How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data

How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data

The aim of this study is to discover the research trends in the field of cyber security with performance analysis and to reveal the intellectual structure of the field of cyber security with scientific mapping. For this purpose, articles published in the field of cyber security between 1998-2021 in the WoS database were examined. The research was carried out in accordance with the bibliometric analysis guide. In the data collection phase, 1,631 articles were included in the study by taking into account the criteria determined among 15,781 studies using the PRISMA procedure. R program was used in bibliometric analysis. According to the findings of the study, there has been a significant increase in article productivity in the field of cyber security after 2020. Although IEEE Access is the journal with the highest number of publications in the field, IEEE Transactions on Smart Grid ranks first according to h-index and g-index values. Considering the topics studied according to the years, it is seen that in the first years, issues related to the law such as cybercrime and cyber terrorism were examined, and recently, in addition to these, current technological issues have been included. It is observed that the most effective publication is 'The Internet of Things for Health Care: a Comprehensive Survey' by Islam et al. which examines the security of the Internet of Things in health care, which is also a current issue.

___

  • Abrizah, A., Zainab, A. N., Kiran, K., & Raj, R. G. (2013). LIS journals scientific impact and subject categorization: A comparison between Web of Science and Scopus. Scientometrics, 94(2), 721–740. https://doi.org/10.1007/s11192-012-0813-7
  • Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys Tutorials, 17(4), 2347–2376. https://doi.org/10.1109/COMST.2015.2444095
  • Ali, M. J. (2021). Understanding the ‘g-index’ and the ‘e-index.’ Seminars in Ophthalmology, 36(4), 139–139. https://doi.org/10.1080/08820538.2021.1922975
  • Alnajem, M., Mostafa, M. M., & ElMelegy, A. R. (2021). Mapping the first decade of circular economy research: A bibliometric network analysis. Journal of Industrial and Production Engineering, 38(1), 29–50. https://doi.org/10.1080/21681015.2020.1838632
  • Altarturi, H. H. M., Saadoon, M., & Anuar, N. B. (2020). Cyber parental control: A bibliometric study. Children and Youth Services Review, 116, 105134. https://doi.org/10.1016/j.childyouth.2020.105134
  • Ansari, S., Aslam, T., Poncela, J., Otero, P., & Ansari, A. (2020). Internet of Things-Based Healthcare Applications [Chapter]. IoT Architectures, Models, and Platforms for Smart City Applications; IGI Global. https://doi.org/10.4018/978-1-7998-1253-1.ch001
  • Appio, F. P., Cesaroni, F., & Di Minin, A. (2014). Visualizing the structure and bridges of the intellectual property management and strategy literature: A document co-citation analysis. Scientometrics, 101(1), 623–661. https://doi.org/10.1007/s11192-014-1329-0
  • Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. https://doi.org/10.1016/j.joi.2017.08.007
  • Baker, H. K., Kumar, S., & Pandey, N. (2021). Forty years of the Journal of Futures Markets: A bibliometric overview. Journal of Futures Markets, 41(7), 1027–1054. https://doi.org/10.1002/fut.22211
  • Bradea, I., Delcea, C., & Paun, R. (2015). Healthcare Risk Management Analysis–A Bibliometric Approach. Journal of Eastern Europe Research in Business & Economics, 2015. https://doi.org/10.5171/2015.169472
  • Calvillo-Arbizu, J., Román-Martínez, I., & Reina-Tosina, J. (2021). Internet of things in health: Requirements, issues, and gaps. Computer Methods and Programs in Biomedicine, 208, 106231. https://doi.org/10.1016/j.cmpb.2021.106231
  • Choi, H., & Varian, H. (2012). Predicting the present with Google Trends. Economic record, 88, 2-9. https://doi.org/10.1111/j.1475-4932.2012.00809.x
  • Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011). An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field. Journal of Informetrics, 5(1), 146–166. https://doi.org/10.1016/j.joi.2010.10.002
  • Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133, 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070
  • Egghe, L. (2006). Theory and practise of the g-index. Scientometrics, 69(1), 131–152. https://doi.org/10.1007/s11192-006-0144-7
  • Firdaus, A., Razak, M. F. A., Feizollah, A., Hashem, I. A. T., Hazim, M., & Anuar, N. B. (2019). The rise of “blockchain”: Bibliometric analysis of blockchain study. Scientometrics, 120(3), 1289–1331. https://doi.org/10.1007/s11192-019-03170-4
  • Gill, J., Okere, I., Haddadpajouh, H., & Dehghantanha, A. (2018). Mobile Forensics: A Bibliometric Analysis. In Advances in Information Security (pp. 297–310). https://doi.org/10.1007/978-3-319-73951-9_15
  • Ho, H. T. N., & Luong, H. T. (2022). Research trends in cybercrime victimization during 2010–2020: A bibliometric analysis. SN Social Sciences, 2(1), 4. https://doi.org/10.1007/s43545-021-00305-4
  • CISA. (n.d.). Retrieved March 4, 2022, from https://www.cisa.gov/ How cybercriminals prey on victims of natural disasters. (2018, September 14). Journal of Accountancy. https://www.journalofaccountancy.com/news/2018/sep/cyber-criminals-prey-on-natural-disaster-victims-201819720.html
  • Islam, S. M. R., Kwak, D., Kabir, MD. H., Hossain, M., & Kwak, K.-S. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678–708. https://doi.org/10.1109/ACCESS.2015.2437951
  • Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research, 21, e12644. https://doi.org/10.2196/jmir.12644
  • Kasemodel, M.-G. C., Makishi, F., Souza, R. C., & Silva, V.-L. (2016). Following the trail of crumbs: A bibliometric study on consumer behavior in the Food Science and Technology field. International Journal of Food Studies, 5(1), Article 1. https://doi.org/10.7455/ijfs/5.1.2016.a7
  • Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248. https://doi.org/10.1016/j.cose.2021.102248
  • Leung, X. Y., Sun, J., & Bai, B. (2017). Bibliometrics of social media research: A co-citation and co-word analysis. International Journal of Hospitality Management, 66, 35–45. https://doi.org/10.1016/j.ijhm.2017.06.012
  • Li, J. X. (2017). Cyber Crime And Legal Countermeasures: A Historical Analysis. https://doi.org/10.5281/ZENODO.1034658
  • Martí‐Parreño, J., Méndez‐Ibáñez, E., & Alonso‐Arroyo, A. (2016). The use of gamification in education: a bibliometric and text mining analysis. Journal of computer assisted learning, 32(6), 663-676. https://doi.org/10.1111/jcal.12161
  • Mingers, J., & Leydesdorff, L. (2015). A review of theory and practice in scientometrics. European Journal of Operational Research, 246(1), 1–19. https://doi.org/10.1016/j.ejor.2015.04.002
  • Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & and the PRISMA Group. (2009). Reprint—Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. Physical Therapy, 89(9), 873–880. https://doi.org/10.1093/ptj/89.9.873
  • Mongeon, P., & Paul-Hus, A. (2016). The journal coverage of Web of Science and Scopus: A comparative analysis. Scientometrics, 106(1), 213–228. https://doi.org/10.1007/s11192-015-1765-5
  • Quayyum, F., Cruzes, D. S., & Jaccheri, L. (2021). Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction, 30, 100343. https://doi.org/10.1016/j.ijcci.2021.100343
  • Ramos-Rodríguez, A.-R., & Ruíz-Navarro, J. (2004). Changes in the intellectual structure of strategic management research: A bibliometric study of the Strategic Management Journal, 1980–2000. Strategic Management Journal, 25(10), 981–1004. https://doi.org/10.1002/smj.397
  • Razak, M. F. A., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76. https://doi.org/10.1016/j.jnca.2016.08.022
  • Samhale, K. (2022). The impact of trust in the internet of things for health on user engagement. Digital Business, 2(1), 100021. https://doi.org/10.1016/j.digbus.2022.100021
  • Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law, 12, 53. https://doi.org/10.15394/jdfsl.2017.1476
  • Serafin Plasencia, M., Garcia-Vargas, G., García-Chitiva, M., Caicedo, M., & Correa, J. C. (2018). Cyberbehavior: A Bibliometric Analysis. https://doi.org/10.31234/osf.io/prfcw
  • Siber güvenlik. (n.d.). ITU. Retrieved January 26, 2022, from https://www.itu.int:443/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx
  • Sule, M.-J., Zennaro, M., & Thomas, G. (2021). Cybersecurity through the lens of Digital Identity and Data Protection: Issues and Trends. Technology in Society, 67, 101734. https://doi.org/10.1016/j.techsoc.2021.101734
  • Suryotrisongko, H., & Musashi, Y. (2019). Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective. 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), 162–167. https://doi.org/10.1109/SOCA.2019.00031
  • Tam, T., Rao, A., & Hall, J. (2021). The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses. Computers & Security, 109, 102385. https://doi.org/10.1016/j.cose.2021.102385
  • Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review. British Journal of Management, 14(3), 207–222. https://doi.org/10.1111/1467-8551.00375
  • TÜİK Kurumsal. (n.d.). Retrieved January 26, 2022, from https://data.tuik.gov.tr/Bulten/Index?p=Hanehalki-Bilisim-Teknolojileri-(BT)-Kullanim-Arastirmasi-2018-27819
  • Waltman, L. (2016). A review of the literature on citation impact indicators. Journal of Informetrics, 10(2), 365–391. https://doi.org/10.1016/j.joi.2016.02.007
  • Williams, C. M., Chaturvedi, R., & Chakravarthy, K. (2020). Cybersecurity Risks in a Pandemic. Journal of Medical Internet Research, 22(9), e23692. https://doi.org/10.2196/23692
  • Zheng, X., Le, Y., Chan, A. P. C., Hu, Y., & Li, Y. (2016). Review of the application of social network analysis (SNA) in construction project management research. International Journal of Project Management, 34(7), 1214–1225. https://doi.org/10.1016/j.ijproman.2016.06.005