Research Landscape of Cybersecurity: A Bibliometric and Network Visualization Analysis
DOI:
https://doi.org/10.58812/jmws.v5i04.3344Kata Kunci:
Cybersecurity, Bibliometric Analysis, Network Visualization, Co-Authorship, ScopusAbstrak
The objectives of this research paper are to explore and analyze the research landscape concerning the issues of cybersecurity via application of bibliometric tools and network analysis visualization. Data for analysis was obtained from the Scopus database and analyzed using VOSviewer to evaluate research collaboration patterns, the most prominent papers in the field, and thematic development of research issues in cybernetics. This work will consider the patterns of collaboration among the authors who conducted research in cybersecurity and the citation and co-word occurrences as well. Based on the results obtained, it is possible to say that the field of cybersecurity is very interdisciplinary and geographically diverse. Such countries as the USA and China provide the major part of research in the field. Concerning the thematic patterns identified, it should be noted that although some traditional themes like information security and risk assessments prevail, new trends of integration of cybersecurity with the use of artificial intelligence and Internet of Things become rather popular. Moreover, growing attention is paid to human and organizational aspects related to cybersecurity (decision-making and cybersecurity education).
Referensi
Alom, M. Z., Taha, T. M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M. S., Hasan, M., Van Essen, B. C., Awwal, A. A. S., & Asari, V. K. (2019). A state-of-the-art survey on deep learning theory and architectures. Electronics, 8(3), 292.
Alzubaidi, L., Zhang, J., Humaidi, A. J., Al-Dujaili, A., Duan, Y., Al-Shamma, O., Santamaría, J., Fadhel, M. A., Al-Amidie, M., & Farhan, L. (2021). Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. Journal of Big Data, 8(1), 53.
Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2154–2156.
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165.
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133, 285–296.
Fischer, E. A. (2014). Cybersecurity issues and challenges: In brief. Congressional Research Service Washington, DC, USA.
Gupta, M., Akiri, C., Aryal, K., Parker, E., & Praharaj, L. (2023). From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access, 11, 80218–80245.
Hassan, M. A., & Shukur, Z. (2019). Review of digital wallet requirements. 2019 International Conference on Cybersecurity (ICoCSec), 43–48.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Nishant, R., Kennedy, M., & Corbett, J. (2020). Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda. International Journal of Information Management, 53, 102104.
Partadiredja, R. A., Serrano, C. E., & Ljubenkov, D. (2020). AI or human: the socio-ethical implications of AI-generated media content. 2020 13th CMI Conference on Cybersecurity and Privacy (CMI)-Digital Transformation-Potentials and Challenges (51275), 1–6.
Pina Taylor, L. (2023). Raising Cybersecurity Awareness and improving Organizational Resilience in the Critical Infrastructure Sector.
Sallam, M. (2023). ChatGPT utility in healthcare education, research, and practice: systematic review on the promising perspectives and valid concerns. Healthcare, 11(6), 887.
Sarker, I. H. (2021a). Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Computer Science, 2(6), 1–20.
Sarker, I. H. (2021b). Machine learning: Algorithms, real-world applications and research directions. SN Computer Science, 2(3), 160.
Sindiramutty, S. R., Jhanjhi, N. Z., Tan, C. E., Khan, N. A., Gharib, A. H., & Yun, K. J. (2024). Applications of blockchain technology in supply chain management. In Cybersecurity Measures for Logistics Industry Framework (pp. 248–304). IGI Global.
Sood, S., & Kim, A. (2023). The Golden Age of the Big Data Audit: Agile Practices and Innovations for E-Commerce, Post-Quantum Cryptography, Psychosocial Hazards, Artificial Intelligence Algorithm Audits, and Deepfakes. International Journal of Innovation and Economic Development, 9(2), 7–23. https://doi.org/10.18775/ijied.1849-7551-7020.2015.92.2001
Sridhar, S., Hahn, A., & Govindarasu, M. (2011). Cyber–physical system security for the electric power grid. Proceedings of the IEEE, 100(1), 210–224.
Ten, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4), 853–865.
Van Eck, N. J., & Waltman, L. (2014). Visualizing bibliometric networks. In Measuring scholarly impact: Methods and practice (pp. 285–320). Springer.
Wang, Z., Wu, H., Burr, G. W., Hwang, C. S., Wang, K. L., Xia, Q., & Yang, J. J. (2020). Resistive switching materials for information processing. Nature Reviews Materials, 5(3), 173–195.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Loso Judijanto

Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.










