Accesso libero

Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI

,  e   
12 set 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Figure 1.

Total of Publications Activity from 2000 until 2025
Total of Publications Activity from 2000 until 2025

Figure 2.

The most important area research on Information Security Risk Management (Source: WoS Research Category Analysis)
The most important area research on Information Security Risk Management (Source: WoS Research Category Analysis)

Figure 3.

Top 10 Most Productive Countries Publishing on Information Security Risk Management
Top 10 Most Productive Countries Publishing on Information Security Risk Management

Figure 4.

Cooperation Network Between Countries in Information Security Risk Management
Cooperation Network Between Countries in Information Security Risk Management

Figure 5.

Keyword Analysis ResultsNotes (Figure 5):High Connectivity: Terms like “Information Security” and “Security” are highly linked, indicating their foundational roles across multiple clusters.Cross-Cluster Relevance: Keywords such as “Risk” and “Management” connect multiple themes, reflecting their broad applicability in the field.Cluster Differentiation: Each cluster represents a specific aspect of cybersecurity, from high-level frameworks to specific vulnerabilities and emerging technologies.
Keyword Analysis ResultsNotes (Figure 5):High Connectivity: Terms like “Information Security” and “Security” are highly linked, indicating their foundational roles across multiple clusters.Cross-Cluster Relevance: Keywords such as “Risk” and “Management” connect multiple themes, reflecting their broad applicability in the field.Cluster Differentiation: Each cluster represents a specific aspect of cybersecurity, from high-level frameworks to specific vulnerabilities and emerging technologies.

Summarise of Bibliometric Studies on Information Security

Study (Reference) Focus/Scope Bibliometric Methods/Tools Data Source Key Findings / Trends Research Gaps / Future Directions
Sharma et al. 2023 [21] Cybersecurity and cyber forensics research (2011–2021); mapping a decade of digital security literature. Co-authorship, co-citation, citation and keyword analysis using full vs. fractional counting; timeline trends and burst detection (CiteSpace-like approach). Web of Science (WoS), 2011–2021 publications.

Steady growth in cybersecurity/forensics publications over the decade.

Top contributors identified: key authors, institutions, countries leading the field.

Major topics include anomaly detection, malware analysis, cyberattacks, machine learning in security.

Collaboration networks show global research clusters (with certain countries forming hubs).

Points out underinvestigated areas at the intersection of cybersecurity and forensics.

Emphasizes need for future work linking preventative security and post-incident forensics.

Provides a decade-long baseline to guide future research directions in emerging cybersecurity threats.

Cybersecurity & Forensics
Arroyabe et al. 2024 [22] Intersection of SME digitalization and cybersecurity – how digital transformation in small businesses relates to security issues. Bibliometric (R) used for co-occurrence (keyword) clustering and citation analysis. Four main thematic clusters identified via co-word analysis. WoS + Scopus (417 papers, up to ~2022) on “SMEs + cybersecurity/digitalization”.

Research splits into 4 clusters: (1) Industry 4.0 & smart factories, (2) Industry 4.0 & SMEs, (3) SMEs & cybersecurity practices, (4) SME digitalization & entrepreneurship.

Increasing digitalization - higher cyber risk for SMEs, but current

literature often treats these topics separately (tech adoption vs. security).

Few studies integrate business innovation and security preparedness, indicating a silo effect.

Identifies a gap: lack of integrated studies on SME digitalization and security.

Predicts cybersecurity in SMEs will emerge as its own research stream, distinct from general digitalization research. Recommends bridging the gap by focusing future research on security as an integral part of SME digital transformation strategies.

Cybersecurity & Digitalization in SMEs
Guembe et al. 2025 [23] Artificial Intelligence in cybersecurity, specifically AI-driven cyberattack and intrusion detection (2014–2024). Comprehensive bibliometric review using Bibliometric/Bibliophagy (R). Co-authorship networks, keyword co-occurrence maps, and citation metrics analysed. Also used dominance factor for author influence. Scopus (2014–2024): 2,338 documents (journals, conferences, etc.) on AI-based cyber defence.

Machine learning & deep learning are the dominant approaches in cybersecurity, showing rapid growth in research interest.

USA is the top-producing country, with India, China and others also major contributors. Strong collaboration networks among leading countries (USA–China–Europe etc.).

High impact work from countries like Canada and Italy despite fewer papers (high citations per paper). Keywords show emphasis on network security, intrusion detection, IoT security, federated learning, etc., indicating trending research topics.

Calls for future research in federated learning and privacy-preserving AI to secure IoT/IoMT systems.

Notes the need to address emerging threats (e.g., adversarial attacks on AI) and to integrate AI with privacy/security by design.

Suggests strengthening international collaborations and interdisciplinary approaches (combining AI with domain knowledge) to tackle complex cyber threats.

AI for Cyberattack Detection
Judijanto et al. 2024 [24] Global landscape of cybersecurity research (2010–2024); evolution of research themes and international collaboration patterns. VOS viewer used for network visualization (co-authorship, co-word, co-citation networks). Analysed publication counts, collaborative networks and topic clusters over time. Scopus (2010–2024): cybersecurity-related publications worldwide.

Dramatic growth in cybersecurity publications over the period, reflecting rising importance of security R&D.

Shift in focus from basic IT security to advanced tech integration: recent literature heavily features AI, IoT, blockchain in cybersecurity context.

Global collaboration network is mapped: USA, China, India, Germany, UK are key hubs driving research and cooperating internationally.

Highlights the field’s increasingly interdisciplinary nature (technical, human, policy angles) to address complex cyber challenges.

Stresses the need for continuous innovation and broad collaboration to keep pace with evolving threats.

Recommends interdisciplinary approaches in future research – integrating fields (technical and human factors) and expanding analytical frameworks.

Suggests using more diverse data sources (beyond just one index, and including real-time threat data) in bibliometric analyses to fully capture the fast-changing cybersecurity landscape.

Global Cybersecurity Research Mapping
Erdoğan & Akmeşe 2025 [25] Cybercrime studies (2000–2023); literature on illegal cyber activities (hacking, cyber fraud, etc.) and countermeasures. Bibliometric (R) and Excel for bibliometric analysis. Examined publication trends, prolific authors, top journals, citation counts; visualized author and country collaboration networks. Web of Science (2000–2023): 2,566 publications on “cybercrime” related keywords.

Steady long-term growth in cybercrime research output as cyber threats proliferate.

Top author: K. Jaishankar (21 papers) – a leading scholar in cyber criminology.

Leading journal: IEEE Access (151 papers on cybercrime); indicates a tech-oriented approach to cybercrime issues is common.

Most-cited work on Stuxnet (cyber warfare), showing crossover between cybercrime and national security topics. Major contributing institutions and countries identified (e.g., strong output from certain universities and cross-country collaborations visualized); reflects an international research effort against cybercrime.

Provides a baseline for future cybercrime research, helping identify less-explored topics.

Implies need for further study in emerging crime areas (e.g., AI-enabled crimes, crypto crimes) as well as underrepresented regions, though specific future directions are general.

Emphasizes using these findings to guide policy and research focus, given the dynamic nature of cybercrime (“moving target” requiring ongoing study).

Cybercrime Research Trends

Top 10 Most Productive Countries Publishing on Information Security Risk Management

Top 10 Country Total of Publications
USA 101
China 24
England 18
Australia 14
India 14
South Korea 13
Spain 12
Taiwan 12
Canada 10
Norway 10

Analysis Tools for Bibliometric Research

No. Criteria VOS viewer CiteSpace Power BI Gephi
1. Purpose Primarily used for constructing and visualizing bibliometric networks, such as citation, co-citation, and co-authorship networks. An open-source software for network visualization and analysis. A business analytics tool by Microsoft, used for data visualization and business intelligence. An open-source software for network visualization and analysis.
2. Strength Preferably for text mining and creating co-occurrence networks of terms from scientific literature. Suitable for detecting emerging trends and sudden bursts of activity in research. Integrates well with various data sources, provides robust data analysis, and interactive dashboards. Supports large-scale network analysis and offers various layout algorithms for better visualization.
3. Visualisation Offers detailed and interactive visualizations of bibliometric maps. Provides temporal visualizations and cluster views, highlighting key areas of research. It offers a variety of visualization options that can be combined into interactive dashboards, allowing users to explore the data dynamically and gain deeper insights into bibliometric patterns and trends. Highly versatile with numerous options for editing and customizing network visualizations.
4. Customisation Customized visualizations to highlight important nodes and connections. Tailored visualizations to emphasize co-citation networks, keyword co-occurrences, and citation bursts. Power BI allows extensive customization for business reports and dashboards, while Gephi offers detailed options for visualizing complex network structures. Rank nodes by metrics such as degree centrality or PageRank.

Top Ten Journals with Highest Total of Publication Activities (2000 – 2025)

Top Ten Journals Total of Publication
Computers & Security 28
Information Security Journal 16
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems 11
IEEE Access 11
Information and Computer Security 11
International Journal of Information Security 9
Journal of Information Security And Applications 8
International Journal of Advanced Computer Science and Applications 7
International Journal of Computer Science and Network Security 6
IET Information Security 5
International Journal of Information Management 5

Keywords Analysis Results

Keywords Links Total Links Strength Occurrences
Cluster 1 (Red Coding) : Information System Risk Governance & Performance
Framework 17 55 28
Governance 11 22 11
Impact 14 47 21
Management 15 62 38
Performance 12 32 17
Technology 10 23 13
Information Security Management 11 21 19
Cluster 2 (Green Coding): Integrated Risk Assessment & Analysis
Computer Security 9 21 10
Cybersecurity 16 71 47
Risk Analysis 10 23 14
Risk Assessment 12 48 35
Cluster 3 (Blue Coding): Risks & Vulnerability
Risks 13 60 30
Security 16 87 57
Systems 12 46 27
Vulnerability 11 26 14
Cluster 4 (Yellow Coding): Information Security & Privacy
Cloud Computing 6 11 11
Information Security 17 185 159
Privacy 12 26 16

Usage of the Risk Management Related to Information Security Term In the Academic Writings

Used in Title Source Total of Academic Writings

2000 – 2005 2006 – 2011 2012 – 2017 2018 – 2023 2024 – 2025
Information Security AND Risk Management WoS 14 74 112 180 38

Top 10 Publisher With Highest Total of Publications

Top Ten Publisher Total Publication
Emerald Group Publishing Ltd 32
Springer 29
Elsevier Advanced Technology 28
Elsevier 25
MDPI 25
Taylor & Francis Inc 22
IEEE-Inst Electrical Electronics Engineers Inc 15
IGI Global 12
Syngress 11
Elsevier Sci Ltd 9

The Top 10 Most Essential Authors of Publications Related to Information Security Risk Management from 2000 to 2025 in the WoS Database Core Collection

First Author Full Name Total of Publication Total of Citation Article Title and Doi
Schuett, Jonas 1 332

Risk Management in the Artificial Intelligence Act

DOI: 10.1111/risa.17665

Summary: Analyzes Article 9 of the EU AI Act, focusing on its risk management provisions.

Massimino, Brett 1 238

On the Inattention to Digital Confidentiality in Operations and Supply Chain Research

DOI: 10.1111/poms.12983

Summary: Discusses the lack of focus on digital confidentiality in operations and supply chain management literature.

Knowles, William 1 229

A Survey of Cyber Security Management in Industrial Control Systems

DOI: 10.1016/j.ijcip.2015.02.002

Summary: Explores cybersecurity management practices in industrial control systems.

Uddin, Md. Hamid 1 214

Cybersecurity Hazards and Financial System Vulnerability: A Synthesis of Literature

DOI: 10.1016/j.ijcip.2015.02.002

Summary: Reviews literature on cybersecurity risks affecting financial systems.

Tarei, Pradeep Kumar 2 202

Benchmarking the Relationship Between Supply Chain Risk Mitigation Strategies and Practices: An Integrated Approach

DOI: 10.1108/BIJ-12-2019-0523

Summary: Proposes a framework linking risk mitigation strategies to practices in supply chains.

Etemadi, Nilofar 1 198

An ISM Modelling of Barriers for Blockchain/Distributed Ledger Technology Adoption in Supply Chains Towards Cybersecurity

DOI: 10.1145/3450588.3450600

Summary: Identifies barriers to adopting blockchain for cybersecurity in supply chains.

Shiau, Wen -Lung 1 196

What Are the Trend and Core Knowledge of Information Security? A Citation and Co-Citation Analysis

DOI: 10.1016/j.im.2023.103774

Summary: Analyzes trends and core knowledge areas in information security research.

Culot, Giovanna 1 189

The ISO/IEC 27001 Information Security Management Standard: Literature Review and Theory-Based Research Agenda

DOI: 10.1108/TQM-09-2020-0202

Summary: Provides a literature review and research agenda for the ISO/IEC 27001 standard.

Fenz, Stefan 5 166

Information Security Risk Management: In Which Security Solutions Is It Worth Investing?

DOI: 10.28963/ais.2011.022

Summary: Evaluates the effectiveness of various security solutions in risk management.

Di Lernia, Cary 1 165

Cyber-Related Risk Disclosure in Australia: Evidence from the ASX200

DOI: 10.3316/agispt.20200324027433

Summary: Investigates the disclosure of cyber-related risks among Australian companies.

Top Ten Journals with Highest Citation (2000 – 2025)

Top 10 Journal Times Cited, WoS Core
Computers & Security 882
MIS Quarterly 391
International Journal of Information Management 327
Information & Management 191
International Journal of Critical Infrastructure Protection 170
Journal of Management Information Systems 167
Information Systems Research 156
Decision Support Systems 141
International Journal of Information Security 111
Journal of Information Security and Applications 90
Lingua:
Inglese
Frequenza di pubblicazione:
6 volte all'anno
Argomenti della rivista:
Informatica, Informatica di base, Informatica teoretica, Sicurezza informatica e criptologia