{"id":"https://openalex.org/W2563013561","doi":"https://doi.org/10.1142/s0219649216500441","title":"The Synergy of Scientometric Analysis and Knowledge Mapping with Topic Models: Modelling the Development Trajectories of Information Security and Cyber-Security Research","display_name":"The Synergy of Scientometric Analysis and Knowledge Mapping with Topic Models: Modelling the Development Trajectories of Information Security and Cyber-Security Research","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2563013561","doi":"https://doi.org/10.1142/s0219649216500441","mag":"2563013561"},"language":"en","primary_location":{"id":"doi:10.1142/s0219649216500441","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649216500441","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003578069","display_name":"Hsia\u2010Ching Chang","orcid":"https://orcid.org/0000-0003-2915-8568"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hsia-Ching Chang","raw_affiliation_strings":["University of North Texas, USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003578069"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.663,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.72885227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":"04","first_page":"1650044","last_page":"1650044"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6783860325813293},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5838650465011597},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5424237251281738},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5392829775810242},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4754181504249573},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4311816096305847},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.42100125551223755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.376518577337265},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.32919710874557495}],"concepts":[{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6783860325813293},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5838650465011597},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5424237251281738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5392829775810242},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4754181504249573},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4311816096305847},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.42100125551223755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.376518577337265},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.32919710874557495},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0219649216500441","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649216500441","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:wsi:jikmxx:v:15:y:2016:i:04:p:1-33","is_oa":false,"landing_page_url":"http://www.worldscientific.com/doi/abs/10.1142/S0219649216500441","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W87431105","https://openalex.org/W1178373590","https://openalex.org/W1536885679","https://openalex.org/W1753361524","https://openalex.org/W1767272795","https://openalex.org/W1880262756","https://openalex.org/W2002356434","https://openalex.org/W2042463707","https://openalex.org/W2049183394","https://openalex.org/W2071735716","https://openalex.org/W2081526168","https://openalex.org/W2083312252","https://openalex.org/W2104192199","https://openalex.org/W2108680868","https://openalex.org/W2144452238","https://openalex.org/W2159750839","https://openalex.org/W2174706414","https://openalex.org/W2480861143","https://openalex.org/W4238591974","https://openalex.org/W4238962718","https://openalex.org/W4247545505","https://openalex.org/W4250001656","https://openalex.org/W4252460146","https://openalex.org/W4299486612"],"related_works":["https://openalex.org/W2541923677","https://openalex.org/W922973732","https://openalex.org/W2103623742","https://openalex.org/W3189065608","https://openalex.org/W793801093","https://openalex.org/W4320712973","https://openalex.org/W2513103231","https://openalex.org/W1488223416","https://openalex.org/W2078202280","https://openalex.org/W1108995587"],"abstract_inverted_index":{"An":[0],"important":[1],"part":[2],"of":[3,53,86],"an":[4],"organisation\u2019s":[5],"mission":[6],"is":[7,155],"protecting":[8],"its":[9],"information":[10,19,32,39,70,77,133,150,176,204],"assets":[11,33,40],"from":[12,31],"inside":[13],"or":[14,51],"outside":[15],"threats.":[16],"As":[17],"the":[18,36,65,120,198,236],"environment":[20,55],"has":[21,29],"become":[22],"more":[23],"diverse":[24],"and":[25,41,56,67,72,92,104,117,123,135,146,152,163,178,183,189,201,206,222,228],"inclusive,":[26],"security":[27,71,134,151,177,205],"concern":[28],"shifted":[30],"resided":[34],"in":[35,69,83,100,132,141,149],"organisation":[37],"to":[38,45,61,74,114,166,234,242],"networked":[42],"devices":[43],"exposed":[44],"broader":[46],"cyberspace,":[47],"such":[48],"as":[49],"cloud":[50],"Internet":[52],"things":[54],"mobile":[57],"Internet.":[58],"Organisations":[59],"have":[60,137,220],"keep":[62],"up":[63],"with":[64,175],"knowledge":[66,87,168,190,237],"trends":[68],"cyber-security":[73,136,153,179,207],"safeguard":[75],"their":[76],"assets.":[78],"Knowledge":[79,102],"mapping":[80,103,191],"will":[81],"aid":[82],"this":[84,195],"sort":[85],"management":[88],"process.":[89],"Mandatory":[90],"standards":[91],"government":[93],"regulations":[94],"help":[95],"industries":[96],"establish":[97],"best":[98],"practices":[99],"cyber-security.":[101,230],"scientometric":[105,161,187],"analysis":[106,162,188],"across":[107,184],"disciplines":[108],"also":[109],"provide":[110],"a":[111],"tracking":[112],"system":[113],"notify":[115],"researchers":[116],"practitioners":[118],"should":[119],"new":[121],"solutions":[122],"technology":[124],"facilitating":[125],"threat":[126],"detection":[127],"emerge.":[128],"While":[129],"various":[130],"topics":[131],"been":[138],"extensively":[139],"investigated":[140],"academia,":[142],"identifying":[143],"salient":[144],"themes":[145],"development":[147],"trajectories":[148],"research":[154,180,208,218,244],"relatively":[156],"unexplored.":[157],"This":[158,210],"study":[159,196],"employs":[160],"topic":[164,193],"modelling":[165],"develop":[167],"maps":[169],"that":[170],"visualise":[171],"core":[172],"concepts":[173],"associated":[174],"over":[181],"time":[182],"disciplines.":[185],"With":[186],"using":[192],"models,":[194],"identifies":[197],"commonality,":[199],"difference,":[200],"relationship":[202],"between":[203],"domains.":[209],"approach":[211,233],"could":[212],"gain":[213],"insights":[214],"into":[215],"how":[216],"these":[217],"areas":[219],"evolved":[221],"might":[223],"be":[224,240],"improved":[225],"concerning":[226],"learning":[227],"teaching":[229],"The":[231],"proposed":[232],"developing":[235],"map":[238],"may":[239],"extended":[241],"other":[243],"areas.":[245]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
