This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
World Economic Forum. (2024, October 22). Why strong cybersecurity means we must reduce complexity. https://www.weforum.org/stories/2024/10/strong-cybersecurity-reduce-complexity-risk-cyber/World Economic Forum2024October22Why strong cybersecurity means we must reduce complexityhttps://www.weforum.org/stories/2024/10/strong-cybersecurity-reduce-complexity-risk-cyber/Search in Google Scholar
Selangor Journal. (2023, July 10). Rise of cybersecurity threats a significant concern — PM. https://selangorjournal.my/2023/07/rise-of-cybersecurity-threats-a-significant-concern-pm/Selangor Journal2023July10Rise of cybersecurity threats a significant concern — PMhttps://selangorjournal.my/2023/07/rise-of-cybersecurity-threats-a-significant-concern-pm/Search in Google Scholar
Syed, B., & Shahid, M. (2022). Impact of information security management system on firm financial performance: Perspective of corporate reputation and branding. American Journal of Industrial and Business Management, 12(5), 934–954. doi:10.4236/ajibm.2022.125048.SyedB.ShahidM.2022Impact of information security management system on firm financial performance: Perspective of corporate reputation and brandingAmerican Journal of Industrial and Business Management12593495410.4236/ajibm.2022.125048Open DOISearch in Google Scholar
Xie, X., Wu, Y., Palacios-Marqués, D., & Ribeiro-Navarrete, S. (2022). Business networks and organizational resilience capacity in the digital age during COVID-19: A perspective utilizing organizational information processing theory. Technological Forecasting and Social Change, 177, 121548. https://doi.org/10.1016/j.techfore.2022.121548XieX.WuY.Palacios-MarquésD.Ribeiro-NavarreteS.2022Business networks and organizational resilience capacity in the digital age during COVID-19: A perspective utilizing organizational information processing theoryTechnological Forecasting and Social Change177121548https://doi.org/10.1016/j.techfore.2022.121548Search in Google Scholar
Mavani, C., Patel, R., Mistry, H., & Goswami, A. (2024). The role of cybersecurity in protecting intellectual property. International Journal on Recent and Innovation Trends in Computing and Communication, 12(2), 529–538.MavaniC.PatelR.MistryH.GoswamiA.2024The role of cybersecurity in protecting intellectual propertyInternational Journal on Recent and Innovation Trends in Computing and Communication122529538Search in Google Scholar
Jacqueline, J., Luky, P. W., & Anastasia, F. I. (2024). The impact of intangible asset and research and development on firm value. Journal of Accounting, Entrepreneurship and Financial Technology (JAEF), 5(2). https://doi.org/10.37715/jaef.v5i2.4553JacquelineJ.LukyP. W.AnastasiaF. I.2024The impact of intangible asset and research and development on firm valueJournal of Accounting, Entrepreneurship and Financial Technology (JAEF)52https://doi.org/10.37715/jaef.v5i2.4553Search in Google Scholar
Norris, B. (2024, May 8). Intangible asset value higher than tangible but protection gap persists. Commercial Risk. https://www.commercialriskonline.com/intangible-asset-value-higher-than-tangible-but-protection-gap-persists/NorrisB.2024May8Intangible asset value higher than tangible but protection gap persistsCommercial Riskhttps://www.commercialriskonline.com/intangible-asset-value-higher-than-tangible-but-protection-gap-persists/Search in Google Scholar
Ikrissi, G., & Mazri, T. (2021). IOT-based smart environments: State of the art, security threats and solutions. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XLVI-4/W5-2021(4), 279–286. https://doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-279-2021IkrissiG.MazriT.2021IOT-based smart environments: State of the art, security threats and solutionsThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information SciencesXLVI-4/W5-20214279286https://doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-279-2021Search in Google Scholar
Pawel, K. (2021). Human factor aspects in information security management in the traditional IT and cloud computing models. Operations Research and Decisions, 1, 62–76. https://doi.org/10.37190/ord210104PawelK.2021Human factor aspects in information security management in the traditional IT and cloud computing modelsOperations Research and Decisions16276https://doi.org/10.37190/ord210104Search in Google Scholar
Meiser, L. C., Nguyen, B. H., Chen, Y.-J., Nivala, J., Strauss, K., Ceze, L., & Grass, R. N. (2022). Synthetic DNA applications in information technology. Nature Communications, 13(1), 352. https://doi.org/10.1038/s41467-021-27846-9MeiserL. C.NguyenB. H.ChenY.-J.NivalaJ.StraussK.CezeL.GrassR. N.2022Synthetic DNA applications in information technologyNature Communications131352https://doi.org/10.1038/s41467-021-27846-9Search in Google Scholar
Alzoubi, N. (2024). Using information technology management with artificial intelligence techniques. Journal of Lifestyle and SDGs Review, 5(2), e03013. https://doi.org/10.47172/2965-730x.sdgsreview.v5.n02.pe03013AlzoubiN.2024Using information technology management with artificial intelligence techniquesJournal of Lifestyle and SDGs Review52e03013https://doi.org/10.47172/2965-730x.sdgsreview.v5.n02.pe03013Search in Google Scholar
Metin, B., Duran, S., Telli, E., Mutluturk, M., Wynn, M. (2024). IT risk management: Towards a system for enhancing objectivity in asset valuation that engenders a security culture. Information, 15(55), 1–27. https://doi.org/10.3390/info15010055MetinB.DuranS.TelliE.MutluturkM.WynnM.2024IT risk management: Towards a system for enhancing objectivity in asset valuation that engenders a security cultureInformation1555127https://doi.org/10.3390/info15010055Search in Google Scholar
Pretorius, R., & Blaauw, D. (2022). Digital risk management: Investigating human-factor security with a Behaviorist Approach. International Conference on Cyber Warfare and Security, 17(1), 513–521. https://doi.org/10.34190/iccws.17.1.64PretoriusR.BlaauwD.2022Digital risk management: Investigating human-factor security with a Behaviorist ApproachInternational Conference on Cyber Warfare and Security171513521https://doi.org/10.34190/iccws.17.1.64Search in Google Scholar
Birchwood University. (2024). Zero trust vs. traditional network security: What’s the difference? Birchwood University. Retrieved from https://www.birchwoodu.org/zero-trust-vs-traditional-network-security/Birchwood University2024Zero trust vs. traditional network security: What’s the difference?Birchwood UniversityRetrieved from https://www.birchwoodu.org/zero-trust-vs-traditional-network-security/Search in Google Scholar
Security Info Watch. (2024). Traditional IT security vs. cloud security: Which approach is right for your business? Security Info Watch. Retrieved from https://www.securityinfowatch.com/cybersecurity/information-security/article/21089929/traditional-it-security-vs-cloud-security-which-approach-is-right-for-your-businessSecurity Info Watch2024Traditional IT security vs. cloud security: Which approach is right for your business?Security Info WatchRetrieved from https://www.securityinfowatch.com/cybersecurity/information-security/article/21089929/traditional-it-security-vs-cloud-security-which-approach-is-right-for-your-businessSearch in Google Scholar
Al-Dosari, K., & Fetais, N. (2023). Risk-management framework and information-security systems for small and medium enterprises (SMEs): A Meta-Analysis Approach. Electronics, 12(17), 3629. https://doi.org/10.3390/electronics12173629Al-DosariK.FetaisN.2023Risk-management framework and information-security systems for small and medium enterprises (SMEs): A Meta-Analysis ApproachElectronics12173629https://doi.org/10.3390/electronics12173629Search in Google Scholar
Brunner, M., Sauerwein, C., Felderer, M., & Breu, R. (2020). Risk management practices in information security: Exploring the status quo in the DACH region. Computers & Security, 92, 101776. https://doi.org/10.1016/j.cose.2020.101776BrunnerM.SauerweinC.FeldererM.BreuR.2020Risk management practices in information security: Exploring the status quo in the DACH regionComputers & Security92101776https://doi.org/10.1016/j.cose.2020.101776Search in Google Scholar
Whitman, M., & Mattord, H. (2021). A Model Curriculum for Programs of Study in Information Security/Cybersecurity March 2021. https://www.kennesaw.edu/coles/centers/cyber-center/resources/docs/model-curriculum-2021WhitmanM.MattordH.2021A Model Curriculum for Programs of Study in Information Security/Cybersecurity March 2021https://www.kennesaw.edu/coles/centers/cyber-center/resources/docs/model-curriculum-2021Search in Google Scholar
Alsafwani, N., Fazea, Y., & Alnajjar, F. (2024). Strategic approaches in network communication and information security risk assessment. Information, 15(6), 353. https://doi.org/10.3390/info15060353AlsafwaniN.FazeaY.AlnajjarF.2024Strategic approaches in network communication and information security risk assessmentInformation156353https://doi.org/10.3390/info15060353Search in Google Scholar
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2022). Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in IT consulting industry. Sustainability, 14(3), 1269. https://doi.org/10.3390/su14031269KitsiosF.ChatzidimitriouE.KamariotouM.2022Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in IT consulting industrySustainability1431269https://doi.org/10.3390/su14031269Search in Google Scholar
Sharma, D., Mittal, R., Sekhar, R., Shah, P., & Renz, M. (2023). A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization, 10, 100204. https://doi.org/10.1016/j.rico.2023.100204SharmaD.MittalR.SekharR.ShahP.RenzM.2023A bibliometric analysis of cyber security and cyber forensics researchResults in Control and Optimization10100204https://doi.org/10.1016/j.rico.2023.100204Search in Google Scholar
Arroyabe, M. F., Arranz, C. F., De Arroyabe, J. C. F., & Fernandez, I. (2024). Digitalization and Cybersecurity in SMEs: A Bibliometric analysis. Procedia Computer Science, 237, 80–87. https://doi.org/10.1016/j.procs.2024.05.082ArroyabeM. F.ArranzC. F.De ArroyabeJ. C. F.FernandezI.2024Digitalization and Cybersecurity in SMEs: A Bibliometric analysisProcedia Computer Science2378087https://doi.org/10.1016/j.procs.2024.05.082Search in Google Scholar
Guembe, B., Misra, S., Azeta, A., & Lopez-Baldominos, I. (2025). Bibliometric analysis of artificial intelligence cyberattack detection models. Artificial Intelligence Review, 58(6). https://doi.org/10.1007/s10462-025-11167-0GuembeB.MisraS.AzetaA.Lopez-BaldominosI.2025Bibliometric analysis of artificial intelligence cyberattack detection modelsArtificial Intelligence Review586https://doi.org/10.1007/s10462-025-11167-0Search in Google Scholar
Judijanto, L., Endrianto, E., & Vandika, A. Y. (2024). Mapping the Cybersecurity Research through Bibliometric Analysis. West Science Information System and Technology, 2(03), 374–382. https://doi.org/10.58812/wsist.v2i03.1534JudijantoL.EndriantoE.VandikaA. Y.2024Mapping the Cybersecurity Research through Bibliometric AnalysisWest Science Information System and Technology203374382https://doi.org/10.58812/wsist.v2i03.1534Search in Google Scholar
Erdoğan, M., & Akmeşe, Ö. F. (2025). Bibliometric analysis of studies on cyber crimes between 2000–2023. ADBA Computer Science, 2(1), 19–29.https://doi.org/10.69882/adba.cs.2025014ErdoğanM.AkmeşeÖ. F.2025Bibliometric analysis of studies on cyber crimes between 2000–2023ADBA Computer Science211929https://doi.org/10.69882/adba.cs.2025014Search in Google Scholar
Broadus, R. N. (1987). Toward a definition of ‘bibliometrics.’ Scientometrics, 12(5–6), 373–379. https://doi.org/10.1007/BF02016680BroadusR. N.1987Toward a definition of ‘bibliometrics.’Scientometrics125–6373379https://doi.org/10.1007/BF02016680Search in Google Scholar
Pritchard, A. (1969). Statistical bibliography or bibliometrics? Journal of Documentation, 25, 348–349.PritchardA.1969Statistical bibliography or bibliometrics?Journal of Documentation25348349Search in Google Scholar
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133, 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070DonthuN.KumarS.MukherjeeD.PandeyN.LimW. M.2021How to conduct a bibliometric analysis: An overview and guidelinesJournal of Business Research133285296https://doi.org/10.1016/j.jbusres.2021.04.070Search in Google Scholar
Merigó, J. M., Pedrycz, W., Weber, R., & de la Sotta, C. (2018). Fifty years of Information Sciences: A bibliometric overview. Information Sciences, 432, 245–268. https://doi.org/10.1016/j.ins.2017.11.054MerigóJ. M.PedryczW.WeberR.de la SottaC.2018Fifty years of Information Sciences: A bibliometric overviewInformation Sciences432245268https://doi.org/10.1016/j.ins.2017.11.054Search in Google Scholar
Seuring, S., Müller, M., Westhaus, M., & Morana, R. (2005). Conducting a literature review—the example of sustainability in supply chains. In Research Methodologies in Supply Chain Management, 91–106.SeuringS.MüllerM.WesthausM.MoranaR.2005Conducting a literature review—the example of sustainability in supply chainsInResearch Methodologies in Supply Chain Management91106Search in Google Scholar
Dohale, V., Gunasekaran, A., Akarte, M. M., & Verma, P. (2020). Twenty-five years’ contribution of “Benchmarking: an International Journal” to manufacturing strategy: a scientometric review. Benchmarking: An International Journal, 27(10), 2887–2908. https://doi.org/10.1108/BIJ-05-2019-0208.DohaleV.GunasekaranA.AkarteM. M.VermaP.2020Twenty-five years’ contribution of “Benchmarking: an International Journal” to manufacturing strategy: a scientometric reviewBenchmarking: An International Journal271028872908https://doi.org/10.1108/BIJ-05-2019-0208.Search in Google Scholar
Qudah, S. M. A. A., Fuentes-Bargues, J. L., & Ferrer-Gisbert, P. S. (2024). Bibliometric analysis of the literature on risk management in the construction sector: Exploring current and future trends. Ain Shams Engineering Journal, 15(8), 102843. https://doi.org/10.1016/j.asej.2024.102843QudahS. M. A. A.Fuentes-BarguesJ. L.Ferrer-GisbertP. S.2024Bibliometric analysis of the literature on risk management in the construction sector: Exploring current and future trendsAin Shams Engineering Journal158102843https://doi.org/10.1016/j.asej.2024.102843Search in Google Scholar
Li, J., Goerlandt, F., & Reniers, G. (2021). An overview of scientometric mapping for the safety science community: Methods, tools, and framework. Safety Science, 134, 105093. https://doi.org/10.1016/j.ssci.2020.105093LiJ.GoerlandtF.ReniersG.2021An overview of scientometric mapping for the safety science community: Methods, tools, and frameworkSafety Science134105093https://doi.org/10.1016/j.ssci.2020.105093Search in Google Scholar
Van Eck, N. J., & Waltman, L. (2010). Software survey: VOS viewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3Van EckN. J.WaltmanL.2010Software survey: VOS viewer, a computer program for bibliometric mappingScientometrics842523538https://doi.org/10.1007/s11192-009-0146-3Search in Google Scholar
Domański, Jarosław, “Risk categories and risk management processes in nonprofit organizations.” Foundations of Management, vol. 8, no. 1, pp. 227–42, Jan., 2016. https://doi.org/10.1515/fman-2016-0018.DomańskiJarosław“Risk categories and risk management processes in nonprofit organizations.”Foundations of Management8122742Jan.2016https://doi.org/10.1515/fman-2016-0018.Search in Google Scholar
Couce-Vieira, Aitor, et al., (2017). GIRA: A General Model for Incident Risk Analysis. Journal of Risk Research, 22(2), 191–208. https://doi.org/10.1080/13669877.2017.1372509.Couce-VieiraAitor2017GIRA: A General Model for Incident Risk AnalysisJournal of Risk Research222191208https://doi.org/10.1080/13669877.2017.1372509.Search in Google Scholar
Yaacoub, J. A., Noura, H. N., Salman, O., & Chehab, A. (2021). Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8YaacoubJ. A.NouraH. N.SalmanO.ChehabA.2021Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendationsInternational Journal of Information Security211115158https://doi.org/10.1007/s10207-021-00545-8Search in Google Scholar
Dube, D. P., & Mohanty, R. (2018). Towards development of a Cyber Security Capability Maturity Model (CSCMM). International Journal of Business Information Systems, 34(1). https://doi.org/10.1504/ijbis.2020.10014790DubeD. P.MohantyR.2018Towards development of a Cyber Security Capability Maturity Model (CSCMM)International Journal of Business Information Systems341https://doi.org/10.1504/ijbis.2020.10014790Search in Google Scholar
Porwal, S., Nair, S. K., & Dimitrakos, T. (2011). Regulatory Impact of Data Protection and Privacy in the Cloud. In S. Porwal, S. K. Nair, & T. Dimitrakos, IFIP advances in information and communication technology (p. 290). Springer Science+Business Media. https://doi.org/10.1007/978-3-642-22200-9_23PorwalS.NairS. K.DimitrakosT.2011Regulatory Impact of Data Protection and Privacy in the CloudInPorwalS.NairS. K.DimitrakosT.IFIP advances in information and communication technology290Springer Science+Business Mediahttps://doi.org/10.1007/978-3-642-22200-9_23Search in Google Scholar
Chawki, M. (2024). An effective cloud computing model enhancing privacy in cloud computing. Information Security Journal a Global Perspective, 1–24. https://doi.org/10.1080/19393555.2024.2307637ChawkiM.2024An effective cloud computing model enhancing privacy in cloud computingInformation Security Journal a Global Perspective124https://doi.org/10.1080/19393555.2024.2307637Search in Google Scholar
Asiri, N. (2024). Security and privacy issues in Cloud Storage. In N. Asiri, arXiv (Cornell University). Cornell University. https://doi.org/10.48550/arxiv.2401.04076AsiriN.2024Security and privacy issues in Cloud StorageInAsiriN.arXiv (Cornell University)Cornell Universityhttps://doi.org/10.48550/arxiv.2401.04076Search in Google Scholar
Chen, H., & Hai, Y. (2024). Exploring the critical success factors of information security management: a mixed-method approach. Information and Computer Security, 32(5), 545–572. https://doi.org/10.1108/ics-03-2023-0034ChenH.HaiY.2024Exploring the critical success factors of information security management: a mixed-method approachInformation and Computer Security325545572https://doi.org/10.1108/ics-03-2023-0034Search in Google Scholar