{"id":"https://openalex.org/W4395448146","doi":"https://doi.org/10.1109/ictas59620.2024.10507133","title":"Bibliometric analysis of Cybersecurity in e-learning systems and big data","display_name":"Bibliometric analysis of Cybersecurity in e-learning systems and big data","publication_year":2024,"publication_date":"2024-03-07","ids":{"openalex":"https://openalex.org/W4395448146","doi":"https://doi.org/10.1109/ictas59620.2024.10507133"},"language":"en","primary_location":{"id":"doi:10.1109/ictas59620.2024.10507133","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictas59620.2024.10507133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Conference on Information Communications Technology and Society (ICTAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095887729","display_name":"Farshida Jahoor","orcid":null},"institutions":[{"id":"https://openalex.org/I4210141751","display_name":"The Independent Institute of Education","ror":"https://ror.org/038cnrz59","country_code":"ZA","type":"education","lineage":["https://openalex.org/I4210141751"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Farshida Jahoor","raw_affiliation_strings":["Independent Institute of Education,Johannesburg,South Africa (RSA)","Independent Institute of Education, Johannesburg, South Africa (RSA)"],"affiliations":[{"raw_affiliation_string":"Independent Institute of Education,Johannesburg,South Africa (RSA)","institution_ids":["https://openalex.org/I4210141751"]},{"raw_affiliation_string":"Independent Institute of Education, Johannesburg, South Africa (RSA)","institution_ids":["https://openalex.org/I4210141751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073226518","display_name":"Meera K. Joseph","orcid":"https://orcid.org/0000-0003-0686-163X"},"institutions":[{"id":"https://openalex.org/I928460267","display_name":"Independence University","ror":"https://ror.org/054phan86","country_code":"US","type":"education","lineage":["https://openalex.org/I928460267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meera K. Joseph","raw_affiliation_strings":["Independent Institute of Education,Varsity College,Johannesburg,RSA","Varsity College, Independent Institute of Education, Johannesburg, RSA"],"affiliations":[{"raw_affiliation_string":"Independent Institute of Education,Varsity College,Johannesburg,RSA","institution_ids":["https://openalex.org/I928460267"]},{"raw_affiliation_string":"Varsity College, Independent Institute of Education, Johannesburg, RSA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033160345","display_name":"Natasha Madhav","orcid":"https://orcid.org/0000-0001-8055-0923"},"institutions":[{"id":"https://openalex.org/I4210141751","display_name":"The Independent Institute of Education","ror":"https://ror.org/038cnrz59","country_code":"ZA","type":"education","lineage":["https://openalex.org/I4210141751"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Natasha Madhav","raw_affiliation_strings":["Independent Institute of Education,Johannesburg,RSA","Independent Institute of Education, Johannesburg, RSA"],"affiliations":[{"raw_affiliation_string":"Independent Institute of Education,Johannesburg,RSA","institution_ids":["https://openalex.org/I4210141751"]},{"raw_affiliation_string":"Independent Institute of Education, Johannesburg, RSA","institution_ids":["https://openalex.org/I4210141751"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095887729"],"corresponding_institution_ids":["https://openalex.org/I4210141751"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76993242,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6754190921783447},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6217324733734131},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4729321300983429},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.44229137897491455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24639728665351868}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6754190921783447},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6217324733734131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4729321300983429},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.44229137897491455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24639728665351868}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictas59620.2024.10507133","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictas59620.2024.10507133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Conference on Information Communications Technology and Society (ICTAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1969865237","https://openalex.org/W2005970541","https://openalex.org/W2111230857","https://openalex.org/W2112042732","https://openalex.org/W2132460378","https://openalex.org/W2496163544","https://openalex.org/W2592084954","https://openalex.org/W2592120565","https://openalex.org/W2795649426","https://openalex.org/W2958285686","https://openalex.org/W2975192120","https://openalex.org/W3001491100","https://openalex.org/W3009740205","https://openalex.org/W3013554172","https://openalex.org/W3032266608","https://openalex.org/W3033213260","https://openalex.org/W3136668850","https://openalex.org/W3159994884","https://openalex.org/W3160545769","https://openalex.org/W3160856016","https://openalex.org/W3197944870","https://openalex.org/W3202886566","https://openalex.org/W3215575541","https://openalex.org/W4239644483","https://openalex.org/W4316659276","https://openalex.org/W4317569479","https://openalex.org/W4319791240","https://openalex.org/W4380433716","https://openalex.org/W4386223550","https://openalex.org/W4389215028","https://openalex.org/W6679466418","https://openalex.org/W6780611687","https://openalex.org/W6782065779","https://openalex.org/W7065238543"],"related_works":["https://openalex.org/W4322629366","https://openalex.org/W2808989540","https://openalex.org/W2397053934","https://openalex.org/W1039292361","https://openalex.org/W2731626691","https://openalex.org/W2551093110","https://openalex.org/W2148016376","https://openalex.org/W4237919137","https://openalex.org/W3184179822","https://openalex.org/W3095362084"],"abstract_inverted_index":{"Cyberattacks":[0],"are":[1,47,99,116,138],"common":[2],"e-learning":[3,33,87],"issues":[4],"nowadays":[5],"and":[6,35,52,89,111,121,140],"it":[7,55],"has":[8],"been":[9],"even":[10],"worse":[11],"due":[12],"to":[13,49,57,66,104],"the":[14,40,45,67,70,84,90,93,112,126],"uptake":[15],"of":[16,30,69,86,92],"online":[17],"learning":[18,41],"in":[19,32],"post-pandemic":[20],"season.":[21],"In":[22],"this":[23],"paper,":[24],"we":[25],"do":[26],"a":[27],"bibliometric":[28,109,132],"analysis":[29,110],"Cybersecurity":[31],"systems":[34,43,88,98],"big":[36],"data.":[37],"Especially":[38],"with":[39,54],"management":[42],"(LMS)":[44],"learners":[46,62,94],"exposed":[48],"enormous":[50],"content":[51],"interacting":[53],"leads":[56],"cybersecurity":[58,76],"challenges":[59],"as":[60],"some":[61],"may":[63,79],"not":[64],"adhere":[65],"rules":[68],"institutions.":[71],"Although":[72],"there":[73],"will":[74],"be":[75],"breaches":[77],"that":[78,136],"result":[80],"from":[81,125],"using":[82,96],"LMS,":[83],"usefulness":[85],"attitude":[91],"towards":[95],"these":[97],"noted.":[100],"VOSviewer":[101],"was":[102,129],"used":[103,130],"illustrate":[105],"scientific":[106],"maps":[107],"for":[108,131],"visualizations":[113],"included":[114],"here":[115],"Density":[117],"map,":[118],"Network":[119],"Visualization,":[120],"Overlay":[122],"visualization.":[123],"Data":[124],"Dimensions":[127],"database":[128],"analysis.":[133],"The":[134],"themes":[135],"emerged":[137],"technology":[139],"models.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
