{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:17:21Z","timestamp":1760660241630,"version":"build-2065373602"},"reference-count":167,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:00:00Z","timestamp":1756771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:00:00Z","timestamp":1756771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education Malaysia","doi-asserted-by":"crossref","award":["FRGS\/1\/2023\/ICT07\/USM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2023\/ICT07\/USM\/02\/1"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01111-2","type":"journal-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T12:21:33Z","timestamp":1756815693000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advancing cybersecurity in ASEAN: current trends, emerging challenges, and opportunities for enhanced resilience"],"prefix":"10.1007","volume":"24","author":[{"given":"Auwal Shehu","family":"Ali","sequence":"first","affiliation":[]},{"given":"Zarul Fitri","family":"Zaaba","sequence":"additional","affiliation":[]},{"given":"Manmeet Mahinderjit","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Nor Badrul","family":"Anuar","sequence":"additional","affiliation":[]},{"given":"Mohd Ridzuan Bin M.","family":"Shariff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,2]]},"reference":[{"issue":"10","key":"1111_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101846","volume":"35","author":"H Alimam","year":"2023","unstructured":"Alimam, H., Mazzuto, G., Tozzi, N., Ciarapica, F.E., Bevilacqua, M.: The resurrection of digital triplet: a cognitive pillar of human-machine integration at the dawn of industry 5.0. J. King Saud Univ. 35(10), 101846 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.101846","journal-title":"J. King Saud Univ."},{"issue":"10","key":"1111_CR2","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1016\/j.telpol.2017.04.005","volume":"41","author":"KM Vu","year":"2017","unstructured":"Vu, K.M.: Ict diffusion and production in ASEAN countries: patterns, performance, and policy directions. Telecomm. Policy 41(10), 962\u2013977 (2017). https:\/\/doi.org\/10.1016\/j.telpol.2017.04.005","journal-title":"Telecomm. Policy"},{"issue":"2","key":"1111_CR3","doi-asserted-by":"publisher","first-page":"495","DOI":"10.53106\/160792642023032402031","volume":"24","author":"YKK Yu Kyung Kim","year":"2023","unstructured":"Yu Kyung Kim, Y.K.K., Myong Hyun Go, M.H.G., Sonyong Kim, S.K., Jaeyeon Lee, J.L., Kyungho Lee, K.L.: Evaluating cybersecurity capacity building of ASEAN Plus three through social network analysis. J. Internet Technol. 24(2), 495\u2013505 (2023). https:\/\/doi.org\/10.53106\/160792642023032402031","journal-title":"J. Internet Technol."},{"issue":"2","key":"1111_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.25041\/lajil.v4i2.2556","volume":"4","author":"K Estiyovionita","year":"2022","unstructured":"Estiyovionita, K., Sitamala, A.: Asean\u2019s role in cybersecurity maintenance and security strategy through an international security approach. Lampung J. Int. Law 4(2), 81\u201390 (2022). https:\/\/doi.org\/10.25041\/lajil.v4i2.2556","journal-title":"Lampung J. Int. Law"},{"issue":"2","key":"1111_CR5","doi-asserted-by":"publisher","DOI":"10.2196\/12644","volume":"21","author":"MS Jalali","year":"2019","unstructured":"Jalali, M.S., Razak, S., Gordon, W., Perakslis, E., Madnick, S.: Health care and cybersecurity: bibliometric analysis of the literature. J. Med. Internet Res. 21(2), e12644 (2019). https:\/\/doi.org\/10.2196\/12644","journal-title":"J. Med. Internet Res."},{"doi-asserted-by":"publisher","unstructured":"Thakur, H., Purandare, P.: Comparative study on bibliometric data of cyber attacks on financial institutions. In: AIP Conference Proceedings, vol. 2519, p. 030044 (2022). https:\/\/doi.org\/10.1063\/5.0112569","key":"1111_CR6","DOI":"10.1063\/5.0112569"},{"unstructured":"Ishaq, K., Fareed, S.: Mitigation techniques for cyber attacks: a systematic mapping study (2023). Accessed 02 Sep 2024. [Online]. Available: https:\/\/arxiv.org\/abs\/2308.13587","key":"1111_CR7"},{"issue":"1","key":"1111_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1353\/asp.2014.0026","volume":"1","author":"CH Heinl","year":"2014","unstructured":"Heinl, C.H.: Regional cybersecurity: moving toward a resilient ASEAN cybersecurity regime. Asia Policy 1(1), 131\u2013159 (2014). https:\/\/doi.org\/10.1353\/asp.2014.0026","journal-title":"Asia Policy"},{"key":"1111_CR9","first-page":"135","volume-title":"Game Theory and Mechanism Design in Politics","author":"T Marwala","year":"2023","unstructured":"Marwala, T.: Cybersecurity in Politics. In: Intelligence, A. (ed.) Game Theory and Mechanism Design in Politics, pp. 135\u2013155. Springer Nature Singapore, Singapore (2023)"},{"doi-asserted-by":"crossref","unstructured":"Kim, Y., Go, M., Lee, K.: Influence through cyber capacity building: network analysis of assistance, cooperation, and agreements among ASEAN plus three countries. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13720 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 330\u2013343 (2023)","key":"1111_CR10","DOI":"10.1007\/978-3-031-25659-2_24"},{"issue":"4","key":"1111_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3203245","volume":"51","author":"J Giraldo","year":"2019","unstructured":"Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51(4), 1\u201336 (2019). https:\/\/doi.org\/10.1145\/3203245","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"1111_CR12","doi-asserted-by":"publisher","first-page":"484","DOI":"10.3390\/fintech2030028","volume":"2","author":"M Hasan","year":"2023","unstructured":"Hasan, M., Hoque, A., Le, T.: Big data-driven banking operations: opportunities, challenges, and data security perspectives. FinTech 2(3), 484\u2013509 (2023). https:\/\/doi.org\/10.3390\/fintech2030028","journal-title":"FinTech"},{"key":"1111_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta, J., Ruj, S., Das Bit, S.: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2019.102481","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1111_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MSP.2015.84","volume":"13","author":"T Benzel","year":"2015","unstructured":"Benzel, T.: A strategic plan for cybersecurity research and development. IEEE Secur. Priv. 13(4), 3\u20135 (2015). https:\/\/doi.org\/10.1109\/MSP.2015.84","journal-title":"IEEE Secur. Priv."},{"issue":"2021","key":"1111_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MysuruCon52639.2021.9641641","volume":"2021","author":"Kusuma, M., Hariyadi, D., Fazlurrahman, Nugroho, M.A.: The Bibliometric Analysis the Digital Forensics Researcher in Indonesia Based on Garba Rujukan Digital: 2008\u20132020. in","year":"2021","unstructured":"Kusuma, M., Hariyadi, D., Fazlurrahman, Nugroho, M.A.: The Bibliometric Analysis the Digital Forensics Researcher in Indonesia Based on Garba Rujukan Digital: 2008\u20132020. in: IEEE Mysore Sub Section International Conference. MysuruCon 2021(2021), 13\u201317 (2021). https:\/\/doi.org\/10.1109\/MysuruCon52639.2021.9641641","journal-title":"MysuruCon"},{"key":"1111_CR16","first-page":"311","volume-title":"\u201cEmerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies\u201d, in Advances in Information Security","author":"J Baldwin","year":"2018","unstructured":"Baldwin, J., Alhawi, O.M.K., Shaughnessy, S., Akinbi, A., Dehghantanha, A.: \u201cEmerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies\u201d, in Advances in Information Security, vol. 70, pp. 311\u2013331. Springer, New York LLC (2018)"},{"key":"1111_CR17","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950","journal-title":"IEEE Access"},{"issue":"2","key":"1111_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1089\/cpb.2007.0056","volume":"11","author":"J Raacke","year":"2008","unstructured":"Raacke, J., Bonds-Raacke, J.: MySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychol. Behav. 11(2), 169\u2013174 (2008). https:\/\/doi.org\/10.1089\/cpb.2007.0056","journal-title":"Cyberpsychol. Behav."},{"doi-asserted-by":"publisher","unstructured":"Goyal, R.: Blockchain Technology in Forensic Science. A Bibliometric Review. In: 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), pp. 1570\u20131573 (2021). https:\/\/doi.org\/10.1109\/ICAC3N53548.2021.9725660.","key":"1111_CR19","DOI":"10.1109\/ICAC3N53548.2021.9725660"},{"key":"1111_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2022.101876","volume":"73","author":"A Rejeb","year":"2022","unstructured":"Rejeb, A., Rejeb, K., Abdollahi, A., Treiblmaier, H.: The big picture on Instagram research: insights from a bibliometric analysis. Telemat. Inform. 73, 101876 (2022). https:\/\/doi.org\/10.1016\/j.tele.2022.101876","journal-title":"Telemat. Inform."},{"issue":"1","key":"1111_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1525\/collabra.73830","volume":"9","author":"JC Garc\u00eda Alanis","year":"2023","unstructured":"Garc\u00eda Alanis, J.C., Strelow, A.E., Dort, M., Christiansen, H., Pinquart, M., Panitz, C.: Expectation violations, expectation change, and expectation persistence: the scientific landscape as revealed by bibliometric network analyses. Collabra. Psychol. 9(1), 65\u201377 (2023). https:\/\/doi.org\/10.1525\/collabra.73830","journal-title":"Collabra. Psychol."},{"key":"1111_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.rico.2023.100204","volume":"10","author":"D Sharma","year":"2023","unstructured":"Sharma, D., Mittal, R., Sekhar, R., Shah, P., Renz, M.: A bibliometric analysis of cyber security and cyber forensics research. Results Control Optim. 10, 100204 (2023). https:\/\/doi.org\/10.1016\/j.rico.2023.100204","journal-title":"Results Control Optim."},{"key":"1111_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100571","volume":"39","author":"V Bolbot","year":"2022","unstructured":"Bolbot, V., Kulkarni, K., Brunou, P., Banda, O.V., Musharraf, M.: Developments and research directions in maritime cybersecurity: a systematic literature review and bibliometric analysis. Int. J. Crit. Infrastruct. Prot. 39, 100571 (2022). https:\/\/doi.org\/10.1016\/j.ijcip.2022.100571","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1111_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105617","volume":"147","author":"X Gou","year":"2022","unstructured":"Gou, X., et al.: In-depth analysis on safety and security research based on system dynamics: a bibliometric mapping approach-based study. Saf. Sci. 147, 105617 (2022). https:\/\/doi.org\/10.1016\/j.ssci.2021.105617","journal-title":"Saf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Jos\u00e9 de Oliveira, O., Francisco da Silva, F., Juliani, F., C\u00e9sar Ferreira Motta Barbosa, L., Vieira Nunhes, T.: Bibliometric method for mapping the state-of-the-art and identifying research gaps and trends in literature: an essential instrument to support the development of scientific projects. In: Scientometrics Recent Advances (2019)","key":"1111_CR25","DOI":"10.5772\/intechopen.85856"},{"issue":"6","key":"1111_CR26","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1108\/JFC-11-2022-0287","volume":"30","author":"H Nobanee","year":"2023","unstructured":"Nobanee, H., Alodat, A., Bajodah, R., Al-Ali, M., Al Darmaki, A.: Bibliometric analysis of cybercrime and cybersecurity risks literature. J. Financ. Crime 30(6), 1736\u20131754 (2023). https:\/\/doi.org\/10.1108\/JFC-11-2022-0287","journal-title":"J. Financ. Crime"},{"key":"1111_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","volume":"133","author":"N Donthu","year":"2021","unstructured":"Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: an overview and guidelines. J. Bus. Res. 133, 285\u2013296 (2021). https:\/\/doi.org\/10.1016\/j.jbusres.2021.04.070","journal-title":"J. Bus. Res."},{"issue":"1","key":"1111_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11192-007-1681-4","volume":"73","author":"F De Moya-Aneg\u00f3n","year":"2007","unstructured":"De Moya-Aneg\u00f3n, F., et al.: Coverage analysis of Scopus: a journal metric approach. Scientometrics 73(1), 53\u201378 (2007). https:\/\/doi.org\/10.1007\/s11192-007-1681-4","journal-title":"Scientometrics"},{"issue":"4","key":"1111_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103405","volume":"60","author":"J Wang","year":"2023","unstructured":"Wang, J., Cheng, Q., Lu, W., Dou, Y., Li, P.: A term function\u2013aware keyword citation network method for science mapping analysis. Inf. Process. Manage. 60(4), 103405 (2023). https:\/\/doi.org\/10.1016\/j.ipm.2023.103405","journal-title":"Inf. Process. Manage."},{"issue":"4","key":"1111_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09716-4","volume":"21","author":"D Sharma","year":"2023","unstructured":"Sharma, D., Kumar, R., Jung, K.-H.: A bibliometric analysis of convergence of artificial intelligence and blockchain for edge of things. J. Grid Comput. 21(4), 79 (2023). https:\/\/doi.org\/10.1007\/s10723-023-09716-4","journal-title":"J. Grid Comput."},{"issue":"5","key":"1111_CR31","doi-asserted-by":"publisher","first-page":"583","DOI":"10.18196\/jrc.v3i5.15453","volume":"3","author":"R Sekhar","year":"2022","unstructured":"Sekhar, R., Shah, P., Iswanto, I.: Robotics in industry 4.0: a bibliometric analysis (2011\u20132022). J. Robot. Control. 3(5), 583\u2013613 (2022). https:\/\/doi.org\/10.18196\/jrc.v3i5.15453","journal-title":"J. Robot. Control."},{"issue":"4","key":"1111_CR32","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s00202-016-0427-9","volume":"98","author":"D Balakrishnan","year":"2016","unstructured":"Balakrishnan, D., Haney, A.B., Meuer, J.: What a MES(s)! A bibliometric analysis of the evolution of research on multi-energy systems. Electr. Eng. 98(4), 369\u2013374 (2016). https:\/\/doi.org\/10.1007\/s00202-016-0427-9","journal-title":"Electr. Eng."},{"issue":"8","key":"1111_CR33","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1109\/TIFS.2016.2561241","volume":"11","author":"L Li","year":"2016","unstructured":"Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forens. Secur. 11(8), 1847\u20131861 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2561241","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"1111_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2023.101968","volume":"80","author":"C-P Liao","year":"2023","unstructured":"Liao, C.-P., Sher, C.-Y., Liu, Y.-H.: Progress and future directions for research on social media addiction: visualisation-based bibliometric analysis. Telemat. Inform. 80, 101968 (2023). https:\/\/doi.org\/10.1016\/j.tele.2023.101968","journal-title":"Telemat. Inform."},{"issue":"1","key":"1111_CR35","doi-asserted-by":"publisher","first-page":"587","DOI":"10.11591\/eei.v12i1.4460","volume":"12","author":"AS Ali","year":"2023","unstructured":"Ali, A.S., Zaaba, Z.F., Singh, M.M.: Privacy during epidemic of COVID-19: a bibliometric analysis. Bull. Electr. Eng. Inform. 12(1), 587\u2013596 (2023). https:\/\/doi.org\/10.11591\/eei.v12i1.4460","journal-title":"Bull. Electr. Eng. Inform."},{"doi-asserted-by":"crossref","unstructured":"Makawana, P.R., Jhaveri, R.H.: A bibliometric analysis of recent research on machine learning for cyber security. In: Lecture Notes in Networks and Systems, vol. 19, pp. 213\u2013226. Springer (2018)","key":"1111_CR36","DOI":"10.1007\/978-981-10-5523-2_20"},{"doi-asserted-by":"crossref","unstructured":"Rahim, N.: Bibliometric analysis of cyber threat and cyber attack literature: exploring the higher education context. In: Cybersecurity Threats with New Perspectives. IntechOpen (2021)","key":"1111_CR37","DOI":"10.5772\/intechopen.98038"},{"key":"1111_CR38","first-page":"203","volume-title":"\u201cA Bibliometric Analysis on the Application of Deep Learning in Cybersecurity\u201d, in Security of Cyber-Physical Systems","author":"S Nakhodchi","year":"2020","unstructured":"Nakhodchi, S., Dehghantanha, A.: \u201cA Bibliometric Analysis on the Application of Deep Learning in Cybersecurity\u201d, in Security of Cyber-Physical Systems, pp. 203\u2013221. Springer International Publishing, Cham (2020)"},{"key":"1111_CR39","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3688394","author":"B Elango","year":"2020","unstructured":"Elango, B., Matilda, S., Jeyasankari, J.: Redefining search terms for cybersecurity: a bibliometric perspective. SSRN Electron. J. (2020). https:\/\/doi.org\/10.2139\/ssrn.3688394","journal-title":"SSRN Electron. J."},{"issue":"3","key":"1111_CR40","doi-asserted-by":"publisher","first-page":"93","DOI":"10.21272\/fmir.6(3).93-104.2022","volume":"6","author":"H Yarovenko","year":"2022","unstructured":"Yarovenko, H., Rogkova, M.: Dynamic and bibliometric analysis of terms identifying the combating financial and cyber fraud system. Financ. Mark. Inst. Risks 6(3), 93\u2013104 (2022). https:\/\/doi.org\/10.21272\/fmir.6(3).93-104.2022","journal-title":"Financ. Mark. Inst. Risks"},{"key":"1111_CR41","first-page":"297","volume-title":"\u201cMobile Forensics: A Bibliometric Analysis\u201d, in Advances in Information Security","author":"J Gill","year":"2018","unstructured":"Gill, J., Okere, I., HaddadPajouh, H., Dehghantanha, A.: \u201cMobile Forensics: A Bibliometric Analysis\u201d, in Advances in Information Security, vol. 70, pp. 297\u2013310. Springer, New York LLC (2018)"},{"doi-asserted-by":"crossref","unstructured":"de Azambuja, A.J.G., Almeida, V.R.: A bibliometric study of Cybersecurity in Industry 4.0 publications. Res. Soc. Dev. 10(3), 4210312937e\u20134210312937e (2021). Accessed 25 Feb 2024. [Online]. Available: https:\/\/www.lareferencia.info\/vufind\/Record\/BR_20c7cd2300e904e7709d6e39a7668f0b","key":"1111_CR42","DOI":"10.33448\/rsd-v10i3.12937"},{"key":"1111_CR43","doi-asserted-by":"publisher","first-page":"151","DOI":"10.24989\/ocg.v335.12","volume":"335","author":"I Cojocaru","year":"2022","unstructured":"Cojocaru, I., Cojocaru, I.: A bibliomeric analysis of cybersecurity research papers in Eastern Europe: case study from the Republic of Moldova. Cent. East. Eur. eDem. eGov. Days 335, 151\u2013162 (2022). https:\/\/doi.org\/10.24989\/ocg.v335.12","journal-title":"Cent. East. Eur. eDem. eGov. Days"},{"issue":"1","key":"1111_CR44","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1080\/0194262X.2020.1714529","volume":"39","author":"A Gokhale","year":"2020","unstructured":"Gokhale, A., Mulay, P., Pramod, D., Kulkarni, R.: A bibliometric analysis of digital image forensics. Sci. Technol. Libr. 39(1), 96\u2013113 (2020). https:\/\/doi.org\/10.1080\/0194262X.2020.1714529","journal-title":"Sci. Technol. Libr."},{"unstructured":"Ismayilova, N.: Bibliometric analysis of information security research. ict.azN IsmayilovaComput Commun. 106\u2013109 (2015). Accessed 25 Feb 2024. [Online]. Available: https:\/\/ict.az\/uploads\/konfrans\/2_konfrans\/27.pdf","key":"1111_CR45"},{"unstructured":"Rehman, S.U., Mahmud, M. Atta-Ur-Rahman, Haq, I.U., Safdar, M.: Information security in business: A bibliometric analysis of the 100 top cited articles. Libr. Philos. Pract. 2021, 1\u201335 (2021). Accessed 25 Feb 2024. [Online]. Available: https:\/\/www.academia.edu\/download\/99081200\/427270879.pdf","key":"1111_CR46"},{"issue":"6","key":"1111_CR47","first-page":"2567","volume":"7","author":"G Shukla","year":"2020","unstructured":"Shukla, G., Gochhait, S.: Cyber security trend analysis using Web of Science: a bibliometric analysis. Eur. J. Mol. Clin. Med. 7(6), 2567\u20132576 (2020)","journal-title":"Eur. J. Mol. Clin. Med."},{"unstructured":"Mahbubani, K., Severino, R.: Asean the Way Foward (2018). https:\/\/www.mckinsey.de\/\/media\/McKinsey\/Industries\/PublicandSocialSector\/OurInsights\/ASEANThewayforward\/ASEANThewayforward.pdf. Accessed 23 Feb 2024","key":"1111_CR48"},{"issue":"4","key":"1111_CR49","first-page":"348","volume":"25","author":"A Pritchard","year":"1969","unstructured":"Pritchard, A.: Statistical bibliography or bibliometrics? J Document. 25(4), 348\u2013349 (1969)","journal-title":"J Document."},{"issue":"16","key":"1111_CR50","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1080\/13683500.2017.1408574","volume":"22","author":"Y Jiang","year":"2019","unstructured":"Jiang, Y., Ritchie, B.W., Benckendorff, P.: Bibliometric visualisation: an application in tourism crisis and disaster management research. Curr. Issues Tour. 22(16), 1925\u20131957 (2019). https:\/\/doi.org\/10.1080\/13683500.2017.1408574","journal-title":"Curr. Issues Tour."},{"issue":"4","key":"1111_CR51","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/BF02019306","volume":"1","author":"E Garfield","year":"1979","unstructured":"Garfield, E.: Is citation analysis a legitimate evaluation tool? Scientometrics 1(4), 359\u2013375 (1979). https:\/\/doi.org\/10.1007\/BF02019306","journal-title":"Scientometrics"},{"issue":"4","key":"1111_CR52","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","volume":"11","author":"M Aria","year":"2017","unstructured":"Aria, M., Cuccurullo, C.: Bibliometrix\u202f: an R-tool for comprehensive science mapping analysis. J. Informetr. 11(4), 959\u2013975 (2017). https:\/\/doi.org\/10.1016\/j.joi.2017.08.007","journal-title":"J. Informetr."},{"issue":"2","key":"1111_CR53","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s10207-023-00761-4","volume":"23","author":"AS Ali","year":"2024","unstructured":"Ali, A.S., Zaaba, Z.F., Singh, M.M.: The rise of \u2018security and privacy\u2019: bibliometric analysis of computer privacy research. Int. J. Inf. Secur. 23(2), 863\u2013885 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00761-4","journal-title":"Int. J. Inf. Secur."},{"key":"1111_CR54","first-page":"1","volume-title":"Metaheuristic algorithms in Industry 4.0","author":"D Sharma","year":"2021","unstructured":"Sharma, D., Gupta, P.K., Andreu-Perez, J.: A review on cyber physical systems and smart computing: bibliometric analysis. In: Metaheuristic algorithms in Industry 4.0, pp. 1\u201331. CRC Press, Boca Raton (2021)"},{"issue":"4","key":"1111_CR55","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1177\/136078041201700402","volume":"17","author":"VG Eslick","year":"2012","unstructured":"Eslick, V.G.: Book review: understanding social networks: theories, concepts, and findings. Sociol. Res. Online 17(4), 161\u2013162 (2012). https:\/\/doi.org\/10.1177\/136078041201700402","journal-title":"Sociol. Res. Online"},{"issue":"2","key":"1111_CR56","doi-asserted-by":"publisher","first-page":"195","DOI":"10.5465\/amr.1994.9410210745","volume":"19","author":"KJ Klein","year":"1994","unstructured":"Klein, K.J., Dansereau, F., Hall, R.J.: Levels issues in theory development, data collection, and analysis. Acad. Manag. Rev. 19(2), 195\u2013229 (1994). https:\/\/doi.org\/10.5465\/amr.1994.9410210745","journal-title":"Acad. Manag. Rev."},{"issue":"1","key":"1111_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1375\/jhtm.16.1.1","volume":"16","author":"P Benckendorff","year":"2009","unstructured":"Benckendorff, P.: Themes and trends in Australian and New Zealand tourism research: a social network analysis of citations in two leading journals (1994\u20132007). J. Hosp. Tour. Manag. 16(1), 1\u201315 (2009). https:\/\/doi.org\/10.1375\/jhtm.16.1.1","journal-title":"J. Hosp. Tour. Manag."},{"issue":"6","key":"1111_CR58","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1016\/j.ipm.2013.07.001","volume":"49","author":"B Hj\u00f8rland","year":"2013","unstructured":"Hj\u00f8rland, B.: Citation analysis: a social and dynamic approach to knowledge organisation. Inf. Process. Manag. 49(6), 1313\u20131325 (2013). https:\/\/doi.org\/10.1016\/j.ipm.2013.07.001","journal-title":"Inf. Process. Manag."},{"key":"1111_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102168","volume":"59","author":"YK Dwivedi","year":"2021","unstructured":"Dwivedi, Y.K., et al.: Setting the future of digital and social media marketing research: perspectives and research propositions. Int. J. Inf. Manage. 59, 102168 (2021). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102168","journal-title":"Int. J. Inf. Manage."},{"key":"1111_CR60","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.cose.2017.11.007","volume":"73","author":"S Chen","year":"2018","unstructured":"Chen, S., et al.: Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach. Comput. Secur. 73, 326\u2013344 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.11.007","journal-title":"Comput. Secur."},{"doi-asserted-by":"publisher","unstructured":"Wang, X., et al.: Search Me in the dark: privacy-preserving boolean range query over encrypted spatial data. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, vol. 2020-July, pp. 2253\u20132262 (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155505","key":"1111_CR61","DOI":"10.1109\/INFOCOM41043.2020.9155505"},{"issue":"5","key":"1111_CR62","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1080\/10967494.2018.1498817","volume":"22","author":"Y Chandra","year":"2019","unstructured":"Chandra, Y., Walker, R.M.: How does a seminal article in public administration diffuse and influence the field? Bibliometric methods and the case of Hood\u2019s \u2018A public management for all seasons?\u2019 Int. Public Manag. J. 22(5), 712\u2013742 (2019). https:\/\/doi.org\/10.1080\/10967494.2018.1498817","journal-title":"Int. Public Manag. J."},{"key":"1111_CR63","first-page":"257","volume-title":"\u201cAnalysing Scientific Networks Through Co-Authorship\u201d, in Handbook of Quantitative Science and Technology Research","author":"W Gl\u00e4nzel","year":"2006","unstructured":"Gl\u00e4nzel, W., Schubert, A.: \u201cAnalysing Scientific Networks Through Co-Authorship\u201d, in Handbook of Quantitative Science and Technology Research, pp. 257\u2013276. Kluwer Academic Publishers, Dordrecht (2006)"},{"key":"1111_CR64","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v069.c02","author":"DM Griffith","year":"2016","unstructured":"Griffith, D.M., Veech, J.A., Marsh, C.J.: Cooccur: probabilistic species co-occurrence analysis in R. J. Stat. Softw. (2016). https:\/\/doi.org\/10.18637\/jss.v069.c02","journal-title":"J. Stat. Softw."},{"issue":"2","key":"1111_CR65","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ipm.2017.11.005","volume":"54","author":"W Zhao","year":"2018","unstructured":"Zhao, W., Mao, J., Lu, K.: Ranking themes on co-word networks: exploring the relationships among different metrics. Inf. Process. Manage. 54(2), 203\u2013218 (2018). https:\/\/doi.org\/10.1016\/j.ipm.2017.11.005","journal-title":"Inf. Process. Manage."},{"issue":"5","key":"1111_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e09369","volume":"8","author":"DD M\u00fchl","year":"2022","unstructured":"M\u00fchl, D.D., de Oliveira, L.: A bibliometric and thematic approach to agriculture 4.0. Heliyon 8(5), e09369 (2022). https:\/\/doi.org\/10.1016\/j.heliyon.2022.e09369","journal-title":"Heliyon"},{"issue":"12","key":"1111_CR67","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1080\/09654313.2022.2158722","volume":"31","author":"P Casadei","year":"2023","unstructured":"Casadei, P., Bloom, M., Camerani, R., Masucci, M., Siepel, J., Ospina, J.V.: Mapping the state of the art of creative cluster research: a bibliometric and thematic analysis. Eur. Plan. Stud. 31(12), 2531\u20132551 (2023). https:\/\/doi.org\/10.1080\/09654313.2022.2158722","journal-title":"Eur. Plan. Stud."},{"key":"1111_CR68","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.1062943","author":"R Alkhammash","year":"2023","unstructured":"Alkhammash, R.: Bibliometric, network, and thematic mapping analyses of metaphor and discourse in COVID-19 publications from 2020 to 2022. Front. Psychol. (2023). https:\/\/doi.org\/10.3389\/fpsyg.2022.1062943","journal-title":"Front. Psychol."},{"key":"1111_CR69","doi-asserted-by":"publisher","first-page":"133377","DOI":"10.1109\/ACCESS.2020.3008733","volume":"8","author":"A Nasir","year":"2020","unstructured":"Nasir, A., Shaukat, K., Hameed, I.A., Luo, S., Alam, T.M., Iqbal, F.: A bibliometric analysis of corona pandemic in social sciences: a review of influential aspects and conceptual structure. IEEE Access 8, 133377\u2013133402 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3008733","journal-title":"IEEE Access"},{"issue":"3","key":"1111_CR70","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1108\/BPMJ-02-2017-0047","volume":"23","author":"S Fosso Wamba","year":"2017","unstructured":"Fosso Wamba, S., Mishra, D.: Big data integration with business processes: a literature review. Bus. Process. Manag. J. 23(3), 477\u2013492 (2017). https:\/\/doi.org\/10.1108\/BPMJ-02-2017-0047","journal-title":"Bus. Process. Manag. J."},{"issue":"60","key":"1111_CR71","doi-asserted-by":"publisher","DOI":"10.21105\/joss.03139","volume":"6","author":"D L\u00fcdecke","year":"2021","unstructured":"L\u00fcdecke, D., Ben-Shachar, M., Patil, I., Waggoner, P., Makowski, D.: Performance: an R package for assessment, comparison and testing of statistical models. J. Open Source Softw. 6(60), 3139 (2021). https:\/\/doi.org\/10.21105\/joss.03139","journal-title":"J. Open Source Softw."},{"doi-asserted-by":"crossref","unstructured":"van Eck, N.J., Waltman, L.: Visualizing bibliometric networks. In: Measuring Scholarly Impact, pp. 285\u2013320. Springer International Publishing (2014)","key":"1111_CR72","DOI":"10.1007\/978-3-319-10377-8_13"},{"issue":"2","key":"1111_CR73","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","volume":"84","author":"NJ van Eck","year":"2010","unstructured":"van Eck, N.J., Waltman, L.: Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2), 523\u2013538 (2010). https:\/\/doi.org\/10.1007\/s11192-009-0146-3","journal-title":"Scientometrics"},{"issue":"3","key":"1111_CR74","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1177\/1094428114562629","volume":"18","author":"I Zupic","year":"2015","unstructured":"Zupic, I., \u010cater, T.: Bibliometric methods in management and organisation. Organ. Res. Methods 18(3), 429\u2013472 (2015). https:\/\/doi.org\/10.1177\/1094428114562629","journal-title":"Organ. Res. Methods"},{"issue":"4","key":"1111_CR75","doi-asserted-by":"publisher","DOI":"10.3390\/joitmc4040047","volume":"4","author":"V Della Corte","year":"2018","unstructured":"Della Corte, V.: Innovation through coopetition: future directions and new challenges. J. Open Innov. Technol. Mark. Complex. 4(4), 47 (2018). https:\/\/doi.org\/10.3390\/joitmc4040047","journal-title":"J. Open Innov. Technol. Mark. Complex."},{"issue":"1999","key":"1111_CR76","first-page":"439","volume":"669","author":"DD Hirsch","year":"2007","unstructured":"Hirsch, D.D., Ntroduction, I.I.: The Law and Policy of Online Privacy. Seattle Univ. Law Rev. 669(1999), 439\u2013480 (2007)","journal-title":"Seattle Univ. Law Rev."},{"issue":"46","key":"1111_CR77","doi-asserted-by":"publisher","first-page":"16569","DOI":"10.1073\/pnas.0507655102","volume":"102","author":"JE Hirsch","year":"2005","unstructured":"Hirsch, J.E.: An index to quantify an individual\u2019s scientific research output. Proc. Natl. Acad. Sci. U.S.A. 102(46), 16569\u201316572 (2005). https:\/\/doi.org\/10.1073\/pnas.0507655102","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"issue":"5","key":"1111_CR78","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0005429","volume":"4","author":"C-T Zhang","year":"2009","unstructured":"Zhang, C.-T.: The e-index, complementing the h-index for excess citations. PLoS ONE 4(5), e5429 (2009). https:\/\/doi.org\/10.1371\/journal.pone.0005429","journal-title":"PLoS ONE"},{"doi-asserted-by":"publisher","unstructured":"Roldan-Valadez, E., Yoselin Salazar-Ruiz, S., Rios, C., Ibarra-Contreras, R.: Current concepts on bibliometrics: a brief review about impact factor, Eigenfactor score, CiteScore, SCImago Journal Rank, Source-Normalised Impact per Paper, H. SpringerE Roldan-Valadez, SY Salazar-Ruiz, R Ibarra-Contreras, C RiosIrish J. Med. Sci. (1971-), 2019. Springer, vol. 188, no. 3, pp. 939\u2013951 (2019). https:\/\/doi.org\/10.1007\/s11845-018-1936-5","key":"1111_CR79","DOI":"10.1007\/s11845-018-1936-5"},{"issue":"3","key":"1111_CR80","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TDSC.2019.2897675","volume":"18","author":"Y Miao","year":"2021","unstructured":"Miao, Y., et al.: Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans. Dependable Secur. Comput. 18(3), 1080\u20131094 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2897675","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"1111_CR81","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/21681015.2020.1838632","volume":"38","author":"M Alnajem","year":"2021","unstructured":"Alnajem, M., Mostafa, M.M., ElMelegy, A.R.: Mapping the first decade of circular economy research: a bibliometric network analysis. J. Ind. Prod. Eng. 38(1), 29\u201350 (2021). https:\/\/doi.org\/10.1080\/21681015.2020.1838632","journal-title":"J. Ind. Prod. Eng."},{"issue":"3","key":"1111_CR82","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.jpedsurg.2012.09.034","volume":"48","author":"DT McDowell","year":"2013","unstructured":"McDowell, D.T., Glynn, R.W., Mortell, A., Quinn, F.: Publication patterns on neonatal surgery over 65years. J. Pediatr. Surg. 48(3), 585\u2013590 (2013). https:\/\/doi.org\/10.1016\/j.jpedsurg.2012.09.034","journal-title":"J. Pediatr. Surg."},{"issue":"12","key":"1111_CR83","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1002\/asi.20335","volume":"57","author":"L Leydesdorff","year":"2006","unstructured":"Leydesdorff, L., Vaughan, L.: Co-occurrence matrices and their applications in information science: extending ACA to the Web environment. J. Am. Soc. Inf. Sci. Technol. 57(12), 1616\u20131628 (2006). https:\/\/doi.org\/10.1002\/asi.20335","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"3","key":"1111_CR84","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/0022250X.1988.9990034","volume":"13","author":"P Doreian","year":"1988","unstructured":"Doreian, P.: Equivalence in a social network. J. Math. Sociol. 13(3), 243\u2013281 (1988). https:\/\/doi.org\/10.1080\/0022250X.1988.9990034","journal-title":"J. Math. Sociol."},{"key":"1111_CR85","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","volume":"53","author":"NS Safa","year":"2015","unstructured":"Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organisations. Comput. Secur. 53, 65\u201378 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.05.012","journal-title":"Comput. Secur."},{"issue":"1\u20132","key":"1111_CR86","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1080\/15377857.2018.1478661","volume":"18","author":"J-S Lin","year":"2019","unstructured":"Lin, J.-S., Himelboim, I.: Political brand communities as social network clusters: winning and trailing candidates in the GOP 2016 primary elections. J. Polit. Mark. 18(1\u20132), 119\u2013147 (2019). https:\/\/doi.org\/10.1080\/15377857.2018.1478661","journal-title":"J. Polit. Mark."},{"doi-asserted-by":"publisher","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone\u2019s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 65\u201374 (2011). https:\/\/doi.org\/10.1145\/1935826.1935845","key":"1111_CR87","DOI":"10.1145\/1935826.1935845"},{"doi-asserted-by":"publisher","unstructured":"Bisgin, H., Agarwal, N., Xu, X.: Does similarity breed connection? - An Investigation in Blogcatalog and Last.fm Communities. In: 2010 IEEE Second International Conference on Social Computing, pp. 570\u2013575 (2010). https:\/\/doi.org\/10.1109\/SocialCom.2010.90","key":"1111_CR88","DOI":"10.1109\/SocialCom.2010.90"},{"issue":"2","key":"1111_CR89","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5020020","volume":"5","author":"M Mora-Cantallops","year":"2021","unstructured":"Mora-Cantallops, M., S\u00e1nchez-Alonso, S., Garc\u00eda-Barriocanal, E., Sicilia, M.-A.: Traceability for trustworthy AI: a review of models and tools. Big Data Cogn. Comput. 5(2), 20 (2021). https:\/\/doi.org\/10.3390\/bdcc5020020","journal-title":"Big Data Cogn. Comput."},{"doi-asserted-by":"publisher","unstructured":"Duricic, T., Kowald, D., Schedl, M., Lex, E.: My friends also prefer diverse music: homophily and link prediction with user preferences for mainstream, novelty, and diversity in music. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 447\u2013454 (2021). https:\/\/doi.org\/10.1145\/3487351.3492706","key":"1111_CR90","DOI":"10.1145\/3487351.3492706"},{"key":"1111_CR91","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.sigpro.2018.12.002","volume":"157","author":"D Jiang","year":"2019","unstructured":"Jiang, D., Liu, M., Gao, Y., Gao, Y.: Time-matching extended target probability hypothesis density filter for multi-target tracking of high resolution radar. Signal Process. 157, 151\u2013160 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2018.12.002","journal-title":"Signal Process."},{"key":"1111_CR92","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2022.101923","volume":"76","author":"M Nilashi","year":"2023","unstructured":"Nilashi, M., et al.: COVID-19 and sustainable development goals: a bibliometric analysis and SWOT analysis in Malaysian context. Telematics Inform. 76, 101923 (2023). https:\/\/doi.org\/10.1016\/j.tele.2022.101923","journal-title":"Telematics Inform."},{"issue":"3","key":"1111_CR93","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s12564-021-09692-y","volume":"22","author":"C Liu","year":"2021","unstructured":"Liu, C., Zou, D., Chen, X., Xie, H., Chan, W.H.: A bibliometric review on latent topics and trends of the empirical MOOC literature (2008\u20132019). Asia Pac. Educ. Rev. 22(3), 515\u2013534 (2021). https:\/\/doi.org\/10.1007\/s12564-021-09692-y","journal-title":"Asia Pac. Educ. Rev."},{"issue":"8","key":"1111_CR94","doi-asserted-by":"publisher","first-page":"10585","DOI":"10.1007\/s10639-022-10991-z","volume":"27","author":"D Zou","year":"2022","unstructured":"Zou, D., Huang, X., Kohnke, L., Chen, X., Cheng, G., Xie, H.: A bibliometric analysis of the trends and research topics of empirical research on TPACK. Educ. Inf. Technol. 27(8), 10585\u201310609 (2022). https:\/\/doi.org\/10.1007\/s10639-022-10991-z","journal-title":"Educ. Inf. Technol."},{"issue":"9","key":"1111_CR95","doi-asserted-by":"publisher","first-page":"11921","DOI":"10.1007\/s10639-023-11647-2","volume":"28","author":"E Perez","year":"2023","unstructured":"Perez, E., Manca, S., Fern\u00e1ndez-Pascual, R., Mc Guckin, C.: A systematic review of social media as a teaching and learning tool in higher education: a theoretical grounding perspective. Educ. Inf. Technol. 28(9), 11921\u201311950 (2023). https:\/\/doi.org\/10.1007\/s10639-023-11647-2","journal-title":"Educ. Inf. Technol."},{"issue":"2","key":"1111_CR96","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.joi.2016.02.007","volume":"10","author":"L Waltman","year":"2016","unstructured":"Waltman, L.: A review of the literature on citation impact indicators. J. Informetr. 10(2), 365\u2013391 (2016). https:\/\/doi.org\/10.1016\/j.joi.2016.02.007","journal-title":"J. Informetr."},{"issue":"2","key":"1111_CR97","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.joi.2010.10.007","volume":"5","author":"K Chen","year":"2011","unstructured":"Chen, K., Guan, J.: A bibliometric investigation of research performance in emerging nanobiopharmaceuticals. J. Informetr. 5(2), 233\u2013247 (2011). https:\/\/doi.org\/10.1016\/j.joi.2010.10.007","journal-title":"J. Informetr."},{"issue":"2","key":"1111_CR98","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s11192-017-2591-8","volume":"114","author":"L Bornmann","year":"2018","unstructured":"Bornmann, L., Haunschild, R., Hug, S.E.: Visualizing the context of citations referencing papers published by Eugene Garfield: a new type of keyword co-occurrence analysis. Scientometrics 114(2), 427\u2013437 (2018). https:\/\/doi.org\/10.1007\/s11192-017-2591-8","journal-title":"Scientometrics"},{"issue":"3","key":"1111_CR99","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1007\/s11192-015-1576-8","volume":"103","author":"Z Ta\u015fk\u0131n","year":"2015","unstructured":"Ta\u015fk\u0131n, Z., Aydinoglu, A.U.: Collaborative interdisciplinary astrobiology research: a bibliometric study of the NASA astrobiology institute. Scientometrics 103(3), 1003\u20131022 (2015). https:\/\/doi.org\/10.1007\/s11192-015-1576-8","journal-title":"Scientometrics"},{"issue":"44","key":"1111_CR100","doi-asserted-by":"publisher","DOI":"10.1097\/MD.0000000000031144","volume":"101","author":"T-Y Yang","year":"2022","unstructured":"Yang, T.-Y., Chien, T.-W., Lai, F.-J.: Citation analysis of the 100 top-cited articles on the topic of hidradenitis suppurativa since 2013 using Sankey diagrams: bibliometric analysis. Medicine (Baltimore) 101(44), e31144 (2022). https:\/\/doi.org\/10.1097\/MD.0000000000031144","journal-title":"Medicine (Baltimore)"},{"key":"1111_CR101","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122516","volume":"191","author":"V Kaushik","year":"2023","unstructured":"Kaushik, V., Tewari, S., Sahasranamam, S., Hota, P.K.: Towards a precise understanding of social entrepreneurship: an integrated bibliometric\u2013machine learning based review and research agenda. Technol. Forecast. Soc. Change 191, 122516 (2023). https:\/\/doi.org\/10.1016\/j.techfore.2023.122516","journal-title":"Technol. Forecast. Soc. Change"},{"key":"1111_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2019.101416","volume":"63","author":"S Corbet","year":"2019","unstructured":"Corbet, S., Dowling, M., Gao, X., Huang, S., Lucey, B., Vigne, S.A.: An analysis of the intellectual structure of research on the financial economics of precious metals. Resour. Policy 63, 101416 (2019). https:\/\/doi.org\/10.1016\/j.resourpol.2019.101416","journal-title":"Resour. Policy"},{"issue":"3","key":"1111_CR103","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.ipm.2017.02.001","volume":"53","author":"AA Khasseh","year":"2017","unstructured":"Khasseh, A.A., Soheili, F., Moghaddam, H.S., Chelak, A.M.: Intellectual structure of knowledge in iMetrics: a co-word analysis. Inf. Process. Manage. 53(3), 705\u2013720 (2017). https:\/\/doi.org\/10.1016\/j.ipm.2017.02.001","journal-title":"Inf. Process. Manage."},{"issue":"2","key":"1111_CR104","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s11192-017-2300-7","volume":"111","author":"NJ van Eck","year":"2017","unstructured":"van Eck, N.J., Waltman, L.: Citation-based clustering of publications using CitNetExplorer and VOSviewer. Scientometrics 111(2), 1053\u20131070 (2017). https:\/\/doi.org\/10.1007\/s11192-017-2300-7","journal-title":"Scientometrics"},{"key":"1111_CR105","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.resconrec.2018.08.004","volume":"139","author":"DR Maditati","year":"2018","unstructured":"Maditati, D.R., Munim, Z.H., Schramm, H.J., Kummer, S.: A review of green supply chain management: from bibliometric analysis to a conceptual framework and future research directions. Resour. Conserv. Recycl. 139, 150\u2013162 (2018). https:\/\/doi.org\/10.1016\/j.resconrec.2018.08.004","journal-title":"Resour. Conserv. Recycl."},{"issue":"10","key":"1111_CR106","doi-asserted-by":"publisher","first-page":"6968","DOI":"10.1080\/10494820.2022.2057548","volume":"31","author":"MM Mostafa","year":"2023","unstructured":"Mostafa, M.M.: Three decades of interactive learning environments: a retrospective bibliometric network analysis. Interact. Learn. Environ. 31(10), 6968\u20136987 (2023). https:\/\/doi.org\/10.1080\/10494820.2022.2057548","journal-title":"Interact. Learn. Environ."},{"issue":"3","key":"1111_CR107","doi-asserted-by":"publisher","first-page":"156","DOI":"10.5530\/jscires.8.3.32","volume":"8","author":"H Dervi\u015f","year":"2020","unstructured":"Dervi\u015f, H.: Bibliometric analysis using bibliometrix an R package. J. Scientometr. Res. 8(3), 156\u2013160 (2020). https:\/\/doi.org\/10.5530\/jscires.8.3.32","journal-title":"J. Scientometr. Res."},{"issue":"1","key":"1111_CR108","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2021.100165","volume":"4","author":"M Mahi","year":"2021","unstructured":"Mahi, M., Mobin, M.A., Habib, M., Akter, S.: A bibliometric analysis of pandemic and epidemic studies in economics: future agenda for COVID-19 research. Soc. Sci. Humanit. Open 4(1), 100165 (2021). https:\/\/doi.org\/10.1016\/j.ssaho.2021.100165","journal-title":"Soc. Sci. Humanit. Open"},{"issue":"2","key":"1111_CR109","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/09737766.2021.1960220","volume":"15","author":"B Markscheffel","year":"2021","unstructured":"Markscheffel, B., Schr\u00f6ter, F.: Comparison of two science mapping tools based on software technical evaluation and bibliometric case studies. COLLNET J. Sci. Inf. Manag. 15(2), 365\u2013396 (2021). https:\/\/doi.org\/10.1080\/09737766.2021.1960220","journal-title":"COLLNET J. Sci. Inf. Manag."},{"key":"1111_CR110","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.watres.2017.01.029","volume":"119","author":"S Zhang","year":"2017","unstructured":"Zhang, S., Mao, G., Crittenden, J., Liu, X., Du, H.: Groundwater remediation from the past to the future: a bibliometric analysis. Water Res. 119, 114\u2013125 (2017). https:\/\/doi.org\/10.1016\/j.watres.2017.01.029","journal-title":"Water Res."},{"issue":"1","key":"1111_CR111","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/1548512920951275","volume":"19","author":"D Dasgupta","year":"2022","unstructured":"Dasgupta, D., Akhtar, Z., Sen, S.: Machine learning in cybersecurity: a comprehensive survey. J. Def. Model. Simul. 19(1), 57\u2013106 (2022). https:\/\/doi.org\/10.1177\/1548512920951275","journal-title":"J. Def. Model. Simul."},{"issue":"1","key":"1111_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3545574","volume":"4","author":"G Apruzzese","year":"2023","unstructured":"Apruzzese, G., et al.: The role of machine learning in cybersecurity. Digit. Threats Res. Pract. 4(1), 1\u201338 (2023). https:\/\/doi.org\/10.1145\/3545574","journal-title":"Digit. Threats Res. Pract."},{"issue":"3","key":"1111_CR113","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s11192-019-03170-4","volume":"120","author":"A Firdaus","year":"2019","unstructured":"Firdaus, A., Razak, M.F.A., Feizollah, A., Hashem, I.A.T., Hazim, M., Anuar, N.B.: The rise of \u2018blockchain\u2019: bibliometric analysis of blockchain study. Scientometrics 120(3), 1289\u20131331 (2019). https:\/\/doi.org\/10.1007\/s11192-019-03170-4","journal-title":"Scientometrics"},{"issue":"9","key":"1111_CR114","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3390\/info13090413","volume":"13","author":"NS Sulaiman","year":"2022","unstructured":"Sulaiman, N.S., Fauzi, M.A., Hussain, S., Wider, W.: Cybersecurity behavior among government employees: the role of protection motivation theory and responsibility in mitigating cyberattacks. Information 13(9), 413 (2022). https:\/\/doi.org\/10.3390\/info13090413","journal-title":"Information"},{"issue":"5","key":"1111_CR115","doi-asserted-by":"publisher","first-page":"3993","DOI":"10.3233\/JIFS-169960","volume":"36","author":"S Priyanga","year":"2019","unstructured":"Priyanga, S., Gauthama Raman, M.R., Jagtap, S.S., Aswin, N., Kirthivasan, K., Shankar Sriram, V.S.: An improved rough set theory based feature selection approach for intrusion detection in SCADA systems. J. Intell. Fuzzy Syst. 36(5), 3993\u20134003 (2019). https:\/\/doi.org\/10.3233\/JIFS-169960","journal-title":"J. Intell. Fuzzy Syst."},{"key":"1111_CR116","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman, S., Oudah, W., Aljuhani, A.: Deep learning-based intrusion detection approach for securing industrial internet of things. Alex. Eng. J. 81, 371\u2013383 (2023). https:\/\/doi.org\/10.1016\/j.aej.2023.09.023","journal-title":"Alex. Eng. J."},{"key":"1111_CR117","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2018.09.013","volume":"472","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Wang, H., Xu, C.: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. (N. Y.). 472, 223\u2013234 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.09.013","journal-title":"Inf. Sci. (N. Y.)."},{"issue":"10","key":"1111_CR118","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2017","unstructured":"Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forens. Secur. 12(10), 2402\u20132415 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2705620","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"1111_CR119","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5540296","volume":"2021","author":"MK Hasan","year":"2021","unstructured":"Hasan, M.K., et al.: Lightweight cryptographic algorithms for guessing attack protection in complex Internet of Things applications. Complexity 2021, 1\u201313 (2021). https:\/\/doi.org\/10.1155\/2021\/5540296","journal-title":"Complexity"},{"key":"1111_CR120","doi-asserted-by":"publisher","first-page":"2848","DOI":"10.1109\/TIFS.2022.3196274","volume":"17","author":"Y Miao","year":"2022","unstructured":"Miao, Y., Liu, Z., Li, H., Choo, K.-K.R., Deng, R.H.: Privacy-preserving Byzantine-robust federated learning via blockchain systems. IEEE Trans. Inf. Forensics Secur. 17, 2848\u20132861 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3196274","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"publisher","unstructured":"Xu, L., Kun, W., Pengfei, L., Miaoyu, X.: Deep learning short-term traffic flow prediction based on lane changing behavior recognition. In: Proceedings of 2020 2nd International Conference on Information Technology and Computer Applications. ITCA 2020, pp. 760\u2013763 (2020). https:\/\/doi.org\/10.1109\/ITCA52113.2020.00163","key":"1111_CR121","DOI":"10.1109\/ITCA52113.2020.00163"},{"unstructured":"Wan, Z., Mahajan, Y., Kang, B., Moore, T.: J. C.-I. Access, and undefined 2021. A survey on centrality metrics and their network resilience analysis,\u201d ieeexplore.ieee.org. Wan, Z., Mahajan, Y., Kang, B.W., Moore, T.J. JH ChoIEEE Access, 2021\u2022ieeexplore.ieee.org. Accessed 03 Sep 2024. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/9471855\/","key":"1111_CR122"},{"issue":"6","key":"1111_CR123","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s12599-010-0127-3","volume":"2","author":"A Landherr","year":"2010","unstructured":"Landherr, A., Friedl, B., Heidemann, J.: A critical review of centrality measures in social networks. Bus. Inf. Syst. Eng. 2(6), 371\u2013385 (2010). https:\/\/doi.org\/10.1007\/s12599-010-0127-3","journal-title":"Bus. Inf. Syst. Eng."},{"key":"1111_CR124","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2021.101566","volume":"59","author":"V Bajaj","year":"2022","unstructured":"Bajaj, V., Kumar, P., Singh, V.K.: Linkage dynamics of sovereign credit risk and financial markets: a bibliometric analysis. Res. Int. Bus. Finance 59, 101566 (2022). https:\/\/doi.org\/10.1016\/j.ribaf.2021.101566","journal-title":"Res. Int. Bus. Finance"},{"issue":"5","key":"1111_CR125","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1007\/s10489-017-1105-y","volume":"48","author":"M Guti\u00e9rrez-Salcedo","year":"2017","unstructured":"Guti\u00e9rrez-Salcedo, M., Mart\u00ednez, M.\u00c1., Moral-Munoz, J.A., Herrera-Viedma, E., Cobo, M.J.: Some bibliometric procedures for analyzing and evaluating research fields. Appl. Intell. 48(5), 1275\u20131287 (2017). https:\/\/doi.org\/10.1007\/s10489-017-1105-y","journal-title":"Appl. Intell."},{"issue":"2","key":"1111_CR126","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1177\/1049731514522101","volume":"25","author":"MA Mart\u00ednez","year":"2015","unstructured":"Mart\u00ednez, M.A., Cobo, M.J., Herrera, M., Herrera-Viedma, E.: Analyzing the scientific evolution of social work using science mapping. Res. Soc. Work. Pract. 25(2), 257\u2013277 (2015). https:\/\/doi.org\/10.1177\/1049731514522101","journal-title":"Res. Soc. Work. Pract."},{"doi-asserted-by":"crossref","unstructured":"Ang, B.: Singapore, ASEAN, and international cybersecurity. In: Routledge Handbook of International Cybersecurity, pp. 218\u2013226. Routledge (2020)","key":"1111_CR127","DOI":"10.4324\/9781351038904-21"},{"doi-asserted-by":"publisher","unstructured":"Analytica, O.: ASEAN Digital Masterplan 2025 faces major hurdles. Emerald Expert Briefings (2022). Accessed 02 Jun 2025. [Online]. Available: https:\/\/doi.org\/10.1108\/OXAN-DB271566\/full\/html","key":"1111_CR128","DOI":"10.1108\/OXAN-DB271566\/full\/html"},{"issue":"6","key":"1111_CR129","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1177\/0972150918794568","volume":"19","author":"A Bong","year":"2018","unstructured":"Bong, A., Premaratne, G.: Regional integration and economic growth in Southeast Asia. Glob. Bus. Rev. 19(6), 1403\u20131415 (2018). https:\/\/doi.org\/10.1177\/0972150918794568","journal-title":"Glob. Bus. Rev."},{"key":"1111_CR130","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.126908","volume":"301","author":"W Choi","year":"2021","unstructured":"Choi, W., Kim, J., Lee, S.E., Park, E.: Smart home and internet of things: a bibliometic study. J. Clean. Prod. 301, 126908 (2021). https:\/\/doi.org\/10.1016\/j.jclepro.2021.126908","journal-title":"J. Clean. Prod."},{"issue":"4","key":"1111_CR131","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","volume":"33","author":"I Linkov","year":"2013","unstructured":"Linkov, I., Eisenberg, D.A., Plourde, K., Seager, T.P., Allen, J., Kott, A.: Resilience metrics for cyber systems. Environ. Syst. Decis. 33(4), 471\u2013476 (2013). https:\/\/doi.org\/10.1007\/s10669-013-9485-y","journal-title":"Environ. Syst. Decis."},{"doi-asserted-by":"crossref","unstructured":"Lasrado, F.: A framework for assessing innovation. In: Fostering Creativity and Innovation, pp. 51\u201387 (2019)","key":"1111_CR132","DOI":"10.1007\/978-3-319-99121-4_3"},{"unstructured":"Sarkar, A., Wingreen, S.C., Cragg, P.: Organisational IS resilience: a pilot study using Q-methodology (2013). Accessed: 20 Sep 2024. [Online]. Available: https:\/\/aisel.aisnet.org\/acis2013\/134\/","key":"1111_CR133"},{"issue":"2","key":"1111_CR134","doi-asserted-by":"publisher","first-page":"112","DOI":"10.69554\/KXJH6961","volume":"7","author":"F Hult","year":"2013","unstructured":"Hult, F., Sivanesan, G.: What good cyber resilience looks like. J. Bus. Contin. Emer. Plan. 7(2), 112\u2013125 (2013)","journal-title":"J. Bus. Contin. Emer. Plan."},{"issue":"2","key":"1111_CR135","doi-asserted-by":"publisher","first-page":"185","DOI":"10.69554\/PRJY4917","volume":"9","author":"J Ferdinand","year":"2015","unstructured":"Ferdinand, J.: Building organisational cyber resilience: A strategic knowledge-based view of cyber security management. J. Bus. Contin. Emer. Plan. 9(2), 185\u2013195 (2015)","journal-title":"J. Bus. Contin. Emer. Plan."},{"doi-asserted-by":"publisher","unstructured":"Lykou, G., Anagnostopoulou, A., Gritzalis, D.: Implementing cyber-security measures in airports to improve cyber-resilience. In: 2018 Global Internet of Things Summit (GIoTS), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/GIOTS.2018.8534523","key":"1111_CR136","DOI":"10.1109\/GIOTS.2018.8534523"},{"issue":"9","key":"1111_CR137","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1111\/risa.12729","volume":"37","author":"V Gisladottir","year":"2017","unstructured":"Gisladottir, V., Ganin, A.A., Keisler, J.M., Kepner, J., Linkov, I.: Resilience of cyber systems with over- and underregulation. Risk Anal. 37(9), 1644\u20131651 (2017). https:\/\/doi.org\/10.1111\/risa.12729","journal-title":"Risk Anal."},{"issue":"2","key":"1111_CR138","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2020.3038411","volume":"54","author":"A Kott","year":"2021","unstructured":"Kott, A., Linkov, I.: To improve cyber resilience, measure it. Comput. (Long. Beach. Calif.). 54(2), 80\u201385 (2021). https:\/\/doi.org\/10.1109\/MC.2020.3038411","journal-title":"Comput. (Long. Beach. Calif.)."},{"key":"1111_CR139","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106829","volume":"149","author":"A Annarelli","year":"2020","unstructured":"Annarelli, A., Nonino, F., Palombi, G.: Understanding the management of cyber resilient systems. Comput. Ind. Eng. 149, 106829 (2020). https:\/\/doi.org\/10.1016\/j.cie.2020.106829","journal-title":"Comput. Ind. Eng."},{"issue":"6","key":"1111_CR140","doi-asserted-by":"publisher","first-page":"3757","DOI":"10.1109\/TEM.2020.2996175","volume":"69","author":"J Loonam","year":"2022","unstructured":"Loonam, J., Zwiegelaar, J., Kumar, V., Booth, C.: Cyber-resiliency for digital enterprises: a strategic leadership perspective. IEEE Trans. Eng. Manag. 69(6), 3757\u20133770 (2022). https:\/\/doi.org\/10.1109\/TEM.2020.2996175","journal-title":"IEEE Trans. Eng. Manag."},{"unstructured":"Yan Ing, L., et al.: ASEAN Digital Community 2045 (2024). Accessed 09 Sep 2024. [Online]. Available: https:\/\/www.eria.org\/uploads\/ASEAN-Digital-Community-2045-DP.pdf","key":"1111_CR141"},{"key":"1111_CR142","doi-asserted-by":"publisher","DOI":"10.1002\/isd2.12311","author":"J Wongwuttiwat","year":"2024","unstructured":"Wongwuttiwat, J., Lawanna, T., Tantontrakul, T.: The state of digital technology and innovation development: the comparative position of Thailand in ASEAN. Electron. J. Inf. Syst. Dev. Count. (2024). https:\/\/doi.org\/10.1002\/isd2.12311","journal-title":"Electron. J. Inf. Syst. Dev. Count."},{"issue":"CSCW2","key":"1111_CR143","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479865","volume":"5","author":"T Riebe","year":"2021","unstructured":"Riebe, T., Kaufhold, M.-A., Reuter, C.: The impact of organisational structure and technology use on collaborative practices in computer emergency response teams: an empirical study. Proc. ACM Hum.-Comput. Interact. 5(CSCW2), 1\u201330 (2021). https:\/\/doi.org\/10.1145\/3479865","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"issue":"1.4","key":"1111_CR144","doi-asserted-by":"publisher","first-page":"113","DOI":"10.30534\/ijatcse\/2019\/1781.42019","volume":"8","author":"NS Mohamed Mizan","year":"2019","unstructured":"Mohamed Mizan, N.S.: CNDS-cybersecurity: issues and challenges in ASEAN countries. Int. J. Adv. Trends Comput. Sci. Eng. 8(1.4), 113\u2013119 (2019). https:\/\/doi.org\/10.30534\/ijatcse\/2019\/1781.42019","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Ohm, M., Plate, H., Sykosch, A., Meier, M.: Backstabber\u2019s knife collection: a review of open source software supply chain attacks. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12223 LNCS, pp. 23\u201343 (2020). Springer","key":"1111_CR145","DOI":"10.1007\/978-3-030-52683-2_2"},{"doi-asserted-by":"crossref","unstructured":"Nee, A.Y.H.: Digital transformation and the ASEAN influences, issues, and challenges. In: Digital Transformation in Aviation, Tourism and Hospitality in Southeast Asia, pp. 24\u201342 (2022). Routledge, London","key":"1111_CR146","DOI":"10.4324\/9781003315179-4"},{"key":"1111_CR147","first-page":"55","volume":"98","author":"W Rui","year":"2023","unstructured":"Rui, W.: ASEAN Cybersecurity Policy and China-ASEAN Cooperation. China Int\u2019l Stud. 98, 55 (2023)","journal-title":"China Int\u2019l Stud."},{"doi-asserted-by":"publisher","unstructured":"Ramadhan, I.: Building cybersecurity regulation in Southeast Asia: A Challenge for the Association of Southeast Asian Nations (ASEAN). J. Soc. Polit. Sci. (2020). https:\/\/doi.org\/10.31014\/aior.1991.03.04.230","key":"1111_CR148","DOI":"10.31014\/aior.1991.03.04.230"},{"key":"1111_CR149","doi-asserted-by":"publisher","first-page":"160","DOI":"10.4324\/9781003308751-10","volume-title":"\u201cAddressing Key Trends in ASEAN\u2019s Digital Economy\u201d, in The ASEAN Digital Economy","author":"K Chen","year":"2023","unstructured":"Chen, K., Jye, Q.S., Guan, T.K.: \u201cAddressing Key Trends in ASEAN\u2019s Digital Economy\u201d, in The ASEAN Digital Economy, pp. 160\u2013185. Routledge, London (2023)"},{"issue":"1","key":"1111_CR150","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439873","volume":"13","author":"NN Neto","year":"2021","unstructured":"Neto, N.N., Madnick, S., De Paula, A.M.G., Borges, N.M.: Developing a global data breach database and the challenges encountered. J. Data Inf. Qual. 13(1), 1\u201333 (2021). https:\/\/doi.org\/10.1145\/3439873","journal-title":"J. Data Inf. Qual."},{"issue":"10","key":"1111_CR151","doi-asserted-by":"publisher","first-page":"880","DOI":"10.17705\/1jais.00411","volume":"16","author":"N Lankton","year":"2015","unstructured":"Lankton, N., McKnight, D.H., Tripp, J.: Technology, humanness, and trust: rethinking trust in technology. J. Assoc. Inf. Syst. 16(10), 880\u2013918 (2015). https:\/\/doi.org\/10.17705\/1jais.00411","journal-title":"J. Assoc. Inf. Syst."},{"issue":"1","key":"1111_CR152","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/23738871.2017.1294610","volume":"2","author":"P Pawlak","year":"2017","unstructured":"Pawlak, P., Barmpaliou, P.-N.: Politics of cybersecurity capacity building: conundrum and opportunity. J. Cyber Policy 2(1), 123\u2013144 (2017). https:\/\/doi.org\/10.1080\/23738871.2017.1294610","journal-title":"J. Cyber Policy"},{"issue":"3","key":"1111_CR153","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10611-016-9653-3","volume":"67","author":"R Bossong","year":"2017","unstructured":"Bossong, R., Wagner, B.: A typology of cybersecurity and public-private partnerships in the context of the EU. Crime Law Soc. Chang. 67(3), 265\u2013288 (2017). https:\/\/doi.org\/10.1007\/s10611-016-9653-3","journal-title":"Crime Law Soc. Chang."},{"unstructured":"Barrett, M.: Framework for improving critical infrastructure cybersecurity. In: Proceedings of the Annual ISA Analysis Division Symposium, 2018, vol. 535, pp. 9\u201325. Accessed: 01 Jun 2025. [Online]. Available: https:\/\/community.mis.temple.edu\/mis5206sec701fall2024\/files\/2018\/08\/NIST.CSWP_.04162018_CybersecurityFramework.pdf","key":"1111_CR154"},{"unstructured":"Pascoe, C.: Public draft: The NIST cybersecurity framework 2.0. Inst. Stand. Technol. (2023). Accessed: 01 Jun 2025. [Online]. Available: https:\/\/insidecybersecurity.com\/sites\/insidecybersecurity.com\/files\/documents\/2023\/aug\/cs2023_0172b.pdf","key":"1111_CR155"},{"doi-asserted-by":"crossref","unstructured":"Edwards, J.: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0. Wiley (2024)","key":"1111_CR156","DOI":"10.1002\/9781394280391"},{"doi-asserted-by":"publisher","unstructured":"Ramadhan, I.: ASEAN consensus and forming cybersecurity regulation in Southeast Asia (2022). https:\/\/doi.org\/10.4108\/eai.31-3-2022.2320684.","key":"1111_CR157","DOI":"10.4108\/eai.31-3-2022.2320684."},{"issue":"1","key":"1111_CR158","doi-asserted-by":"publisher","first-page":"20","DOI":"10.36079\/lamintang.ijlapp-0701.788","volume":"7","author":"BTF Lee","year":"2025","unstructured":"Lee, B.T.F., Kornphetcharat, K., Sims, J.P., Dieu, D.L., Ali, B.S.: Asean cybersecurity cooperation strategy: combating cyber terrorism and hackers through CERT coordination. Int. J. Law Public Policy 7(1), 20\u201330 (2025). https:\/\/doi.org\/10.36079\/lamintang.ijlapp-0701.788","journal-title":"Int. J. Law Public Policy"},{"issue":"1","key":"1111_CR159","doi-asserted-by":"publisher","DOI":"10.1063\/5.0127597","volume":"2739","author":"S Vasupongayya","year":"2023","unstructured":"Vasupongayya, S., et al.: Initial ASEAN digital security and interoperability standard proposal. AIP Conf. 2739(1), 020003 (2023). https:\/\/doi.org\/10.1063\/5.0127597","journal-title":"AIP Conf."},{"issue":"Extra-A","key":"1111_CR160","doi-asserted-by":"publisher","first-page":"214","DOI":"10.24115\/s2446-622020206extra-a656p.214-221","volume":"6","author":"EV Gorian","year":"2020","unstructured":"Gorian, E.V.: Information security at ASEAN in a digitalized economy. LAPLAGE EM Rev. 6(Extra-A), 214\u2013221 (2020). https:\/\/doi.org\/10.24115\/s2446-622020206extra-a656p.214-221","journal-title":"LAPLAGE EM Rev."},{"doi-asserted-by":"publisher","unstructured":"Ang, B.: Singapore, ASEAN, and international cybersecurity. Routledge Handb. Int. Cybersecurity, pp. 218\u2013226 (2020). https:\/\/doi.org\/10.4324\/9781351038904-21\/SINGAPORE-ASEAN-INTERNATIONAL-CYBERSECURITY-BENJAMIN-ANG","key":"1111_CR161","DOI":"10.4324\/9781351038904-21\/SINGAPORE-ASEAN-INTERNATIONAL-CYBERSECURITY-BENJAMIN-ANG"},{"key":"1111_CR162","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jclinepi.2021.02.003","volume":"134","author":"MJ Page","year":"2021","unstructured":"Page, M.J., et al.: Updating guidance for reporting systematic reviews: development of the PRISMA 2020 statement. J. Clin. Epidemiol. 134, 103\u2013112 (2021). https:\/\/doi.org\/10.1016\/j.jclinepi.2021.02.003","journal-title":"J. Clin. Epidemiol."},{"unstructured":"Mayring, P.: Qualitative content analysis: theoretical foundation, basic procedures and software solution. Forum Qual. Soc. Res.10, 1\u2013143 (2014). Accessed 02 Jun 2025. [Online]. Available: https:\/\/www.ssoar.info\/ssoar\/bitstream\/handle\/document\/39517\/ssoar-2014-mayring-Qualitative_content_analysis_theoretical_foundation.pdf","key":"1111_CR163"},{"issue":"4","key":"1111_CR164","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10643-9","volume":"57","author":"A Rahman","year":"2024","unstructured":"Rahman, A., Raj, A., Tomy, P., Hameed, M.S.: A comprehensive bibliometric and content analysis of artificial intelligence in language learning: tracing between the years 2017 and 2023. Artif. Intell. Rev. 57(4), 107 (2024). https:\/\/doi.org\/10.1007\/s10462-023-10643-9","journal-title":"Artif. Intell. Rev."},{"key":"1111_CR165","doi-asserted-by":"publisher","DOI":"10.1142\/S0217590823500480","author":"P-K Wong","year":"2023","unstructured":"Wong, P.-K., Ho, Y.-P., Singh, A.: The impact of R&D on the Singapore an economy over 1978\u20132019. Singapore Econ. Rev. (2023). https:\/\/doi.org\/10.1142\/S0217590823500480","journal-title":"Singapore Econ. Rev."},{"unstructured":"Sadeski, F., Rennie, L., Lacave, M., Cus\u00f3, M., Cruz, R.: The research ecosystem of Cambodia (2023). Accessed 02 Jun 2025. [Online]. Available: https:\/\/repository.unescap.org\/handle\/20.500.12870\/5426","key":"1111_CR166"},{"issue":"2","key":"1111_CR167","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1108\/JABS-05-2022-0174","volume":"18","author":"R Yudaruddin","year":"2024","unstructured":"Yudaruddin, R.: Financial technology and banking market discipline in Indonesia banking. J. Asia Bus. Stud. 18(2), 299\u2013317 (2024). https:\/\/doi.org\/10.1108\/JABS-05-2022-0174","journal-title":"J. Asia Bus. Stud."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01111-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01111-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01111-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:07Z","timestamp":1760614687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01111-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,2]]},"references-count":167,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1111"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01111-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,2]]},"assertion":[{"value":"5 August 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"No datasets were generated or analysed during the current study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}}],"article-number":"200"}}