Araştırma Makalesi
BibTex RIS Kaynak Göster

Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma Yönelimleri

Yıl 2023, , 221 - 235, 31.07.2023
https://doi.org/10.17671/gazibtd.1291783

Öz

Makale, Web of Science'ın veritabanında indekslenen siber güvenlik ve bilgi güvenliği araştırmalarının kapsamlı bir bibliyometrik analizini sunmaktadır. Siber güvenlik, son zamanların ilgi odağı olan popüler bir araştırma konusudur. Alandaki küresel araştırma verimliliğini ve gelişimini incelemek için 1980 ve 2021 yılları arasında yayınlanan 4252 makale R tabanlı Biblioshiny paket programı ile analiz edilmiştir. Siber güvenlik alanındaki yayınlanan araştırmalar yıllara göre giderek artan bir eğilim gösterirken bilgi güvenliği ile ilgili olan yayınlar giderek azalan bir eğim göstermiştir. Alanın kavramsal yapısı incelediğinde, son dönemin en dikkat çekici araştırma konuları “siber güvenlik farkındalığı” ve “siber fiziksel sistemler” olduğu bulunmuştur. Ek olarak alanın tematik ağ haritası incelendiğinde, bilgi güvenliği alanının sosyal boyutunu ifade eden bilgi güvenliği farkındalığı, bilgi güvenliği yönetimi, bilgi güvenliği politikaları, bilgi güvenliği kültürü gibi konularla daha çok çalışılmıştır. Siber güvenlik alanının teknik tarafını ifade eden yapay zeka, büyük veri, blokzincir, makine öğrenmesi ve derin öğrenme gibi konularla daha çok çalışıldığı ortaya çıkmıştır. Çalışmanın bulguları, araştırmacılara, bilgi teknolojisi uzmanlarına ve bilgi uzmanlarına, siber güvenlik alanındaki araştırma ilerlemesine ve yeni araştırma konularını belirlemede yardımcı olabileceği ön görülmektedir.

Kaynakça

  • A. Pawlicka, M. Choraś, and M. Pawlicki, “Cyberspace threats: Not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - Cybersecurity researchers’ perspective”, ACM International Conference Proceeding Series. 2020.
  • K. Shaukat, S. Luo, V. Varadharajan, I. A. Hameed, and M. Xu, “A Survey on Machine Learning Techniques for Cyber Security in the Last Decade”, IEEE Access, 8, 222310–222354, 2020.
  • V. Aliusta and R. Benzer, “Avrupa Siber Suçlar Sözleşmesi ve Türkiye’nin Dahil Olma Süreci”, Cilt:4, 2,35–42, 2018.
  • Statista, “Global internet penetration rate by region 2023 | Statista,” 2022. https://www.statista.com/statistics/269329/penetration-rate-of-the-internet-by-region/ 20.03. 2023.
  • Statista, “Devices used to access the internet 2022 | Statista,” 2022. https://www.statista.com/statistics/1289755/internet-access-by-device-worldwide/ 20.03, 2023.
  • T. Aslan, B. Aktaş, and A. Akbıyık, “Kullanıcıların Bilgisayar Güvenliği Davranışını İnceleme: Siber Hijyen”, 7. Uluslararası Yönetim Bilişim Sistemleri Konferansı, Bakırçay Üniversitesi, İzmir, 3–10, 9-11 Aralık 2020.
  • F. A. Loan, B. Bisma, and N. Nahida, “Global Research Productivity in Cybersecurity: A Scientometric Study”, Global Knowledge, Memory Communication, 71, 4–5, 342–354, 2022.
  • İ. Tuğal, C. Almaz, and M. Sevi, “Üniversitelerdeki Siber Güvenlik Sorunları ve Farkındalık Eğitimleri”, Bilişim Teknolojileri Dergisi, 14, 3, 229–238, 2021.
  • B. von Solms and R. von Solms, “Cybersecurity And İnformation Security – What Goes Where?”, Information Computer Security, 26, 2–9, 2018.
  • B. Elango, S. Matilda, and J. Jeyasankari, “Redefining Search Terms for Cybersecurity: A Bibliometric Perspective”, SSRN Electron. J., 2020.
  • Kaspersky, “What is Cyber Security? | Definition, Types, and User Protection | Kaspersky,” Www.Kaspersky.Co.Uk. p. Home/Resource Centre/Definitions, 2019. https://www.kaspersky.com.au/resource-center/definitions/what-is-cyber-security. 21.02. 2022.
  • A. Klimburg, "Natıonal Cyber Securıty Framework Manual", 2012.
  • F. Wamala, “ITU National Cybersecurity Strategy Guide”, 2011.
  • R. Solms and J. Niekerk, “From İnformation Security to CyberSecurity”, Computer Security, 38,97–102, 2013.
  • M. S. Jalali, S. Razak, W. Gordon, E. Perakslis, and S. Madnick, “Health Care and Cybersecurity: Bibliometric Analysis of the Literature”, Journal Medical Internet Research 21, 2, 12644, 2019.
  • P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo, “A Systematic Literature Review of Blockchain Cyber Security”, Digital Communication Networks, 6, 2, 147–156, 2020.
  • N. Rahim, “Bibliometric Analysis of Cyber Threat and Cyber Attack Literature: Exploring the Higher Education Context”, Cybersecurity Threat. with New Perspect. 1–17, 2021.
  • B. Elango, S. Matilda, M. Martina Jose Mary, and M. Arul Pugazhendhi, “Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications” , 4, 1-17 2022.
  • F. A. Loan, B. Bisma, and N. Nahida, “Global research productivity in cybersecurity: a scientometric study”, Global Knowledge, Memory Communication, 71, 4–5, 342–354, 2022.
  • D. Sharma, R. Mittal, R. Sekhar, P. Shah, and M. Renz, “A Bibliometric Analysis of Cyber Security and Cyber Forensics Research”, Results in Control and Optimization, 10, 100204, 2023.
  • H. Ying et al., “A Bibliometric Analysis of Research on Heart Failure Comorbid With Depression from 2002 to 2021”, Heliyon, 13054, 2023.
  • H. Xie, Y. Zhang, Z. Wu, and T. Lv, “A Bibliometric Analysis on Land Degradation: Current Status, Development, and Future Directions”, Land, 9, 1, 2020.
  • A. L. Buczak and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE Communication Survey Tutorials, 18, 2, 1153–1176, 2016.
  • B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness”, MIS Quarterly, 34, 3, 523–548, 2010.
  • W. Wang and Z. Lu, “Cyber Security in the Smart Grid: Survey and Challenges”, Computer Networks, 57, 5, 1344–1371, 2013.
  • B. A. C. Johnston and M. Warkentin, “Fear Appeals and Information Security Behaviors : an Empirical Study”, MIS Quarterly, 34, 3, 549–566, 2010.
  • A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security”, IEEE Transactions. Information Forensics Securutiy, 1, 2, 125–143, 2006.
  • P. Puhakainen and M. Siponen, “Improving Employees’ Compliance Through İnformation Systems Security Training: An Action Research Study”, MIS Quarterly. Management Information Systems, 34, 4, 757–778, 2010.
  • T. Herath and H. R. Rao, “Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness”, Decision Support Systems, 47, 2, 154–165, 2009.
  • Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A Survey on Cyber Security for Smart Grid Communications”, IEEE Communications Surveys and Tutorials, 14, 4, 998–1010, 2012.
  • R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future Directions for Behavioral Information Security Research”, Computer Security, 32, 90–101, 2013.
  • P. Ifinedo, “Understanding Information Systems Security Policy Compliance: An Integration of The Theory of Planned Behavior and The Protection Motivation Theory”, Computer Security, 31, 1, 83–95, 2012.
  • D. Fiala and G. Tutoky, “Computer Science Papers in Web of Science: A Bibliometric Analysis”, Publications, 5, 4, 2017.
  • X. Lyu, W. Peng, W. Yu, Z. Xin, S. Niu, and Y. Qu, “Sustainable Intensification to Coordinate agricultural Efficiency And Environmental Protection: A Systematic Review Based on Metrological Visualization”, Journal Land Use Science, 16, 3, 313–338, 2021.
  • M. S. Jalali, S. Razak, W. Gordon, E. Perakslis, and S. Madnick, “Health Care and Cybersecurity: Bibliometric Analysis of The Literature”, Journal Medical Internet Research, 21, 2, 1–18, 2019.

A Global Perspective of Cybersecurity Research: Publication Trends and Research Directions

Yıl 2023, , 221 - 235, 31.07.2023
https://doi.org/10.17671/gazibtd.1291783

Öz

The article presents a comprehensive bibliometric analysis of cybersecurity and information security research indexed in the Web of Science database. Cybersecurity is a popular research topic that has been the focus of recent attention in recent times. To examine the global research efficiency and development in the field, 4252 articles published between 1980 and 2021 were analyzed with the R-based Biblioshiny package program. While cybersecurity-related publications have shown an increasing trend over the years, publications related to information security have shown a decreasing trend. When examining the conceptual structure of the field, the most notable research topics in recent years were found to be "cybersecurity awareness" and "cyber-physical systems. Additionally, when the thematic network map of the field was examined, it is observed that topics related to the social dimension of information security such as information security awareness, information security management, information security policies, and information security culture are studied more. On the other hand, it is revealed that topics related to the technical side of cybersecurity such as artificial intelligence, big data, blockchain, machine learning, and deep learning are studied more. The findings of the study are expected to help researchers, information technology experts, and information professionals in advancing research in the field of cybersecurity and identifying new research topics.

Kaynakça

  • A. Pawlicka, M. Choraś, and M. Pawlicki, “Cyberspace threats: Not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - Cybersecurity researchers’ perspective”, ACM International Conference Proceeding Series. 2020.
  • K. Shaukat, S. Luo, V. Varadharajan, I. A. Hameed, and M. Xu, “A Survey on Machine Learning Techniques for Cyber Security in the Last Decade”, IEEE Access, 8, 222310–222354, 2020.
  • V. Aliusta and R. Benzer, “Avrupa Siber Suçlar Sözleşmesi ve Türkiye’nin Dahil Olma Süreci”, Cilt:4, 2,35–42, 2018.
  • Statista, “Global internet penetration rate by region 2023 | Statista,” 2022. https://www.statista.com/statistics/269329/penetration-rate-of-the-internet-by-region/ 20.03. 2023.
  • Statista, “Devices used to access the internet 2022 | Statista,” 2022. https://www.statista.com/statistics/1289755/internet-access-by-device-worldwide/ 20.03, 2023.
  • T. Aslan, B. Aktaş, and A. Akbıyık, “Kullanıcıların Bilgisayar Güvenliği Davranışını İnceleme: Siber Hijyen”, 7. Uluslararası Yönetim Bilişim Sistemleri Konferansı, Bakırçay Üniversitesi, İzmir, 3–10, 9-11 Aralık 2020.
  • F. A. Loan, B. Bisma, and N. Nahida, “Global Research Productivity in Cybersecurity: A Scientometric Study”, Global Knowledge, Memory Communication, 71, 4–5, 342–354, 2022.
  • İ. Tuğal, C. Almaz, and M. Sevi, “Üniversitelerdeki Siber Güvenlik Sorunları ve Farkındalık Eğitimleri”, Bilişim Teknolojileri Dergisi, 14, 3, 229–238, 2021.
  • B. von Solms and R. von Solms, “Cybersecurity And İnformation Security – What Goes Where?”, Information Computer Security, 26, 2–9, 2018.
  • B. Elango, S. Matilda, and J. Jeyasankari, “Redefining Search Terms for Cybersecurity: A Bibliometric Perspective”, SSRN Electron. J., 2020.
  • Kaspersky, “What is Cyber Security? | Definition, Types, and User Protection | Kaspersky,” Www.Kaspersky.Co.Uk. p. Home/Resource Centre/Definitions, 2019. https://www.kaspersky.com.au/resource-center/definitions/what-is-cyber-security. 21.02. 2022.
  • A. Klimburg, "Natıonal Cyber Securıty Framework Manual", 2012.
  • F. Wamala, “ITU National Cybersecurity Strategy Guide”, 2011.
  • R. Solms and J. Niekerk, “From İnformation Security to CyberSecurity”, Computer Security, 38,97–102, 2013.
  • M. S. Jalali, S. Razak, W. Gordon, E. Perakslis, and S. Madnick, “Health Care and Cybersecurity: Bibliometric Analysis of the Literature”, Journal Medical Internet Research 21, 2, 12644, 2019.
  • P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo, “A Systematic Literature Review of Blockchain Cyber Security”, Digital Communication Networks, 6, 2, 147–156, 2020.
  • N. Rahim, “Bibliometric Analysis of Cyber Threat and Cyber Attack Literature: Exploring the Higher Education Context”, Cybersecurity Threat. with New Perspect. 1–17, 2021.
  • B. Elango, S. Matilda, M. Martina Jose Mary, and M. Arul Pugazhendhi, “Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications” , 4, 1-17 2022.
  • F. A. Loan, B. Bisma, and N. Nahida, “Global research productivity in cybersecurity: a scientometric study”, Global Knowledge, Memory Communication, 71, 4–5, 342–354, 2022.
  • D. Sharma, R. Mittal, R. Sekhar, P. Shah, and M. Renz, “A Bibliometric Analysis of Cyber Security and Cyber Forensics Research”, Results in Control and Optimization, 10, 100204, 2023.
  • H. Ying et al., “A Bibliometric Analysis of Research on Heart Failure Comorbid With Depression from 2002 to 2021”, Heliyon, 13054, 2023.
  • H. Xie, Y. Zhang, Z. Wu, and T. Lv, “A Bibliometric Analysis on Land Degradation: Current Status, Development, and Future Directions”, Land, 9, 1, 2020.
  • A. L. Buczak and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE Communication Survey Tutorials, 18, 2, 1153–1176, 2016.
  • B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness”, MIS Quarterly, 34, 3, 523–548, 2010.
  • W. Wang and Z. Lu, “Cyber Security in the Smart Grid: Survey and Challenges”, Computer Networks, 57, 5, 1344–1371, 2013.
  • B. A. C. Johnston and M. Warkentin, “Fear Appeals and Information Security Behaviors : an Empirical Study”, MIS Quarterly, 34, 3, 549–566, 2010.
  • A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security”, IEEE Transactions. Information Forensics Securutiy, 1, 2, 125–143, 2006.
  • P. Puhakainen and M. Siponen, “Improving Employees’ Compliance Through İnformation Systems Security Training: An Action Research Study”, MIS Quarterly. Management Information Systems, 34, 4, 757–778, 2010.
  • T. Herath and H. R. Rao, “Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness”, Decision Support Systems, 47, 2, 154–165, 2009.
  • Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A Survey on Cyber Security for Smart Grid Communications”, IEEE Communications Surveys and Tutorials, 14, 4, 998–1010, 2012.
  • R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future Directions for Behavioral Information Security Research”, Computer Security, 32, 90–101, 2013.
  • P. Ifinedo, “Understanding Information Systems Security Policy Compliance: An Integration of The Theory of Planned Behavior and The Protection Motivation Theory”, Computer Security, 31, 1, 83–95, 2012.
  • D. Fiala and G. Tutoky, “Computer Science Papers in Web of Science: A Bibliometric Analysis”, Publications, 5, 4, 2017.
  • X. Lyu, W. Peng, W. Yu, Z. Xin, S. Niu, and Y. Qu, “Sustainable Intensification to Coordinate agricultural Efficiency And Environmental Protection: A Systematic Review Based on Metrological Visualization”, Journal Land Use Science, 16, 3, 313–338, 2021.
  • M. S. Jalali, S. Razak, W. Gordon, E. Perakslis, and S. Madnick, “Health Care and Cybersecurity: Bibliometric Analysis of The Literature”, Journal Medical Internet Research, 21, 2, 1–18, 2019.
Toplam 35 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgisayar Yazılımı
Bölüm Makaleler
Yazarlar

Tuğçe Karayel 0000-0002-5556-225X

Adem Akbıyık 0000-0001-7634-4545

Yayımlanma Tarihi 31 Temmuz 2023
Gönderilme Tarihi 3 Mayıs 2023
Yayımlandığı Sayı Yıl 2023

Kaynak Göster

APA Karayel, T., & Akbıyık, A. (2023). Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma Yönelimleri. Bilişim Teknolojileri Dergisi, 16(3), 221-235. https://doi.org/10.17671/gazibtd.1291783