Today’s researchers are obliged to include a variety of metrics in their applications for grant funding, and promotion and tenure files. They also develop online profiles to enhance their reputation and attract collaborators. Whether welcome or worrisome, researcher profiles and metrics have become commonplace. So how can librarians help?
It begins with a conversation. Discover how to put researchers at ease with the notion of metrics, and what metrics can and cannot convey. Find out more about how to select the best metrics for different disciplines and at different stages of the research career. And learn how institutional initiatives, such as instituting the ORCID researcher iD and providing early education, can provide them with lifelong benefits. By helping to clarify and codify certain processes, you will ensure your researchers are their own best advocates.
- Clearing up misconceptions about bibliometric indicators
- Metrics as a means to counterbalance other biases
- Telling researchers’ stories through metrics
- Metrics for different disciplines and career stages
- Promoting ORCID at various points in the researchers’ career
- Touchpoints for researcher training
Join us for the first webinar in the Wiley Learn to Publish series and learn all you need to know to publish your next article with confidence. Learn from and interact with top editors in the research community during the live Q&A sessions and connect with other researchers in the BrightTalk community.
Register for the first FREE webinar now and you’ll receive guidance from expert editors on:
•Selecting the RIGHT journal – How to choose the best outlet for your research
•Preparing your article – How to follow author guidelines
•Creating a title and abstract- How to communicate your research effectively
Future webinars will include 'Peer Review and Publishing Ethics- the dos and don'ts' and 'Sharing and Promoting your Research- SEO and Altmetrics'.
Attend all three webinars to receive your free ‘Get Published’ eBook and course completion certificate.
Wiley is pleased to present an Introduction to Publishing for Early Career Researchers in India.
If you’re just starting out in your Research career then this webinar is for you… We will talk you through the writing and publishing processes using local and relevant examples, and providing you with helpful hints and tips
Our experienced Editors will cover the following topics:
-So you’re thinking of writing a paper? Find out how and where to begin the writing process, and how to choose the right journal.
-How to write? We’ll guide you through what editors are looking for and how to tailor your writing to it.
-The publishing and peer review processes. Everything you need to know about the publishing process including time lines.
-Your paper has published, what next? Learn how to increase the exposure of your paper.
Chair – Graham Woodward, Associate Marketing Director, Author Marketing
Andrew Moore, Editor-in-Chief, BioEssays
Anne Nijs, Deputy Editor, European Journal of Organic Chemistry
This webinar will leave you feeling confident about publishing your research papers with Wiley.
In the past few years, with the proliferation of IoT devices, IoT security becomes a hot topic. Earlier this year, researchers at NSFocus put together a “2017 Annual IoT Cybersecurity Report”, surveying the IoT landscape and the new threats from them. In this webinar, we will highlight the important findings and opinions in this report. Topics include:
•Survey of the exposed IoT devices.
•Various vulnerabilities in these IoT devices.
•Threat analysis from these IoT devices.
•How to protect the IoT devices.
SANS Principal Instructor, Ted Demopoulos, sets the stage for Cisco Security Research Analyst, Josh Pyorre, to walk you through a brief history of cryptomining and cryptojacking, how it all works and the various steps you or your organization can take to detect and stop it.
Josh Pyorre is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible
The SD-WAN market has been flooded with a range of vendors offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it also creates confusion that complicates the task of evaluating alternative SD-WAN solutions.
Join us as Jim Metzler, analyst, researcher and founder at Ashton, Metzler & Associates, cuts through the confusion in the market by identifying seven key questions that network organizations should ask themselves as part of evaluating SD-WAN solutions.
Elsevier’s Pure gives your faculty and their research global exposure through the Pure Portal. The Portal hosts searchable, open web profiles that make it easy for industry representatives and researchers from other institutions to quickly locate and connect with potential collaborators among your faculty.
Join us on September 7th to learn more about the Pure Portal, including practical examples of how Oregon Health & Science University uses it to promote their faculty's expertise on a global scale.
Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution Attacks
Remote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulnerabilities in web application source code and are prevalent in over 88% of all RCE attacks. In this webinar, join Security Researcher Gilad Yehudai and Threat Research Team Leader Nadav Avital as they analyze malicious cryptomining script, investigate methods these attackers use to make money, and explain how Imperva WAF solutions are equipped to mitigate the threat.
The art of cyber-threat hunting keeps businesses aware of recent or upcoming threats, and enables them to protect the organization from attacks and breaches before it's too late. But what if criminals go totally under the radar? Vicente Diaz, security researcher at Kaspersky Lab, will present the most recent trends in the world of cybercriminals and how they avoid even the most sophisticated threat hunters. Join the webinar to learn how to harvest intelligence when the criminals are completely in the shadows.
Want to know more about challenges to cyber-threat intelligence? Join our next webinar:
Underground cybercriminal flora and marketplaces have a lot to hide – from recent trends to upcoming prospects, from leaked vulnerabilities to the newest financial malware samples. Sergey Lozhkin, security researcher at Kaspersky Lab, will show you what can be found there. Join the talk and learn what can be done with the help of proper underground threat intelligence – and how it could help your business before any attack takes place.
Want to know more about credit card hijacking? Join our next webinar (in Portuguese): https://kas.pr/9a1x
Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.
Please find more by the link – https://securelist.com/time-of-death-%D1%81onnected-medicine/84315/
Want to know more about underground financial threats? Join our next webinar:
This webinar will explore how librarians are supporting researchers in applied and discipline-specific areas. Presenters will include three chemistry professionals, two who have gone into library sciences supporting fellow researchers and one who has pursued a distinguished research career in chemistry. They will examine whether researchers' needs vary with their involvement in applied versus basic research, and examine the impact on the librarian's skill set and tools. Other key themes include how important is it for a librarian to have an educational background in the disciplines they support, and how do they stay up-to-date in their field?Read more >
Does your company employ foreign scientists or researchers coming to the United States? This webinar will discuss immigration options and what an employer needs to know when sponsoring scientists and researchers for U.S. visas.
Topics will include:
1.Common Temporary Visa Options
2.Paths to Permanent Residence and their Advantages and Limitations
3.Pitfalls and Real-World Considerations for Employers
Kaspersky Lab is holding a webinar to help businesses understand and address the recent surge in ‘jackpotting’ attacks targeting ATMs. Over $1 million is believed to have been stolen in the U.S. in the latest campaign and researchers warn that only minor changes to the malware code being used could enable it to hit 40 different ATM vendors in 80 countries.
Sergey Golovanov, Principal Security Researcher in Kaspersky Lab’s Global Research and Analysis Team, will explain the Plotous.D malware and the techniques used in these latest attacks, and consider why an approach active since 2013 is still able to succeed. Attendees will learn about the action required to secure ATM terminals and networks against this threat.
Authors and researchers around the world have let us know through survey feedback and one-on-one interviews that time management is a common concern. In recognition of this concern, we would like to invite you to a free webinar on November 13, 2014 featuring time management expert Joan Capua.
As the Manager for Learning and Development at Wiley, Joan will be applying time management techniques learned from her 20 years of experience in training professionals in multiple industries to feedback from authors and researchers.
In this 1-hour session, Joan will provide:
• An introduction to the latest research on time management
• Step-by-step application of a professional time management tool to examples of real author concerns and stressors
• A strategy for the best way to trim down your “To-Do” list and prevent burn-out
• Tips on preventing distraction and an analysis of the real costs of distraction
• Feedback on your comments and questions as submitted during the session
Peer review is a great opportunity for early career researchers to play a greater role in the research community and gain valuable experience to help improve your own research writing. If you’d like to get involved in peer review, or are looking for tips on how to deliver a great review, join our webinar for top advice from our team of experts.
We will cover the following:
- Why peer review matters: Why peer review is important, your responsibilities as a peer reviewer, and why you should get involved.
- The Editors’ perspective: Find out how editors choose reviewers, what editors expect from peer review, and how your review is used to inform editorial decisions.
- How to write a great peer review: Learn how to provide a top quality evaluation that is useful for the authors in improving their manuscript, and editors in making their decisions.
- The ethics of peer review: We’ll guide you through your ethical obligations as a reviewer, and the main pitfalls to watch out for.
• Chair: Verity Warne, Author Marketing, Wiley
• Michael Willis, Senior Manager Peer Review, Wiley and ISMTE president Elect
• J. Matthias Starck, Editor, Journal of Morphology
• Paul Trevorrow, Executive Journals Editor, Wiley
• Dr John Langley, University of Southampton
• Emily Jesper, Sense About Science
Connect your published works to a global audience effectively in this webinar, where you will learn best practices, strategies & tips around:
•Enhancing article discoverability
•Wiley author marketing solutions
•Measuring & Increasing the Altmetric Score
•Telling a story with both metrics
•Practical Uses of Altmetric
Each quarter, our expert threat researchers from FortiGuard Labs analyse data from millions of sensors around the globe to identify the most current and dangerous threats, and dissect how and why they are succeeding.
Join this webinar for a first-hand look at this past quarter's findings, plus actionable steps to help you avoid these pitfalls. Learn more about these top takeaways that include:
•Insight into the Equifax breach; Apache and other exploit trends
•Evidence mobile malware is on the rise and how to stop it
•A list of vulnerabilities attacked, by frequency so you can prioritize patching
Accurate assessment of risk is vital for effective cybersecurity, yet numerous studies show that perceptions of risk vary considerably, between demographic groups and along gender lines. Leveraging established research in areas like cultural theory of risk perception, plus original research by the authors, this session presents evidence of a “white male effect” leading to underestimation of technology risks. Could this account for the persistent insecurity of digital product design? Does it undermine efforts to protect information systems from criminal abuse? Given that most cybersecurity professionals are males who tend to see more risk in technology than their peers, the researchers explore the causes of white male effect, then suggest strategies for countering its influence, such as increasing diversity in technology companies and the cybersecurity workforce.Read more >
Veteran threat researcher Keith Gilbert sits down for an interview on threat intelligence in hunting. Watch to learn about:
-How to convert data into actionable threat intel
-Best techniques for leveraging threat intel on a hunt
-Tips and best practices from Keith's threat hunting career
Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evangelist, as they explore the rationale behind this type of attack, the consequences it can have for your network, and what you should do to make sure your organization is adequately protected.Read more >