A bibliometric analysis of the of cybersecurity policy research

Opik Qorahman, Nova Nauval Akbar

Abstract


The cybersecurity policy is a fundamental framework for developing a robust defense strategy for an organization's digital landscape. It involves various critical steps, including classifying information based on sensitivity, implementing strict access control, encrypting data in transit and at rest, continuous security awareness training, an incident response plan for addressing security breaches, deploying network security measures such as firewalls and intrusion detection systems, and physical security protocols to protect data centers and infrastructure. The purpose of this study is to answer the following questions: How are articles on Cybersecurity Policy classified? What are the latest study trends in Cybersecurity Policy analysis? What are the most frequently published research topics? What are the potential areas for future research in Cybersecurity Policy analysis? This research used a quantitative-descriptive technique. This bibliometric analysis explores the extensive and dynamic domain of cybersecurity policy, examining academic outputs from various dimensions. Utilizing standardized methodologies, including Mendeley software, VOSviewer, and PoP, this study navigates the complex terrain of academic literature. The findings reveal major topics such as 'Cybersecurity policy,' 'Network security policy,' and 'Cybersecurity' emerge, illuminating both well-explored areas and less developed fields such as 'National cybersecurity' and 'Cyberspace.' These unexplored aspects present intriguing avenues for future research.


Keywords


CS (Cyber Scurity); Cybersecurity policy; Cyber threats; Bibliometric; Policy

Full Text:

PDF

References


Aguillo, I. F. (2012). Is Google Scholar useful for bibliometrics? A webometric analysis. Scientometrics, 91(2), 343–351. https://doi.org/10.1007/s11192-011-0582-8

Brandão, A. P., & Camisão, I. (2021). Playing the market card: The commission’s strategy to shape EU cybersecurity policy. JCMS: Journal of Common Market Studies, 60(5), 1335–1355. https://doi.org/10.1111/jcms.13158

Bruijn, H. de, & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007

Carrapico, H., & Farrand, B. (2020). Discursive continuity and change in the time of Covid-19: The case of EU cybersecurity policy. Journal of European Integration, 42(8), 1111–1126. https://doi.org/10.1080/07036337.2020.1853122

Charlet, K., & King, H. (2020). The future of cybersecurity policy. IEEE Security and Privacy, 18(1), 8–10. https://doi.org/10.1109/MSEC.2019.2953368

Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133(April), 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070

Hatcher, W., Meares, W. L., & Heslen, J. (2020). The cybersecurity of municipalities in the United States: An exploratory survey of policies and practices. Journal of Cyber Policy, 5(2), 302–325. https://doi.org/10.1080/23738871.2020.1792956

Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2). https://doi.org/10.1093/jogss/ogz077

Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45(February 2018), 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126

Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265–284. https://doi.org/10.1080/23738871.2020.1778759

Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538

Nandiyanto, A. B. D., & Al Husaeni, D. F. (2022). Bibliometric analysis of engineering research using vosviewer indexed by Google Scholar. Journal of Engineering Science and Technology, 17(2), 883–894.

Rizal, M., & Yani, Y. (2016). Cybersecurity policy and iIts implementation in Indonesia. JAS (Journal of ASEAN Studies), 4(1), 61. https://doi.org/10.21512/jas.v4i1.967

Sharma, D., Mittal, R., Sekhar, R., Shah, P., & Renz, M. (2023). A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization, 10(2), 100204. https://doi.org/10.1016/j.rico.2023.100204

Shively, J. (2021). Cybersecurity policy and the Trump administration. Policy Studies, 42(5–6), 738–754. https://doi.org/10.1080/01442872.2021.1947482

Smith, K. J., Dhillon, G., & Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management, 56, 102123. https://doi.org/10.1016/j.ijinfomgt.2020.102123

Snider, K. L. G., Shandler, R., Zandani, S., & Canetti, D. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal of Cybersecurity, 7(1), 1–11. https://doi.org/10.1093/cybsec/tyab019

Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178–188. https://doi.org/10.1016/j.future.2018.09.063

Sulardja, E. C. (2021). Analisis bibliometrik publikasi ilmiah bidang digital asset management berbasis data Scopus 2011-2020. Informatio: Journal of Library and Information Science, 1(3), 259. https://doi.org/10.24198/inf.v1i3.35339

Zakiyyah, F. N., Winoto, Y., & Rohanda, R. (2022). Pemetaan bibliometrik terhadap perkembangan penelitian arsitektur informasi pada Google Scholar menggunakan VOSviewer. Informatio: Journal of Library and Information Science, 2(1), 43. https://doi.org/10.24198/inf.v2i1.37766




DOI: https://doi.org/10.24198/inf.v4i1.52033

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Informatio: Journal of Library and Information Science

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Informatio Indexed by:

Editorial Office :
Library and Information Science Study Program, Building 3 Floor 2, Faculty of Communication Science, Universitas Padjadjaran
Jl. Raya Bandung Sumedang Km. 21 Jatinangor, Sumedang 45363

Principal Contact :
Phone : 08122184219
Email : rully.khairul@unpad.ac.id

Bos88