Skip to main content

A gap analysis study between multimedia security research and education by meta data analysis


Studies are increasing on seeking to cultivate multimedia security professional personnel by providing core knowledge necessary for the safe use of multimedia information. Time is needed for such academic studies to be applied to actual education. However, it should be quickly applicable to security professional education according to the characteristics of the security industry that is very sensitive to a fast-changing environment. For the purpose of examining research trends in the area of multimedia security, a network analysis was conducted focusing on keywords to understand the correlation among studies by analyzing well-known academic journals and identifying the directional nature of research. Based on the keywords researched, a meta-analysis was conducted. The result showed that the highest frequency keyword was ‘certification’ and keywords formed correlations affecting research trends. For consistency between such research and studies, it is important to increase the relative importance of the multimedia information security management area subject through which the business of companies can be understood. It is also necessary to create balanced thinking and a perspective for multimedia security.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11


  1. Allen M (1999) The role of meta-analysis for connecting critical and scientific approaches: the need to develop a sense of collaboration. Crit Stud Mass Commun 16:373–379

  2. Amankwa E, Loock M, Kritzinger E (2014) A conceptual analysis of information security education, information security training and information security awareness definitions. Internet Technol Secur Trans 248–252

  3. Armstrong CJ, Armstrong HL (2007) Mapping information security curricula to professional accreditation standards. Inf Assur Secur Work 30–35

  4. Chunying W (2010) Analysis on the information security education for the public security active forces academy. Inf Technol Appl 3:355–357

    Google Scholar 

  5. Crossler RE (2013) Future directions for behavioral information security research. Comput Sec 32:90–101

    Article  Google Scholar 

  6. Du W, Shang M, Xu H (2006) A novel approach for computer security education using Minix instructional operating system. 25(3)190–220

  7. Durlak JA (2011) The impact of enhancing students’ social and emotional learning: a meta-analysis of school-based universal interventions. Child Dev 82(1):405–432

    Article  Google Scholar 

  8. Guo KH, Yuan Y (2012) The effects of multilevel sanctions on information security violations: a mediating model. Inf Manag 49(6):320–326

    Article  Google Scholar 

  9. Higgins J, Thompson SG (2002) Quantifying heterogeneity in a meta-analysis. Stat Med 21(11):1539–1558

    Article  Google Scholar 

  10. Idziorek J, Rursch J, Jacobson D (2012) Security across the curriculum and beyond. Front Educ Conf 1–6

  11. Kolkowska E, Dhillon G (2013) Organizational power and information security rule compliance. Comput Sec 33:3–11

    Article  Google Scholar 

  12. Nelson HD, Vesco KK, Haney E, FU R, Nedrow A, Miller J, Nicolaidis C, Walker M, Humphrey L (2006) Nonhormonal therapies for menopausal hot flashes: systematic review and metaanalysis. ama 295(17)2057–2071

  13. Osterholm MT (2012) Efficacy and effectiveness of influenza vaccines: a systematic review and meta-analysis. Lancet Infect Dis 12(1):36–44

    Article  Google Scholar 

  14. Palmerini T (2012) Stent thrombosis with drug-eluting and bare-metal stents: evidence from a comprehensive network meta-analysis. Lancet 379(9824):1393–1402

    Article  Google Scholar 

  15. Posillico T (2005) Adapting advanced computer networking technologies for curricula models in security education. J Appl Sec Res 1(2):11–21

    Google Scholar 

  16. Reid R, Van Niekerk J (2013) Back to basics: information security education for the youth via gameplay. Inf Assur Sec Educ Train 406:1–10

    Google Scholar 

  17. Ruff CT (2014) Comparison of the efficacy and safety of new oral anticoagulants with warfarin in patients with atrial fibrillation: a meta-analysis of randomised trials. Lancet 383(9921):955–962

    Article  Google Scholar 

  18. Stalvey RH, Farkas C, Eastman C (2012) First use: introducing information security in high school oracle academy courses. Inf Reuse Integr 653–658

  19. Stoica A, Islam S (2013) Teaching information and software security courses in regular and distance learning programs. Glob Eng Educ Conf (EDUCON) 44–50

  20. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  21. Wallace WI (1992) Metatheory, conceptual standardization, and the future of sociology. In: Ritzer G (ed) Metatheorizing, Sage, New York, pp. 53–68

  22. Watters PA (2009) University incorporated: implications for professional information security education. Corp Gov 9(5):564–572

    Article  Google Scholar 

  23. Wright MA (1998) The need for information security education. Comput Fraud Sec 1998(8):14–17

    Article  Google Scholar 

  24. Wright AM (2001) Assessing the impact of security education initiatives on critical infrastructure protection. Comput Fraud Sec 2001(8):8–10

    Article  Google Scholar 

  25. Wolf FM (1986) Meta-analysis: quantitative methods for research synthesis. Sage Publications, Beverly Hills

Download references


This work was supported by the Human Resources Development (no. 20154030200860) of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) Grant funded by the Korea Government Ministry of Trade, Industry and Energy.

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the CPRC (Communication Policy Research Center) Support Program (R0880-15-1007) supervised by the IITP (Institute for Information & Communication Technology Promotion).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kim, H., Park, S. & Chang, H. A gap analysis study between multimedia security research and education by meta data analysis. Multimed Tools Appl 75, 12779–12793 (2016).

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Meta-analysis
  • Multimedia security research trends
  • Security education
  • Social network analysis