Investigación en ciberseguridad y negocios: una revisión bibliométrica (2004-2023)
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Anna M. Gil-Lafuente
José M. Merigó
Resumen
La ciberseguridad representa un riesgo importante para las empresas debido al aumento de los ciberataques en todo el mundo, lo que genera una mayor incertidumbre en la gestión de la seguridad y pone en riesgo la sostenibilidad de las empresas. A pesar de algunas contribuciones académicas, existen estudios bibliométricos limitados sobre la integración de la ciberseguridad y la información empresarial. La investigación tiene como objetivo ayudar a los académicos, los responsables políticos y los tomadores de decisiones en la gestión de la ciberseguridad. Los autores realizaron una revisión bibliométrica utilizando el mapeo científico y el análisis de rendimiento. El estudio utilizó la base de datos Web of Science y el software Bibliometrix para analizar 410 artículos y 1,355 autores en nueve indicadores bibliométricos entre 2004 y 2023. Este artículo es novedoso al proponer una revisión bibliométrica de la ciberseguridad y los negocios, ya que los otros estudios abordaron sectores específicos y no permiten una visión integrada de la información sobre estos dos temas. Los principales hallazgos mostraron un crecimiento anual del 27.63% y una coautoría internacional del 31.46%. Los Estados Unidos de América cuentan con la mayor producción científica, seguido de Reino Unido y China. Business Horizons e IEEE Access son las revistas más influyentes en este campo de investigación. Este estudio puede mejorar el análisis de académicos, formuladores de políticas y tomadores de decisiones en las empresas en relación con la gestión de la seguridad. Estudios futuros podrían proponer modelos de gestión para mejorar la ciberseguridad en las organizaciones.
Cómo citar
##plugins.themes.bootstrap3.article.details##
Ciberseguridad, Negocios, Gestión de la seguridad, Mapeo científico, Riesgo, Bibliometrix
Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122. https://doi.org/10.1016/j.cose.2020.102122
Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and counter-measures: A survey and research directions. Computers & Security, 74, 144–166. https://doi.org/10.1016/j.cose.2018.01.001
Aria, M., & Cuccurullo, C. (2017). bibliometrix : An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. https://doi.org/10.1016/j.joi.2017.08.007
Asghar, M. R., Hu, Q., & Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and chal-lenges. Computer Networks, 165. https://doi.org/10.1016/j.comnet.2019.106946
Babiceanu, R. F., & Seker, R. (2016). Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook. Computers in Industry, 81, 128–137. https://doi.org/10.1016/j.compind.2016.02.004
Barcellos‐Paula, L., de La Vega, I., & Gil‐Lafuente, A. M. (2022). Bibliometric review of research on decision models in uncertainty, 1990–2020. International Journal of Intelligent Systems, 37(10), 7300–7333. https://doi.org/10.1002/int.22882
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. (2020). Cybersecurity for industrial control sys-tems: A survey. Computers & Security, 89, 101677. https://doi.org/10.1016/j.cose.2019.101677
Blanco-Mesa, F., León-Castro, E., & Merigó, J. M. (2019). A bibliometric analysis of aggregation operators. Applied Soft Computing, 81, 105488. https://doi.org/10.1016/j.asoc.2019.105488
Blanco-Mesa, F., Merigó, J. M., & Gil-Lafuente, A. M. (2017). Fuzzy decision making: A bibliometric-based review. Journal of Intelligent & Fuzzy Systems, 32(3), 2033–2050. https://doi.org/10.3233/JIFS-161640
Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7). https://doi.org/10.1016/j.technovation.2014.02.001
Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D., & Tran, T. (2019). Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity. Computer, 52(12), 45–52. https://doi.org/10.1109/MC.2019.2942584
Broadus, R. N. (1987). Early approaches to bibliometrics. Journal of the American Society for Information Science, 38(2). https://doi.org/10.1002/(SICI)1097-4571(198703)38:2<127::AID-ASI6>3.0.CO;2-K
Calabrese, A., Costa, R., Tiburzi, L., & Brem, A. (2023). Merging two revolutions: A human-artificial intelligence method to study how sustainability and Industry 4.0 are intertwined. Technological Forecasting and Social Change, 188. https://doi.org/10.1016/j.techfore.2022.122265
Chaal, M., Ren, X., BahooToroody, A., Basnet, S., Bolbot, V., Banda, O. A. V., & Gelder, P. Van. (2023). Research on risk, safety, and reliability of autonomous ships: A bibliometric review. Safety Science, 167, 106256. https://doi.org/10.1016/j.ssci.2023.106256
Clarivate (2023). Journal Citation Reports: Reference Guide. Journal Citation Reports.
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011a). An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field. Journal of In-formetrics, 5(1), 146–166. https://doi.org/10.1016/j.joi.2010.10.002
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011b). Science mapping software tools: Review, analysis, and cooperative study among tools. Journal of the American Society for Information Science and Technology, 62(7), 1382–1402. https://doi.org/10.1002/asi.21525
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. https://doi.org/10.1016/j.compind.2019.103165
Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Computers in Industry, 137, 103614. https://doi.org/10.1016/j.compind.2022.103614
Corallo, A., Lazoi, M., Lezzi, M., & Pontrandolfo, P. (2023). Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 70(11). https://doi.org/10.1109/TEM.2021.3084687
Garfield, E. (1955). Citation indexes for science. Science, 122(3159). https://doi.org/10.1126/science.122.3159.108
Ghobakhloo, M. (2020). Determinants of information and digital technology implementation for smart manufacturing. International Journal of Production Research, 58(8), 2384–2405. https://doi.org/10.1080/00207543.2019.1630775
Gil-Aluja, J. (1999). Elements for a Theory of Decision in Uncertainty (Vol. 32). Springer US. https://doi.org/10.1007/978-1-4757-3011-1
Gupta, S., Meissonier, R., Drave, V. A., & Roubaud, D. (2020). Examining the impact of Cloud ERP on sustainable per-formance: A dynamic capability view. International Journal of Information Management, 51. https://doi.org/10.1016/j.ijinfomgt.2019.10.013
Hasanova, H., Baek, U. jun, Shin, M. gon, Cho, K., & Kim, M. S. (2019). A survey on blockchain cybersecurity vulner-abilities and possible countermeasures. International Journal of Network Management, 29(2). https://doi.org/10.1002/nem.2060
Hayat, R. F., Aurangzeb, S., Aleem, M., Srivastava, G., & Lin, J. C. W. (2022). ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2022.3170519
Hayes, A. (2020). Business Definition. Investopedia.
Hosseini Shirvani, M., Rahmani, A. M., & Sahafi, A. (2018). An iterative mathematical decision model for cloud migration: A cost and security risk approach. Software - Practice and Experience, 48(3). https://doi.org/10.1002/spe.2528
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research, 21(2), e12644. https://doi.org/10.2196/12644
Javaheri, D., Gorgin, S., Lee, J. A., & Masdari, M. (2023). Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Information Sciences, 626. https://doi.org/10.1016/j.ins.2023.01.067
Johnson, M. E., Goetz, E., & Pfleeger, S. L. (2009). Security through information risk management. IEEE Security and Privacy, 7(3). https://doi.org/10.1109/MSP.2009.77
Johnson, V., Torres, R., Maurer, C., Guerra, K., Srivastava, S., & Mohit, H. (2023). The 2022 SIM IT Issues and Trends Study. MIS Quarterly Executive, 22(1). https://doi.org/10.17705/2msqe.00075
Kappelman, L., Johnson, V., Maurer, C., McLean, E., Torres, R., David, A., & Nguyen, Q. (2018). The 2017 SIM IT issues and trends study. MIS Quarterly Executive, 17(1).
Kappelman, L., Johnson, V., Torres, R., Maurer, C., & McLean, E. (2019). A study of information systems issues, prac-tices, and leadership in Europe. European Journal of Information Systems, 28(1). https://doi.org/10.1080/0960085X.2018.1497929
Kappelman, L., Maurer, C., Mclean, E. R., Kim, K., Johnson, V. L., Guerra, K., Torres, R., & Snyder, M. (2021). The 2020 SIM IT Issues and Trends Study. MIS Quarterly Executive, 20(1).
Kappelman, L., Torres, R., McLean, E., Maurer, C., Johnson, V., & Kim, K. (2018). The 2018 SIM IT issues and trends study. MIS Quarterly Executive, 18(1). https://doi.org/10.17705/2msqe.00008
Kappelman, L., Torres, R., McLean, E. R., Maurer, C., Johnson, V. L., Snyder, M., & Guerra, K. (2022). The 2021 SIM IT Issues and Trends Study. MIS Quarterly Executive, 21(1), 75–114. https://doi.org/10.17705/2msqe.00060
Kaufmann, A. & Gil-Aluja, J. (1988). Modelos para la investigación de efectos olvidados. Editorial Milladoiro.
Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F., & Díaz-Castaño, N. (2021). Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/10439862211027986
Khan, A. A., Uddin, M., Shaikh, A. A., Laghari, A. A., & Rajput, A. E. (2021). MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3099037
Klaus, J. P., Kim, K., Masli, A., Guerra, K., & Kappelman, L. (2022). Prioritizing IT Management Issues and Business Performance. Journal of Information Systems, 36(2). https://doi.org/10.2308/ISYS-2020-016
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80. https://doi.org/10.1016/j.ijcip.2015.02.002
Kosmowski, K. T., Piesik, E., Piesik, J., & Śliwiński, M. (2022). Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies, 15(10), 3610. https://doi.org/10.3390/en15103610
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cy-ber-physical system. Applied Sciences (Switzerland), 8(6). https://doi.org/10.3390/app8060898
Leng, J., Ye, S., Zhou, M., Zhao, J. L., Liu, Q., Guo, W., Cao, W., & Fu, L. (2021). Blockchain-Secured Smart Manufac-turing in Industry 4.0: A Survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1), 237–252. https://doi.org/10.1109/TSMC.2020.3040789
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Manuel, D.-D., Carmona-Murillo, J., Cortes-Polo, D., & Rodriguez-Perez, F. J. (2022). CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels. IEEE Access, 10, 122454–122485. https://doi.org/10.1109/ACCESS.2022.3223440
Marti, L., & Cervelló‐Royo, R. (2023). Disparities in sustainable development goals compliance and their association with country risk. Sustainable Development. https://doi.org/10.1002/sd.2568
Martínez-López, F. J., Merigó, J. M., Valenzuela-Fernández, L., & Nicolás, C. (2018). Fifty years of the European Journal of Marketing: a bibliometric analysis. In European Journal of Marketing (Vol. 52, Issues 1–2). https://doi.org/10.1108/EJM-11-2017-0853
Mendhurwar, S., & Mishra, R. (2021). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 15(4). https://doi.org/10.1080/17517575.2019.1600041
Moed, H. F. (2005). Citation Analysis in Research Evaluation (Information Science and Knowledge Management). In Analysis.
Naffa, H., & Fain, M. (2020). Performance measurement of ESG-themed megatrend investments in global equity markets using pure factor portfolios methodology. PLOS ONE, 15(12), e0244225. https://doi.org/10.1371/journal.pone.0244225
Ngoc Thach, N., Thanh Hanh, H., Ngoc Huy, D. T., Gwozdziewicz, S., Viet Nga, L. T., & Thanh Huong, L. T. (2021). Technology Quality Management of the Industry 4.0 and Cybersecurity Risk Management on Current Banking Activities in Emerging Markets - The Case in Vietnam. International Journal for Quality Research, 15(3), 845–856. https://doi.org/10.24874/IJQR15.03-10
Nishant, R., Kennedy, M., & Corbett, J. (2020). Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda. International Journal of Information Management, 53, 102104. https://doi.org/10.1016/j.ijinfomgt.2020.102104
Noyons, E. C. M., Moed, H. F., & Luwel, M. (1999). Combining mapping and citation analysis for evaluative bibliometric purposes: A bibliometric study. Journal of the American Society for Information Science, 50(2), 115–131. https://doi.org/10.1002/(SICI)1097-4571(1999)50:2<115::AID-ASI3>3.0.CO;2-J
Page MJ, McKenzie JE, Bossuyt PM, et al (2021) The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. The BMJ 372:71.
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. In ICT Express (Vol. 9, Issue 4). https://doi.org/10.1016/j.icte.2023.02.007
Pedraja-Rejas, L., Rodríguez-Ponce, E., & Muñoz-Fritis, C. (2022). Human resource management and performance in Ibero-America: Bibliometric analysis of scientific production. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211569lp
Pritchard, A. (1969). Statistical Bibliography or Bibliometrics? In Journal of Documentation 25 (4): 348-349.
Protogerou, A., Papadopoulos, S., Drosou, A., Tzovaras, D., & Refanidis, I. (2021). A graph neural network method for distributed anomaly detection in IoT. Evolving Systems, 12(1). https://doi.org/10.1007/s12530-020-09347-0
Rashid, Z., Noor, U., & Altmann, J. (2021). Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Future Generation Computer Systems, 124, 436–466. https://doi.org/10.1016/j.future.2021.05.033
Ribeiro, H., Barbosa, B., Moreira, A. C., & Rodrigues, R. (2022). Churn in services – A bibliometric review. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211509hr
Shackelford, S. J. (2012). Should your firm invest in cyber risk insurance? Business Horizons, 55(4). https://doi.org/10.1016/j.bushor.2012.02.004
Shah, S. (2020). The Technological Impact of COVID-19 on the Future of Education and Health Care Delivery. Pain Physician, 4S;23(8;4S), S367–S380. https://doi.org/10.36076/ppj.2020/23/S367
Silva, B. C., & Moreira, A. C. (2022). Entrepreneurship and the gig economy: A bibliometric analysis. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211580am
Tagarev, T., Davis, B., & Cooke, M. (2022). Business, Organisational and governance modalities of collaborative cybersecurity networks. Multimedia Tools and Applications, 81(7). https://doi.org/10.1007/s11042-021-11109-2
Tsiodra, M., Panda, S., Chronopoulos, M., & Panaousis, E. (2023). Cyber Risk Assessment and Optimization: A Small Business Case Study. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3272670
van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. SCIENTOMETRICS, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
Yager, R. R. (1988). On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Transactions on Systems, Man, and Cybernetics, 18(1), 183–190. https://doi.org/10.1109/21.87068
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3087109
Zupic, I., & Čater, T. (2015). Bibliometric Methods in Management and Organization. Organizational Research Methods, 18(3), 429–472. https://doi.org/10.1177/1094428114562629
Los autores mantienen el copyright de la publicación. Las publicaciones en Cuadernos de Gestión se distribuyen bajo la licencia de Creative Commons -CC-BY-NC-ND, garantizando el acceso abierto a toda la sociedad.
En concreto la licencia CC-BY-NC-ND permite utilización, copia, distribución y comunicación pública de la obra, siempre que los autores y la fuente sean correctamente citados y no se utilice para propósitos comerciales.
El/la autor/a puede hacer libre uso de su artículo indicando siempre que el texto ha sido publicado en Management Letters/Cuadernos de Gestión y cualquier re-edición del mismo deberá contar con la autorización de la revista.