Skip to main content
Log in

International journal of information security: a bibliometric study, 2007–2023

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

The dataset analyzed during the current study is available in the Web of Science core collection citation index database. Specific data included herein are derived from Clarivate Web of Science. © Copyright Clarivate 2023. All rights reserved. This data is available through the Web of Science platform, requiring access through a paid service available individually or through an organization.

Notes

  1. https://www.springer.com/journal/10207/aims-and-scope

  2. https://clarivate.com/products/scientific-and-academic-research/research-discovery-and-workflow-solutions/webofscience-platform/

  3. https://www.vosviewer.com/

  4. https://csrc.nist.gov/Projects/access-control-policy-and-implementation-guides

  5. https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  6. https://www.ibm.com/reports/data-breach

References

  1. Shiau, W.-L., Wang, X., Zheng, F.: What are the trend and core knowledge of information security? A citation and co-citation analysis. Inf. Manage. 60(3), 103774 (2023)

    Article  Google Scholar 

  2. Singh, N., Krishnaswamy, V., Zhang, J.Z.: Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 17(6), 1–25 (2022)

    Google Scholar 

  3. Olijnyk, N.V.: A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015. Scientometrics 105(2), 883–904 (2015)

    Article  Google Scholar 

  4. Von Solms S. The 5 waves of information security–from Kristian Beckman to the present. In: Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings 25, Springer. pp. 1–8 (2010)

  5. Von Solms, B.: Information security–the fourth wave. Comput. Secur. 25(3), 165–168 (2006)

    Article  Google Scholar 

  6. von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013). https://doi.org/10.1016/j.cose.2013.04.004

    Article  Google Scholar 

  7. Moral-Muñoz J.A., Herrera-Viedma E., Santisteban-Espejo A., Cobo M.J. Software tools for conducting bibliometric analysis in science: an up-to-date review. Prof. Inf. 29(1), (2020)

  8. Donthu, N., Kumar, S., Pandey, N., Gupta, P.: Forty years of the international journal of information management: a bibliometric analysis. Int. J. Inf. Manag. 57, 102307 (2021)

    Article  Google Scholar 

  9. Dwivedi, Y.K., Lal, B., Mustafee, N., Williams, M.D.: Profiling a decade of information systems frontiers’ research. Inf. Syst. Front. 11, 87–102 (2009)

    Article  Google Scholar 

  10. Beydoun, G., Abedin, B., Merigó, J.M., Vera, M.: Twenty years of information systems frontiers. Inf. Syst. Front. 21, 485–494 (2019)

    Article  Google Scholar 

  11. Abedin, B., Jafarzadeh, H., Olszak, C.M.: Thirty six years of information systems management: a bibliometric and thematic analysis. Inf. Syst. Manag. 38(2), 151–164 (2021)

    Article  Google Scholar 

  12. Ramos-Rodríguez, A.-R., Ruíz-Navarro, J.: Changes in the intellectual structure of strategic management research: a bibliometric study of the strategic management journal, 1980–2000. Strateg. Manag. J. 25(10), 981–1004 (2004)

    Article  Google Scholar 

  13. Nerur, S.P., Rasheed, A.A., Natarajan, V.: The intellectual structure of the strategic management field: an author co-citation analysis. Strateg. Manag. J. 29(3), 319–336 (2008)

    Article  Google Scholar 

  14. Donthu, N., Kumar Badhotiya, G., Kumar, S., Soni, G., Pandey, N.: A retrospective overview of journal of enterprise information management using bibliometric analysis. J. Enterp. Inf. Manag. 35(2), 504–529 (2022)

    Article  Google Scholar 

  15. Dwivedi, Y.K., Mustafee, N.: Profiling research published in the journal of enterprise information management (JEIM). J. Enterp. Inf. Manag 23(1), 8–26 (2010)

    Article  Google Scholar 

  16. La Paz, A., Merigó, J.M., Powell, P., Ramaprasad, A., Syn, T.: Twenty-five years of the information systems journal: a bibliometric and ontological overview. Inf. Syst. J. 30(3), 431–457 (2020)

    Article  Google Scholar 

  17. Dwivedi, Y.K., Kuljis, J.: Profile of IS research published in the European journal of information systems. Eur. J. Inf. Syst. 17(6), 678–693 (2008)

    Article  Google Scholar 

  18. Cobo, M.J., Martínez, M.-Á., Gutiérrez-Salcedo, M., Fujita, H., Herrera-Viedma, E.: 25 years at knowledge-based systems a bibliometric analysis. Knowl.-Based Syst. 80, 3–13 (2015)

    Article  Google Scholar 

  19. Claver, E., González, R., Llopis, J.: An analysis of research in information systems (1981–1997). Inf. Manage. 37(4), 181–195 (2000)

    Article  Google Scholar 

  20. Palvia, P., Pinjani, P., Sibley, E.H.: A profile of information systems research published in information & management. Inf. Manage. 44(1), 11 (2007)

    Article  Google Scholar 

  21. Dwivedi, Y.K., Kiang, M., Williams, M.D., Lal, B.: Profiling electronic commerce research published in the journal of electronic commerce research. J. Electron. Commer. Res. 9(2), 77–91 (2008)

    Google Scholar 

  22. Gaviria-Marin, M., Merigo, J.M., Popa, S.: Twenty years of the journal of knowledge management: a bibliometric analysis. J. Knowl. Manag. 22(8), 1655–1687 (2018)

    Article  Google Scholar 

  23. Laengle, S., et al.: Forty years of the European journal of operational research: a bibliometric overview. Eur. J. Oper. Res. 262(3), 803–816 (2017)

    Article  Google Scholar 

  24. Martínez-López, F.J., Merigó, J.M., Valenzuela-Fernández, L., Nicolás, C.: Fifty years of the European journal of marketing: a bibliometric analysis. Eur. J. Mark. 52(1/2), 439–468 (2018)

    Article  Google Scholar 

  25. Yu, D., Xu, Z., Fujita, H.: Bibliometric analysis on the evolution of applied intelligence. Appl. Intell. 49, 449–462 (2019)

    Article  Google Scholar 

  26. Mohanty B. Management information systems quarterly (MISQ): a bibliometric study. Libr. Philos. Pract. p. 0-1 (2014)

  27. Merigó, J.M., Pedrycz, W., Weber, R., de la Sotta, C.: Fifty years of information sciences: a bibliometric overview. Inf. Sci. 432, 245–268 (2018)

    Article  MathSciNet  Google Scholar 

  28. Calabretta, G., Durisin, B., Ogliengo, M.: Uncovering the intellectual structure of research in business ethics: a journey through the history, the classics, and the pillars of journal of business ethics. J. Bus. Ethics 104, 499–524 (2011)

    Article  Google Scholar 

  29. Sharma, A., Koohang, A., Rana, N.P., Abed, S.S., Dwivedi, Y.K.: Journal of computer information systems: intellectual and conceptual structure. J. Comput. Inf. Syst. 63(1), 1–31 (2022)

    Google Scholar 

  30. Yu, D., Xu, Z., Kao, Y., Lin, C.-T.: The structure and citation landscape of IEEE transactions on fuzzy systems (1994–2015). IEEE Trans. Fuzzy Syst. 26(2), 430–442 (2017)

    Article  Google Scholar 

  31. Agarwal, R.: On the intellectual structure and evolution of ISR. Inf. Syst. Res. 27(3), 471–477 (2016)

    Article  MathSciNet  Google Scholar 

  32. Hoffman, D.L., Holbrook, M.B.: The intellectual structure of consumer research: a bibliometric study of author cocitations in the first 15 years of the journal of consumer research. J. Consum. Res. 19(4), 505–517 (1993)

    Article  Google Scholar 

  33. Wang, X., Bendle, N.T., Mai, F., Cotte, J.: The journal of consumer research at 40: a historical analysis. J. Consum. Res. 42(1), 5–18 (2015)

    Article  Google Scholar 

  34. Blei, D.M.: Probabilistic topic models. Commun. ACM 55(4), 77–84 (2012)

    Article  Google Scholar 

  35. Roberts, M.E., et al.: Structural topic models for open-ended survey responses. Am. J. Polit. Sci. 58(4), 1064–1082 (2014)

    Article  Google Scholar 

  36. Basin, D.: The cyber security body of knowledge. Univ. Bristol Ch Form. Methods Secur, VersionOnline (2021)

    Google Scholar 

  37. Pritchard, A.: Statistical bibliography or bibliometrics. J. Doc. 25, 348 (1969)

    Google Scholar 

  38. Lawani, S.M.: Bibliometrics: its theoretical foundations, methods and applications. Libri 31, 294–315 (1981)

    Article  Google Scholar 

  39. Broadus, R.N.: Toward a definition of ‘bibliometrics.’ Scientometrics 12, 373–379 (1987)

    Article  Google Scholar 

  40. Tague-Sutcliffe, J.: An introduction to informetrics. Inf. Process. Manag. 28(1), 1–3 (1992)

    Article  Google Scholar 

  41. Hood, W.W., Wilson, C.S.: The literature of bibliometrics, scientometrics, and informetrics. Scientometrics 52, 291–314 (2001)

    Article  Google Scholar 

  42. Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 133, 285–296 (2021)

    Article  Google Scholar 

  43. Culnan M. J. Mapping the intellectual structure of MIS, 1980–1985: a co-citation analysis. Mis Q., pp. 341–353 (1987)

  44. Kessler, M.M.: Bibliographic coupling between scientific papers. Am. Doc. 14(1), 10–25 (1963)

    Article  Google Scholar 

  45. Small, H.: Co-citation in the scientific literature: a new measure of the relationship between two documents. J. Am. Soc. Inf. Sci. 24(4), 265–269 (1973)

    Article  Google Scholar 

  46. Brooks, J., McCluskey, S., Turley, E., King, N.: The utility of template analysis in qualitative psychology research. Qual. Res. Psychol. 12(2), 202–222 (2015)

    Article  Google Scholar 

  47. King, N.: Doing template analysis. Qual. Organ. Res. Core Methods Curr. Chall. 426, 426–450 (2012)

    Google Scholar 

  48. Callon, M., Courtial, J.P., Laville, F.: Co-word analysis as a tool for describing the network of interactions between basic and technological research: the case of polymer chemsitry. Scientometrics 22, 155–205 (1991)

    Article  Google Scholar 

  49. Fiala, D., Tutoky, G.: Computer science papers in web of science: a bibliometric analysis. Publications 5(4), 23 (2017)

    Article  Google Scholar 

  50. Franceschet, M.: The skewness of computer science. Inf. Process. Manag. 47(1), 117–124 (2011)

    Article  Google Scholar 

  51. N. J. van Eck and L. Waltman, (2013) “VOSviewer manual,” Leiden Univeristeit Leiden, vol. 1, no. 1,

  52. King N., Brooks J., Tabari S. Template analysis in business and management research. Qual. Methodol. Organ. Stud. Vol. II Methods Possibilities, pp. 179–206 (2018)

  53. van Eck, N., Waltman, L.: Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2), 523–538 (2009)

    Google Scholar 

  54. Swan A. The open access citation advantage: studies and results to date (2010)

  55. Sotudeh, H.: Does open access citation advantage depend on paper topics? J. Inf. Sci. 46(5), 696–709 (2020)

    Article  Google Scholar 

  56. J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, R. L. Tatham, and others, Multivariate data analysis (Vol. 6). Upper Saddle River, NJ: Pearson Prentice Hall, 2006.

  57. Bornmann, L., Schier, H., Marx, W., Daniel, H.-D.: What factors determine citation counts of publications in chemistry besides their quality? J. Informetr. 6(1), 11–18 (2012)

    Article  Google Scholar 

  58. Uddin, S., Khan, A.: The impact of author-selected keywords on citation counts. J. Informetr. 10(4), 1166–1177 (2016)

    Article  Google Scholar 

  59. Leimu, R., Koricheva, J.: What determines the citation frequency of ecological papers? Trends Ecol. Evol. 20(1), 28–32 (2005)

    Article  Google Scholar 

  60. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)

    Article  Google Scholar 

  61. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113–170 (2014)

    Article  Google Scholar 

  62. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6, 1–14 (2007)

    Article  Google Scholar 

  63. Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.: Opacity generalised to transition systems. Int. J. Inf. Secur. 7, 421–435 (2008)

    Article  Google Scholar 

  64. Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487–497 (2015)

    Article  Google Scholar 

  65. Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11, 403–418 (2012)

    Article  Google Scholar 

  66. Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399–422 (2009)

    Article  Google Scholar 

  67. H. J. Smith, T. Dinev, and H. Xu, “Information privacy research: an interdisciplinary review,” MIS Q., pp. 989–1015, 2011.

  68. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM Sigmod Rec. 33(1), 50–57 (2004)

    Article  Google Scholar 

  69. Höne, K., Eloff, J.H.P.: Information security policy—what do international information security standards say? Comput. Secur. 21(5), 402–409 (2002)

    Article  Google Scholar 

  70. Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020)

    Article  Google Scholar 

  71. Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)

    Article  Google Scholar 

  72. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

R.D. is the sole author of the manuscript. All the work carried out - data gathering, data analyses, and manuscript writing - is done by R.D.

Corresponding author

Correspondence to Rahul Dwivedi.

Ethics declarations

Conflict of interest

I confirm that the work presented in this research article is original and has not been published elsewhere, nor is it under consideration for publication elsewhere. Also, we have no conflicts of interest to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dwivedi, R. International journal of information security: a bibliometric study, 2007–2023. Int. J. Inf. Secur. (2024). https://doi.org/10.1007/s10207-024-00840-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10207-024-00840-0

Keywords

Navigation