Strategy and Info...
Follow
Find
1.8K views | +2 today
 
Rescooped by Randy Borum from A cool selection of cool search engines with extra flavours
onto Strategy and Information Analysis
Scoop.it!

citations-gadget Search >> A Google Scholar Universal Gadget for Scientific Publication Citation Counting

citations-gadget Search >> A Google Scholar Universal Gadget for Scientific Publication Citation Counting | Strategy and Information Analysis | Scoop.it

 

A Google Scholar Universal Gadget which enables users to search for the total number of citations of author(s). It provides a total citation count, total number of cited publications and Jorge E. Hirsch's H-Index.

 

IMPORTANT: Please note that this tool is as accurate/inaccurate as Google Scholar itself.

 

Thus it is important to check and refine the data that the gadget performs calculations on by clicking on the "view publications" link.

 

If the returned page shows inaccurate results then the search terms in the gadget need to be refined until the returned page shows as accurate information as the user deems fit for his/her purpose.

 

Peter Jacso published an article in the Library Journal that describes many issues with tools that are based on Google Scholar.

 

This article can provide a user of our gadget with a better understanding of many of the possible pitfalls that can be encountered when using our tool.

 

Post Image: http://bit.ly/10htM5E

 


Via Mhd.Shadi Khudr
more...
No comment yet.
Strategy and Information Analysis
A collection of items for strategists and problems-solvers who aim to be well-informed about global affairs and perspectives; capable of developing and evaluating new knowledge; generating and analyzing courses of action; and who are interested in expressing clearly reasoned opinions and communicating effectively in writing, oral presentation, and visual display.
Curated by Randy Borum
Your new post is loading...
Your new post is loading...
Scooped by Randy Borum
Scoop.it!

Teams Better Than Individuals at Intelligence Analysis - Imperial Valley News

Teams Better Than Individuals at Intelligence Analysis - Imperial Valley News | Strategy and Information Analysis | Scoop.it
Imperial Valley News Pressing all envelopes
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

The new Cyber Threat Intelligence Integration Center - Lawfare (blog)

The new Cyber Threat Intelligence Integration Center - Lawfare (blog) | Strategy and Information Analysis | Scoop.it
According to the Washington Post, the Obama administration is establishing a new agency to fuse intelligence from around the government when a cyber crisis occurs.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Norse Talk: What's So Funny About Threat Intelligence?

Norse Talk: What's So Funny About Threat Intelligence? | Strategy and Information Analysis | Scoop.it
In this debut episode of the Norse Talk video series, Kurt Stammberger and Brian Contos discuss what next generation threat intelligence really means for network security.
more...
No comment yet.
Rescooped by Randy Borum from IT Support and Hardware for Clinics
Scoop.it!

White House Creates Cybersecurity Agency

White House Creates Cybersecurity Agency | Strategy and Information Analysis | Scoop.it
The Obama administration has announced creation of a federal agency to analyze information culled from other agencies to battle cyberthreats to the government and

Via Technical Dr. Inc.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

What is Strategy?

A full set of strategy animations accompany the forthcoming textbook: “Strategic Management: Concepts and Tools for Creating Real World Strategy” published b...
more...
No comment yet.
Rescooped by Randy Borum from Cyber Security Health Care
Scoop.it!

Security predictions for 2015

Security predictions for 2015 | Strategy and Information Analysis | Scoop.it
As the complexity and diversity of devices, platforms and modes of interaction advance, so do the associated risks from malicious individuals, criminal organisations and states that wish to exploit technology for their own purposes. Below, Michael Fimin, CEO at Netwrix, provides his major observations of IT security trends and the most crucial areas to keep watch over in 2015:

Cloud
Many individuals and enterprises are already using cloud technologies to store sensitive information and perform business critical tasks. In response to security concerns, cloud technologies will continue to develop in 2015, focusing on improved data encryption; the ability to view audit trails for configuration management and secure access of data; and the development of security brokers for cloud access, allowing for user access control as a security enforcement point between a user and cloud service provider.

Mobile
As the adoption and standardisation of a few select mobile OS platforms grows, the opportunity for attack also increases. We can expect to see further growth in smartphone malware, increases in mobile phishing attacks and fake apps making their way into app stores. Targeted attacks on mobile payment technologies can also be expected. In response, 2015 will see various solutions introduced to improve mobile protection, including the development of patch management across multiple devices and platforms, the blocking of apps from unknown sources and anti-malware protection.

Software defined data centre
’Software defined’ usually refers to the decoupling and abstracting of infrastructure elements followed by a centralised control. Software defined networking (SDN) and software defined storage (SDS) are clearly trending and we can expect this to expand in 2015. But while these modular software defined infrastructures improve operational efficiency, they also create new security risks. In particular, centralised controllers can become a single point of attack. While the adoption of this approach is not widespread enough to become a common target for attacks, as more companies run SDN and SDS pilots in 2015, we expect their security concerns will be raised. This will result in more of a focus on security from manufacturers, as well as new solutions from third party vendors.

Internet of things
The Internet of things (IoT) universe is expanding with a growing diversity of devices connecting to the network and/or holding sensitive data - from smart TVs and Wi-Fi-connected light bulbs to complex industrial operational technology systems.

With the IoT likely to play a more significant role in 2015 and beyond, devices and systems require proper management, as well as security policies and provisions. While the IoT security ecosystem has not yet developed, we do not expect attacks on the IoT to become widespread in 2015.

Most attacks are likely to be ’whitehat’ hacks to report vulnerabilities and proof of concept exploits. That being said, sophisticated targeted attacks may go beyond traditional networks and PCs.

Next generation security platforms
In 2015 and beyond, we can expect to see more vendors in the information security industry talking about integration, security analytics and the leveraging of big data. Security analytics platforms have to take into account more internal data sources as well as the external feeds, such as online reputation services and third party threat intelligence feeds. The role of context and risk assessment will also become more important. The focus of defence systems becomes more about minimising attack surfaces, isolating and segmenting the infrastructure to reduce potential damage and identifying the most business critical components to protect.

Looking back at previous years, new security challenges will continue to arise, so IT professionals should be armed with mission critical information and be prepared to defend against them.

Via Institute for Critical Infrastructure Technology
more...
Institute for Critical Infrastructure Technology's curator insight, December 12, 2014 11:02 AM

As the complexity and diversity of devices, platforms and modes of interaction advance, so do the associated risks from malicious individuals, criminal organisations and states that wish to exploit technology for their own purposes. Below, Michael Fimin, CEO at Netwrix, provides his major observations of IT security trends and the most crucial areas to keep watch over in 2015:

Cloud
Many individuals and enterprises are already using cloud technologies to store sensitive information and perform business critical tasks. In response to security concerns, cloud technologies will continue to develop in 2015, focusing on improved data encryption; the ability to view audit trails for configuration management and secure access of data; and the development of security brokers for cloud access, allowing for user access control as a security enforcement point between a user and cloud service provider.

Mobile
As the adoption and standardisation of a few select mobile OS platforms grows, the opportunity for attack also increases. We can expect to see further growth in smartphone malware, increases in mobile phishing attacks and fake apps making their way into app stores. Targeted attacks on mobile payment technologies can also be expected. In response, 2015 will see various solutions introduced to improve mobile protection, including the development of patch management across multiple devices and platforms, the blocking of apps from unknown sources and anti-malware protection.

Software defined data centre
’Software defined’ usually refers to the decoupling and abstracting of infrastructure elements followed by a centralised control. Software defined networking (SDN) and software defined storage (SDS) are clearly trending and we can expect this to expand in 2015. But while these modular software defined infrastructures improve operational efficiency, they also create new security risks. In particular, centralised controllers can become a single point of attack. While the adoption of this approach is not widespread enough to become a common target for attacks, as more companies run SDN and SDS pilots in 2015, we expect their security concerns will be raised. This will result in more of a focus on security from manufacturers, as well as new solutions from third party vendors.

Internet of things
The Internet of things (IoT) universe is expanding with a growing diversity of devices connecting to the network and/or holding sensitive data - from smart TVs and Wi-Fi-connected light bulbs to complex industrial operational technology systems.

With the IoT likely to play a more significant role in 2015 and beyond, devices and systems require proper management, as well as security policies and provisions. While the IoT security ecosystem has not yet developed, we do not expect attacks on the IoT to become widespread in 2015.

Most attacks are likely to be ’whitehat’ hacks to report vulnerabilities and proof of concept exploits. That being said, sophisticated targeted attacks may go beyond traditional networks and PCs.

Next generation security platforms
In 2015 and beyond, we can expect to see more vendors in the information security industry talking about integration, security analytics and the leveraging of big data. Security analytics platforms have to take into account more internal data sources as well as the external feeds, such as online reputation services and third party threat intelligence feeds. The role of context and risk assessment will also become more important. The focus of defence systems becomes more about minimising attack surfaces, isolating and segmenting the infrastructure to reduce potential damage and identifying the most business critical components to protect.

Looking back at previous years, new security challenges will continue to arise, so IT professionals should be armed with mission critical information and be prepared to defend against them.

Scooped by Randy Borum
Scoop.it!

Critical Thinking For Strategic Intelligence: Katherine Hibbs Pherson, Randolph H Pherson: 9781452226675: Amazon.com: Books

Critical Thinking For Strategic Intelligence

Product by Brand: CQ Press ~ Randolph H Pherson (author) More about this product
List Price: $40.00
Price: $36.36
You Save: $3.64 (9%)
Critical Thinking For Strategic Intelligence [Katherine Hibbs Pherson, Randolph H Pherson] on Amazon.com. *FREE* shipping on qualifying offers.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Top 5 Big Data Trends Of 2014 - InformationWeek

Top 5 Big Data Trends Of 2014 - InformationWeek | Strategy and Information Analysis | Scoop.it
As companies move beyond bleeding-edge experiments into production deployments, these trends point to real-world progress in big data analysis.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Hacker Wars: Companies Fight Back With Counter-Intelligence - NBCNews.com

Hacker Wars: Companies Fight Back With Counter-Intelligence - NBCNews.com | Strategy and Information Analysis | Scoop.it
ROME, N.Y. — One Monday last June, 16 workers logged into their computers at the defense contractor Exelis and found emails from a financial consultant who w...
more...
No comment yet.
Rescooped by Randy Borum from information analyst
Scoop.it!

Here's How To Figure Out Everything Google Knows About You

Here's How To Figure Out Everything Google Knows About You | Strategy and Information Analysis | Scoop.it
Here's what Google's sharing with advertisers about you, and how to get Google to stop.

Via Tom D'Amico (@TDOttawa) , michel verstrepen
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Data Visualization: Your Secret Weapon in Storytelling and Persuasion - ClickZ

Data Visualization: Your Secret Weapon in Storytelling and Persuasion - ClickZ | Strategy and Information Analysis | Scoop.it
Creating visualizations of your data can help attract links, traffic, and buzz, which are all essential to a brand's success.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

The Future of Big Data – Big Data 2.0

The Future of Big Data – Big Data 2.0 | Strategy and Information Analysis | Scoop.it
The future of big data isn't about numeric data points but instead about asking the deeper questions and finding out why consumers make the decisions they do.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

The State of Information Visualization, 2015

The State of Information Visualization, 2015 | Strategy and Information Analysis | Scoop.it
It seems to be a foregone conclusion that 2014 was not an exciting year in visualization. When we recorded the Data Stories episode looking back at 2014 last week (to be released soon), everybody started out with a bit of a downer.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

PATIENT, PRUDENT, STRATEGIC? THE 2015 US NATIONAL SECURITY STRATEGY :: ANALYSIS - Integration Through Media ....!

PATIENT, PRUDENT, STRATEGIC? THE 2015 US NATIONAL SECURITY STRATEGY :: ANALYSIS - Integration Through Media ....! | Strategy and Information Analysis | Scoop.it
By Giovanni Grevi :: The publication of a National Security Strategy (NSS) gives American presidents …
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Eight New Ideas From Data Visualization Experts

This post summarizes and visualizes eight key ideas we’ve heard from data visualization experts. Check out our first Case Study to learn more about using Plotly Enterprise on-premise, on your servers.
more...
No comment yet.
Rescooped by Randy Borum from Strategy and Competitive Intelligence by Bonnie Hohhof
Scoop.it!

Tech Trends 2015 - Deloitte

Tech Trends 2015 - Deloitte | Strategy and Information Analysis | Scoop.it
In our sixth annual report, we outline eight trends that could potentially disrupt the way businesses engage their customers, how work gets done, and how markets and industries evolve. Read about the trends below, download the full report, and explore our interactive tablet app.

Via Bonnie Hohhof
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Free Social Media Analytics Tools | Simply Measured

Easy Social Media Measurement & Analytics
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Here's How Cyber-Warfare Started And Where It's Going

Here's How Cyber-Warfare Started And Where It's Going | Strategy and Information Analysis | Scoop.it
When America dropped its two atom bombs, Little...
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

How Networks Are Revolutionizing Scientific (and Maybe Human) Thought - Scientific American (blog)

How Networks Are Revolutionizing Scientific (and Maybe Human) Thought - Scientific American (blog) | Strategy and Information Analysis | Scoop.it
Science and common sense are alike grounded in human experience. Yet these ways of thinking about things are often in conflict. Sometimes the simplicity of most ...
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

8 Subconscious Mistakes Our Brains Make Every Day--And How To Avoid Them

8 Subconscious Mistakes Our Brains Make Every Day--And How To Avoid Them | Strategy and Information Analysis | Scoop.it
The "swimmer's body illusion," and other ways our brains play tricks on us.
more...
No comment yet.
Rescooped by Randy Borum from Healthcare and Technology news
Scoop.it!

Analysis: HHS' Threat Info Sharing Plan

Analysis: HHS' Threat Info Sharing Plan | Strategy and Information Analysis | Scoop.it
Learn why the Department of Health and Human Services is reassessing how its many internal agencies, and the entire healthcare sector, can boost cyberthreat

Via Technical Dr. Inc.
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

Strategic Intelligence Management

Strategic Intelligence Management | Strategy and Information Analysis | Scoop.it
Babak Akhgar, \Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies\ 2013 | ISBN-10: 0124071910 | 330 pages | PDF | 11 MB Babak
more...
No comment yet.
Scooped by Randy Borum
Scoop.it!

The beauty of data visualization

The beauty of data visualization | Strategy and Information Analysis | Scoop.it
David McCandless turns complex data sets (like worldwide military spending, media buzz, Facebook status updates) into beautiful, simple diagrams that tease out unseen patterns and connections.
more...
Mike Allen's curator insight, November 1, 2014 12:49 PM

this brings in another aspect of psychology in marketing. While the majority are visually inclined in accepting information, others touch or hear as a priority sensing method, or at least are more strongly influenced by sound or touch. How do we manage this in marketing?

Scooped by Randy Borum
Scoop.it!

Insurance analytics – the missing link - Financial Times

Insurance analytics – the missing link - Financial Times | Strategy and Information Analysis | Scoop.it
Analytics and big data are the flavour of the season and every educational institution worth its name has introduced courses around them. Magazines, books, articles are flooded with information on the use of analytics and the harnessing of big data.
more...
No comment yet.