DEVELOPMENTS AND TRENDS IN CYBERSECURITY AGAINST HUMAN FACTORS AND TIME PRESSURE USING BIBLIOMETRIC ANALYSIS
Aprilia Mayang Saputri(1*), Syaifullah Syaifullah(2)
(1) Universitas Islam Negeri Sultas Syarif Kasim Riau
(2) Universitas Islam Negeri Sultas Syarif Kasim Riau
(*) Corresponding Author
Abstract
Memahami keamanan siber sangat penting di era digital saat ini, dan penelitian telah dilakukan untuk memahami faktor-faktor yang mempengaruhi keberhasilan atau kegagalannya. Faktor manusia berperan penting dalam keamanan siber, dan lebih dari 95% serangan yang berhasil disebabkan oleh kesalahan manusia. Tekanan waktu adalah faktor lain yang tidak boleh diabaikan, karena organisasi sering kali menghadapi tekanan waktu yang tinggi dalam lingkungan bisnis yang kompetitif dan dinamis. Penelitian mengenai faktor manusia dalam keamanan siber menunjukkan bahwa faktor manusia masih menjadi perhatian utama dibandingkan dengan teknologi. Penelitian ini bertujuan untuk menganalisis perkembangan dan tren keamanan siber mengenai faktor manusia dan tekanan waktu dari tahun 2014 hingga 2023 menggunakan Analisis Bibliometrik dari software R studio. Metodologi penelitian meliputi perencanaan, identifikasi kata kunci, pencarian data Scopus, dan pembatasan pencarian pada "semua bidang" untuk memperoleh data yang sesuai dengan tema penelitian. Penelitian dibatasi sebanyak 110 jurnal yang diambil dari database Scopus. Kesimpulannya, memahami faktor manusia dan tekanan waktu dalam keamanan siber sangat penting bagi organisasi untuk meningkatkan langkah-langkah keamanan siber mereka. Dengan menganalisis perkembangan dan tren faktor-faktor ini, para peneliti dapat lebih memahami masa depan keamanan siber dan mengambil keputusan yang tepat untuk melindungi informasi dan infrastruktur penting.
Keywords
Full Text:
PDFReferences
[1] G. D. Moody, M. Siponen, and S. Pahnila, “TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE Appendix B Validation and Analysis Details for Analysis of Eleven Theories Used in Previous IS Behavioral Security Research: Appendix,” MIS Q., vol. 42, no. 1—Appendices, 2018, [Online]. Available: https://misq.org/skin/frontend/default/misq/pdf/appendices/2018/V42I1Appendices/14_13853_RA_MoodyAppendices.pdf [2] H. Young, T. van Vliet, J. van de Ven, S. Jol, and C. Broekman, “Understanding human factors in cyber security as a dynamic system,” Adv. Intell. Syst. Comput., vol. 593, no. March 2022, pp. 244–254, 2018, doi: 10.1007/978-3-319-60585-2_23. [3] M. S. Jalali, M. Siegel, and S. Madnick, “Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment,” J. Strateg. Inf. Syst., vol. 28, no. 1, pp. 66–82, 2019, doi: 10.1016/j.jsis.2018.09.003. [4] Washington, “More than 150 countries affected by massive cyberattack, Europol says.” Accessed: Oct. 05, 2023. [Online]. Available: http://wapo.st/2pKyXum [5] IBM, “Analysis of cyber attack and incident data from IBM’s worldwide security operations,” IBM Secur. Manag. Secur. Serv., p. 11, 2014, [Online]. Available: http://public.dhe.ibm.com/common/ssi/ecm/en/sew03031usen/SEW03031USEN.PDF [6] B. P. Hámornik and C. Krasznay, “A team-level perspective of human factors in cyber security: Security operations centers,” Adv. Intell. Syst. Comput., vol. 593, pp. 224–236, 2018, doi: 10.1007/978-3-319-60585-2_21. [7] J. Jeong, J. Mihelcic, G. Oliver, and C. Rudolph, “Towards an improved understanding of human factors in cybersecurity,” Proc. - 2019 IEEE 5th Int. Conf. Collab. Internet Comput. CIC 2019, no. Cic, pp. 338–345, 2019, doi: 10.1109/CIC48465.2019.00047. [8] M. T. P. A. & G. S. Noman H. Chowdhury, “Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures,” Comput. Secur., vol. 97, p. 101963, 2020, doi: 10.1016/j.cose.2020.101963. [9] M. T. P. A. & G. S. Noman H. Chowdhury, “The impact of time pressure on cybersecurity behaviour: a systematic literature review,” Behav. Inf. Technol., vol. 38, no. 12, pp. 1290–1308, 2019, doi: 10.1080/0144929X.2019.1583769. [10] P. A. Bagane and S. Kotrappa, “Bibliometric Survey for Cryptanalysis of Block Ciphers towards Cyber Security,” Libr. Philos. Pract., vol. 2020, no. February 2020, 2020. [11] A. Maalej and I. Kallel, “Does Keystroke Dynamics tell us about Emotions? A Systematic Literature Review and Dataset Construction,” Proc. 2020 16th Int. Conf. Intell. Environ. IE 2020, no. August, pp. 60–67, 2020, doi: 10.1109/IE49459.2020.9155004. [12] X. Zhang, “A BIBLIOMETRIC ANALYSIS of SECOND LANGUAGE ACQUISITION between 1997 and 2018,” Stud. Second Lang. Acquis., vol. 42, no. 1, pp. 199–222, 2020, doi: 10.1017/S0272263119000573. [13] A. Syahid and N. Mukminatien, “Thirty years of teflin journal: A bibliometric portrait through the lens of microsoft academic,” Teflin J., vol. 32, no. 1, pp. 134–166, 2021, doi: 10.15639/teflinjournal.v32i1/134-166. [14] R. H. Raja Mohd Ali, A. Ahmi, and S. Sudin, “Examining the trend of the research on the internet of things (IoT): A bibliometric analysis of the journal articles as indexed in the Scopus database,” J. Phys. Conf. Ser., vol. 1529, no. 2, 2020, doi: 10.1088/1742-6596/1529/2/022075. [15] A. R. Saleh and E. Sumarni, “Studi Bibliometrik pada Jurnal Standardisasi Pasca Terakreditasi (2011 – 2015),” Visi Pustaka, vol. 18, no. Desember, pp. 231–240, 2016. [16] W. Chiu, T. C. M. Fan, S. B. Nam, and P. H. Sun, “Knowledge mapping and sustainable development of esports research: A bibliometric and visualized analysis,” Sustain., vol. 13, no. 18, 2021, doi: 10.3390/su131810354. [17] M. Aria and C. Cuccurullo, “bibliometrix: An R-tool for comprehensive science mapping analysis,” J. Informetr., vol. 11, no. 4, pp. 959–975, 2017, doi: 10.1016/j.joi.2017.08.007. [18] N. Donthu, S. Kumar, D. Mukherjee, N. Pandey, and W. M. Lim, “How to conduct a bibliometric analysis: An overview and guidelines,” J. Bus. Res., vol. 133, no. March, pp. 285–296, 2021, doi: 10.1016/j.jbusres.2021.04.070. [19] R. C. Team., “R: A language and environment for statistical computing. Vienna, Austria: R Foundation for Statistical Computing.” [20] C. L. Borgman, “Challenges in building digital libraries for the 21st century,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2555, pp. 1–13, 2002, doi: 10.1007/3-540-36227-4_1. [21] D. Sharma, R. Mittal, R. Sekhar, P. Shah, and M. Renz, “A bibliometric analysis of cyber security and cyber forensics research,” Results Control Optim., vol. 10, no. October 2022, p. 100204, 2023, doi: 10.1016/j.rico.2023.100204. [22] C. Westby, “Resource Review,” Word Mouth, vol. 32, no. 5, pp. 10–12, 2021, doi: 10.1177/10483950211008345b. [23] A. T. Guler, C. J. F. Waaijer, Y. Mohammed, and M. Palmblad, “Automating bibliometric analyses using Taverna scientific workflows: A tutorial on integrating Web Services,” J. Informetr., vol. 10, no. 3, pp. 830–841, 2016, doi: 10.1016/j.joi.2016.05.002. [24] A. Velez-estevez, I. J. Perez, P. García-sánchez, and J. A. Moral-munoz, “New trends in bibliometric APIs : A comparative analysis,” Inf. Process. Manag., vol. 60, no. 4, p. 103385, 2023, doi: 10.1016/j.ipm.2023.103385. [25] U. S. Mutia and A. Mahsyar, “Research Trends on Collaborative Governance Approaches in the Developing Country: a Bibliometric Analysis,” Proc. Int. …, pp. 163–170, 2023, [Online]. Available: https://eproceeding.undwi.ac.id/index.php/mdasd/article/view/272%0Ahttps://eproceeding.undwi.ac.id/index.php/mdasd/article/download/272/247 [26] B. Gunawan, B. M. Ratmono, and A. G. Abdullah, “Cybersecurity and Strategic Management,” Foresight STI Gov., vol. 17, no. 3, pp. 88–97, 2023, doi: 10.17323/2500-2597.2023.3.88.97. [27] S. Büyükkidik, “A Bibliometric Analysis: A Tutorial for the Bibliometrix Package in R Using IRT Literature,” J. Meas. Eval. Educ. Psychol., vol. 13, no. 3, pp. 164–193, 2022, doi: 10.21031/EPOD.1069307. [28] J. Sleeman, T. Finin, and M. Halem, “Understanding Cybersecurity Threat Trends Through Dynamic Topic Modeling,” Front. Big Data, vol. 4, no. June, pp. 1–13, 2021, doi: 10.3389/fdata.2021.601529. [29] H. C. Chang, “The synergy of scientometric analysis and knowledge mapping with topic models: Modelling the development trajectories of information security and cyber-security research,” J. Inf. Knowl. Manag., vol. 15, no. 4, pp. 4–6, 2016, doi: 10.1142/S0219649216500441.
[30] N. N. Abbas, T. Ahmed, S. H. U. Shah, M. Omar, and H. W. Park, “Investigating the applications of artificial intelligence in cyber security,” Scientometrics, vol. 121, no. 2, pp. 1189–1211, 2019, doi: 10.1007/s11192-019-03222-9. [31] A. Parlina, K. Ramli, and H. Murfi, “Theme mapping and bibliometrics analysis of one decade of big data research in the scopus database,” Inf., vol. 11, no. 2, pp. 1–26, 2020, doi: 10.3390/info11020069.
[32] E. C. Luis and D. Celma, “Circular economy. A review and bibliometric analysis,” Sustain., vol. 12, no. 16, 2020, doi: 10.3390/SU12166381.
[33] A. Onan, “Two-Stage Topic Extraction Model for Bibliometric Data Analysis Based on Word Embeddings and Clustering,” IEEE Access, vol. 7, pp. 145614–145633, 2019, doi: 10.1109/ACCESS.2019.2945911.
[34] T. Altenburg and J. Meyer-Stamer, “How to Promote Clusters: Policy Experiences from Latin America. World Development,” Elsevier Sci. Ltd. Gt. Britain., vol. 27, no. 9, pp. 1693–1713, 1999.
[35] G. Gonzalez-Alcaide, S. Palacios-Fernandez, and J. M. Ramos-Rincon, “Thematic research clusters in very old populations (≥ 80 years): a bibliometric approach,” BMC Geriatr., vol. 21, no. 1, pp. 1–13, 2021, doi: 10.1186/s12877-021-02209-7.
[36] P. Mulay, “DigitalCommons @ University of Nebraska - Lincoln Bibliometric Study of Bibliometric Papers about Clustering Bibliometric Study of Bibliometric Papers about Clustering,” 2020.
[37] K. van Nunen, J. Li, G. Reniers, and K. Ponnet, “Bibliometric analysis of safety culture research,” Saf. Sci., vol. 108, no. November 2016, pp. 248–258, 2018, doi: 10.1016/j.ssci.2017.08.011.
[38] N. Donthu, S. Kumar, D. Mukherjee, N. Pandey, and W. M. Lim, “How to conduct a bibliometric analysis: An overview and guidelines,” J. Bus. Res., vol. 133, no. April, pp. 285–296, 2021, doi: 10.1016/j.jbusres.2021.04.070.
[39] M. J. Cobo, A. G. López-Herrera, E. Herrera-Viedma, and F. Herrera, “An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field,” J. Informetr., vol. 5, no. 1, pp. 146–166, 2011, doi: 10.1016/j.joi.2010.10.002.
[40] R. Alkhammash, “Bibliometric, network, and thematic mapping analyses of metaphor and discourse in COVID-19 publications from 2020 to 2022,” Front. Psychol., vol. 13, 2023, doi: 10.3389/fpsyg.2022.1062943.
[41] D. D. Mühl and L. de Oliveira, “A bibliometric and thematic approach to agriculture 4.0,” Heliyon, vol. 8, no. 5, p. e09369, 2022, doi: 10.1016/j.heliyon.2022.e09369.
[42] A. Rejeb, K. Rejeb, and H. Treiblmaier, “Mapping Metaverse Research: Identifying Future Research Areas Based on Bibliometric and Topic Modeling Techniques,” Inf., vol. 14, no. 7, 2023, doi: 10.3390/info14070356.
DOI: https://doi.org/10.22146/ijccs.92636
Article Metrics
Abstract views : 1975 | views : 1053Refbacks
- There are currently no refbacks.
Copyright (c) 2024 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats1