A bibliometric analysis of the of cybersecurity policy research
Abstract
The cybersecurity policy is a fundamental framework for developing a robust defense strategy for an organization's digital landscape. It involves various critical steps, including classifying information based on sensitivity, implementing strict access control, encrypting data in transit and at rest, continuous security awareness training, an incident response plan for addressing security breaches, deploying network security measures such as firewalls and intrusion detection systems, and physical security protocols to protect data centers and infrastructure. The purpose of this study is to answer the following questions: How are articles on Cybersecurity Policy classified? What are the latest study trends in Cybersecurity Policy analysis? What are the most frequently published research topics? What are the potential areas for future research in Cybersecurity Policy analysis? This research used a quantitative-descriptive technique. This bibliometric analysis explores the extensive and dynamic domain of cybersecurity policy, examining academic outputs from various dimensions. Utilizing standardized methodologies, including Mendeley software, VOSviewer, and PoP, this study navigates the complex terrain of academic literature. The findings reveal major topics such as 'Cybersecurity policy,' 'Network security policy,' and 'Cybersecurity' emerge, illuminating both well-explored areas and less developed fields such as 'National cybersecurity' and 'Cyberspace.' These unexplored aspects present intriguing avenues for future research.
Keywords
Full Text:
PDFReferences
Aguillo, I. F. (2012). Is Google Scholar useful for bibliometrics? A webometric analysis. Scientometrics, 91(2), 343–351. https://doi.org/10.1007/s11192-011-0582-8
Brandão, A. P., & Camisão, I. (2021). Playing the market card: The commission’s strategy to shape EU cybersecurity policy. JCMS: Journal of Common Market Studies, 60(5), 1335–1355. https://doi.org/10.1111/jcms.13158
Bruijn, H. de, & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007
Carrapico, H., & Farrand, B. (2020). Discursive continuity and change in the time of Covid-19: The case of EU cybersecurity policy. Journal of European Integration, 42(8), 1111–1126. https://doi.org/10.1080/07036337.2020.1853122
Charlet, K., & King, H. (2020). The future of cybersecurity policy. IEEE Security and Privacy, 18(1), 8–10. https://doi.org/10.1109/MSEC.2019.2953368
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133(April), 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070
Hatcher, W., Meares, W. L., & Heslen, J. (2020). The cybersecurity of municipalities in the United States: An exploratory survey of policies and practices. Journal of Cyber Policy, 5(2), 302–325. https://doi.org/10.1080/23738871.2020.1792956
Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2). https://doi.org/10.1093/jogss/ogz077
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45(February 2018), 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126
Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265–284. https://doi.org/10.1080/23738871.2020.1778759
Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538
Nandiyanto, A. B. D., & Al Husaeni, D. F. (2022). Bibliometric analysis of engineering research using vosviewer indexed by Google Scholar. Journal of Engineering Science and Technology, 17(2), 883–894.
Rizal, M., & Yani, Y. (2016). Cybersecurity policy and iIts implementation in Indonesia. JAS (Journal of ASEAN Studies), 4(1), 61. https://doi.org/10.21512/jas.v4i1.967
Sharma, D., Mittal, R., Sekhar, R., Shah, P., & Renz, M. (2023). A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization, 10(2), 100204. https://doi.org/10.1016/j.rico.2023.100204
Shively, J. (2021). Cybersecurity policy and the Trump administration. Policy Studies, 42(5–6), 738–754. https://doi.org/10.1080/01442872.2021.1947482
Smith, K. J., Dhillon, G., & Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management, 56, 102123. https://doi.org/10.1016/j.ijinfomgt.2020.102123
Snider, K. L. G., Shandler, R., Zandani, S., & Canetti, D. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal of Cybersecurity, 7(1), 1–11. https://doi.org/10.1093/cybsec/tyab019
Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178–188. https://doi.org/10.1016/j.future.2018.09.063
Sulardja, E. C. (2021). Analisis bibliometrik publikasi ilmiah bidang digital asset management berbasis data Scopus 2011-2020. Informatio: Journal of Library and Information Science, 1(3), 259. https://doi.org/10.24198/inf.v1i3.35339
Zakiyyah, F. N., Winoto, Y., & Rohanda, R. (2022). Pemetaan bibliometrik terhadap perkembangan penelitian arsitektur informasi pada Google Scholar menggunakan VOSviewer. Informatio: Journal of Library and Information Science, 2(1), 43. https://doi.org/10.24198/inf.v2i1.37766
DOI: https://doi.org/10.24198/inf.v4i1.52033
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Informatio: Journal of Library and Information Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Informatio Indexed by:
Editorial Office :
Library and Information Science Study Program, Building 3 Floor 2, Faculty of Communication Science, Universitas Padjadjaran
Jl. Raya Bandung Sumedang Km. 21 Jatinangor, Sumedang 45363
Principal Contact :
Phone : 08122184219
Email : rully.khairul@unpad.ac.id