The Synergy of Scientometric Analysis and Knowledge Mapping with Topic Models: Modelling the Development Trajectories of Information Security and Cyber-Security Research

2016 ◽  
Vol 15 (04) ◽  
pp. 1650044 ◽  
Author(s):  
Hsia-Ching Chang

An important part of an organisation’s mission is protecting its information assets from inside or outside threats. As the information environment has become more diverse and inclusive, security concern has shifted from information assets resided in the organisation to information assets and networked devices exposed to broader cyberspace, such as cloud or Internet of things environment and mobile Internet. Organisations have to keep up with the knowledge and trends in information security and cyber-security to safeguard their information assets. Knowledge mapping will aid in this sort of knowledge management process. Mandatory standards and government regulations help industries establish best practices in cyber-security. Knowledge mapping and scientometric analysis across disciplines also provide a tracking system to notify researchers and practitioners should the new solutions and technology facilitating threat detection emerge. While various topics in information security and cyber-security have been extensively investigated in academia, identifying salient themes and development trajectories in information security and cyber-security research is relatively unexplored. This study employs scientometric analysis and topic modelling to develop knowledge maps that visualise core concepts associated with information security and cyber-security research over time and across disciplines. With scientometric analysis and knowledge mapping using topic models, this study identifies the commonality, difference, and relationship between information security and cyber-security research domains. This approach could gain insights into how these research areas have evolved and might be improved concerning learning and teaching cyber-security. The proposed approach to developing the knowledge map may be extended to other research areas.

Author(s):  
Donald Murphy ◽  
Manish Gupta ◽  
H.R. Rao

We present five emerging areas in information security that are poised to bring the radical benefits to the information security practice and research. We have selected these five areas based on extensive literature review and emerging trends in information technology and security. This is a theoretical discourse, which considers a number of research issues and paradigms and explores the relevance of some interesting research areas that have far-reaching implications for IS research. The chapter aims to stimulate discussions about the five covered research areas and in doing so responds to the call for information security researchers to be more aware of the research methodological options available to them. For each area, we have provided background and existing research along side rationale on why this area is becoming important and vital in the field of information security research. The chapter introduces five key areas of information security research that are gaining recognition and credibility to significantly aid information security practice.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fayaz Ahmad Loan ◽  
Bashir Bisma ◽  
Nasreen Nahida

Purpose The purpose of the study is to conduct a scientometric analysis of cybersecurity literature indexed in the core collection of the Web of Science for a period of ten years (2011–2020). Design/methodology/approach Cybersecurity is a focused topic of research across the globe. To identify the global research productivity in the field, the terms “cybersecurity, cyber-security, web security, information security, computer security, etc.” were used for retrieving the publications in the advanced search mode of the database “Web of Science”, limiting the time frame for 2011– 2020. The results retrieved were downloaded in the Excel file for further analysis and interpretation. The harvested data was analysed by using scientometric techniques to measure the progress such as growth rate, doubling time and author collaborations. Besides, the Biblioshiny and VOSviewer software were used for mapping networks. Findings The research output in the field of cybersecurity has shown an increasing trend during 2011–2020, and the maximum number of scholarly publications was published in 2020 (1,581), i.e. more than 715% of 2011 (221). A good number of countries (93) have contributed globally in cybersecurity research, and the highest share in research publications was reported by the USA (23.55%), followed by China (23.24%), South Korea (5.31%), UK (5.28%) and India (4.25%). The authorship patterns in cybersecurity publications show a collaborative trend, as most articles have been published by multiple authors. Total 5,532 (90.14%) articles have been published in co-authorship, whereas only 605 (9.86%) articles have been published by single authors. Keyword analysis shows that the most common keyword research by the authors is cybersecurity and its variants such as “cyber security” and “cyber-security” (1,698) followed by security (782), computer security (680) and information security (329). Research limitations/implications The database studied for the work does not represent the total literary output available on the theme. There are plenty of other databases, such as Scopus, Compendex, INSPEC, IEEE Xplore, arXiv, contributing to the same theme as well. Practical implications The findings of the study may help researchers, information technologists, library professionals and information specialists to identify the research progress, authorship patterns, collaborative networks and hot topics of research in the field of cybersecurity. Besides, it will assess the global response to the cybersecurity issue. Originality/value The study is the scientometric analysis of the cybersecurity based on current literature and will highlight the progress and development of global research in the said field.


Author(s):  
Judith Barlaan

Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.


2019 ◽  
Author(s):  
Zhigang Cui ◽  
Zhihua Yin ◽  
Lei Cui

BACKGROUND Background:H19 gene is maternally expressed imprinted oncofetal gene. This study aimed to explore distribution pattern and intellectual structure of H19 in cancer. OBJECTIVE Published scientific 826 papers related to H19 from Jan 1st, 2000 to March 22st, 2019 were obtained from the Web of Science core collection. METHODS We performed extraction of keywords and co-word matrix construction using BICOMB software. Then gCLUTO software, ucinet, excel software, Citespace, Vosviewer were successfully used for double -cluster analysis, social network analysis, Strategic coordinate analysis, co-citation analysis, and journal analysis. RESULTS We analyzed the distributions of included article of H19, identified 34 high-frequency keywords and classified them into 6 categories. Through co-word analysis and co-citation analysis for these categories, we identified the hotspot areas and intellectual basis about H19 in cancer research. Then the prospects of hotspots and their associations were accesssed by strategic coordinate diagrams and social network diagrams. CONCLUSIONS 6 research categories of 34 high-frequency keywords could represent the theme trends on H19 to some extent. Mir-675, cancer metastasis and risk, Wnt/β-catenin signaling pathway, SNP, and ceRNA network were core and mature research areas in this field. There is a lack of promising areas of H19 research. Matouk(2006) article play a key role in H19 research, and Murphy SK(2006)and Luo M(2013) articles serve knowledge transmission as pivotal study.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.


Sign in / Sign up

Export Citation Format

Share Document