THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web...

44
MAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by Ann Kushmerick October 7 th , 2010

Transcript of THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web...

Page 1: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

MAPPING THE CYBERSECURITY LANDSCAPEUSING JOURNAL AND PATENT DATA

Presented by Ann KushmerickOctober 7th, 2010

Page 2: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Agenda

2

– What is cybersecurity and why is it important– Identifying research trends in cybersecurity using journal and patent

data– Questions

Page 3: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

What is cybersecurity?

3

Page 4: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Why is cybersecurity important?

• President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” http://www.whitehouse.gov/administration/eop/nsc/cybersecurity

• President Obama reflected his continued commitment to cybersecurity as a national priority and signed a proclamation recognizing October as National Cyber Security Awareness Month. 

• Metro article

• Lisa stuff

• Jennifer stuff

4

Page 5: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Why is cybersecurity important?

• The cyber-threat crosses the economic, defense, intelligence, transportation, and medical/health sectors.

• 4 February 2010, The U.S. House of Representatives overwhelmingly approved a cybersecurity bill that calls for reinforcing training, research, and coordination so the government can be better prepared to deal with cyberattacks. http://news.cnet.com/8301-27080_3-10447627-245.html

• National Cybersecurity and Communications Integration Center- under DHS

5

Page 6: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

CRITICAL INFRASTRUCTURE PROTECTION Key Private and Public Cyber Expectations Need to Be Consistently Addressed (July 2010 GAO)

http://www.gao.gov/new.items/d10628.pdf

“Pervasive and sustained computer-based attacks pose a potentially devastating impact to systems and operations and the critical infrastructures they support. Addressing these threats depends on effective partnerships between the government and private sector owners and operators of critical infrastructure.”

6

Page 7: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Cyber security in the news•Stuxnet- Sept 24, 2010

“The malware attacks software programs that run Supervisory Control and Data Acquisition, or SCADA, systems. Such systems are used to monitor automated plants -- from food and chemical facilities to power generators.” http://www.reuters.com/article/idUSTRE68N3PT20100924

U.S. military eyes cyber defenses for banks, grid Sept 23, 2010 Expanded U.S. government cyber defenses would be the best way to guard vital services, possibly including financial networks, from the "real probability" of a destructive online attack, the head of the military's new Cyber Command said. http://www.reuters.com/article/idUSTRE68M39R20100923

7

Page 8: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

How are we defining cybersecurity for this presentation?

Sample of keywords:

• hacker

• cyber secur*

• logic bomb*

• vishing

• cyberincident*

• email virus*

8

•cyberterror*

•cyberespionage

•cyberspy

•attack script

•cellular war*

•cyber SAME forensic*

•cybertrust*

•malicious code

•cyber SAME criminal*

Page 9: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

9

Science Citation Index

Arts & HumanitiesCitation Index

Web of Knowledge 4.0

Social Sciences Citation Index

ISI Web of Knowledge

1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 2007 2008 2010

SciSearchCentury of Science InCitesEssential

Science Indicators PC-based Indicators

for journals, nations, institutions

PC-based citation setsCustom citation projects and national indicators - mainframe

Thomson Reuters (formerly ISI) has been the authority on citation data for over 50 years.

Century of Social Science

Page 10: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

US National Science Foundation Science & Engineering Indicators

Web of Science data have been used in major research evaluation initiatives around the globe for decades.

European Commission: European Union Science & Technology Indicators

US National Research Council -- Doctoral Program Ranking

US National Institutes of Health- Electronic Scientific Portfolio Assistant

Times Higher Education world university ranking

Academic Ranking of World Universities (Shanghai Jiao Tong University)

Government bodies in all major countries.

Citation metrics are only as good as their source

Page 11: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Web of Science- the first and largest citation index• Selectivity and control of content- high, consistent standards

• 11,500+ journals and 716 million+ cited references

• Multidisciplinary- Science, Social Science, Arts/Humanities

• Depth- 100+ years- including cited references

• Consistency and reliability- ideal for research evaluation e.g. field averages

• Unmatched expertise- 40+ years of citation analysis and research evaluation

• Conference Proceedings- 12,000 conferences annually• Funding acknowledgments• The gold standard-used by over 3,200 institutions in more than

90 countries11

Page 12: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Publication and citation trend- cybersecurityTotal articles: 8,620 (2000-2009)

12

Output increased steadily until 2006.

Citations annually continue to grow for the collective population.

Page 13: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Breakdown by Web of Science journal category: cybersecurity is multidisciplinary

13

Page 14: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Analyze the global output in cybersecurity research

14

Percentage of articles by country of authorship

Page 15: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

High-impact US institutions

15

Highly Cited Institutions # citations received by cybersecurity papers

University of California Berkeley 452Cornell University 303University Southern California 265

Carnegie Mellon University 251Florida State University 230Arizona State University 229University Maryland 229University California Los Angeles 226

Michigan State University 223

Page 16: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

16

Cavusoglu H, Mishra B, Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce. (9), 1, 69-104. 2004.

Trace the impact of cybersecurity research through citation maps

This paper on e-commerce has been cited by articles from a variety of fields

Page 17: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Where is this research being published?

17

Page 18: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

What journals focus on this topic?

18

Journal metrics, such as journal impact factor, help to identify the high impact journals in this subject area.

IEEE Transactions on Information Forensics and Security 

Page 19: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Number of Articles by funding body acknowledged (2008-present)

19

Page 20: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

20

RESEARCH GRANTAir Force grant F306020110146awarded on 6/11/2002for $200k

PRINCIPAL INVESTIGATORS. ForrestUniversity of New MexicoComputer Science Dept.

Technological networks andthe spread of computerviruses - SCIENCE

RESULTING PUBLICATIONSProtecting data privacy through hard-to-reverse negative databases - IS, PROCEEDINGS

Scaling theory for informationnetworks - JOURNAL OF THEROYAL SOCIETY INTERFACE

Negative representations ofinformation - INTERNATIONALJOURNAL OF INFORMATIONSECURITY

Automatic Program Repair withEvolutionary Computation -COMMUNICATIONS OF THEACM

A machine learning evaluationof an artificial immune system -EVOLUTIONARY COMPUTATION

Computer immunology -IMMUNOLOGICAL REVIEWS

Example network map: topics represented by the papers associated with this grant (including first and second generation citations)

Citations: 11 - 30

Citations: 7 - 14

Citations: 0 - 0

Citations: 0 - 0

Citations: 1 - 0

Citations: 2 - 0Citations:

1st gen. 38 – 2nd gen. 463

Page 21: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Cybersecurity-related conference proceedings: telecommunications

21

The volume of research on this topic was on the rise until 2008.  Since then, the number of papers has decreased, and the total number of citations has plateaued.

Page 22: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Find experts and collect competitive intelligence

22

• Relatively low level of co-authorship in this field

• Also, low average number of papers per author: approx 1.5 papers per author name

Page 23: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

The highly cited authors in this dataset are not the most prolific in this field

23

Page 24: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Find experts and gather competitive intelligence

24

Pastor-Satorras, R authored the most highly cited paper in the dataset:Pastor-Satorras R, Vespignani A., Epidemic spreading in scale-free networks. Physical Review Letters, (86), 14. 3200-3203. April 2, 2001.

This paper has been cited 689 times.

Indirect, long- term impact.

This paper has been cited over 14 times above the expected rate of citation for this journal. (689 cites/47.21) expected cites.

This paper ranks in the top 0.07% of 2001 physics, multidisciplinary papers

This paper has been cited over 42 times above the expected rate of citation for this category. (689 cites/16.27expected cites)

Page 25: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

A cybersecurity sub-topic- biometrics

“automated methods of recognizing an individual based on measuring biological (anatomical or physiological) and behavioral characteristics”- Biometrics.gov

25

The output in this subfield has been steadily increasing.

Page 26: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

A cybersecurity sub-topic- biometrics• What institutions are working on this area?

26

Organization # papers

W Virginia Univ 9

Chinese Univ Hong Kong 5

Univ Plymouth 5

IBM Corp 4

Hong Kong Polytech Univ 3

Michigan State Univ 3

Univ Miami 3

Aristotelian Univ Salonika 2

Def R&D Canada 2

Edith Cowan Univ 2

Graz Tech Univ 2

The research is being done across many diverse institutions, with few clear centers of concentration

Page 27: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

A cybersecurity sub-topic- biometricsLow levels of collaboration

27

# Papers Organization Organization

2Chinese Univ Hong Kong SE Univ

2Chinese Univ Hong Kong Univ Illinois

2Edith Cowan Univ Univ Plymouth

2IBM Corp Michigan State Univ

2Michigan State Univ W Virginia Univ

2US Navy USN Acad

The greatest number of co-authored papers by any two organizations is two.

Page 28: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Furnell, SM authored the most papers on biometrics (Univ Plymouth, UK)

28

Mean percentile: on average, Furnell’s papers rank in the top 39% of their respective fields

H index: 3 papers have been cited at least 3 times each

Journal actual/expected ratio: Furnell gets cited 163% above average for the journals he publishes in

Self citation analysis: 9.09% of Furnell’s citations are self citations. H index without self citations is 3.

Page 29: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

A cybersecurity sub-topic- biometricsRecent patenting activity

29

Page 30: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Patents: Importance as a scientific resource

The patent system is the most prolific and up-to-date source of information on applied technology. Patents contain detailed technical information which often cannot be found anywhere else: up to 80% of current technical knowledge can only be found in patent documents. Moreover, this information is rapidly available, as most patent applications are published 18 months after the first filing, irrespective of their country of origin.

Why researchers should care about patentsEuropean Commission and the European Patent Office 2007

Page 31: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Derwent Innovations Index

• 16.3 million inventions accounting for over 33 million patents

• Coverage of 41 world patent-issuing authorities

• Coverage depth back to 1966, updated weekly

• Over 1.5 million patent documents added each year

• Provides both general key-term and cited patent searching

• Cross-searchable with other Web of Knowledge resources, such as Web of Science – enabling one to search against patent, journal, and conference literature simultaneously.

Page 32: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Derwent Innovations Index: Value-added informationgreatly improves the ability to retrieve and understand patent information.

This value-added information is unavailable within free patent resources.

• Descriptive Titles – Original patent titles are re-written and enhanced to provide more detail and make them easier to comprehend.

• Detailed Abstracts – Written by Derwent experts and organized into sections such as:– Novelty – New inventions are deliberately buried within patents. The Novelty

section, allows the reader to quickly identify what's new in the patent record.– Use – All patented inventions must have an industrial application, i.e. a use.

This paragraph covers all the uses (applications) of the invention in terms of its different technology areas.

– Advantage – describes all advantages of the new invention over what has been done in the past.

– Detailed Description – further details on other claimed technologies.

Page 33: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

• Patent Family Records – Grouping of related patents into a family record to illustrate the global coverage of the invention.

• Patent Assignee Codes – assigned to about 21,000 organizations worldwide, unifying parent companies and subsidiaries.

• Key Drawings and Images selected and included

• Derwent Classification and Manual Codes – providing uniform, accurate indexing; enabling precise retrieval for those with more expertise in patent literature.

Derwent Innovations Index: Value-added information

Page 34: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Analyze the patenting activity on cybersecurity: Derwent value-added information enables non-experts to access IP information

• 32,092 patents matched the search

34

Analyze by Derwent class codes-specific subject areas

T01 Digital Computers (G06C-F) Electronic data processors, interfaces and programme control. Mechanical digital computers.

Page 35: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Drill down by Derwent manual code

35

Manual codes are used to indicate the novel technical aspects of an invention, and also its applications.

T01-N02B1B USER PRIVILEGES/PASSWORD SYSTEMS (2002- )

T01-N02A3C SERVERS (2002- )

Page 36: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Who patents most frequently in cybersecurity

36

Page 37: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

37

This patent has been cited by 127 subsequent patents

This patent’s examiner cited 5 journal articles upon which this technology was built.

Easily understand the novelty, use, advantage, and description of this patent.

Page 38: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

38

Identifying and Tracking scholars ResearcherID http://researcherid.com/A free, online community where authors: Create a personalized research profile Receive a unique identifier to eliminate author misidentification Increase recognition of their work and exposure for their institutionFacilitate global collaboration among researchers.

Page 39: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

ResearcherID profiles with keyword “network security”

39

Page 40: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

ResearcherID profiles with keyword “computer network*”

40

Page 41: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

ScienceWatch.com- free newsletter for tracking bibliometric trends

• Special topics feature on face recognition http://sciencewatch.com/ana/st/face/

• View high impact papers, authors, institutions, countries, and journals on face recognition

41

Page 42: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

ScienceWatch.com- free newsletter for tracking bibliometric trends

• View research front maps

42

Co-citation analysis reveals clusters of papers, suggesting emerging research areas.

Page 43: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

43

• Compare like with like – The Golden Rule• Use relative measures, not just absolute counts• More applicable to hard sciences than arts/humanities• Know your data parameters:

– journal categories–author names–author addresses–time periods–document types

• Obtain multiple measures• Recognize skewed nature of citation data• Ask whether the results are reasonable

Guidelines for citation analysis Download the white papers at: http://science.thomsonreuters.com/info/bibliometrics/ http://isiwebofknowledge.com/media/pdf/UsingBibliometricsinEval_WP.pdf

Page 44: THOMSON REUTERS PRESENTATION TEMPLATEwokinfo.com/media/ppt/Cybersecurity.ppt · PPT file · Web viewMAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA Presented by

Thank you

Websites for further information

Web of Knowledgehttp://wokinfo.com/

Research Analytics http://researchanalytics.thomsonreuters.com/

Webinars and traininghttp://science.thomsonreuters.com/training/