{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:18:12Z","timestamp":1772554692837,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00840-0","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T06:02:21Z","timestamp":1711346541000},"page":"2159-2187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["International journal of information security: a bibliometric study, 2007\u20132023"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9994-1991","authenticated-orcid":false,"given":"Rahul","family":"Dwivedi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,25]]},"reference":[{"issue":"3","key":"840_CR1","doi-asserted-by":"publisher","first-page":"103774","DOI":"10.1016\/j.im.2023.103774","volume":"60","author":"W-L Shiau","year":"2023","unstructured":"Shiau, W.-L., Wang, X., Zheng, F.: What are the trend and core knowledge of information security? A citation and co-citation analysis. Inf. Manage. 60(3), 103774 (2023)","journal-title":"Inf. Manage."},{"issue":"6","key":"840_CR2","first-page":"1","volume":"17","author":"N Singh","year":"2022","unstructured":"Singh, N., Krishnaswamy, V., Zhang, J.Z.: Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 17(6), 1\u201325 (2022)","journal-title":"Enterp. Inf. Syst."},{"issue":"2","key":"840_CR3","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11192-015-1708-1","volume":"105","author":"NV Olijnyk","year":"2015","unstructured":"Olijnyk, N.V.: A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015. Scientometrics 105(2), 883\u2013904 (2015)","journal-title":"Scientometrics"},{"key":"840_CR4","doi-asserted-by":"crossref","unstructured":"Von Solms S. The 5 waves of information security\u2013from Kristian Beckman to the present. In: Security and Privacy\u2013Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20\u201323, 2010. Proceedings 25, Springer. pp. 1\u20138 (2010)","DOI":"10.1007\/978-3-642-15257-3_1"},{"issue":"3","key":"840_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","volume":"25","author":"B Von Solms","year":"2006","unstructured":"Von Solms, B.: Information security\u2013the fourth wave. Comput. Secur. 25(3), 165\u2013168 (2006)","journal-title":"Comput. Secur."},{"key":"840_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R von Solms","year":"2013","unstructured":"von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.04.004","journal-title":"Comput. Secur."},{"key":"840_CR7","doi-asserted-by":"crossref","unstructured":"Moral-Mu\u00f1oz J.A., Herrera-Viedma E., Santisteban-Espejo A., Cobo M.J. Software tools for conducting bibliometric analysis in science: an up-to-date review. Prof. Inf. 29(1), (2020)","DOI":"10.3145\/epi.2020.ene.03"},{"key":"840_CR8","doi-asserted-by":"publisher","first-page":"102307","DOI":"10.1016\/j.ijinfomgt.2020.102307","volume":"57","author":"N Donthu","year":"2021","unstructured":"Donthu, N., Kumar, S., Pandey, N., Gupta, P.: Forty years of the international journal of information management: a bibliometric analysis. Int. J. Inf. Manag. 57, 102307 (2021)","journal-title":"Int. J. Inf. Manag."},{"key":"840_CR9","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10796-008-9147-7","volume":"11","author":"YK Dwivedi","year":"2009","unstructured":"Dwivedi, Y.K., Lal, B., Mustafee, N., Williams, M.D.: Profiling a decade of information systems frontiers\u2019 research. Inf. Syst. Front. 11, 87\u2013102 (2009)","journal-title":"Inf. Syst. Front."},{"key":"840_CR10","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s10796-019-09925-x","volume":"21","author":"G Beydoun","year":"2019","unstructured":"Beydoun, G., Abedin, B., Merig\u00f3, J.M., Vera, M.: Twenty years of information systems frontiers. Inf. Syst. Front. 21, 485\u2013494 (2019)","journal-title":"Inf. Syst. Front."},{"issue":"2","key":"840_CR11","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1080\/10580530.2020.1781987","volume":"38","author":"B Abedin","year":"2021","unstructured":"Abedin, B., Jafarzadeh, H., Olszak, C.M.: Thirty six years of information systems management: a bibliometric and thematic analysis. Inf. Syst. Manag. 38(2), 151\u2013164 (2021)","journal-title":"Inf. Syst. Manag."},{"issue":"10","key":"840_CR12","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1002\/smj.397","volume":"25","author":"A-R Ramos-Rodr\u00edguez","year":"2004","unstructured":"Ramos-Rodr\u00edguez, A.-R., Ru\u00edz-Navarro, J.: Changes in the intellectual structure of strategic management research: a bibliometric study of the strategic management journal, 1980\u20132000. Strateg. Manag. J. 25(10), 981\u20131004 (2004)","journal-title":"Strateg. Manag. J."},{"issue":"3","key":"840_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/smj.659","volume":"29","author":"SP Nerur","year":"2008","unstructured":"Nerur, S.P., Rasheed, A.A., Natarajan, V.: The intellectual structure of the strategic management field: an author co-citation analysis. Strateg. Manag. J. 29(3), 319\u2013336 (2008)","journal-title":"Strateg. Manag. J."},{"issue":"2","key":"840_CR14","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1108\/JEIM-09-2020-0375","volume":"35","author":"N Donthu","year":"2022","unstructured":"Donthu, N., Kumar Badhotiya, G., Kumar, S., Soni, G., Pandey, N.: A retrospective overview of journal of enterprise information management using bibliometric analysis. J. Enterp. Inf. Manag. 35(2), 504\u2013529 (2022)","journal-title":"J. Enterp. Inf. Manag."},{"issue":"1","key":"840_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1108\/17410391011008888","volume":"23","author":"YK Dwivedi","year":"2010","unstructured":"Dwivedi, Y.K., Mustafee, N.: Profiling research published in the journal of enterprise information management (JEIM). J. Enterp. Inf. Manag 23(1), 8\u201326 (2010)","journal-title":"J. Enterp. Inf. Manag"},{"issue":"3","key":"840_CR16","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/isj.12260","volume":"30","author":"A La Paz","year":"2020","unstructured":"La Paz, A., Merig\u00f3, J.M., Powell, P., Ramaprasad, A., Syn, T.: Twenty-five years of the information systems journal: a bibliometric and ontological overview. Inf. Syst. J. 30(3), 431\u2013457 (2020)","journal-title":"Inf. Syst. J."},{"issue":"6","key":"840_CR17","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1057\/ejis.2008.57","volume":"17","author":"YK Dwivedi","year":"2008","unstructured":"Dwivedi, Y.K., Kuljis, J.: Profile of IS research published in the European journal of information systems. Eur. J. Inf. Syst. 17(6), 678\u2013693 (2008)","journal-title":"Eur. J. Inf. Syst."},{"key":"840_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.knosys.2014.12.035","volume":"80","author":"MJ Cobo","year":"2015","unstructured":"Cobo, M.J., Mart\u00ednez, M.-\u00c1., Guti\u00e9rrez-Salcedo, M., Fujita, H., Herrera-Viedma, E.: 25\u00a0years at knowledge-based systems a bibliometric analysis. Knowl.-Based Syst. 80, 3\u201313 (2015)","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"840_CR19","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0378-7206(99)00043-9","volume":"37","author":"E Claver","year":"2000","unstructured":"Claver, E., Gonz\u00e1lez, R., Llopis, J.: An analysis of research in information systems (1981\u20131997). Inf. Manage. 37(4), 181\u2013195 (2000)","journal-title":"Inf. Manage."},{"issue":"1","key":"840_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.im.2006.10.002","volume":"44","author":"P Palvia","year":"2007","unstructured":"Palvia, P., Pinjani, P., Sibley, E.H.: A profile of information systems research published in information & management. Inf. Manage. 44(1), 11 (2007)","journal-title":"Inf. Manage."},{"issue":"2","key":"840_CR21","first-page":"77","volume":"9","author":"YK Dwivedi","year":"2008","unstructured":"Dwivedi, Y.K., Kiang, M., Williams, M.D., Lal, B.: Profiling electronic commerce research published in the journal of electronic commerce research. J. Electron. Commer. Res. 9(2), 77\u201391 (2008)","journal-title":"J. Electron. Commer. Res."},{"issue":"8","key":"840_CR22","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1108\/JKM-10-2017-0497","volume":"22","author":"M Gaviria-Marin","year":"2018","unstructured":"Gaviria-Marin, M., Merigo, J.M., Popa, S.: Twenty years of the journal of knowledge management: a bibliometric analysis. J. Knowl. Manag. 22(8), 1655\u20131687 (2018)","journal-title":"J. Knowl. Manag."},{"issue":"3","key":"840_CR23","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.ejor.2017.04.027","volume":"262","author":"S Laengle","year":"2017","unstructured":"Laengle, S., et al.: Forty years of the European journal of operational research: a bibliometric overview. Eur. J. Oper. Res. 262(3), 803\u2013816 (2017)","journal-title":"Eur. J. Oper. Res."},{"issue":"1\/2","key":"840_CR24","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1108\/EJM-11-2017-0853","volume":"52","author":"FJ Mart\u00ednez-L\u00f3pez","year":"2018","unstructured":"Mart\u00ednez-L\u00f3pez, F.J., Merig\u00f3, J.M., Valenzuela-Fern\u00e1ndez, L., Nicol\u00e1s, C.: Fifty years of the European journal of marketing: a bibliometric analysis. Eur. J. Mark. 52(1\/2), 439\u2013468 (2018)","journal-title":"Eur. J. Mark."},{"key":"840_CR25","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s10489-018-1278-z","volume":"49","author":"D Yu","year":"2019","unstructured":"Yu, D., Xu, Z., Fujita, H.: Bibliometric analysis on the evolution of applied intelligence. Appl. Intell. 49, 449\u2013462 (2019)","journal-title":"Appl. Intell."},{"key":"840_CR26","unstructured":"Mohanty B. Management information systems quarterly (MISQ): a bibliometric study. Libr. Philos. Pract. p. 0-1 (2014)"},{"key":"840_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ins.2017.11.054","volume":"432","author":"JM Merig\u00f3","year":"2018","unstructured":"Merig\u00f3, J.M., Pedrycz, W., Weber, R., de la Sotta, C.: Fifty years of information sciences: a bibliometric overview. Inf. Sci. 432, 245\u2013268 (2018)","journal-title":"Inf. Sci."},{"key":"840_CR28","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10551-011-0924-8","volume":"104","author":"G Calabretta","year":"2011","unstructured":"Calabretta, G., Durisin, B., Ogliengo, M.: Uncovering the intellectual structure of research in business ethics: a journey through the history, the classics, and the pillars of journal of business ethics. J. Bus. Ethics 104, 499\u2013524 (2011)","journal-title":"J. Bus. Ethics"},{"issue":"1","key":"840_CR29","first-page":"1","volume":"63","author":"A Sharma","year":"2022","unstructured":"Sharma, A., Koohang, A., Rana, N.P., Abed, S.S., Dwivedi, Y.K.: Journal of computer information systems: intellectual and conceptual structure. J. Comput. Inf. Syst. 63(1), 1\u201331 (2022)","journal-title":"J. Comput. Inf. Syst."},{"issue":"2","key":"840_CR30","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TFUZZ.2017.2672732","volume":"26","author":"D Yu","year":"2017","unstructured":"Yu, D., Xu, Z., Kao, Y., Lin, C.-T.: The structure and citation landscape of IEEE transactions on fuzzy systems (1994\u20132015). IEEE Trans. Fuzzy Syst. 26(2), 430\u2013442 (2017)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"3","key":"840_CR31","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1287\/isre.2016.0670","volume":"27","author":"R Agarwal","year":"2016","unstructured":"Agarwal, R.: On the intellectual structure and evolution of ISR. Inf. Syst. Res. 27(3), 471\u2013477 (2016)","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"840_CR32","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1086\/209319","volume":"19","author":"DL Hoffman","year":"1993","unstructured":"Hoffman, D.L., Holbrook, M.B.: The intellectual structure of consumer research: a bibliometric study of author cocitations in the first 15\u00a0years of the journal of consumer research. J. Consum. Res. 19(4), 505\u2013517 (1993)","journal-title":"J. Consum. Res."},{"issue":"1","key":"840_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1093\/jcr\/ucv009","volume":"42","author":"X Wang","year":"2015","unstructured":"Wang, X., Bendle, N.T., Mai, F., Cotte, J.: The journal of consumer research at 40: a historical analysis. J. Consum. Res. 42(1), 5\u201318 (2015)","journal-title":"J. Consum. Res."},{"issue":"4","key":"840_CR34","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2133806.2133826","volume":"55","author":"DM Blei","year":"2012","unstructured":"Blei, D.M.: Probabilistic topic models. Commun. ACM 55(4), 77\u201384 (2012)","journal-title":"Commun. ACM"},{"issue":"4","key":"840_CR35","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1111\/ajps.12103","volume":"58","author":"ME Roberts","year":"2014","unstructured":"Roberts, M.E., et al.: Structural topic models for open-ended survey responses. Am. J. Polit. Sci. 58(4), 1064\u20131082 (2014)","journal-title":"Am. J. Polit. Sci."},{"key":"840_CR36","volume-title":"The cyber security body of knowledge","author":"D Basin","year":"2021","unstructured":"Basin, D.: The cyber security body of knowledge. Univ. Bristol Ch Form. Methods Secur, VersionOnline (2021)"},{"key":"840_CR37","first-page":"348","volume":"25","author":"A Pritchard","year":"1969","unstructured":"Pritchard, A.: Statistical bibliography or bibliometrics. J. Doc. 25, 348 (1969)","journal-title":"J. Doc."},{"key":"840_CR38","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1515\/libr.1981.31.1.294","volume":"31","author":"SM Lawani","year":"1981","unstructured":"Lawani, S.M.: Bibliometrics: its theoretical foundations, methods and applications. Libri 31, 294\u2013315 (1981)","journal-title":"Libri"},{"key":"840_CR39","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/BF02016680","volume":"12","author":"RN Broadus","year":"1987","unstructured":"Broadus, R.N.: Toward a definition of \u2018bibliometrics.\u2019 Scientometrics 12, 373\u2013379 (1987)","journal-title":"Scientometrics"},{"issue":"1","key":"840_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0306-4573(92)90087-G","volume":"28","author":"J Tague-Sutcliffe","year":"1992","unstructured":"Tague-Sutcliffe, J.: An introduction to informetrics. Inf. Process. Manag. 28(1), 1\u20133 (1992)","journal-title":"Inf. Process. Manag."},{"key":"840_CR41","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1017919924342","volume":"52","author":"WW Hood","year":"2001","unstructured":"Hood, W.W., Wilson, C.S.: The literature of bibliometrics, scientometrics, and informetrics. Scientometrics 52, 291\u2013314 (2001)","journal-title":"Scientometrics"},{"key":"840_CR42","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","volume":"133","author":"N Donthu","year":"2021","unstructured":"Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 133, 285\u2013296 (2021)","journal-title":"J. Bus. Res."},{"key":"840_CR43","doi-asserted-by":"crossref","unstructured":"Culnan M. J. Mapping the intellectual structure of MIS, 1980\u20131985: a co-citation analysis. Mis Q., pp. 341\u2013353 (1987)","DOI":"10.2307\/248680"},{"issue":"1","key":"840_CR44","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1002\/asi.5090140103","volume":"14","author":"MM Kessler","year":"1963","unstructured":"Kessler, M.M.: Bibliographic coupling between scientific papers. Am. Doc. 14(1), 10\u201325 (1963)","journal-title":"Am. Doc."},{"issue":"4","key":"840_CR45","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1002\/asi.4630240406","volume":"24","author":"H Small","year":"1973","unstructured":"Small, H.: Co-citation in the scientific literature: a new measure of the relationship between two documents. J. Am. Soc. Inf. Sci. 24(4), 265\u2013269 (1973)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"2","key":"840_CR46","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1080\/14780887.2014.955224","volume":"12","author":"J Brooks","year":"2015","unstructured":"Brooks, J., McCluskey, S., Turley, E., King, N.: The utility of template analysis in qualitative psychology research. Qual. Res. Psychol. 12(2), 202\u2013222 (2015)","journal-title":"Qual. Res. Psychol."},{"key":"840_CR47","first-page":"426","volume":"426","author":"N King","year":"2012","unstructured":"King, N.: Doing template analysis. Qual. Organ. Res. Core Methods Curr. Chall. 426, 426\u2013450 (2012)","journal-title":"Qual. Organ. Res. Core Methods Curr. Chall."},{"key":"840_CR48","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF02019280","volume":"22","author":"M Callon","year":"1991","unstructured":"Callon, M., Courtial, J.P., Laville, F.: Co-word analysis as a tool for describing the network of interactions between basic and technological research: the case of polymer chemsitry. Scientometrics 22, 155\u2013205 (1991)","journal-title":"Scientometrics"},{"issue":"4","key":"840_CR49","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/publications5040023","volume":"5","author":"D Fiala","year":"2017","unstructured":"Fiala, D., Tutoky, G.: Computer science papers in web of science: a bibliometric analysis. Publications 5(4), 23 (2017)","journal-title":"Publications"},{"issue":"1","key":"840_CR50","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ipm.2010.03.003","volume":"47","author":"M Franceschet","year":"2011","unstructured":"Franceschet, M.: The skewness of computer science. Inf. Process. Manag. 47(1), 117\u2013124 (2011)","journal-title":"Inf. Process. Manag."},{"key":"840_CR51","unstructured":"N. J. van Eck and L. Waltman, (2013) \u201cVOSviewer manual,\u201d Leiden Univeristeit Leiden, vol. 1, no. 1,"},{"key":"840_CR52","doi-asserted-by":"crossref","unstructured":"King N., Brooks J., Tabari S. Template analysis in business and management research. Qual. Methodol. Organ. Stud. Vol. II Methods Possibilities, pp. 179\u2013206 (2018)","DOI":"10.1007\/978-3-319-65442-3_8"},{"issue":"2","key":"840_CR53","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","volume":"84","author":"N van Eck","year":"2009","unstructured":"van Eck, N., Waltman, L.: Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2), 523\u2013538 (2009)","journal-title":"Scientometrics"},{"key":"840_CR54","unstructured":"Swan A. The open access citation advantage: studies and results to date (2010)"},{"issue":"5","key":"840_CR55","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1177\/0165551519865489","volume":"46","author":"H Sotudeh","year":"2020","unstructured":"Sotudeh, H.: Does open access citation advantage depend on paper topics? J. Inf. Sci. 46(5), 696\u2013709 (2020)","journal-title":"J. Inf. Sci."},{"key":"840_CR56","unstructured":"J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, R. L. Tatham, and others, Multivariate data analysis (Vol. 6). Upper Saddle River, NJ: Pearson Prentice Hall, 2006."},{"issue":"1","key":"840_CR57","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.joi.2011.08.004","volume":"6","author":"L Bornmann","year":"2012","unstructured":"Bornmann, L., Schier, H., Marx, W., Daniel, H.-D.: What factors determine citation counts of publications in chemistry besides their quality? J. Informetr. 6(1), 11\u201318 (2012)","journal-title":"J. Informetr."},{"issue":"4","key":"840_CR58","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1016\/j.joi.2016.10.004","volume":"10","author":"S Uddin","year":"2016","unstructured":"Uddin, S., Khan, A.: The impact of author-selected keywords on citation counts. J. Informetr. 10(4), 1166\u20131177 (2016)","journal-title":"J. Informetr."},{"issue":"1","key":"840_CR59","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.tree.2004.10.010","volume":"20","author":"R Leimu","year":"2005","unstructured":"Leimu, R., Koricheva, J.: What determines the citation frequency of ecological papers? Trends Ecol. Evol. 20(1), 28\u201332 (2005)","journal-title":"Trends Ecol. Evol."},{"key":"840_CR60","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213\u2013241 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR61","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113\u2013170 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"NL Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6, 1\u201314 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR63","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10207-008-0058-x","volume":"7","author":"JW Bryans","year":"2008","unstructured":"Bryans, J.W., Koutny, M., Mazar\u00e9, L., Ryan, P.Y.: Opacity generalised to transition systems. Int. J. Inf. Secur. 7, 421\u2013435 (2008)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR64","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","volume":"14","author":"H Qian","year":"2015","unstructured":"Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487\u2013497 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR65","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10207-012-0177-2","volume":"11","author":"D Bogdanov","year":"2012","unstructured":"Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11, 403\u2013418 (2012)","journal-title":"Int. J. Inf. Secur."},{"issue":"6","key":"840_CR66","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399\u2013422 (2009)","journal-title":"Int. J. Inf. Secur."},{"key":"840_CR67","doi-asserted-by":"crossref","unstructured":"H. J. Smith, T. Dinev, and H. Xu, \u201cInformation privacy research: an interdisciplinary review,\u201d MIS Q., pp. 989\u20131015, 2011.","DOI":"10.2307\/41409970"},{"issue":"1","key":"840_CR68","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM Sigmod Rec. 33(1), 50\u201357 (2004)","journal-title":"ACM Sigmod Rec."},{"issue":"5","key":"840_CR69","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/S0167-4048(02)00504-7","volume":"21","author":"K H\u00f6ne","year":"2002","unstructured":"H\u00f6ne, K., Eloff, J.H.P.: Information security policy\u2014what do international information security standards say? Comput. Secur. 21(5), 402\u2013409 (2002)","journal-title":"Comput. Secur."},{"issue":"12","key":"840_CR70","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493\u20139532 (2020)","journal-title":"J. Supercomput."},{"key":"840_CR71","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.compeleceng.2018.06.006","volume":"71","author":"N Subramanian","year":"2018","unstructured":"Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28\u201342 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"8","key":"840_CR72","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2010","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390\u20131397 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00840-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00840-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00840-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:12:58Z","timestamp":1716761578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00840-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["840"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00840-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3339166\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,25]]},"assertion":[{"value":"6 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"I confirm that the work presented in this research article is original and has not been published elsewhere, nor is it under consideration for publication elsewhere. Also, we have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}