A Visual Analysis of Research on Information Security Risk by Using CiteSpace
Open Access
- 4 October 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Access
- Vol. 6, 63243-63257
- https://doi.org/10.1109/access.2018.2873696
Abstract
The security of information issue has become a global problem and has risen the concerns of both researchers and practitioners. When security incidents occur, there is a risk that national military secrets or confidential information of corporations will leak out and cause serious damages to the collective. This paper is aimed to explore the knowledge structure, development, and the future trend of information security area by providing a comprehensive review of the present information security risk (ISR) literature. The visualization analysis was conducted on journal literatures from the Web of Science, IEEE, ACM, and Scopus database, and the results were mapped into the I-model. According to 2748 articles, evaluation methods, e.g., frequency statistics, clustering coefficient, and centrality calculation, are employed to analyze all of the interrelated matrixes that are supported by CiteSpace. Some useful outcomes of a variety of objectives are shown under a significant level, such as author, country/territory, cluster, institute, as well as reference. A synthetical analysis has demonstrated the future research trend on ISR. As for researchers and practitioners, this paper suggests an analysis of integrated visualization in terms of the knowledge and innovation based on the area of ISR.Keywords
Funding Information
- Fundamental Research Funds for the Central Universities (JB180608)
This publication has 33 references indexed in Scilit:
- A new comprehensive framework for enterprise information security risk managementApplied Computing and Informatics, 2011
- The thematic and citation landscape of Data and Knowledge Engineering (1985–2007)Data & Knowledge Engineering, 2008
- Understanding information related fields: A conceptual frameworkJournal of the American Society for Information Science and Technology, 2007
- Continuous auctions and insider trading: uniqueness and risk aversionFinance and Stochastics, 2003
- The economics of information security investmentACM Transactions on Information and System Security, 2002
- Coping with Systems Risk: Security Planning Models for Management Decision MakingMIS Quarterly, 1998
- Common risk factors in the returns on stocks and bondsJournal of Financial Economics, 1993
- Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyMIS Quarterly, 1989
- Evaluating Structural Equation Models with Unobservable Variables and Measurement ErrorJournal of Marketing Research, 1981
- The Pricing of Options and Corporate LiabilitiesJournal of Political Economy, 1973