Abstract
This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.
Similar content being viewed by others
Data availability
The dataset analyzed during the current study is available in the Web of Science core collection citation index database. Specific data included herein are derived from Clarivate Web of Science. © Copyright Clarivate 2023. All rights reserved. This data is available through the Web of Science platform, requiring access through a paid service available individually or through an organization.
Notes
References
Shiau, W.-L., Wang, X., Zheng, F.: What are the trend and core knowledge of information security? A citation and co-citation analysis. Inf. Manage. 60(3), 103774 (2023)
Singh, N., Krishnaswamy, V., Zhang, J.Z.: Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 17(6), 1–25 (2022)
Olijnyk, N.V.: A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015. Scientometrics 105(2), 883–904 (2015)
Von Solms S. The 5 waves of information security–from Kristian Beckman to the present. In: Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings 25, Springer. pp. 1–8 (2010)
Von Solms, B.: Information security–the fourth wave. Comput. Secur. 25(3), 165–168 (2006)
von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013). https://doi.org/10.1016/j.cose.2013.04.004
Moral-Muñoz J.A., Herrera-Viedma E., Santisteban-Espejo A., Cobo M.J. Software tools for conducting bibliometric analysis in science: an up-to-date review. Prof. Inf. 29(1), (2020)
Donthu, N., Kumar, S., Pandey, N., Gupta, P.: Forty years of the international journal of information management: a bibliometric analysis. Int. J. Inf. Manag. 57, 102307 (2021)
Dwivedi, Y.K., Lal, B., Mustafee, N., Williams, M.D.: Profiling a decade of information systems frontiers’ research. Inf. Syst. Front. 11, 87–102 (2009)
Beydoun, G., Abedin, B., Merigó, J.M., Vera, M.: Twenty years of information systems frontiers. Inf. Syst. Front. 21, 485–494 (2019)
Abedin, B., Jafarzadeh, H., Olszak, C.M.: Thirty six years of information systems management: a bibliometric and thematic analysis. Inf. Syst. Manag. 38(2), 151–164 (2021)
Ramos-Rodríguez, A.-R., Ruíz-Navarro, J.: Changes in the intellectual structure of strategic management research: a bibliometric study of the strategic management journal, 1980–2000. Strateg. Manag. J. 25(10), 981–1004 (2004)
Nerur, S.P., Rasheed, A.A., Natarajan, V.: The intellectual structure of the strategic management field: an author co-citation analysis. Strateg. Manag. J. 29(3), 319–336 (2008)
Donthu, N., Kumar Badhotiya, G., Kumar, S., Soni, G., Pandey, N.: A retrospective overview of journal of enterprise information management using bibliometric analysis. J. Enterp. Inf. Manag. 35(2), 504–529 (2022)
Dwivedi, Y.K., Mustafee, N.: Profiling research published in the journal of enterprise information management (JEIM). J. Enterp. Inf. Manag 23(1), 8–26 (2010)
La Paz, A., Merigó, J.M., Powell, P., Ramaprasad, A., Syn, T.: Twenty-five years of the information systems journal: a bibliometric and ontological overview. Inf. Syst. J. 30(3), 431–457 (2020)
Dwivedi, Y.K., Kuljis, J.: Profile of IS research published in the European journal of information systems. Eur. J. Inf. Syst. 17(6), 678–693 (2008)
Cobo, M.J., Martínez, M.-Á., Gutiérrez-Salcedo, M., Fujita, H., Herrera-Viedma, E.: 25 years at knowledge-based systems a bibliometric analysis. Knowl.-Based Syst. 80, 3–13 (2015)
Claver, E., González, R., Llopis, J.: An analysis of research in information systems (1981–1997). Inf. Manage. 37(4), 181–195 (2000)
Palvia, P., Pinjani, P., Sibley, E.H.: A profile of information systems research published in information & management. Inf. Manage. 44(1), 11 (2007)
Dwivedi, Y.K., Kiang, M., Williams, M.D., Lal, B.: Profiling electronic commerce research published in the journal of electronic commerce research. J. Electron. Commer. Res. 9(2), 77–91 (2008)
Gaviria-Marin, M., Merigo, J.M., Popa, S.: Twenty years of the journal of knowledge management: a bibliometric analysis. J. Knowl. Manag. 22(8), 1655–1687 (2018)
Laengle, S., et al.: Forty years of the European journal of operational research: a bibliometric overview. Eur. J. Oper. Res. 262(3), 803–816 (2017)
Martínez-López, F.J., Merigó, J.M., Valenzuela-Fernández, L., Nicolás, C.: Fifty years of the European journal of marketing: a bibliometric analysis. Eur. J. Mark. 52(1/2), 439–468 (2018)
Yu, D., Xu, Z., Fujita, H.: Bibliometric analysis on the evolution of applied intelligence. Appl. Intell. 49, 449–462 (2019)
Mohanty B. Management information systems quarterly (MISQ): a bibliometric study. Libr. Philos. Pract. p. 0-1 (2014)
Merigó, J.M., Pedrycz, W., Weber, R., de la Sotta, C.: Fifty years of information sciences: a bibliometric overview. Inf. Sci. 432, 245–268 (2018)
Calabretta, G., Durisin, B., Ogliengo, M.: Uncovering the intellectual structure of research in business ethics: a journey through the history, the classics, and the pillars of journal of business ethics. J. Bus. Ethics 104, 499–524 (2011)
Sharma, A., Koohang, A., Rana, N.P., Abed, S.S., Dwivedi, Y.K.: Journal of computer information systems: intellectual and conceptual structure. J. Comput. Inf. Syst. 63(1), 1–31 (2022)
Yu, D., Xu, Z., Kao, Y., Lin, C.-T.: The structure and citation landscape of IEEE transactions on fuzzy systems (1994–2015). IEEE Trans. Fuzzy Syst. 26(2), 430–442 (2017)
Agarwal, R.: On the intellectual structure and evolution of ISR. Inf. Syst. Res. 27(3), 471–477 (2016)
Hoffman, D.L., Holbrook, M.B.: The intellectual structure of consumer research: a bibliometric study of author cocitations in the first 15 years of the journal of consumer research. J. Consum. Res. 19(4), 505–517 (1993)
Wang, X., Bendle, N.T., Mai, F., Cotte, J.: The journal of consumer research at 40: a historical analysis. J. Consum. Res. 42(1), 5–18 (2015)
Blei, D.M.: Probabilistic topic models. Commun. ACM 55(4), 77–84 (2012)
Roberts, M.E., et al.: Structural topic models for open-ended survey responses. Am. J. Polit. Sci. 58(4), 1064–1082 (2014)
Basin, D.: The cyber security body of knowledge. Univ. Bristol Ch Form. Methods Secur, VersionOnline (2021)
Pritchard, A.: Statistical bibliography or bibliometrics. J. Doc. 25, 348 (1969)
Lawani, S.M.: Bibliometrics: its theoretical foundations, methods and applications. Libri 31, 294–315 (1981)
Broadus, R.N.: Toward a definition of ‘bibliometrics.’ Scientometrics 12, 373–379 (1987)
Tague-Sutcliffe, J.: An introduction to informetrics. Inf. Process. Manag. 28(1), 1–3 (1992)
Hood, W.W., Wilson, C.S.: The literature of bibliometrics, scientometrics, and informetrics. Scientometrics 52, 291–314 (2001)
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 133, 285–296 (2021)
Culnan M. J. Mapping the intellectual structure of MIS, 1980–1985: a co-citation analysis. Mis Q., pp. 341–353 (1987)
Kessler, M.M.: Bibliographic coupling between scientific papers. Am. Doc. 14(1), 10–25 (1963)
Small, H.: Co-citation in the scientific literature: a new measure of the relationship between two documents. J. Am. Soc. Inf. Sci. 24(4), 265–269 (1973)
Brooks, J., McCluskey, S., Turley, E., King, N.: The utility of template analysis in qualitative psychology research. Qual. Res. Psychol. 12(2), 202–222 (2015)
King, N.: Doing template analysis. Qual. Organ. Res. Core Methods Curr. Chall. 426, 426–450 (2012)
Callon, M., Courtial, J.P., Laville, F.: Co-word analysis as a tool for describing the network of interactions between basic and technological research: the case of polymer chemsitry. Scientometrics 22, 155–205 (1991)
Fiala, D., Tutoky, G.: Computer science papers in web of science: a bibliometric analysis. Publications 5(4), 23 (2017)
Franceschet, M.: The skewness of computer science. Inf. Process. Manag. 47(1), 117–124 (2011)
N. J. van Eck and L. Waltman, (2013) “VOSviewer manual,” Leiden Univeristeit Leiden, vol. 1, no. 1,
King N., Brooks J., Tabari S. Template analysis in business and management research. Qual. Methodol. Organ. Stud. Vol. II Methods Possibilities, pp. 179–206 (2018)
van Eck, N., Waltman, L.: Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2), 523–538 (2009)
Swan A. The open access citation advantage: studies and results to date (2010)
Sotudeh, H.: Does open access citation advantage depend on paper topics? J. Inf. Sci. 46(5), 696–709 (2020)
J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, R. L. Tatham, and others, Multivariate data analysis (Vol. 6). Upper Saddle River, NJ: Pearson Prentice Hall, 2006.
Bornmann, L., Schier, H., Marx, W., Daniel, H.-D.: What factors determine citation counts of publications in chemistry besides their quality? J. Informetr. 6(1), 11–18 (2012)
Uddin, S., Khan, A.: The impact of author-selected keywords on citation counts. J. Informetr. 10(4), 1166–1177 (2016)
Leimu, R., Koricheva, J.: What determines the citation frequency of ecological papers? Trends Ecol. Evol. 20(1), 28–32 (2005)
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113–170 (2014)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6, 1–14 (2007)
Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.: Opacity generalised to transition systems. Int. J. Inf. Secur. 7, 421–435 (2008)
Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487–497 (2015)
Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11, 403–418 (2012)
Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399–422 (2009)
H. J. Smith, T. Dinev, and H. Xu, “Information privacy research: an interdisciplinary review,” MIS Q., pp. 989–1015, 2011.
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM Sigmod Rec. 33(1), 50–57 (2004)
Höne, K., Eloff, J.H.P.: Information security policy—what do international information security standards say? Comput. Secur. 21(5), 402–409 (2002)
Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020)
Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)
Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2010)
Author information
Authors and Affiliations
Contributions
R.D. is the sole author of the manuscript. All the work carried out - data gathering, data analyses, and manuscript writing - is done by R.D.
Corresponding author
Ethics declarations
Conflict of interest
I confirm that the work presented in this research article is original and has not been published elsewhere, nor is it under consideration for publication elsewhere. Also, we have no conflicts of interest to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dwivedi, R. International journal of information security: a bibliometric study, 2007–2023. Int. J. Inf. Secur. (2024). https://doi.org/10.1007/s10207-024-00840-0
Accepted:
Published:
DOI: https://doi.org/10.1007/s10207-024-00840-0