AEPH
Home > Occupation and Professional Education > Vol. 1 No. 3 (OPE 2024) >
Advancing Frontiers in Data Security: A Comprehensive Bibliometric and Visual Exploration from 2013 to 2023
DOI: https://doi.org/10.62381/O242308
Author(s)
Jindong Hu1, Na Li2, Xing Liu3,4,*, Jiamin Liang5, Xizhou Yan6
Affiliation(s)
1Faculty of Law,Macau University of Science and Technology,Macau, 2School of Law,Henan University of Science and Technology ,Luoyang, Henan, China 3School of Law, Hunan University of Technology and Business, Changsha, China 4HunanResearch Base for the Construction of Clean Governance, Changsha, China 5School of Law,Hunan Normal University,Changsha,Hunan, China 6Nanning Municipal People's Procuratorate of Guangxi Zhuang Autonomous Region,Nanning, China *Corresponding Author
Abstract
This paper presents a bibliometric analysis of global research on data security from 2013 to 2023, highlighting the increasing challenges in cybersecurity and the evolution of new research paradigms. Through the use of bibliometric methods, this study evaluates the scope and themes of scholarly articles, pinpointing key trends and outlining potential avenues for future investigation. The research begins with a detailed review of major data breaches, which sets the stage for examining critical areas of academic interest within the field of data security. This includes the gathering of data and the selection of appropriate tools for bibliometric analysis, followed by an in-depth discussion of principal themes and prospective research directions. The results reveal a notable rise in publications related to data security, especially after 2018, indicating a heightened focus within the academic community. Significant contributions of this study include the identification of the most frequently cited works, an analysis of contributions by country and institution, and an examination of the distribution of articles across various journals. Additionally, the paper identifies leading researchers, key research hotspots, and emerging trends, highlighting the importance of a multidisciplinary approach that incorporates technological, legal, and managerial perspectives to tackle issues in data security. The conclusion of this research offers insights into the dynamic and growing field of data security studies, characterized by annual increases and an expansion into new areas such as personal data protection, blockchain technology, and artificial intelligence.
Keywords
Data Security; Bibliometric Analysis; Cybersecurity Trends; Academic Research; Emerging Paradigms
References
[1]Ma, D., Yang, B., Guan, B., Song, L., Liu, Q., Fan, Y., ... & Xu, H. (2021). A bibliometric analysis of pyroptosis from 2001 to 2021. Frontiers in immunology, 12, 731933. [2]Van Eck, N., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. scientometrics, 84(2), 523-538. [3]Carre, J. R., Curtis, S. R., & Jones, D. N. (2018). Ascribing responsibility for online security and data breaches. Managerial Auditing Journal, 33(4), 436-446. [4]Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. IEEE Access, 8, 131723-131740. [5]Liu, X., Zhao, J., Li, J., Cao, B., & Lv, Z. (2022). Federated neural architecture search for medical data security. IEEE transactions on industrial informatics, 18(8), 5628-5636. [6]Goldblum, M., Tsipras, D., Xie, C., Chen, X., Schwarzschild, A., Song, D., ... & Goldstein, T. (2022). Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(2), 1563-1580. [7]Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176. [8]Mohammad, A. S., & Pradhan, M. R. (2021). Machine learning with big data analytics for cloud security. Computers & Electrical Engineering, 96, 107527. [9]Zhang, N., Jia, H., Hou, Q., Zhang, Z., Xia, T., Cai, X., & Wang, J. (2022). Data-driven security and stability rule in high renewable penetrated power system operation. Proceedings of the IEEE. [10]Coulter, R., Han, Q. L., Pan, L., Zhang, J., & Xiang, Y. (2019). Data-driven cyber security in perspective—Intelligent traffic analysis. IEEE transactions on cybernetics, 50(7), 3081-3093. [11]Sullivan, G. (2022). Law, technology, and data‐driven security: infra‐legalities as method assemblage. Journal of Law and Society, 49, S31-S50. [12]Wang, Y. G., Zhu, G., Li, J., Conti, M., & Huang, J. (2020). Defeating lattice-based data hiding code via decoding security hole. IEEE Transactions on Circuits and Systems for Video Technology, 31(1), 76-87. [13]Yang, J., Meng, Q., Lu, W., Fu, L., & Zhang, B. (2022). Data gathering, quality and security in intelligent phytoprotection. Frontiers in Plant Science, 13, 1010525. [14]Berdik, D., Otoum, S., Schmidt, N., Porter, D., & Jararweh, Y. (2021). A survey on blockchain for information systems management and security. Information Processing & Management, 58(1), 102397. [15]Soltanisehat, L., Alizadeh, R., Hao, H., & Choo, K. K. R. (2020). Technical, temporal, and spatial research challenges and opportunities in blockchain-based healthcare: A systematic literature review. IEEE Transactions on Engineering Management, 70(1), 353-368. [16]Soltanisehat, L., Alizadeh, R., Hao, H., & Choo, K. K. R. (2020). Technical, temporal, and spatial research challenges and opportunities in blockchain-based healthcare: A systematic literature review. IEEE Transactions on Engineering Management, 70(1), 353-368. [17]Suhail, S., Hussain, R., Jurdak, R., & Hong, C. S. (2021). Trustworthy digital twins in the industrial internet of things with blockchain. IEEE Internet Computing, 26(3), 58-67. [18]Deepa, N., Pham, Q. V., Nguyen, D. C., Bhattacharya, S., Prabadevi, B., Gadekallu, T. R., ... & Pathirana, P. N. (2022). A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems, 131, 209-226. [19]Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., & Li, K. C. (2021). Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet of Things Journal, 9(16), 14741-14751. [20]Javed, A. R., Hassan, M. A., Shahzad, F., Ahmed, W., Singh, S., Baker, T., & Gadekallu, T. R. (2022). Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey. Sensors, 22(12), 4394. [21]Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018). Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. Journal of medical systems, 42, 1-7. [22]Yaqoob, I., Salah, K., Jayaraman, R., & Al-Hammadi, Y. (2021). Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications, 1-16. [23]Sehar, N. U., Khalid, O., Khan, I. A., Rehman, F., Fayyaz, M. A., Ansari, A. R., & Nawaz, R. (2023). Blockchain enabled data security in vehicular networks. Scientific Reports, 13(1), 4412. [24]Deng, S., Hu, Q., Wu, D., & He, Y. (2023). BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing. Computers and Electrical Engineering, 108, 108666. [25]Mohanty, S. P., Yanambaka, V. P., Kougianos, E., & Puthal, D. (2020). PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consumer Electronics Magazine, 9(2), 8-16. [26]Khalid, M. I., Ahmed, M., & Kim, J. (2023). Enhancing data protection in dynamic consent management systems: formalizing privacy and security definitions with differential privacy, decentralization, and Zero-Knowledge proofs. Sensors, 23(17), 7604. [27]Chintapalli, S. S. N., Paramesh, S. P., Nijaguna, G. S., Jeyaraj, J. R. A., & Subhash, P. (2023). Controlled blockchain enabled data record security for healthcare applications. Neural Computing and Applications, 1-13. [28]Liu, X., Zhao, J., Li, J., Cao, B., & Lv, Z. (2022). Federated neural architecture search for medical data security. IEEE transactions on industrial informatics, 18(8), 5628-5636. [29]Rodríguez, R. J., & Garcia‐Escartin, J. C. (2017). Security assessment of the Spanish contactless identity card. IET Information Security, 11(6), 386-393. [30]van Rensburg, S. K. J. (2021). End-user perceptions on information security: Pragmatic lessons on social engineering attacks in the workplace in Gauteng, South Africa. Journal of Global Information Management (JGIM), 29(6), 1-16. [31]Mahajan, H. B., Rashid, A. S., Junnarkar, A. A., Uke, N., Deshpande, S. D., Futane, P. R., ... & Alhayani, B. (2023). Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Applied Nanoscience, 13(3), 2329-2342. [32]van Rensburg, S. K. J. (2021). End-user perceptions on information security: Pragmatic lessons on social engineering attacks in the workplace in Gauteng, South Africa. Journal of Global Information Management (JGIM), 29(6), 1-16. [33]Winter, J. S., & Davidson, E. (2022). Harmonizing regulatory regimes for the governance of patient-generated health data. Telecommunications Policy, 46(5), 102285. [34]Shin, S. Y., & Kim, H. S. (2021). Data pseudonymization in a range that does not affect data quality: correlation with the degree of participation of clinicians. Journal of Korean Medical Science, 36(44). [35]Paik, S., Mays, K. K., & Katz, J. E. (2022). Invasive Yet Inevitable? Privacy Normalization Trends in Biometric Technology. Social Media+ Society, 8(4), 20563051221129147.
Copyright @ 2020-2035 Academic Education Publishing House All Rights Reserved