Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach

  • Chichao Lu
  • Wenyuan Jen
  • Weiping Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4430)

Abstract

The aim of this study is to explore trends in computer crime and cybercrime research from 1974 to 2006. All publications for this analysis were drawn from the ISI Web of Science, the Science Citation Index (SCI), and the Social Science Citation Index (SSCI). The ISI Web of Science is considered a powerful and relatively accurate tool in bibliometric studies. About 292 papers related to computer crime and cybercrime were published during this period. The greatest number of these papers was written in English, and the annual output increased significantly after 2003. In the period under study, most papers originated in the USA. Approximately 57% of the publications were articles, and 72% of these articles had single authors. More bibliometric analyses are described in this study, which shows a high scientific production of articles on computer crime and cybercrime publications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bell, R.E.: The Prosecution of Computer Crime. Journal Financial Crime 9(4), 308–325 (2002)CrossRefGoogle Scholar
  2. 2.
    Elmacioglu, E., Lee, D.: Research articles and surveys: On six degrees of separation in DBLP-DB and more. ACM SIGMOD Record 34(2), 33–40 (2005)CrossRefGoogle Scholar
  3. 3.
    Guzman, I.R., Kaarst-Brown, M.L.: Organizational survival and alignment: insights into conflicting perspectives on the role of the IT professional. In: ACM Proceedings of the 2004 SIGMIS, pp. 30–34 (2004)Google Scholar
  4. 4.
    Kshetri, N.: Pattern of global cyber war and crime: A conceptual framework. Journal of International Management 11(4), 541–562 (2005)CrossRefGoogle Scholar
  5. 5.
    Laudon, K.C., Traver, C.G.: E-Commerce: Business, Technology, Society, 2nd edn. Addison-Wesley, Reading (2004)Google Scholar
  6. 6.
    Luukkonen, T.: Bibliometrics and evaluation of research performance. Annals of Medicine 22(3), 145–150 (1990)CrossRefGoogle Scholar
  7. 7.
    Mann, G.S., Mimno, D., McCallum, A.: Bibliometric impact measures leveraging topic analysis. In: Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries, pp. 65–74 (2006)Google Scholar
  8. 8.
    Matsuura, K., Ebato, K.: University-industry collaboration networks in the information security field in Japan: problems and a particular success. In: 2004 IEEE International Engineering Management Conference, vol. 2, 18-21 Oct. 2004, pp. 839–844 (2004)Google Scholar
  9. 9.
    Pilkington, A.: Defining technology management: a citation/co-citation study. In: IEEE International Engineering Management Conference, vol. 1, 18-21 Oct. 2004, pp. 337–341 (2004)Google Scholar
  10. 10.
    Rao, I.K.R.: Methodological and conceptual questions of bibliometric standards. Scientometrics 35(2), 265–270 (1996)CrossRefGoogle Scholar
  11. 11.
    Skoie, H.: Bibliometrics - some warnings from the north. Scientometrics 45(3), 433–437 (1999)CrossRefGoogle Scholar
  12. 12.
    Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Taylor & Francis Group, New York (2000)Google Scholar
  13. 13.
    Verton, D.: FBI chief: Lack of incident reporting slows cybercrime fight. Computerworld (31 Oct. 2002), http://computerworld.com/securitytopics/security/cybercrime/story/0,10801,75532,00.html

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Chichao Lu
    • 1
  • Wenyuan Jen
    • 2
  • Weiping Chang
    • 3
  1. 1.Center for General Education, Overseas Chinese Institute of TechnologyTaiwan
  2. 2.Department of Information Management, Overseas Chinese Institute of Technology 
  3. 3.Department of Student Affairs, Central Police UniversityTaiwan

Personalised recommendations