Wiley is pleased to present an Introduction to Publishing for Early Career Researchers in India.
If you’re just starting out in your Research career then this webinar is for you… We will talk you through the writing and publishing processes using local and relevant examples, and providing you with helpful hints and tips
Our experienced Editors will cover the following topics:
-So you’re thinking of writing a paper? Find out how and where to begin the writing process, and how to choose the right journal.
-How to write? We’ll guide you through what editors are looking for and how to tailor your writing to it.
-The publishing and peer review processes. Everything you need to know about the publishing process including time lines.
-Your paper has published, what next? Learn how to increase the exposure of your paper.
Chair – Graham Woodward, Associate Marketing Director, Author Marketing
Andrew Moore, Editor-in-Chief, BioEssays
Anne Nijs, Deputy Editor, European Journal of Organic Chemistry
This webinar will leave you feeling confident about publishing your research papers with Wiley.
This webinar will explore how librarians are supporting researchers in applied and discipline-specific areas. Presenters will include three chemistry professionals, two who have gone into library sciences supporting fellow researchers and one who has pursued a distinguished research career in chemistry. They will examine whether researchers' needs vary with their involvement in applied versus basic research, and examine the impact on the librarian's skill set and tools. Other key themes include how important is it for a librarian to have an educational background in the disciplines they support, and how do they stay up-to-date in their field?Read more >
Does your company employ foreign scientists or researchers coming to the United States? This webinar will discuss immigration options and what an employer needs to know when sponsoring scientists and researchers for U.S. visas.
Topics will include:
1.Common Temporary Visa Options
2.Paths to Permanent Residence and their Advantages and Limitations
3.Pitfalls and Real-World Considerations for Employers
Authors and researchers around the world have let us know through survey feedback and one-on-one interviews that time management is a common concern. In recognition of this concern, we would like to invite you to a free webinar on November 13, 2014 featuring time management expert Joan Capua.
As the Manager for Learning and Development at Wiley, Joan will be applying time management techniques learned from her 20 years of experience in training professionals in multiple industries to feedback from authors and researchers.
In this 1-hour session, Joan will provide:
• An introduction to the latest research on time management
• Step-by-step application of a professional time management tool to examples of real author concerns and stressors
• A strategy for the best way to trim down your “To-Do” list and prevent burn-out
• Tips on preventing distraction and an analysis of the real costs of distraction
• Feedback on your comments and questions as submitted during the session
Connect your published works to a global audience effectively in this webinar, where you will learn best practices, strategies & tips around:
•Enhancing article discoverability
•Wiley author marketing solutions
•Measuring & Increasing the Altmetric Score
•Telling a story with both metrics
•Practical Uses of Altmetric
Peer review is a great opportunity for early career researchers to play a greater role in the research community and gain valuable experience to help improve your own research writing. If you’d like to get involved in peer review, or are looking for tips on how to deliver a great review, join our webinar for top advice from our team of experts.
We will cover the following:
- Why peer review matters: Why peer review is important, your responsibilities as a peer reviewer, and why you should get involved.
- The Editors’ perspective: Find out how editors choose reviewers, what editors expect from peer review, and how your review is used to inform editorial decisions.
- How to write a great peer review: Learn how to provide a top quality evaluation that is useful for the authors in improving their manuscript, and editors in making their decisions.
- The ethics of peer review: We’ll guide you through your ethical obligations as a reviewer, and the main pitfalls to watch out for.
• Chair: Verity Warne, Author Marketing, Wiley
• Michael Willis, Senior Manager Peer Review, Wiley and ISMTE president Elect
• J. Matthias Starck, Editor, Journal of Morphology
• Paul Trevorrow, Executive Journals Editor, Wiley
• Dr John Langley, University of Southampton
• Emily Jesper, Sense About Science
In our “Cybersecurity Threat Insights Report for Leaders”, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.
During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, will give his perspective, observations and guidance through responses to a series of questions led by our EMEA Marketing Manager, Andy Patton.
Discover what successful researchers do to get published!
Do you need advice on finding the right journal? Does peer review feel like a mystery? Do you want tips on how to maximize the impact of your research? Do you want to connect with our experienced editors in real-time? …well this is the webinar for you!
In this practical webinar you'll hear expert publishing advice from Katy Dillon, Associate Journals Editor for the Journal of the Science of Food and Agriculture, Anne Nijs, Deputy Editor, European Journal of Organic Chemistry and Vicky Kinsman, Wiley Author Services. Register for your place today and learn all you need to know to start feeling confident about publishing your next research paper.
Join ESET Malware Researcher Lukáš Štefanko and ESET Solutions Engineer Ben Reed to learn the five components for a winning mobile security strategy and see why replacing your current MDM with ESET mobile solutions can cut costs while boosting security.Read more >
Before the widely-publicised spearphishing campaign against HillaryClinton.com and the DNC during the 2016 Presidential Election, Threat Group-4127 (TG-4127), also known as APT28, Sofacy, Sednit, Fancy bear and Pawn Storm, had traditionally targeted governments, the military and international non-governmental organisations (NGOs).
In this short 30-minute on-demand webcast, the first in the four-part SecureWorks Threat Intelligence Spotlight Series, Tom Finney, Senior Researcher with the SecureWorks Counter Threat Unit (CTU) shares what the CTU learned after spending a year tracking the threat group that hacked the DNC and HillaryClinton.com.
By 2050, the world will need to feed 9.7 billion people. Not only that, but sustainability and energy-saving initiatives will become increasingly more important. Join Ranveer Chandra, Principal Researcher at Microsoft Research, as he explains how low-cost technology and the Internet of Things (IoT) can make small-scale farming more productive to help meet the challenge of feeding a growing world.Read more >
"Nigerian prince" and "419" scams have plagued victims for decades and transitioned to the Internet in the 1990s. There are many variations and names for these scams, which originated in Nigeria. The scammers refer to their trade using the terms "yahoo yahoo" or "G-work," calling themselves "yahoo-yahoo boys," "yahoo boiz," or "G-boys." However, the simple con man fraud practiced by many West African-based threat actors is being replaced by a new crime they refer to as "wire-wire," "waya-waya," or "the new G-work."
In this short 25-minute on-demand webcast, the second in the four-part SecureWorks Threat Intelligence Spotlight Series, Lee Lawson, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), explains how the low-level con games these threat actors are typically known for have evolved into more sophisticated and conventional cybercrime that is compromising businesses around the world.
Our 2016 State of Bug Bounty Report announced that bug bounty programs adoption has increased 210% since 2013.
As more and more companies leverage the capabilities of the global researcher community to identify critical vulnerabilities, we must ask...has the bug bounty economy reached a tipping point?
Join Bugcrowd as we unpack the top trends in crowdsourced cybersecurity and review the key findings from The State of Bug Bounty Report 2016.
Register to learn:
- Bug bounties, defined: Quick history and evolution
- What motivates a bug hunter
- Maturity of the bug bounty economy
It’s a Good Time to Be a Bad Guy
Imagine a marketplace where illegal vendors offer hackers a wide range of goods, tools, and training to enable them to exploit or breach unsuspecting individuals, groups or organizations. Now imagine the walls of this marketplace lined with advertisements offering services and information. The point is, the underground marketplace is booming and only getting bigger, more sophisticated, and competitive.
Register to take a journey with James Bettke, SecureWorks Counter Threat Unit (CTU) researcher, Sean O’Connor and Shawn Cozzolino from the SecureWorks CISO Intel team as they walk you through their time spent in the Underground, tracking hackers in numerous forums and marketplaces all over the world.
When you attend this interactive webinar, you will walk away with:
- Notable trends occurring year over year in the underground hacker market
- Real examples of goods and services for sale to enable cyber-crime
- Tips on how to protect data and additional security advice
Are you new to publishing your research? Struggling to select a journal or understand Peer Review? In this webinar you’ll hear practical tips from top journal editors who’ll guide you through the publishing process and help you discover all you need to know to successfully publish your next article.
You’ll learn more about:
•Where to start if you’re thinking of publishing your research
•Selecting the right journal
•Writing and submitting your article
•Tools to help you through publication and beyond
Plus you’ll have the chance to ask the editors your questions and connect with fellow researchers attending from across the globe. Sign up today to reserve your place!
SecureWorks® incident responders assist hundreds of organisations annually with the containment and remediation of threats during suspected security incidents.
Visibility of these incidents provides the SecureWorks Counter Threat Unit™ (CTU) research team with a unique view of emerging threats and developing trends. This Threat Intelligence is then continuously provided to clients, arming them with the information they need to stay one step ahead of adversaries trying to compromise their networks.
In this webcast Matt Webster, CTU Security Researcher, will discuss developments in the threat landscape observed through SecureWorks’ Incident Response engagements from April to June of 2016, including;
- Key developments of the APT threat
- Criminal cyber threat trends
- Developments in Ransomware
Matt will also discuss observations of how the affected organisations could have better prepared for the threats they encountered.
In our wired, connected world, software flaws are inevitable – so why not utilize the nature of our connected world to work with a distributed immune system made up of thousands of security researchers? This webcast will provide in-depth analysis based on extensive academic research, conversations with CISOs experienced in running such programs, and the security researcher community.
In this webinar, we will highlight the business, technology, and organizational values companies derive from these bug bounty programs. Finally, the talk will identify the common myths, fears and barriers for participation, and suggest recommendations to counter these barriers.
- Bug Bounty program evolution and myth busting
- Lessons from Barracuda’s Bug Bounty program
- How businesses and technology derive value from bug bounty programs
- The art of running a successful & effective bug bounty program
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
Join research data librarians and leaders in developing library infrastructure and services, as well as Mendeley's research data expert, for insight into how to help researchers share their research data -- from instruction and tools to motivating them with metrics for research data impact.Read more >
Like all cyber threats, ransomware continues to evolve and its effects will cause significantly greater impact to corporate organizations and networks. Just as computer viruses caused more damage as they grew in sophistication, ransomware is increasing its way to enter networks and wreak more havoc. Newer strains now know to look for networked file shares as encryption targets. Do you know what signals to look for to detect ransomware as it begins to attack? Exabeam researchers have analyzed nearly 100 strains of malware and have categorized some of the more aggressive techniques being used. Join Exabeam and (ISC)2 on August 18, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms ransomware might use to propagate and how to detect signs of these mechanisms in use.Read more >
Demystify the process of writing and submitting your research with practical tips on selecting the right journal, handling feedback, bouncing back from rejection and streamlining the writing process.
Wiley Author Services presents Publishing Secrets for Early Career Researchers in Nursing. If you’re new to research or want to know more about the process, this webinar will give you practical guidance on:
•Selecting the RIGHT Journal
•Preparing your article – How to follow author guidelines
•Peer Review/Rejection – How to address reviewers comments
•Post publication and SEO – How to promote your work
With expert advice from top editors in the nursing research community you’ll discover all you need to help you successfully publish your next article.
Susan Gennaro, RN, PhD, FAAN
Dean and Professor, Boston College
Editor-in-Chief of Journal of Nursing Scholarship
Bernadette Mazurek Melnyk, PhD, RN, CPNP/PMHNP, FAANP, FNAP, FAAN
Dean, Associate Vice President for Health Promotion, Chief Wellness Officer, Ohio State University
Editor-in-Chief of Worldviews on Evidence-Based Nursing
Charon A. Pierson, PhD, GNP, FAANP, FAAN
Journal of the American Association of Nurse Practitioners
Professor Roger Watson,University of Hull
Faculty of Health and Social Care
BSc, PhD, RN, FRSB, FFNMRCSI, FRSA, FHEA, FEANS, FRCP Edin, FRCN, FAAN
Editor-in-Chief of Journal of Advanced Nursing
Elizabeth Park, Wiley
In this short video, Mark Osborn, a threat researcher with the world-class SecureWorks Counter Threat Unit™ (CTU), discusses the recent investigation into a cyber-espionage campaign, covering the tools and tactics used by the threat actors and exploring the intent behind the activity.
SecureWorks CTU researchers uncovered a set of fake profiles on a popular professional social media networking site supporting a suspected Iran-based threat group's cyber operations.
This social engineering campaign is just one example of the kind of malicious activity the SecureWorks CTU are tracking on a daily basis. This Threat Intelligence is constantly being gathered on prominent threat groups across the globe, and is fed into SecureWorks services to ensure their clients stay one step ahead of the Techniques, Tactics and Procedures (TTP) being employed by their adversaries.