Mapping the Cybersecurity Research: A Comprehensive Bibliometric Analysis

Authors

DOI:

https://doi.org/10.52756/ijerr.2024.v46.016

Keywords:

Artificial intelligence, Bibliometric analysis, Cyber security, Cyber threat, Technology

Abstract

The present study conducted a bibliometric analysis to synthesise available literature on cybersecurity. The analysis identifies prolific authors, relevant sources, affiliations, nations, trend topics, publication trends, themes, and collaboration patterns among countries.  Scopus database was searched using the keyword “cyber security” and the search resulted in 31,852 articles. After the inclusion and exclusion criteria, a total of 733 documents were extracted in a CSV format for analysis. The Biblioshiny web tool of the R-package was used for analysis. The finding shows an exponential rise in scholarly work on cybersecurity. “Information and computer security” is identified as the most relevant source.  Chen H has published most articles and the USA leads the field in terms of publication, global citations, and collaboration with other countries. The trend topics and themes have also been listed.  The study would help readers understand the landscape of cybersecurity research, identify key contributors, and guide them in addressing the challenges posed by cyber threats.

References

Alec Cram, W., D’Arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance. MIS Quarterly: Management Information Systems, 43(2). https://doi.org/10.25300/MISQ/2019/15117

Alkatheiri, M. S., Chauhdary, S. H., & Alqarni, M. A. (2021). Seamless security apprise method for improving the reliability of sustainable energy-based smart home applications. Sustainable Energy Technologies and Assessments, 45. https://doi.org/10.1016/j.seta.2021.101219

Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2019). Towards Industry 4.0: Mapping digital technologies for supply chain management-marketing integration. Business Process Management Journal, 25(2). https://doi.org/10.1108/BPMJ-04-2017-0088

Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4). https://doi.org/10.1016/j.joi.2017.08.007

Aslam, J., Saleem, A., Khan, N. T., & Kim, Y. B. (2021). Factors influencing blockchain adoption in supply chain management practices: A study based on the oil industry. Journal of Innovation and Knowledge, 6(2). https://doi.org/10.1016/j.jik.2021.01.002

Awasthi, A., & Goel, N. (2024). An Approach for Efficient and Accurate Phishing Website Prediction Using Improved ML Classifier Performance for Feature Selection. International Journal of Experimental Research and Review, 40(Spl Volume), 73-89. https://doi.org/10.52756/ijerr.2024.v40spl.006

Chetry, A., & Sharma, U. (2023). Anonymity in decentralized apps: Study of implications for cybercrime investigations. Int. J. Exp. Res. Rev., 32, 195-205. https://doi.org/10.52756/ijerr.2023.v32.017

Computer Security Handbook. (2012). In Computer Security Handbook. https://doi.org/10.1002/9781118851678

Dwivedi, Y. K., Hughes, D. L., Coombs, C., Constantiou, I., Duan, Y., Edwards, J. S., … Upadhyay, N. (2020). Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life. International Journal of Information Management, 55. https://doi.org/10.1016/j.ijinfomgt.2020.102211

Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision Support Systems, 86. https://doi.org/10.1016/j.dss.2016.02.012

Gal-Or, E., & Chose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2). https://doi.org/10.1287/isre.1050.0053

Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6). https://doi.org/10.1016/j.jaccpubpol.2003.09.001

Heradio, R., De La Torre, L., Galan, D., Cabrerizo, F. J., Herrera-Viedma, E., & Dormido, S. (2016). Virtual and remote labs in education: A bibliometric analysis. Computers and Education, 98. https://doi.org/10.1016/j.compedu.2016.03.010

ITU. (2015). Global Cybersecurity Index & Cyberwellness Profiles. In 4. Lain-Lain.

Jha, K., Jain, A., & Srivastava, S. (2024). A Secure Biometric-Based User Authentication Scheme for Cyber-Physical Systems in Healthcare. International Journal of Experimental Research and Review, 39(Spl Volume), 154-169. https://doi.org/10.52756/ijerr.2024.v39spl.012

Jones, R. W. (1997). International Telecommunication Union. IEEE Antennas and Propagation Society, AP-S International Symposium (Digest), 2. https://doi.org/10.1386/jdtv.1.3.367_7

Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University - Computer and Information Sciences, Vol. 34. https://doi.org/10.1016/j.jksuci.2021.01.018

Krishnasamy, V., & Venkatachalam, S. (2021). An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm. Materials Today: Proceedings, 81(2). https://doi.org/10.1016/j.matpr.2021.04.303

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10). https://doi.org/10.1016/j.telpol.2017.09.003

Kumar, B. S., & Ravi, V. (2016). A survey of the applications of text mining in financial domain. Knowledge-Based Systems, 114. https://doi.org/10.1016/j.knosys.2016.10.003

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7. https://doi.org/10.1016/j.egyr.2021.08.126

Maglaras, L., Ferrag, M. A., Derhab, A., Mukherjee, M., & Janicke, H. (2019). Cyber Security: From Regulations and Policies to Practice. Springer Proceedings in Business and Economics. https://doi.org/10.1007/978-3-030-12453-3_88

Ogbanufe, O. (2021). Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Computers and Security, 108. https://doi.org/10.1016/j.cose.2021.102340

Parkinson, S., Ward, P., Wilson, K., & Miller, J. (2017). Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Transactions on Intelligent Transportation Systems, 18(11). https://doi.org/10.1109/TITS.2017.2665968

Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013). Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. Proceedings - 2013 11th International Symposium on Autonomous Decentralized Systems, ISADS 2013. https://doi.org/10.1109/ISADS.2013.6513420

Roy, M., Chowdhury, C., & Aslam, N. (2019). Security and privacy issues in wireless sensor and body area networks. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms. https://doi.org/10.1007/978-3-030-22277-2_7

Smit, D. M. (2015). Cyberbullying in South African and American schools: A legal comparative study. South African Journal of Education, 35(2). https://doi.org/10.15700/saje.v35n2a1076

Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2016). An Investigation on Cyber Security Threats and Security Models. Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015. https://doi.org/10.1109/CSCloud.2015.71

Yin, H. H. S., Langenheldt, K., Harlev, M., Mukkamala, R. R., & Vatrapu, R. (2019). Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain. Journal of Management Information Systems, 36(1). https://doi.org/10.1080/07421222.2018.1550550

Zhang, J. (2021). Distributed network security framework of energy internet based on internet of things. Sustainable Energy Technologies and Assessments, 44. https://doi.org/10.1016/j.seta.2021.101051

Published

2024-12-30

How to Cite

Khurana, P., Narula, S., Tiwari, N., Kapoor, R., & Arora, M. (2024). Mapping the Cybersecurity Research: A Comprehensive Bibliometric Analysis. International Journal of Experimental Research and Review, 46, 202–211. https://doi.org/10.52756/ijerr.2024.v46.016

Issue

Section

Articles

Most read articles by the same author(s)