- by Dr. Prafulla Dikshit
(4-6 minutes read)
Introduction
The Bibliometric and Bibliographic analysis is a promising new analytical methodology that derives
its applications from the methodological realm of network analysis. One of the
major applications of Bibliometrics is in understanding the publication
dynamics within a given field and/or a specific focal area of research (Andersen
2018). Cybersecurity is
one such emergent field with numerous challenges with the proliferation of the
latest digital technologies, especially within the last five years. One of the
major challenges facing the cybersecurity field is the lack of cooperation at various
levels including industry, regional, national, and international, towards
ensuring. This is primarily owing to a lack of a single or integrated framework
for cybersecurity risk governance and compliance and the disjointed efforts by
the various national governments towards achieving cybersecurity integration.
One of the underlying factors is a trust deficit. It remains to be seen whether
research on the topic points to a possibility and the modalities of such cooperation
(Link, et al. 2018).
Method
I performed a bibliometric analysis
based on a search query executed in the Web of Science database, for literature
within the last 10 years which included peer-reviewed journal articles in the
field. The database search yielded a collection of 282 high-quality
peer-reviewed journal articles and corresponding bibliographic data was
exported as a text file. The bibliographic data was exported to the VOS viewer
and cluster analysis of the key terms within the title, abstract, and keywords
of the articles within the collection were performed. Just to provide a broad
idea of the search – the major terms within the original search query included
– cybersecurity, protection, governance, risk, compliance, regulations,
cooperation, firm, industry, national, and international.
Discussion
This analysis yielded a fascinating
structure of keyword occurrence clusters within the topical area, as shown in
Figure 1 below. The figure shows that there are broadly three keyword clusters
within the literature on the topic as represented by the blue, green, and red
colored node clusters. We can say that the keywords in a given cluster co-occur
in a set of publications closely related thematically. The size of the node
shows the occurrence frequency of an individual keyword, while its distance
with another keyword node shows the relative co-occurrence and strength of
association with the other keyword. A thematic aggregation of the green cluster
shows a pattern of four prominent interconnected nodes – System-Requirement-Standard-Solution
in the order of importance by occurrence. Herein the System node is the largest
and it co-occurs with the three other major keywords and shows the direction the
research in this cluster may be taking. The ‘system’ keyword node is closer to
the ‘standard’ and solution’ nodes which are still closer to each other indicating
standard solutions or solution standards within the cybersecurity application systems
are being majorly researched within this cluster, and the same are being
assessed for the requirements of the system as indicated by proximity of this
system-standard-solution sub-cluster to the prominent yet slightly distant
'requirement node'. The other smaller and more distant nodes in the green
cluster provide more context and granularity to the research area. For example,
nodes like 'service', 'assessment', and 'operation' provide a firm and
industry-level thrust to the theme of cybersecurity system solutions through
the assessment of service operation requirements (Akanfe,
Valecha, and Rao 2020; Rosado, et al. 2022; Wang, et al. 2020).
Similarly, the blue cluster
represents a GDPR and Regulation-centric intellectual structure. GDPR is short
for General Data Protection Regulation. The overarching keyword co-occurrence
structure of the blue cluster is Regulation-Protection-Implementation-GDPR-Application-Device-Privacy-Challenge.
Regulation is here the largest and the key node and the nearest prominent nodes
are requirement and protection. This may be interpreted as a focus on
protection requirements through regulation. Further, GDPR appears as the most
prominent cybersecurity regulation and the application of the provisions of device-based
privacy protection and its underlying challenges are likely the research focus.
This is consistent with the cybersecurity challenges owing to new connected device
system technologies like IOT (Jagannathan and Sorini 2015; Jideani, et al. 2018).
The red cluster is represented
primarily by a node named ‘study’ and the closest and largest node to
the same is ‘threat’, followed by ‘research’, ‘practice', and 'context'. This shows that there is a pertinent research
effort to study the threats and the cybersecurity practices with a focus on
their contexts (Hare 2016; Topping,
et al. 2021).
Figure 1. Cluster diagram for
the research on the topical area within the Cybersecurity domain.
Conclusion
Overall, the research in this
area of cybersecurity cooperation as the problem area is focused on the lines
of - Study of threats, and System requirements for Protection Regulation and
implementation, to mitigate the threats as the solution side of the research.
This article demonstrates the power of keyword cluster analysis in capturing
the research insights from the visual aggregation of research themes and
identifying the recent and upcoming research directions on the solution side of
a broad research problem area.
***
References
Akanfe, Oluwafemi, Rohit Valecha, and Raghav H.
Rao. 2020. "Assessing
country-level privacy risk for digital payment systems." Computers & Security 99: 102065.
Andersen, Jan. 2018. "Chapter 6 - Preaward—Project
Preparation." In Research Management:
Europe and Beyond, 147-171.
Hare, Stephanie. 2016. "For your eyes only: U.S. technology companies, sovereign states, and the battle over
data protection." Business Horizons 59: 549-561.
Jagannathan, Srinivasan, and Adam
Sorini. 2015. "A cybersecurity
risk analysis methodology for medical devices." 2015
IEEE Symposium on Product Compliance Engineering (ISPCE). IEEE. 1-6.
Jideani, Paul, Louise Leenen, Bennet
Alexander, and Jay Barnes. 2018. "Towards
an electronic retail cybersecurity framework." 2018
International Conference on Advances in Big Data, Computing and Data
Communication Systems (IcABCD).
IEEE. 1-6.
Link, Jochen, Karl Waedt, Ben Ines
Zid, and Xinxin Lou. 2018. "Current
Challenges of the Joint Consideration of Functional Safety & Cyber Security,
Their Interoperability and Impact on Organizations: How to
Manage RAMS + S (Reliability
Availability Maintainability Safety + Security)." 2018 12th International Conference on Reliability,
Maintainability, and Safety (ICRMS).
IEEE. 185-191.
Rosado, David G.,
Antonio Santos-Olmo, Luis Enrique Sánchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis, and Eduardo
Fernández-Medina. 2022.
"Managing cybersecurity risks of cyber-physical
systems: The MARISMA-CPS pattern." Computers in Industry 142: 103715.
Topping, Colin, Andrew Dwyer, Ola
Michalec, Barnaby Craggs, and Awais Rashid. 2021. "Beware suppliers bearing gifts!: Analysing
coverage of supply chain cyber security in critical national infrastructure
sectorial and cross-sectorial frameworks."
Computers & Security 108: 102324.
Wang, Di, Yan Zhu, Yi Zhang, and
Guowei Liu. 2020. "Security
Assessment of Blockchain in Chinese Classified Protection of Cybersecurity." IEEE Access 203440-203456.