Information Problem-Solving: the Big Six Skills Approach to Library & Information Skills Instruction . Norwood, NJ: Ablex Publishing.
I. Define your topic
A. Many students have difficulty selecting a topic. You want to find a topic you find interesting and will enjoy learning more about.
B. Students often select a topic that is too broad. You may have a broad topic in mind initially and will need to narrow it.
1. To help narrow a broad topic :
a. Brainstorm.
1). Try this technique for brainstorming to narrow your focus.
a) Step 1. Write down your broad topic.
b) Step 2. Write down a "specific kind" or "specific aspect" of the topic you identified in step 1.
c) Step 3. Write down an aspect --such as an attribute or behavior-- of the "specific kind" you identified in step 2.
d) Step 4. Continue to add levels of specificity as needed to get to a focus that is manageable. However, you may want to begin researching the literature before narrowing further to give yourself the opportunity to explore what others are doing and how that might impact the direction that you take for your own research.
2) Three examples of using the narrowing technique. These examples start with very, very broad topics, so the topic at step 3 or 4 in these examples would be used for a preliminary search in the literature in order to identify a more specific focus. Greater specificity than level 3 or 4 will ultimately be necessary for developing a specific research question. And we may discover in our preliminary research that we need to alter the direction that we originally were taking.
a) Example 1.
Step 1. information security
Step 2. protocols
Step 3. handshake protocol
Brainstorming has brought us to focus on the handshake protocol.
b) Example 2.
Step 1. information security
Step 2. single sign-on authentication
Step 3. analyzing
Step 4. methods
Brainstorming has brought us to focus on methods for analyzing the security of single sign-on authentication
c) Example 3. The diagram below is an example using the broad topic of "software" to show two potential ways to begin to narrow the topic.
C. Once you have completed the brainstorming process and your topic is more focused, you can do preliminary research to help you identify a specific research question .
1) Examine overview sources such as subject-specific encyclopedias and textbooks that are likely to break down your specific topic into sub-topics and to highlight core issues that could serve as possible research questions. [See section II. below on developing a strategy to learn how to find these encyclopedias]
2). Search the broad topic in a research database that includes scholarly journals and professional magazines (to find technical and scholarly articles) and scan recent article titles for ideas. [See section II. below on developing a strategy to learn how to find trade and scholarly journal articles]
D. Once you have identified a research question or questions, ask yourself what you need to know to answer the questions. For example,
1. What new knowledge do I need to gain?
2. What has already been answered by prior research of other scholars?
E. Use the answers to the questions in C. to identify what words to use to describe the topic when you are doing searches.
1. Identify key words
a. For example , if you are investigating "security audits in banking", key terms to combine in your searches would be: security, audits, banking.
2. Create a list of alternative ways of referring to a key word or phrase
a.For example , "information assurance" may be referred to in various ways such as: "information assurance," "information security," and "computer security."
b. Use these alternatives when doing searches.
3. As you are searching, pay attention to how others are writing about the topic and add new words or phrases to your searches if appropriate.
II. Develop a strategy for finding the information.
A. Start by considering what types of source might contain the information you need . Do you need a dictionary for definitions? a directory for an address? the history of a concept or technique that might be in a book or specialized encyclopedia? today's tech news in an online tech magazine or newspaper? current research in a journal article? background information that might be in a specialized encyclopedia? data or statistics from a specific organization or website? Note that you will typically have online access to these source types.
B. This section provides a description of some of the common types of information needed for research.
1. For technical and business analysis , look for articles in technical and trade magazines . These articles are written by information technology professionals to help other IT professionals do their jobs better. Content might include news on new developments in hardware or software, techniques, tools, and practical advice. Technical journals are also likely to have product ads relevant to information technology workers and to have job ads. Examples iof technical magazines include Network Computing and IEEE Spectrum .
2. To read original research studies , look for articles in scholarly journals and conference proceedings . They will provide articles written by information technology professionals who are reporting original research; that is, research that has been done by the authors and is being reported for the first time. The audience for original research articles is other information technology scholars and professionals. Examples of scholarly journals include Journal of Applied Security Research , Journal of Management Information Systems , IEEE Transactions on Computers , and ACM Transactions on Information and System Security .
3. For original research being reported to funding agencies , look for technical reports on agency websites. Technical reports are researcher reports to funding agencies about progress on or completion of research funded by the agency.
4. For in-depth, comprehensive information on a topic , look for book-length volumes . All chapters in the book might be written by the same author(s) or might be a collection of separate papers written by different authors.
5. To learn about an unfamiliar topic , use textbooks , specialized encyclopedias and handbooks to get get overviews of topics, history/background, and key issues explained.
6. For instructions for hardware, software, networking, etc., look for manuals that provide step-by-step instructions.
7. For technical details about inventions (devices, instruments, machines), look for patent documents .
C. NOTE - In order to search for and find original research studies, it will help if you understand how information is produced, packaged and communicated within your profession. This is explained in the tab "Research Communication: Graphic."
III. Locate the information
A. Use search tools designed to find the sources you want. Types of sources were described in section II. above.
Always feel free to Ask a librarian for assistance when you have questions about where and how locate the information you need.
B. Evaluate the search results (no matter where you find the information)
1. Evaluate the items you find using at least these 5 criteria:
a. accuracy -- is the information reliable and error free?
1) Is there an editor or someone who verifies/checks the information?
2) Is there adequate documentation: bibliography, footnotes, credits?
3) Are the conclusions justified by the information presented?
b. authority -- is the source of the information reputable?
1) How did you find the source of information: an index to edited/peer-reviewed material, in a bibliography from a published article, etc.?
2) What type of source is it: sensationalistic, popular, scholarly?
c. objectivity -- does the information show bias?
1) What is the purpose of the information: to inform, persuade, explain, sway opinion, advertise?
2) Does the source show political or cultural biases?
d. currency -- is the information current? does it cover the time period you need?
e. coverage -- does it provide the evidence or information you need?
2. Is the search producing the material you need? -- the right content? the right quality? right time period? right geographical location? etc. If not, are you using
a. the right sources?
b. the right tools to get to the sources?
c. are you using the right words to describe the topic?
3. Have you discovered additional terms that should be searched? If so, search those terms.
4. Have you discovered additional questions you need to answer? If so, return to section A above to begin to answer new questions.
IV. Use the information.
A. Read, hear or view the source
1. Evaluate: Does the material answer your question(s)? -- right content? If not, return to B.
2. Evaluate: Is the material appropriate? -- right quality? If not, return to B.
B. Extract the information from the source : copy/download information, take notes, record citation, keep track of items using a citation manager.
1. Note taking (these steps will help you when you begin to write your thesis and/or document your project.):
a. Write the keywords you use in your searches to avoid duplicating previous searches if you return to search a research database again. Keeping track of keywords used will also save you time if your search is interrupted or you need return and do the search again for some other reason. It will help you remember which search terms worked successfully in which databases
b. Write the citations or record the information needed to cite each article/document you plan to read and use, or make sure that any saved a copy of the article includes all the information needed to cite it. Some article pdf files may not include all of the information needed to cite, and it's a waste of your valuable time to have to go back to search and find the items again in order to be able to cite them. Using citation management software such as EndNote will help keep track of citations and help create bibliographies for your research papers.
c. Write a summary of each article you read and/or why you want to use it.
V. Synthesize.
A. Organize and integrate information from multiple sources
B. Present the information (create report, speech, etc. that communicates)
C. Cite material using the style required by your professor or by the venue (conference, publication, etc.). For help with citation styles, see Guide to Citing Sources . A link to the citing guide is also available in the "Get Help" section on the left side of the Library home page
VI. Evaluate the paper, speech, or whatever you are using to communicate your research.
A. Is it effective?
B. Does it meet the requirements?
C. Ask another student or colleague to provide constructive criticism of your paper/project.
Service update: Some parts of the Library’s website will be down for maintenance on August 11.
Conducting a literature review: why do a literature review, why do a literature review.
Besides the obvious reason for students -- because it is assigned! -- a literature review helps you explore the research that has come before you, to see how your research question has (or has not) already been addressed.
You identify:
COMMENTS
How to Write a Literature Review | Guide, Examples, & ...
A literature review is an integrated analysis-- not just a summary-- of scholarly writings and other relevant evidence related directly to your research question. That is, it represents a synthesis of the evidence that provides background information on your topic and shows a association between the evidence and your research question.
Literature reviews take time. Here is some general information to know before you start. VIDEO -- This video is a great overview of the entire process. (2020; North Carolina State University Libraries) --The transcript is included. --This is for everyone; ignore the mention of "graduate students". --9.5 minutes, and every second is important.
Steps in the Literature Review Process
How to write a literature review in 6 steps
Steps for Cr eating Literature Reviews. Formulating Research Questions and Objectives: Define the scope and focus of the review.; Searching the Literature: Conduct a thorough search of academic databases and other sources.; Screening for Inclusion: Select relevant studies based on predefined criteria.; Assessing Quality: Evaluate the quality and reliability of the selected studies.
The steps below look sequential. However, doing a literature review is often an iterative process. That is, you may "circle back" to redo or modify earlier steps. You may also be working on a number of steps at the same time. General steps. State your research topic or question.
How to write a literature review in 6 steps. How do you write a good literature review? This step-by-step guide on how to write an excellent literature review covers all aspects of planning and writing literature reviews for academic papers and theses.
Writing a Literature Review - Purdue OWL
As mentioned above, writing your literature review is a process, which I'll break down into three steps: Finding the most suitable literature. Understanding, distilling and organising the literature. Planning and writing up your literature review chapter. Importantly, you must complete steps one and two before you start writing up your chapter.
Literature Review: Conducting & Writing
Step One: Decide on your areas of research: Before you begin to search for articles or books, decide beforehand what areas you are going to research. Make sure that you only get articles and books in those areas, even if you come across fascinating books in other areas. A literature review I am currently working on, for example, explores ...
A literature review surveys scholarly articles, books and other sources relevant to a particular issue, area of research, or theory, and by so doing, providing a description, summary, and critical evaluation of these works. ... The literature review : a step-by-step guide for students. Conducting research literature reviews: from internet to ...
Ten Simple Rules for Writing a Literature Review - PMC
Learn what a literature review is, why it is important, and how to write one. Explore different types of literature reviews, their formats, and tips to use SciSpace Copilot AI research assistant.
Format: Describe your literature review's organization and adhere to it throughout. Body . The discussion of your research and its importance to the literature should be presented in a logical structure. Chronological: Structure your discussion by the literature's publication date moving from the oldest to the newest research.
Example: Predictors and Outcomes of U.S. Quality Maternity Leave: A Review and Conceptual Framework: 10.1177/08948453211037398 ; Systematic review: "The authors of a systematic review use a specific procedure to search the research literature, select the studies to include in their review, and critically evaluate the studies they find." (p. 139).
What is a Literature Review? Steps to Write a Literature Review. Step 1: Choosing a Topic ; Step 2: Finding Information ; Step 3: Evaluating Content ; Step 4: Taking Notes ; Step 5: Synthesizing Content ; Step 6: Writing the Review ; Step 7: Citing Your Sources ; Library Services Toggle Dropdown. Meet the Library Team ; Off-Campus & Mobile Access
Abstract. Performing a literature review is a critical first step in research to understanding the state-of-the-art and identifying gaps and challenges in the field. A systematic literature review is a method which sets out a series of steps to methodically organize the review. In this paper, we present a guide designed for researchers and in ...
5 STEPS TO WRITING A LITERATURE REVIEW . 2 STEP ONE: DEFINE THE SCOPE Look for relevant models in journals in your field (e.g., a target journal for publication) and papers, ... STEP FIVE: WRITE THE REVIEW HOW DO I WRITE THE INTRODUCTION? 1. Define or identify the general topic, issue, or area of concern, ...
The type of information you choose to mention should relate directly to the review's focus, whether it is thematic, methodological, or chronological. Use quotes sparingly. Falk and Mills do not use any direct quotes. That is because the survey nature of the literature review does not allow for in-depth discussion or detailed quotes from the text.
he simplest thing of all—structure. Everything you write has three components: a beginning, a middle and an e. d and each serves a different purpose. In practice, this means your review will have an introduction, a main body where you review the literature an. a conclusion where you tie things up.
When seeking information for a literature review or for any purpose, it helps to understand information-seeking as a process that you can follow. 5 Each of the six (6) steps has its own section in this web page with more detail. Do (and re-do) the following six steps: 1. Define your topic.
A formal literature review is an evidence-based, in-depth analysis of a subject. There are many reasons for writing one and these will influence the length and style of your review, but in essence a literature review is a critical appraisal of the current collective knowledge on a subject. Rather than just being an exhaustive list of all that ...
Besides the obvious reason for students -- because it is assigned! -- a literature review helps you explore the research that has come before you, to see how your research question has (or has not) already been addressed. You identify: core research in the field. experts in the subject area. methodology you may want to use (or avoid)