References
Abeshu, A., & Chilamkurti, N. (2018). Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing. IEEE Communications Magazine, 56(2), 169–175. https://doi.org/10.1109/MCOM.2018.1700332
Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122. https://doi.org/10.1016/j.cose.2020.102122
Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and counter-measures: A survey and research directions. Computers & Security, 74, 144–166. https://doi.org/10.1016/j.cose.2018.01.001
Aria, M., & Cuccurullo, C. (2017). bibliometrix : An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. https://doi.org/10.1016/j.joi.2017.08.007
Asghar, M. R., Hu, Q., & Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and chal-lenges. Computer Networks, 165. https://doi.org/10.1016/j.comnet.2019.106946
Babiceanu, R. F., & Seker, R. (2016). Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook. Computers in Industry, 81, 128–137. https://doi.org/10.1016/j.compind.2016.02.004
Barcellos‐Paula, L., de La Vega, I., & Gil‐Lafuente, A. M. (2022). Bibliometric review of research on decision models in uncertainty, 1990–2020. International Journal of Intelligent Systems, 37(10), 7300–7333. https://doi.org/10.1002/int.22882
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. (2020). Cybersecurity for industrial control sys-tems: A survey. Computers & Security, 89, 101677. https://doi.org/10.1016/j.cose.2019.101677
Blanco-Mesa, F., León-Castro, E., & Merigó, J. M. (2019). A bibliometric analysis of aggregation operators. Applied Soft Computing, 81, 105488. https://doi.org/10.1016/j.asoc.2019.105488
Blanco-Mesa, F., Merigó, J. M., & Gil-Lafuente, A. M. (2017). Fuzzy decision making: A bibliometric-based review. Journal of Intelligent & Fuzzy Systems, 32(3), 2033–2050. https://doi.org/10.3233/JIFS-161640
Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7). https://doi.org/10.1016/j.technovation.2014.02.001
Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D., & Tran, T. (2019). Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity. Computer, 52(12), 45–52. https://doi.org/10.1109/MC.2019.2942584
Broadus, R. N. (1987). Early approaches to bibliometrics. Journal of the American Society for Information Science, 38(2). https://doi.org/10.1002/(SICI)1097-4571(198703)38:2<127::AID-ASI6>3.0.CO;2-K
Calabrese, A., Costa, R., Tiburzi, L., & Brem, A. (2023). Merging two revolutions: A human-artificial intelligence method to study how sustainability and Industry 4.0 are intertwined. Technological Forecasting and Social Change, 188. https://doi.org/10.1016/j.techfore.2022.122265
Chaal, M., Ren, X., BahooToroody, A., Basnet, S., Bolbot, V., Banda, O. A. V., & Gelder, P. Van. (2023). Research on risk, safety, and reliability of autonomous ships: A bibliometric review. Safety Science, 167, 106256. https://doi.org/10.1016/j.ssci.2023.106256
Clarivate (2023). Journal Citation Reports: Reference Guide. Journal Citation Reports.
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011a). An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field. Journal of In-formetrics, 5(1), 146–166. https://doi.org/10.1016/j.joi.2010.10.002
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011b). Science mapping software tools: Review, analysis, and cooperative study among tools. Journal of the American Society for Information Science and Technology, 62(7), 1382–1402. https://doi.org/10.1002/asi.21525
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. https://doi.org/10.1016/j.compind.2019.103165
Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Computers in Industry, 137, 103614. https://doi.org/10.1016/j.compind.2022.103614
Corallo, A., Lazoi, M., Lezzi, M., & Pontrandolfo, P. (2023). Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 70(11). https://doi.org/10.1109/TEM.2021.3084687
Garfield, E. (1955). Citation indexes for science. Science, 122(3159). https://doi.org/10.1126/science.122.3159.108
Ghobakhloo, M. (2020). Determinants of information and digital technology implementation for smart manufacturing. International Journal of Production Research, 58(8), 2384–2405. https://doi.org/10.1080/00207543.2019.1630775
Gil-Aluja, J. (1999). Elements for a Theory of Decision in Uncertainty (Vol. 32). Springer US. https://doi.org/10.1007/978-1-4757-3011-1
Gupta, S., Meissonier, R., Drave, V. A., & Roubaud, D. (2020). Examining the impact of Cloud ERP on sustainable per-formance: A dynamic capability view. International Journal of Information Management, 51. https://doi.org/10.1016/j.ijinfomgt.2019.10.013
Hasanova, H., Baek, U. jun, Shin, M. gon, Cho, K., & Kim, M. S. (2019). A survey on blockchain cybersecurity vulner-abilities and possible countermeasures. International Journal of Network Management, 29(2). https://doi.org/10.1002/nem.2060
Hayat, R. F., Aurangzeb, S., Aleem, M., Srivastava, G., & Lin, J. C. W. (2022). ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2022.3170519
Hayes, A. (2020). Business Definition. Investopedia.
Hosseini Shirvani, M., Rahmani, A. M., & Sahafi, A. (2018). An iterative mathematical decision model for cloud migration: A cost and security risk approach. Software - Practice and Experience, 48(3). https://doi.org/10.1002/spe.2528
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research, 21(2), e12644. https://doi.org/10.2196/12644
Javaheri, D., Gorgin, S., Lee, J. A., & Masdari, M. (2023). Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Information Sciences, 626. https://doi.org/10.1016/j.ins.2023.01.067
Johnson, M. E., Goetz, E., & Pfleeger, S. L. (2009). Security through information risk management. IEEE Security and Privacy, 7(3). https://doi.org/10.1109/MSP.2009.77
Johnson, V., Torres, R., Maurer, C., Guerra, K., Srivastava, S., & Mohit, H. (2023). The 2022 SIM IT Issues and Trends Study. MIS Quarterly Executive, 22(1). https://doi.org/10.17705/2msqe.00075
Kappelman, L., Johnson, V., Maurer, C., McLean, E., Torres, R., David, A., & Nguyen, Q. (2018). The 2017 SIM IT issues and trends study. MIS Quarterly Executive, 17(1).
Kappelman, L., Johnson, V., Torres, R., Maurer, C., & McLean, E. (2019). A study of information systems issues, prac-tices, and leadership in Europe. European Journal of Information Systems, 28(1). https://doi.org/10.1080/0960085X.2018.1497929
Kappelman, L., Maurer, C., Mclean, E. R., Kim, K., Johnson, V. L., Guerra, K., Torres, R., & Snyder, M. (2021). The 2020 SIM IT Issues and Trends Study. MIS Quarterly Executive, 20(1).
Kappelman, L., Torres, R., McLean, E., Maurer, C., Johnson, V., & Kim, K. (2018). The 2018 SIM IT issues and trends study. MIS Quarterly Executive, 18(1). https://doi.org/10.17705/2msqe.00008
Kappelman, L., Torres, R., McLean, E. R., Maurer, C., Johnson, V. L., Snyder, M., & Guerra, K. (2022). The 2021 SIM IT Issues and Trends Study. MIS Quarterly Executive, 21(1), 75–114. https://doi.org/10.17705/2msqe.00060
Kaufmann, A. & Gil-Aluja, J. (1988). Modelos para la investigación de efectos olvidados. Editorial Milladoiro.
Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F., & Díaz-Castaño, N. (2021). Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/10439862211027986
Khan, A. A., Uddin, M., Shaikh, A. A., Laghari, A. A., & Rajput, A. E. (2021). MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3099037
Klaus, J. P., Kim, K., Masli, A., Guerra, K., & Kappelman, L. (2022). Prioritizing IT Management Issues and Business Performance. Journal of Information Systems, 36(2). https://doi.org/10.2308/ISYS-2020-016
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80. https://doi.org/10.1016/j.ijcip.2015.02.002
Kosmowski, K. T., Piesik, E., Piesik, J., & Śliwiński, M. (2022). Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies, 15(10), 3610. https://doi.org/10.3390/en15103610
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cy-ber-physical system. Applied Sciences (Switzerland), 8(6). https://doi.org/10.3390/app8060898
Leng, J., Ye, S., Zhou, M., Zhao, J. L., Liu, Q., Guo, W., Cao, W., & Fu, L. (2021). Blockchain-Secured Smart Manufac-turing in Industry 4.0: A Survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1), 237–252. https://doi.org/10.1109/TSMC.2020.3040789
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Manuel, D.-D., Carmona-Murillo, J., Cortes-Polo, D., & Rodriguez-Perez, F. J. (2022). CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels. IEEE Access, 10, 122454–122485. https://doi.org/10.1109/ACCESS.2022.3223440
Marti, L., & Cervelló‐Royo, R. (2023). Disparities in sustainable development goals compliance and their association with country risk. Sustainable Development. https://doi.org/10.1002/sd.2568
Martínez-López, F. J., Merigó, J. M., Valenzuela-Fernández, L., & Nicolás, C. (2018). Fifty years of the European Journal of Marketing: a bibliometric analysis. In European Journal of Marketing (Vol. 52, Issues 1–2). https://doi.org/10.1108/EJM-11-2017-0853
Mendhurwar, S., & Mishra, R. (2021). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 15(4). https://doi.org/10.1080/17517575.2019.1600041
Moed, H. F. (2005). Citation Analysis in Research Evaluation (Information Science and Knowledge Management). In Analysis.
Naffa, H., & Fain, M. (2020). Performance measurement of ESG-themed megatrend investments in global equity markets using pure factor portfolios methodology. PLOS ONE, 15(12), e0244225. https://doi.org/10.1371/journal.pone.0244225
Ngoc Thach, N., Thanh Hanh, H., Ngoc Huy, D. T., Gwozdziewicz, S., Viet Nga, L. T., & Thanh Huong, L. T. (2021). Technology Quality Management of the Industry 4.0 and Cybersecurity Risk Management on Current Banking Activities in Emerging Markets - The Case in Vietnam. International Journal for Quality Research, 15(3), 845–856. https://doi.org/10.24874/IJQR15.03-10
Nishant, R., Kennedy, M., & Corbett, J. (2020). Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda. International Journal of Information Management, 53, 102104. https://doi.org/10.1016/j.ijinfomgt.2020.102104
Noyons, E. C. M., Moed, H. F., & Luwel, M. (1999). Combining mapping and citation analysis for evaluative bibliometric purposes: A bibliometric study. Journal of the American Society for Information Science, 50(2), 115–131. https://doi.org/10.1002/(SICI)1097-4571(1999)50:2<115::AID-ASI3>3.0.CO;2-J
Page MJ, McKenzie JE, Bossuyt PM, et al (2021) The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. The BMJ 372:71.
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. In ICT Express (Vol. 9, Issue 4). https://doi.org/10.1016/j.icte.2023.02.007
Pedraja-Rejas, L., Rodríguez-Ponce, E., & Muñoz-Fritis, C. (2022). Human resource management and performance in Ibero-America: Bibliometric analysis of scientific production. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211569lp
Pritchard, A. (1969). Statistical Bibliography or Bibliometrics? In Journal of Documentation 25 (4): 348-349.
Protogerou, A., Papadopoulos, S., Drosou, A., Tzovaras, D., & Refanidis, I. (2021). A graph neural network method for distributed anomaly detection in IoT. Evolving Systems, 12(1). https://doi.org/10.1007/s12530-020-09347-0
Rashid, Z., Noor, U., & Altmann, J. (2021). Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Future Generation Computer Systems, 124, 436–466. https://doi.org/10.1016/j.future.2021.05.033
Ribeiro, H., Barbosa, B., Moreira, A. C., & Rodrigues, R. (2022). Churn in services – A bibliometric review. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211509hr
Shackelford, S. J. (2012). Should your firm invest in cyber risk insurance? Business Horizons, 55(4). https://doi.org/10.1016/j.bushor.2012.02.004
Shah, S. (2020). The Technological Impact of COVID-19 on the Future of Education and Health Care Delivery. Pain Physician, 4S;23(8;4S), S367–S380. https://doi.org/10.36076/ppj.2020/23/S367
Silva, B. C., & Moreira, A. C. (2022). Entrepreneurship and the gig economy: A bibliometric analysis. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211580am
Tagarev, T., Davis, B., & Cooke, M. (2022). Business, Organisational and governance modalities of collaborative cybersecurity networks. Multimedia Tools and Applications, 81(7). https://doi.org/10.1007/s11042-021-11109-2
Tsiodra, M., Panda, S., Chronopoulos, M., & Panaousis, E. (2023). Cyber Risk Assessment and Optimization: A Small Business Case Study. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3272670
van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. SCIENTOMETRICS, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
Yager, R. R. (1988). On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Transactions on Systems, Man, and Cybernetics, 18(1), 183–190. https://doi.org/10.1109/21.87068
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3087109
Zupic, I., & Čater, T. (2015). Bibliometric Methods in Management and Organization. Organizational Research Methods, 18(3), 429–472. https://doi.org/10.1177/1094428114562629