Research on cybersecurity and business: A bibliometric review (2004-2023)
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Anna M. Gil-Lafuente
José M. Merigó
Abstract
Cybersecurity poses a significant risk for companies due to the rise in cyberattacks worldwide, leading to increased uncertainty in security management and putting the sustainability of businesses at risk. Despite some academic contributions, limited bibliometric studies on integrating cybersecurity and business information exist. The research aims to assist academics, policymakers, and decision-makers in cybersecurity management. The authors conducted a bibliometric review using scientific mapping and performance analysis. The study used the Web of Science database and Bibliometrix software to analyze 410 articles and 1,355 authors across nine bibliometric indicators between 2004 and 2023. This article is novel in proposing a bibliometric review of cybersecurity and business, as the other studies addressed specific sectors and do not allow for an integrated view of information on these two topics. The main findings showed an annual growth of 27.63% and an international co-authorship of 31.46%. The United States of America has the highest scientific production, followed by the United Kingdom and China. Business Horizons and IEEE Access are the most influential journals in this field of research. This study can improve the analysis of academics, policymakers, and decision-makers in companies regarding security management. Future studies could propose management models to improve cybersecurity in organizations.
How to Cite
##plugins.themes.bootstrap3.article.details##
Cybersecurity, Business, Safety Management, Scientific Mapping, Bibliometrix, Risk
Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122. https://doi.org/10.1016/j.cose.2020.102122
Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and counter-measures: A survey and research directions. Computers & Security, 74, 144–166. https://doi.org/10.1016/j.cose.2018.01.001
Aria, M., & Cuccurullo, C. (2017). bibliometrix : An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. https://doi.org/10.1016/j.joi.2017.08.007
Asghar, M. R., Hu, Q., & Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and chal-lenges. Computer Networks, 165. https://doi.org/10.1016/j.comnet.2019.106946
Babiceanu, R. F., & Seker, R. (2016). Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook. Computers in Industry, 81, 128–137. https://doi.org/10.1016/j.compind.2016.02.004
Barcellos‐Paula, L., de La Vega, I., & Gil‐Lafuente, A. M. (2022). Bibliometric review of research on decision models in uncertainty, 1990–2020. International Journal of Intelligent Systems, 37(10), 7300–7333. https://doi.org/10.1002/int.22882
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. (2020). Cybersecurity for industrial control sys-tems: A survey. Computers & Security, 89, 101677. https://doi.org/10.1016/j.cose.2019.101677
Blanco-Mesa, F., León-Castro, E., & Merigó, J. M. (2019). A bibliometric analysis of aggregation operators. Applied Soft Computing, 81, 105488. https://doi.org/10.1016/j.asoc.2019.105488
Blanco-Mesa, F., Merigó, J. M., & Gil-Lafuente, A. M. (2017). Fuzzy decision making: A bibliometric-based review. Journal of Intelligent & Fuzzy Systems, 32(3), 2033–2050. https://doi.org/10.3233/JIFS-161640
Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7). https://doi.org/10.1016/j.technovation.2014.02.001
Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D., & Tran, T. (2019). Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity. Computer, 52(12), 45–52. https://doi.org/10.1109/MC.2019.2942584
Broadus, R. N. (1987). Early approaches to bibliometrics. Journal of the American Society for Information Science, 38(2). https://doi.org/10.1002/(SICI)1097-4571(198703)38:2<127::AID-ASI6>3.0.CO;2-K
Calabrese, A., Costa, R., Tiburzi, L., & Brem, A. (2023). Merging two revolutions: A human-artificial intelligence method to study how sustainability and Industry 4.0 are intertwined. Technological Forecasting and Social Change, 188. https://doi.org/10.1016/j.techfore.2022.122265
Chaal, M., Ren, X., BahooToroody, A., Basnet, S., Bolbot, V., Banda, O. A. V., & Gelder, P. Van. (2023). Research on risk, safety, and reliability of autonomous ships: A bibliometric review. Safety Science, 167, 106256. https://doi.org/10.1016/j.ssci.2023.106256
Clarivate (2023). Journal Citation Reports: Reference Guide. Journal Citation Reports.
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011a). An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field. Journal of In-formetrics, 5(1), 146–166. https://doi.org/10.1016/j.joi.2010.10.002
Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011b). Science mapping software tools: Review, analysis, and cooperative study among tools. Journal of the American Society for Information Science and Technology, 62(7), 1382–1402. https://doi.org/10.1002/asi.21525
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. https://doi.org/10.1016/j.compind.2019.103165
Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Computers in Industry, 137, 103614. https://doi.org/10.1016/j.compind.2022.103614
Corallo, A., Lazoi, M., Lezzi, M., & Pontrandolfo, P. (2023). Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 70(11). https://doi.org/10.1109/TEM.2021.3084687
Garfield, E. (1955). Citation indexes for science. Science, 122(3159). https://doi.org/10.1126/science.122.3159.108
Ghobakhloo, M. (2020). Determinants of information and digital technology implementation for smart manufacturing. International Journal of Production Research, 58(8), 2384–2405. https://doi.org/10.1080/00207543.2019.1630775
Gil-Aluja, J. (1999). Elements for a Theory of Decision in Uncertainty (Vol. 32). Springer US. https://doi.org/10.1007/978-1-4757-3011-1
Gupta, S., Meissonier, R., Drave, V. A., & Roubaud, D. (2020). Examining the impact of Cloud ERP on sustainable per-formance: A dynamic capability view. International Journal of Information Management, 51. https://doi.org/10.1016/j.ijinfomgt.2019.10.013
Hasanova, H., Baek, U. jun, Shin, M. gon, Cho, K., & Kim, M. S. (2019). A survey on blockchain cybersecurity vulner-abilities and possible countermeasures. International Journal of Network Management, 29(2). https://doi.org/10.1002/nem.2060
Hayat, R. F., Aurangzeb, S., Aleem, M., Srivastava, G., & Lin, J. C. W. (2022). ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2022.3170519
Hayes, A. (2020). Business Definition. Investopedia.
Hosseini Shirvani, M., Rahmani, A. M., & Sahafi, A. (2018). An iterative mathematical decision model for cloud migration: A cost and security risk approach. Software - Practice and Experience, 48(3). https://doi.org/10.1002/spe.2528
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research, 21(2), e12644. https://doi.org/10.2196/12644
Javaheri, D., Gorgin, S., Lee, J. A., & Masdari, M. (2023). Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Information Sciences, 626. https://doi.org/10.1016/j.ins.2023.01.067
Johnson, M. E., Goetz, E., & Pfleeger, S. L. (2009). Security through information risk management. IEEE Security and Privacy, 7(3). https://doi.org/10.1109/MSP.2009.77
Johnson, V., Torres, R., Maurer, C., Guerra, K., Srivastava, S., & Mohit, H. (2023). The 2022 SIM IT Issues and Trends Study. MIS Quarterly Executive, 22(1). https://doi.org/10.17705/2msqe.00075
Kappelman, L., Johnson, V., Maurer, C., McLean, E., Torres, R., David, A., & Nguyen, Q. (2018). The 2017 SIM IT issues and trends study. MIS Quarterly Executive, 17(1).
Kappelman, L., Johnson, V., Torres, R., Maurer, C., & McLean, E. (2019). A study of information systems issues, prac-tices, and leadership in Europe. European Journal of Information Systems, 28(1). https://doi.org/10.1080/0960085X.2018.1497929
Kappelman, L., Maurer, C., Mclean, E. R., Kim, K., Johnson, V. L., Guerra, K., Torres, R., & Snyder, M. (2021). The 2020 SIM IT Issues and Trends Study. MIS Quarterly Executive, 20(1).
Kappelman, L., Torres, R., McLean, E., Maurer, C., Johnson, V., & Kim, K. (2018). The 2018 SIM IT issues and trends study. MIS Quarterly Executive, 18(1). https://doi.org/10.17705/2msqe.00008
Kappelman, L., Torres, R., McLean, E. R., Maurer, C., Johnson, V. L., Snyder, M., & Guerra, K. (2022). The 2021 SIM IT Issues and Trends Study. MIS Quarterly Executive, 21(1), 75–114. https://doi.org/10.17705/2msqe.00060
Kaufmann, A. & Gil-Aluja, J. (1988). Modelos para la investigación de efectos olvidados. Editorial Milladoiro.
Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F., & Díaz-Castaño, N. (2021). Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/10439862211027986
Khan, A. A., Uddin, M., Shaikh, A. A., Laghari, A. A., & Rajput, A. E. (2021). MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3099037
Klaus, J. P., Kim, K., Masli, A., Guerra, K., & Kappelman, L. (2022). Prioritizing IT Management Issues and Business Performance. Journal of Information Systems, 36(2). https://doi.org/10.2308/ISYS-2020-016
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80. https://doi.org/10.1016/j.ijcip.2015.02.002
Kosmowski, K. T., Piesik, E., Piesik, J., & Śliwiński, M. (2022). Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies, 15(10), 3610. https://doi.org/10.3390/en15103610
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cy-ber-physical system. Applied Sciences (Switzerland), 8(6). https://doi.org/10.3390/app8060898
Leng, J., Ye, S., Zhou, M., Zhao, J. L., Liu, Q., Guo, W., Cao, W., & Fu, L. (2021). Blockchain-Secured Smart Manufac-turing in Industry 4.0: A Survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1), 237–252. https://doi.org/10.1109/TSMC.2020.3040789
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Manuel, D.-D., Carmona-Murillo, J., Cortes-Polo, D., & Rodriguez-Perez, F. J. (2022). CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels. IEEE Access, 10, 122454–122485. https://doi.org/10.1109/ACCESS.2022.3223440
Marti, L., & Cervelló‐Royo, R. (2023). Disparities in sustainable development goals compliance and their association with country risk. Sustainable Development. https://doi.org/10.1002/sd.2568
Martínez-López, F. J., Merigó, J. M., Valenzuela-Fernández, L., & Nicolás, C. (2018). Fifty years of the European Journal of Marketing: a bibliometric analysis. In European Journal of Marketing (Vol. 52, Issues 1–2). https://doi.org/10.1108/EJM-11-2017-0853
Mendhurwar, S., & Mishra, R. (2021). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 15(4). https://doi.org/10.1080/17517575.2019.1600041
Moed, H. F. (2005). Citation Analysis in Research Evaluation (Information Science and Knowledge Management). In Analysis.
Naffa, H., & Fain, M. (2020). Performance measurement of ESG-themed megatrend investments in global equity markets using pure factor portfolios methodology. PLOS ONE, 15(12), e0244225. https://doi.org/10.1371/journal.pone.0244225
Ngoc Thach, N., Thanh Hanh, H., Ngoc Huy, D. T., Gwozdziewicz, S., Viet Nga, L. T., & Thanh Huong, L. T. (2021). Technology Quality Management of the Industry 4.0 and Cybersecurity Risk Management on Current Banking Activities in Emerging Markets - The Case in Vietnam. International Journal for Quality Research, 15(3), 845–856. https://doi.org/10.24874/IJQR15.03-10
Nishant, R., Kennedy, M., & Corbett, J. (2020). Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda. International Journal of Information Management, 53, 102104. https://doi.org/10.1016/j.ijinfomgt.2020.102104
Noyons, E. C. M., Moed, H. F., & Luwel, M. (1999). Combining mapping and citation analysis for evaluative bibliometric purposes: A bibliometric study. Journal of the American Society for Information Science, 50(2), 115–131. https://doi.org/10.1002/(SICI)1097-4571(1999)50:2<115::AID-ASI3>3.0.CO;2-J
Page MJ, McKenzie JE, Bossuyt PM, et al (2021) The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. The BMJ 372:71.
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. In ICT Express (Vol. 9, Issue 4). https://doi.org/10.1016/j.icte.2023.02.007
Pedraja-Rejas, L., Rodríguez-Ponce, E., & Muñoz-Fritis, C. (2022). Human resource management and performance in Ibero-America: Bibliometric analysis of scientific production. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211569lp
Pritchard, A. (1969). Statistical Bibliography or Bibliometrics? In Journal of Documentation 25 (4): 348-349.
Protogerou, A., Papadopoulos, S., Drosou, A., Tzovaras, D., & Refanidis, I. (2021). A graph neural network method for distributed anomaly detection in IoT. Evolving Systems, 12(1). https://doi.org/10.1007/s12530-020-09347-0
Rashid, Z., Noor, U., & Altmann, J. (2021). Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Future Generation Computer Systems, 124, 436–466. https://doi.org/10.1016/j.future.2021.05.033
Ribeiro, H., Barbosa, B., Moreira, A. C., & Rodrigues, R. (2022). Churn in services – A bibliometric review. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211509hr
Shackelford, S. J. (2012). Should your firm invest in cyber risk insurance? Business Horizons, 55(4). https://doi.org/10.1016/j.bushor.2012.02.004
Shah, S. (2020). The Technological Impact of COVID-19 on the Future of Education and Health Care Delivery. Pain Physician, 4S;23(8;4S), S367–S380. https://doi.org/10.36076/ppj.2020/23/S367
Silva, B. C., & Moreira, A. C. (2022). Entrepreneurship and the gig economy: A bibliometric analysis. Cuadernos de Gestion, 22(2). https://doi.org/10.5295/cdg.211580am
Tagarev, T., Davis, B., & Cooke, M. (2022). Business, Organisational and governance modalities of collaborative cybersecurity networks. Multimedia Tools and Applications, 81(7). https://doi.org/10.1007/s11042-021-11109-2
Tsiodra, M., Panda, S., Chronopoulos, M., & Panaousis, E. (2023). Cyber Risk Assessment and Optimization: A Small Business Case Study. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3272670
van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. SCIENTOMETRICS, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
Yager, R. R. (1988). On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Transactions on Systems, Man, and Cybernetics, 18(1), 183–190. https://doi.org/10.1109/21.87068
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3087109
Zupic, I., & Čater, T. (2015). Bibliometric Methods in Management and Organization. Organizational Research Methods, 18(3), 429–472. https://doi.org/10.1177/1094428114562629
Authors retain copyright of its works. Management Letters/Cuadernos de Gestión publications are licensed under Creative Commons license CC-BY-NC-ND, granting open access rights to society.
Specifically, CC-BY-NC-ND license permits any kind of use, distribution, publicize and copy the article, as long as the original author and source are properly recognized and for Non Commercial purposes.
The author can use the article freely always indicating that it has been published in Management Letters/Cuadernos de Gestión. Any re-edition of the article must be approved by the journal editorial team.