Understanding the Scientific Publication “H” Index, and others

Join Our Mailing List 

How to evaluate the academic performance of individual scientists

[By Dr. David Edward Marcinko MBA]

Dr. MarcinkoThe “h-index” was introduced in 2005 as a metric for estimating “the importance, significance and broad impact of a scientist’s cumulative contributions.” It takes into account both the number of an individual’s publications and their impact on peers, as indicated by citation counts.

Origination

Its creator, Jorge Hirsch (UC-San Diego) asserts that a “successful scientist” will have an h-index of 20 after 20 years; an “outstanding scientist” will have an index of 40 after 20 years; and a “truly unique individual” will have an index of 60 after 20 years or 90 after 30 years. You can read more about it in Nature and PhysicsWeb.

Web of Science

Curious to know your own h-index? You can easily determine it using Web of Science. Select “Science Citation Index Expanded.” Click “General Search” category and search for your name as author (e.g., SMITH J*). Use “Refine Your Results” by Institution to differentiate yourself from other scientists with the same initial(s). (This is an important step, otherwise your publications will be intermingled with unrelated papers and your h-index will be inaccurate.) Click on “Citation Report” in the box on the right side. Your h-index will be calculated automatically.

An alternative method is to sort your citations by “Times Cited”, using sort box on the right side. Scan down the list until the number of the paper exceeds the number of citations to that paper. For example, your h-index is 20 if your 21st paper has been cited 20 or fewer times, but your 20th paper has been cited 20 or more times.

Critique

Although effective and simple, the h-index suffers from some drawbacks that limit its use in accurately and fairly comparing the scientific output of different researchers. These drawbacks include information loss and low resolution: the former refers to the fact that in addition to h2 citations for papers in the h-core, excess citations are completely ignored, whereas the latter means that it is common for a group of researchers to have an identical h-index.

***

Financial Planning MDs 2015

Comprehensive Financial Planning Strategies for Doctors and Advisors: Best Practices from Leading Consultants

***

Fixing the Bias

To solve these problems, Chun-Ting Zhang proposed the “e-index“, where e2 represents the ignored excess citations, in addition to the h2 citations for h-core papers. Citation information can be completely depicted by using the h-index together with the e-index, which are independent of each other. Some other h-type indices, such as a and R, are h-dependent, have information redundancy with h, and therefore, when used together with h, mask the real differences in excess citations of different researchers.

Link: http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0005429

Assessment

Google Scholar is another useful source of citation data.  A.-W. Harzing’s Publish or Perish software is a free application for Windows, Mac OS, and GNU/Linux that uses Google Scholar to compute citation counts, h-indexes, journal impact factors, and many other citation metrics.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct Details

Product Details

Product Details

 Product Details

Product Details

On Healthcare Intranets and Extranets

Join Our Mailing List

A Primer for Physicians and Medical Executives

Dr. Mata

By Richard J. Mata; MD, MS, CMP™ [Hon]

According to the “Dictionary of Heath Information and Technology”,

“An intranet is a private network that uses Internet Protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization’s information or operations with its employees”.

Sometimes the term refers only to the most visible service, the internal website.  The same concepts and technologies of the Internet, such as clients and servers running on the Internet protocol suite, are used to build an intranet.

Uses in Healthcare

An intranet is commonly used to provide communication and application services.  The advantages of using an intranet in the healthcare setting include the following:

  • Medical Workforce productivity: Intranets can help employees quickly find and view information and applications relevant to their roles and responsibilities.  Via a simple-to-use web browser interface, users can access data held in any database the organization wants to make available, anytime and  subject to security provisions — from anywhere, increasing employees’ ability to perform their jobs faster, more accurately, and with confidence that they have the right information.
  • Time: With intranets, healthcare organizations can make more information available to employees on a “pull” basis (i.e., employees can link to relevant information at a time that suits them) rather than being deluged indiscriminately by e-mails.
  • Communication: Intranets can serve as powerful tools for communication within a healthcare organization; vertically and horizontally.

Vulnerability and Security Protection

Intranets, like other IT systems, need to be protected by security systems. Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack.  Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

Multiple Lines of Defense

The first line of defense is a firewall and these are commonly set up using proxy servers, which allow system administrators to track all traffic coming in and out of an intranet. Another layer of sophistication is added by using a bastion server firewall, configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won’t be compromised.

Authentication Systems

Authentication systems are an important part of any intranet security scheme. They are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, fingerprints and iris scans, and various encryption systems.

Protection and Monitoring

Server-based software is used to protect an intranet and its data. Virus-checking software can check every file coming into the intranet to make sure that it is virus-free, and site-blocking software can bar people on the intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access.

Filtering Systems and Routers

One way of ensuring that the wrong people or erroneous data can’t get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet. Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and for teleconferences) or sophisticated corporate directories, sales and customer relationship management (CRM) tools, project management, etc, to advance productivity. Intranets are also being used as Health 2.0 culture change platforms

Metrics

Intranet traffic, like public-facing website traffic, is better understood by using web metrics software to track overall activity, as well as through surveys of users. Intranet User experience, editorial, and technology teams work together to produce in-house sites. Most commonly, intranets are owned by the communications, HR or IT areas of large healthcare organizations, or some combination of the three.

Assessment

When part of an intranet is made accessible to customers, partners, suppliers, patients, or others outside the healthcare organization – that part becomes part of an extranet.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

Product DetailsProduct Details

***