1 / 44

MAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA

MAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA. Presented by Ann Kushmerick October 7 th , 2010. Agenda. What is cybersecurity and why is it important Identifying research trends in cybersecurity using journal and patent data Questions. What is cybersecurity?.

elyse
Download Presentation

MAPPING THE CYBERSECURITY LANDSCAPE USING JOURNAL AND PATENT DATA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MAPPING THE CYBERSECURITY LANDSCAPEUSING JOURNAL AND PATENT DATA Presented by Ann Kushmerick October 7th, 2010

  2. Agenda • What is cybersecurity and why is it important • Identifying research trends in cybersecurity using journal and patent data • Questions

  3. What is cybersecurity?

  4. Why is cybersecurity important? President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” http://www.whitehouse.gov/administration/eop/nsc/cybersecurity President Obama reflected his continued commitment to cybersecurity as a national priority and signed a proclamation recognizing October as National Cyber Security Awareness Month.  Metro article Lisa stuff Jennifer stuff

  5. Why is cybersecurity important? • The cyber-threat crosses the economic, defense, intelligence, transportation, and medical/health sectors. • 4 February 2010, The U.S. House of Representatives overwhelmingly approved a cybersecurity bill that calls for reinforcing training, research, and coordination so the government can be better prepared to deal with cyberattacks. http://news.cnet.com/8301-27080_3-10447627-245.html • National Cybersecurity and Communications Integration Center- under DHS

  6. CRITICAL INFRASTRUCTURE PROTECTION Key Private and Public Cyber Expectations Need to Be Consistently Addressed (July 2010 GAO) http://www.gao.gov/new.items/d10628.pdf “Pervasive and sustained computer-based attacks pose a potentially devastating impact to systems and operations and the critical infrastructures they support. Addressing these threats depends on effective partnerships between the government and private sector owners and operators of critical infrastructure.”

  7. Cyber security in the news • Stuxnet- Sept 24, 2010 “The malware attacks software programs that run Supervisory Control and Data Acquisition, or SCADA, systems. Such systems are used to monitor automated plants -- from food and chemical facilities to power generators.” http://www.reuters.com/article/idUSTRE68N3PT20100924 U.S. military eyes cyber defenses for banks, grid Sept 23, 2010 Expanded U.S. government cyber defenses would be the best way to guard vital services, possibly including financial networks, from the "real probability" of a destructive online attack, the head of the military's new Cyber Command said. http://www.reuters.com/article/idUSTRE68M39R20100923

  8. How are we defining cybersecurity for this presentation?Sample of keywords: • cybertrust* • malicious code • cyber SAME criminal* • cyberterror* • cyberespionage • cyberspy • attack script • cellular war* • cyber SAME forensic* hacker cyber secur* logic bomb* vishing cyberincident* email virus*

  9. Thomson Reuters (formerly ISI) has been the authority on citation data for over 50 years. Web of Knowledge 4.0 Arts & HumanitiesCitation Index Social Sciences Citation Index ISI Web of Knowledge Science Citation Index 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 2007 2008 2010 SciSearch Century of Science PC-based citation sets Essential Science Indicators InCites Custom citation projects and national indicators - mainframe PC-based Indicators for journals, nations, institutions Century of Social Science

  10. Citation metrics are only as good as their source Web of Science data have been used in major research evaluation initiatives around the globe for decades. • European Commission: • European Union • Science & Technology Indicators • US National Research Council -- Doctoral Program Ranking • US National Institutes of Health- Electronic Scientific Portfolio Assistant • Times Higher Education world university ranking • Academic Ranking of World Universities (Shanghai Jiao Tong University) • Government bodies in all major countries. • US National Science Foundation Science & Engineering Indicators

  11. Web of Science- the first and largest citation index Selectivity and control of content- high, consistent standards 11,500+ journals and 716 million+ cited references Multidisciplinary- Science, Social Science, Arts/Humanities Depth- 100+ years- including cited references Consistency and reliability- ideal for research evaluation e.g. field averages Unmatched expertise- 40+ years of citation analysis and research evaluation Conference Proceedings- 12,000 conferences annually Funding acknowledgments The gold standard-used by over 3,200 institutions in more than 90 countries

  12. Publication and citation trend- cybersecurityTotal articles: 8,620 (2000-2009) Output increased steadily until 2006. Citations annually continue to grow for the collective population. # citations # publications

  13. Breakdown by Web of Science journal category: cybersecurity is multidisciplinary

  14. Analyze the global output in cybersecurity research Percentage of articles by country of authorship

  15. High-impact US institutions

  16. Trace the impact of cybersecurity research through citation maps Cavusoglu H, Mishra B, Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce. (9), 1, 69-104. 2004. This paper on e-commerce has been cited by articles from a variety of fields

  17. Where is this research being published?

  18. What journals focus on this topic? IEEE Transactions on Information Forensics and Security  Journal metrics, such as journal impact factor, help to identify the high impact journals in this subject area.

  19. Number of Articles by funding body acknowledged (2008-present)

  20. RESEARCH GRANT PRINCIPAL INVESTIGATOR RESULTING PUBLICATIONS Air Force grant F306020110146 awarded on 6/11/2002 for $200k S. Forrest University of New Mexico Computer Science Dept. Technological networks and the spread of computer viruses - SCIENCE Protecting data privacy through hard-to-reverse negative databases - IS, PROCEEDINGS Citations: 1st gen. 38 – 2nd gen. 463 Citations: 2 - 0 Example network map: topics represented by the papers associated with this grant (including first and second generation citations) Scaling theory for information networks - JOURNAL OF THE ROYAL SOCIETY INTERFACE Citations: 1 - 0 Negative representations of information - INTERNATIONAL JOURNAL OF INFORMATION SECURITY Citations: 0 - 0 Automatic Program Repair with Evolutionary Computation - COMMUNICATIONS OF THE ACM Citations: 0 - 0 A machine learning evaluation of an artificial immune system - EVOLUTIONARY COMPUTATION Citations: 7 - 14 Computer immunology - IMMUNOLOGICAL REVIEWS Citations: 11 - 30

  21. Cybersecurity-related conference proceedings: telecommunications The volume of research on this topic was on the rise until 2008.  Since then, the number of papers has decreased, and the total number of citations has plateaued.

  22. Find experts and collect competitive intelligence • Relatively low level of co-authorship in this field • Also, low average number of papers per author: approx 1.5 papers per author name

  23. The highly cited authors in this dataset are not the most prolific in this field

  24. Find experts and gather competitive intelligence Pastor-Satorras, R authored the most highly cited paper in the dataset: Pastor-Satorras R, Vespignani A.,Epidemic spreading in scale-free networks. Physical Review Letters, (86), 14. 3200-3203. April 2, 2001. This paper has been cited 689 times. Indirect, long- term impact. This paper has been cited over 42 times above the expected rate of citation for this category. (689 cites/16.27expected cites) This paper ranks in the top 0.07% of 2001 physics, multidisciplinary papers This paper has been cited over 14 times above the expected rate of citation for this journal. (689 cites/47.21) expected cites.

  25. A cybersecurity sub-topic- biometrics“automated methods of recognizing an individual based on measuring biological (anatomical or physiological) and behavioral characteristics”- Biometrics.gov The output in this subfield has been steadily increasing.

  26. A cybersecurity sub-topic- biometrics The research is being done across many diverse institutions, with few clear centers of concentration What institutions are working on this area?

  27. A cybersecurity sub-topic- biometricsLow levels of collaboration The greatest number of co-authored papers by any two organizations is two.

  28. Furnell, SM authored the most papers on biometrics (Univ Plymouth, UK) Mean percentile: on average, Furnell’s papers rank in the top 39% of their respective fields H index: 3 papers have been cited at least 3 times each Self citation analysis: 9.09% of Furnell’s citations are self citations. H index without self citations is 3. Journal actual/expected ratio: Furnell gets cited 163% above average for the journals he publishes in

  29. A cybersecurity sub-topic- biometricsRecent patenting activity

  30. Patents: Importance as a scientific resource The patent system is the most prolific and up-to-date source of information on applied technology. Patents contain detailed technical information which often cannot be found anywhere else: up to 80% of current technical knowledge can only be found in patent documents. Moreover, this information is rapidly available, as most patent applications are published 18 months after the first filing, irrespective of their country of origin. Why researchers should care about patents European Commission and the European Patent Office 2007

  31. Derwent Innovations Index • 16.3 million inventions accounting for over 33 million patents • Coverage of 41 world patent-issuing authorities • Coverage depth back to 1966, updated weekly • Over 1.5 million patent documents added each year • Provides both general key-term and cited patent searching • Cross-searchable with other Web of Knowledge resources, such as Web of Science – enabling one to search against patent, journal, and conference literature simultaneously.

  32. Derwent Innovations Index: Value-added informationgreatly improves the ability to retrieve and understand patent information.This value-added information is unavailable within free patent resources. • Descriptive Titles – Original patent titles are re-written and enhanced to provide more detail and make them easier to comprehend. • Detailed Abstracts – Written by Derwent experts and organized into sections such as: • Novelty – New inventions are deliberately buried within patents. The Novelty section, allows the reader to quickly identify what's new in the patent record. • Use – All patented inventions must have an industrial application, i.e. a use. This paragraph covers all the uses (applications) of the invention in terms of its different technology areas. • Advantage – describes all advantages of the new invention over what has been done in the past. • Detailed Description – further details on other claimed technologies.

  33. Derwent Innovations Index: Value-added information Patent Family Records – Grouping of related patents into a family record to illustrate the global coverage of the invention. Patent Assignee Codes – assigned to about 21,000 organizations worldwide, unifying parent companies and subsidiaries. Key Drawings and Images selected and included Derwent Classification and Manual Codes – providing uniform, accurate indexing; enabling precise retrieval for those with more expertise in patent literature.

  34. Analyze the patenting activity on cybersecurity: Derwent value-added information enables non-experts to access IP information Analyze by Derwent class codes-specific subject areas T01 Digital Computers (G06C-F) Electronic data processors, interfaces and programme control. Mechanical digital computers. 32,092 patents matched the search

  35. Drill down by Derwent manual code Manual codes are used to indicate the novel technical aspects of an invention, and also its applications. T01-N02B1B USER PRIVILEGES/PASSWORD SYSTEMS (2002- ) T01-N02A3C SERVERS (2002- )

  36. Who patents most frequently in cybersecurity

  37. This patent’s examiner cited 5 journal articles upon which this technology was built. This patent has been cited by 127 subsequent patents Easily understand the novelty, use, advantage, and description of this patent.

  38. Identifying and Tracking scholars • ResearcherIDhttp://researcherid.com/ • A free, online community where authors: • Create a personalized research profile • Receive a unique identifier to eliminate author misidentification • Increase recognition of their work and exposure for their institution • Facilitate global collaboration among researchers.

  39. ResearcherID profiles with keyword “network security”

  40. ResearcherID profiles with keyword “computer network*”

  41. ScienceWatch.com- free newsletter for tracking bibliometric trends Special topics feature on face recognition http://sciencewatch.com/ana/st/face/ View high impact papers, authors, institutions, countries, and journals on face recognition

  42. ScienceWatch.com- free newsletter for tracking bibliometric trends Co-citation analysis reveals clusters of papers, suggesting emerging research areas. View research front maps

  43. Guidelines for citation analysis Download the white papers at: http://science.thomsonreuters.com/info/bibliometrics/http://isiwebofknowledge.com/media/pdf/UsingBibliometricsinEval_WP.pdf • Compare like with like – The Golden Rule • Use relative measures, not just absolute counts • More applicable to hard sciences than arts/humanities • Know your data parameters: • journal categories • author names • author addresses • time periods • document types • Obtain multiple measures • Recognize skewed nature of citation data • Ask whether the results are reasonable

  44. Thank you Websites for further information Web of Knowledge http://wokinfo.com/ Research Analytics http://researchanalytics.thomsonreuters.com/ Webinars and training http://science.thomsonreuters.com/training/

More Related