Mapping the Cybersecurity Research through Bibliometric Analysis
DOI:
https://doi.org/10.58812/wsist.v2i03.1534Keywords:
Cybersecurity, Advanced Technologies, Innovation, Bibliometric AnalysisAbstract
This bibliometric analysis explores the evolution and global landscape of cybersecurity research from 2010 to 2024. Utilizing data sourced exclusively from Scopus and analyzed through VOSviewer, this study identifies significant trends, key themes, and the dynamics of international collaboration within the field. The findings reveal a notable increase in the volume of publications over the years, highlighting a shift from basic security measures towards the integration of advanced technologies such as artificial intelligence, the Internet of Things (IoT), and blockchain. The study also maps the dense network of international collaborations, with the United States, China, India, Germany, and the United Kingdom emerging as central nodes. This analysis not only reflects the increasing complexity of cyber threats but also the global effort to develop proactive and dynamic defense mechanisms. The results emphasize the need for continuous innovation and expanded international cooperation to address the challenges posed by rapidly evolving cyber threats. Future research should consider more interdisciplinary approaches and a wider range of databases to capture the full spectrum of cybersecurity research.
References
S. Sood and A. Kim, “The Golden Age of the Big Data Audit: Agile Practices and Innovations for E-Commerce, Post-Quantum Cryptography, Psychosocial Hazards, Artificial Intelligence Algorithm Audits, and Deepfakes,” Int. J. Innov. Econ. Dev., vol. 9, no. 2, pp. 7–23, 2023, doi: 10.18775/ijied.1849-7551-7020.2015.92.2001.
A. Nelson and S. Wang, “The importance of cybersecurity disclosures in customer relationships,” J. Corp. Account. Financ..
M. Lezzi, M. Lazoi, and A. Corallo, “Cybersecurity for Industry 4.0 in the current literature: A reference framework,” Comput. Ind., vol. 103, pp. 97–110, 2018.
L. Coventry and D. Branley, “Cybersecurity in healthcare: A narrative review of trends, threats and ways forward,” Maturitas, vol. 113, pp. 48–52, 2018.
C. Caddy, “Cybersecurity and Digital Components: Supply Chain Deep Dive Assessment,” USDOE Office of Policy (PO), Washington DC (United States), 2022.
J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” J. Comput. Syst. Sci., vol. 80, no. 5, pp. 973–993, 2014.
Y. Lu and L. Da Xu, “Internet of Things (IoT) cybersecurity research: A review of current research topics,” IEEE Internet Things J., vol. 6, no. 2, pp. 2103–2115, 2018.
C.-W. Ten, G. Manimaran, and C.-C. Liu, “Cybersecurity for critical infrastructures: Attack and defense modeling,” IEEE Trans. Syst. Man, Cybern. A Syst. Humans, vol. 40, no. 4, pp. 853–865, 2010.
A. H. Brown and T. D. Green, The essentials of instructional design: Connecting fundamental principles with process and practice. Routledge, 2019.
N. Kshetri, “Blockchain’s roles in strengthening cybersecurity and protecting privacy,” Telecomm. Policy, vol. 41, no. 10, pp. 1027–1038, 2017.
C. Mavani, H. K. Mistry, R. Patel, and A. Goswami, “The Role of Cybersecurity in Protecting Intellectual Property,” Int. J. Recent Innov. Trends Comput. Commun., vol. 12, no. 2, pp. 529–538, 2024.
L. Pina Taylor, “Raising Cybersecurity Awareness and improving Organizational Resilience in the Critical Infrastructure Sector,” 2023.
Y. Xin et al., “Machine learning and deep learning methods for cybersecurity,” Ieee access, vol. 6, pp. 35365–35381, 2018.
I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” J. Big data, vol. 7, pp. 1–29, 2020.
A. Taeihagh and H. S. M. Lim, “Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks,” Transp. Rev., vol. 39, no. 1, pp. 103–128, 2019.
S. McLaughlin et al., “The cybersecurity landscape in industrial control systems,” Proc. IEEE, vol. 104, no. 5, pp. 1039–1057, 2016.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Loso Judijanto, Endrixs Endrianto , Arnes Yuli Vandika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.