{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:06:29Z","timestamp":1775667989162,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11192-015-1708-1","type":"journal-article","created":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T12:56:47Z","timestamp":1440853007000},"page":"883-904","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015"],"prefix":"10.1007","volume":"105","author":[{"given":"Nicholas V.","family":"Olijnyk","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"issue":"1","key":"1708_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avi\u017eienis","year":"2004","unstructured":"Avi\u017eienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11\u201333.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"1708_CR2","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s11192-012-0699-4","volume":"94","author":"RS Bajwa","year":"2013","unstructured":"Bajwa, R. S., Yaldram, K., & Rafique, S. (2013). A scientometric assessment of research output in nanoscience and nanotechnology: Pakistan perspective. Scientometrics, 94(1), 333\u2013342.","journal-title":"Scientometrics"},{"key":"1708_CR3","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1038\/scientificamerican0503-60","volume":"288","author":"AL Barabasi","year":"2003","unstructured":"Barabasi, A. L., & Bonabeau, E. (2003). Scale-free networks. Scientific America, 288, 60\u201369.","journal-title":"Scientific America"},{"issue":"4","key":"1708_CR4","first-page":"413","volume":"50","author":"C Baskaran","year":"2013","unstructured":"Baskaran, C. (2013). Scientometric analysis of cryptography research output. SRELS Journal of Information Management, 50(4), 413\u2013421.","journal-title":"SRELS Journal of Information Management"},{"issue":"1","key":"1708_CR5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s11192-015-1538-1","volume":"104","author":"S Batisti\u010d","year":"2015","unstructured":"Batisti\u010d, S., & Ka\u0161e, R. (2015). The organizational socialization field fragmentation: A bibliometric review. Scientometrics, 104(1), 121\u2013146.","journal-title":"Scientometrics"},{"issue":"5","key":"1708_CR6","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.nedt.2015.01.002","volume":"35","author":"H Bla\u017eun","year":"2015","unstructured":"Bla\u017eun, H., Kokol, P., & Vo\u0161ner, J. (2015). Research literature production on nursing competences from 1981 till 2012: A bibliometric snapshot. Nurse Education Today, 35(5), 673\u2013679.","journal-title":"Nurse Education Today"},{"key":"1708_CR7","volume-title":"Information assurance: Securing the information environment","author":"A Blyth","year":"2006","unstructured":"Blyth, A., & Kovacich, G. L. (2006). Information assurance: Securing the information environment (2nd ed.). New York, NY: Springer.","edition":"2"},{"issue":"1","key":"1708_CR8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1002\/aris.1440360102","volume":"36","author":"CL Borgman","year":"2002","unstructured":"Borgman, C. L., & Furner, J. (2002). Scholarly communication and bibliometrics. Annual Review of Information Science and Technology, 36(1), 2\u201372.","journal-title":"Annual Review of Information Science and Technology"},{"issue":"4","key":"1708_CR9","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.cose.2006.04.002","volume":"25","author":"RA Botha","year":"2006","unstructured":"Botha, R. A., & Gaaingwe, T. G. (2006). Reflecting on 20 SEC conferences. Computers and Security, 25(4), 247\u2013256.","journal-title":"Computers and Security"},{"issue":"1","key":"1708_CR10","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11192-006-0147-4","volume":"69","author":"T Braun","year":"2006","unstructured":"Braun, T., Gl\u00e4nzel, W., & Schubert, A. (2006). A Hirsch-type index for journals. Scientometrics, 69(1), 169\u2013173.","journal-title":"Scientometrics"},{"key":"1708_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-07408-2","volume-title":"Mapping the dynamics of science and technology","author":"M Callon","year":"1986","unstructured":"Callon, M., Law, J., & Rip, A. (1986). Mapping the dynamics of science and technology. London: Sage."},{"issue":"9","key":"1708_CR12","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1109\/5.628714","volume":"85","author":"JP Campbell","year":"1997","unstructured":"Campbell, J. P. (1997). Speaker recognition: A tutorial. Proceedings of the IEEE, 85(9), 1437\u20131462.","journal-title":"Proceedings of the IEEE"},{"key":"1708_CR13","unstructured":"Capaccio, T. (2013, June 10). Pentagon five-year cybersecurity plan seeks 23 billion. Bloomberg. http:\/\/www.bloomberg.com\/news\/2013-06-10\/pentagon-five-year-cybersecurity-plan-seeks-23-billion.html . Accessed 10 July, 2015."},{"issue":"1","key":"1708_CR14","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.optom.2014.02.003","volume":"8","author":"G Cardona","year":"2015","unstructured":"Cardona, G., & Sanz, J. P. (2015). Publication analysis of the contact lens field: What are the current topics of interest? Journal of Optometry, 8(1), 33\u201339.","journal-title":"Journal of Optometry"},{"issue":"16","key":"1708_CR15","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R Cohen","year":"2001","unstructured":"Cohen, R., Erez, K., Ben-Avraham, D., & Havlin, S. (2001). Breakdown of the Internet under intentional attack. Physical Review Letters, 86(16), 3682.","journal-title":"Physical Review Letters"},{"key":"1708_CR16","unstructured":"Corrin, A. (2013, April 10). 2014 budget: DOD budget includes boosts for cyber, future priorities. FCW. http:\/\/fcw.com\/articles\/2013\/04\/10\/dod-budget.aspx . Accessed 10 July, 2015."},{"key":"1708_CR17","doi-asserted-by":"crossref","unstructured":"Crowley, E. (2003). Information system security curricula development. In Proceedings of the 4th annual conference on information technology curriculum (pp. 249\u2013255). New York, NY: ACM.","DOI":"10.1145\/947121.947178"},{"key":"1708_CR18","volume-title":"Joint publication 1-02: Department of defense dictionary of military and associated terms","author":"Department of Defense","year":"2010","unstructured":"Department of Defense. (2010). Joint publication 1-02: Department of defense dictionary of military and associated terms. Washington, DC: Department of Defense."},{"issue":"3\u20134","key":"1708_CR19","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.cose.2008.11.007","volume":"28","author":"M Dlamini","year":"2009","unstructured":"Dlamini, M., Eloff, M., & Eloff, J. (2009). Information security: The moving target. Computers & Security, 28(3\u20134), 189\u2013198.","journal-title":"Computers & Security"},{"key":"1708_CR20","volume-title":"Author co-citation analysis using custom bibliographic databases: An introduction to the SAS approach","author":"SB Eom","year":"2003","unstructured":"Eom, S. B. (2003). Author co-citation analysis using custom bibliographic databases: An introduction to the SAS approach. Lewiston, NY: Edwin Mellen Press."},{"key":"1708_CR21","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. D. (2002, November). A key-management scheme for distributed sensor networks. Paper presented at the proceedings of the 9th ACM conference on computer and communications security, Washington, DC.","DOI":"10.1145\/586110.586117"},{"issue":"2","key":"1708_CR22","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1096\/fj.07-9492LSF","volume":"22","author":"ME Falagas","year":"2008","unstructured":"Falagas, M. E., Pitsouni, E. L., Malietzis, G. A., & Pappas, G. (2008). Comparison of PubMed, Scopus, Web of Science, and Google Scholar: Strengths and weaknesses. FASEB Journal, 22(2), 338\u2013342.","journal-title":"FASEB Journal"},{"key":"1708_CR23","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., & Longstaff, T. (1996, May). A sense of self for Unix processes. In 1996 IEEE symposium on security and privacy (pp. 120\u2013128). New York, NY: IEEE."},{"key":"1708_CR24","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. (1998). A security architecture for computational grids. In Proceedings of the 5th ACM conference on computer and communications security (pp. 83\u201392). New York, NY: ACM.","DOI":"10.1145\/288090.288111"},{"issue":"8","key":"1708_CR25","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.cose.2011.08.002","volume":"30","author":"L Fuchs","year":"2011","unstructured":"Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security\u2014A survey and classification of the research area. Computers & Security, 30(8), 748\u2013769.","journal-title":"Computers & Security"},{"issue":"3159","key":"1708_CR26","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1126\/science.122.3159.108","volume":"122","author":"E Garfield","year":"1955","unstructured":"Garfield, E. (1955). Citation indexes for science: A New dimension in documentation through association of ideas. Science, 122(3159), 108\u2013111.","journal-title":"Science"},{"key":"1708_CR27","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security (pp. 89\u201398). New York, NY: ACM.","DOI":"10.1145\/1180405.1180418"},{"key":"1708_CR28","unstructured":"Hammonds, G. L. (1993). Confidentiality, integrity, assured service: Tying security all together. In Proceedings on the 1991\u20131993 workshop on new security paradigms (pp. 48\u201352). New York, NY: ACM."},{"issue":"46","key":"1708_CR29","doi-asserted-by":"crossref","first-page":"16569","DOI":"10.1073\/pnas.0507655102","volume":"102","author":"JE Hirsch","year":"2005","unstructured":"Hirsch, J. E. (2005). An index to quantify an individual\u2019s scientific research output. Proceedings of the National Academy of Sciences of the United States of America, 102(46), 16569\u201316572.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"3","key":"1708_CR30","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"SA Hofmeyr","year":"1998","unstructured":"Hofmeyr, S. A., Forrest, S., & Somayaji, A. (1998). Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3), 151\u2013180.","journal-title":"Journal of Computer Security"},{"key":"1708_CR31","unstructured":"International Monetary Fund. (2015, April). IMF world economic outlook [Data file]. Retrieved 10 July, 2015 from http:\/\/www.imf.org\/external\/pubs\/ft\/weo\/2015\/01\/weodata\/index.aspx ."},{"issue":"4","key":"1708_CR32","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1108\/14684520910985756","volume":"33","author":"P Jacs\u00f3","year":"2009","unstructured":"Jacs\u00f3, P. (2009). The h-index for countries in Web of Science and Scopus. Online Information Review, 33(4), 831\u2013837.","journal-title":"Online Information Review"},{"issue":"2015","key":"1708_CR33","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.polgeo.2014.10.001","volume":"46","author":"R Kaiser","year":"2015","unstructured":"Kaiser, R. (2015). The birth of cyberwar. Political Geography, 46(2015), 11\u201320.","journal-title":"Political Geography"},{"issue":"10","key":"1708_CR34","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1001\/jama.2009.1307","volume":"302","author":"AV Kulkarni","year":"2009","unstructured":"Kulkarni, A. V., Aziz, B., Shams, I., & Busse, J. W. (2009). Comparison of citations in the Web of Science, Scopus, and Google Scholar for articles published in general medical journals. Journal of the American Medical Association, 302(10), 1092\u20131096.","journal-title":"Journal of the American Medical Association"},{"issue":"3","key":"1708_CR35","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s11192-007-1898-2","volume":"76","author":"WH Lee","year":"2008","unstructured":"Lee, W. H. (2008). How to identify emerging research fields using scientometrics: An example in the field of Information Security. Scientometrics, 76(3), 503\u2013525.","journal-title":"Scientometrics"},{"issue":"2","key":"1708_CR36","doi-asserted-by":"crossref","first-page":"387","DOI":"10.3171\/2008.10.JNS08978","volume":"111","author":"J Lee","year":"2009","unstructured":"Lee, J., Kraus, K. L., & Couldwell, W. T. (2009). Use of the h index in neurosurgery: Clinical article. Journal of Neurosurgery, 111(2), 387\u2013392.","journal-title":"Journal of Neurosurgery"},{"issue":"1","key":"1708_CR37","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D Liu","year":"2005","unstructured":"Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41\u201377.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"1","key":"1708_CR38","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11192-014-1517-y","volume":"103","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Yin, Y., Liu, W., & Dunford, M. (2015). Visualizing the intellectual structure and evolution of innovation systems research: A bibliometric analysis. Scientometrics, 103(1), 135\u2013158.","journal-title":"Scientometrics"},{"key":"1708_CR39","volume-title":"America\u2019s cyber future: Security and prosperity in the information age","author":"KM Lord","year":"2011","unstructured":"Lord, K. M., & Sharp, T. (2011). America\u2019s cyber future: Security and prosperity in the information age (Vol. I). Washington, DC: Center for a New American Security."},{"key":"1708_CR40","unstructured":"Maconachy, V. W., Schou, C. D., Ragsdale, D., & Welch, D. (2001, June). A model for information assurance: An integrated approach. Paper presented at the proceedings of the 2001 IEEE workshop on information assurance and security, West Point, NY."},{"issue":"3810","key":"1708_CR41","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1126\/science.159.3810.56","volume":"159","author":"RK Merton","year":"1968","unstructured":"Merton, R. K. (1968). The Matthew effect in science. Science, 159(3810), 56\u201363.","journal-title":"Science"},{"issue":"2","key":"1708_CR42","first-page":"1","volume":"19","author":"R Meushaw","year":"2012","unstructured":"Meushaw, R. (2012). Developing a blueprint for a science of cyber security. Guest Editor\u2019s Column. The Next Wave, 19(2), 1.","journal-title":"The Next Wave"},{"issue":"1","key":"1708_CR43","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1186\/1471-2105-9-386","volume":"9","author":"F Meyer","year":"2008","unstructured":"Meyer, F., Paarmann, D., D\u2019Souza, M., Olson, R., Glass, E. M., Kubal, M., et al. (2008). The metagenomics RAST server\u2014A public resource for the automatic phylogenetic and functional analysis of metagenomes. BMC Bioinformatics, 9(1), 386.","journal-title":"BMC Bioinformatics"},{"issue":"1","key":"1708_CR44","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1002\/aris.2008.1440420113","volume":"42","author":"SA Morris","year":"2008","unstructured":"Morris, S. A., & Martens, B. (2008). Mapping research specialties. Annual Review of the American Society for Information Science and Technology, 42(1), 213\u2013295.","journal-title":"Annual Review of the American Society for Information Science and Technology"},{"issue":"1","key":"1708_CR45","first-page":"57","volume":"73","author":"F Moya-Anegon","year":"2007","unstructured":"Moya-Anegon, F., Chinchilla-Rodriquez, Z., Vargas-Quesada, B., Corera-Alvarez, E., Munoz-Fernandez, F. J., Gonalez-Molina, A., et al. (2007). Coverage analysis of scopus: A metric approach. Scientometrics, 73(1), 57\u201358.","journal-title":"Scientometrics"},{"key":"1708_CR46","volume-title":"Fiscal year 2012 report to Congress on the implementation of the Federal Information Security Management Act of 2002","author":"Office of Management and Budget","year":"2013","unstructured":"Office of Management and Budget. (2013). Fiscal year 2012 report to Congress on the implementation of the Federal Information Security Management Act of 2002. Washington, DC: Office of Management and Budget."},{"key":"1708_CR47","unstructured":"Oree, W. L. (2013). Analysis of the Unites States Computer Emergency Readiness Team\u2019s (U.S. CERT) Einstein III intrusion detection system, and its impact on privacy (Master\u2019s thesis). Naval Postgraduate School, Monterey, CA."},{"issue":"14","key":"1708_CR48","doi-asserted-by":"crossref","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., & Vespignani, A. (2001). Epidemic spreading in scale-free networks. Physical Review Letters, 86(14), 3200.","journal-title":"Physical Review Letters"},{"key":"1708_CR49","doi-asserted-by":"crossref","unstructured":"Perez, L.C., Cooper, S., Hawthorne, E. K., Wetzel, S., Brynieisson, A., Gokce, G., et al. (2011, June). Information assurance in two- and four-year institutions. Paper presented at the proceedings of the 16th annual conference on innovation and technology in computer science education\u2014Working group reports, New York, NY.","DOI":"10.1145\/2078856.2078860"},{"issue":"1","key":"1708_CR50","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s11192-014-1440-2","volume":"102","author":"M Pinto","year":"2015","unstructured":"Pinto, M. (2015). Viewing and exploring the subject area of information literacy assessment in higher education (2000\u20132011). Scientometrics, 102(1), 227\u2013245.","journal-title":"Scientometrics"},{"key":"1708_CR51","doi-asserted-by":"crossref","DOI":"10.7312\/pric91844","volume-title":"Little science, big science","author":"DJS Price","year":"1963","unstructured":"Price, D. J. S. (1963). Little science, big science. New York, NY: Columbia University Press."},{"issue":"3683","key":"1708_CR52","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1126\/science.149.3683.510","volume":"149","author":"DJS Price","year":"1965","unstructured":"Price, D. J. S. (1965). Networks of scientific papers. Science, 149(3683), 510\u2013515.","journal-title":"Science"},{"key":"1708_CR53","first-page":"69","volume-title":"Toward a metric of science: The advent of scientific indicators","author":"DJS Price","year":"1978","unstructured":"Price, D. J. S. (1978). Toward a model for scientific indicators. In E. Yehuda, J. Lederberg, R. K. Merton, A. Thackray, & H. Zuckerman (Eds.), Toward a metric of science: The advent of scientific indicators (pp. 69\u201396). New York, NY: Wiley."},{"issue":"3","key":"1708_CR54","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1111\/j.1471-8286.2007.01678.x","volume":"7","author":"S Ratnasingham","year":"2007","unstructured":"Ratnasingham, S., & Hebert, P. D. (2007). BOLD: The barcode of life data system. Molecular Ecology Notes, 7(3), 355\u2013364.","journal-title":"Molecular Ecology Notes"},{"issue":"1","key":"1708_CR55","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ijhcs.2006.08.006","volume":"65","author":"EF Reid","year":"2007","unstructured":"Reid, E. F., & Chen, H. (2007). Mapping the contemporary terrorism research domain. International Journal of Human-Computer Studies, 65(1), 42\u201356.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"1708_CR56","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.ipm.2011.03.004","volume":"48","author":"A Rorissa","year":"2012","unstructured":"Rorissa, A., & Yuan, X. (2012). Visualizing and mapping the intellectual structure of information retrieval. Information Processing and Management, 48(1), 120\u2013135.","journal-title":"Information Processing and Management"},{"issue":"1","key":"1708_CR57","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., & Myers, A. C. (2003). Language-based information-flow security. IEEE Journal on Selected Areas in Communications, 21(1), 5\u201319.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"1708_CR58","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s11192-012-0825-3","volume":"95","author":"E Sanz-Casado","year":"2013","unstructured":"Sanz-Casado, E., Garcia-Zorita, J. C., Serrano-Lopez, A. E., Larsen, B., & Ingwersen, P. (2013). Renewable energy research 1995\u20132009: A case study of wind power research in EU, Spain, and Germany and Denmark. Scientometrics, 95(1), 197\u2013224.","journal-title":"Scientometrics"},{"issue":"2","key":"1708_CR59","first-page":"373","volume":"30","author":"M Sedighi","year":"2015","unstructured":"Sedighi, M. (2015). Using of co-word analysis method in mapping of the structure of scientific fields (case study: The field of informetrics). Journal of Information Processing and Management, 30(2), 373\u2013396.","journal-title":"Journal of Information Processing and Management"},{"issue":"1","key":"1708_CR60","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1216218.1216224","volume":"38","author":"MT Siponen","year":"2007","unstructured":"Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. SIGMIS Database, 38(1), 60\u201380.","journal-title":"SIGMIS Database"},{"issue":"6","key":"1708_CR61","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/S0167-4048(01)00608-3","volume":"20","author":"B Solms","year":"2001","unstructured":"Solms, B. (2001). Information security\u2014A multidimensional discipline. Computers & Security, 20(6), 504\u2013508.","journal-title":"Computers & Security"},{"issue":"October","key":"1708_CR62","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Solms","year":"2013","unstructured":"Solms, R., & Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38(October), 97\u2013102.","journal-title":"Computers and Security"},{"issue":"2","key":"1708_CR63","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/248922","volume":"13","author":"DW Straub","year":"1989","unstructured":"Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147\u2013169.","journal-title":"MIS Quarterly"},{"key":"1708_CR64","first-page":"249","volume":"34","author":"AN Tabah","year":"1999","unstructured":"Tabah, A. N. (1999). Literature dynamics: Studies on growth, diffusion, and epidemics. Annual Review of Information Science and Technology, 34, 249\u2013286.","journal-title":"Annual Review of Information Science and Technology"},{"key":"1708_CR65","volume-title":"VOS: A new method for visualizing similarities between objects","author":"NJ Eck Van","year":"2007","unstructured":"Van Eck, N. J., & Waltman, L. (2007). VOS: A new method for visualizing similarities between objects. Berlin: Springer."},{"issue":"2","key":"1708_CR66","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","volume":"84","author":"NJ Eck Van","year":"2010","unstructured":"Van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523\u2013538.","journal-title":"Scientometrics"},{"issue":"1","key":"1708_CR67","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/BF02016799","volume":"26","author":"A Raan Van","year":"1993","unstructured":"Van Raan, A., & Tijssen, R. (1993). The neural net of neural network research: An exercise in bibliometric mapping. Scientometrics, 26(1), 169\u2013192.","journal-title":"Scientometrics"},{"key":"1708_CR68","doi-asserted-by":"crossref","unstructured":"Vaughn, R. B., Dampier, D. A., & Warkentin, M. B. (2004). Building an information education program. In Proceedings of the first annual conference on information security curriculum development (pp. 41\u201345). New York, NY: ACM.","DOI":"10.1145\/1059524.1059533"},{"issue":"8","key":"1708_CR69","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1177\/0170840612448028","volume":"33","author":"R Vogel","year":"2012","unstructured":"Vogel, R. (2012). The visible colleges of management and organization studies: A bibliometric analysis of academic journals. Organization Studies, 33(8), 1015\u20131043.","journal-title":"Organization Studies"},{"issue":"9","key":"1708_CR70","doi-asserted-by":"crossref","first-page":"4588","DOI":"10.1021\/ac5040314","volume":"87","author":"CJ Waaijer","year":"2015","unstructured":"Waaijer, C. J., & Palmblad, M. (2015). Bibliometric mapping: Eight decades of analytical chemistry, with special focus on the use of mass spectrometry. Analytical Chemistry, 87(9), 4588\u20134596.","journal-title":"Analytical Chemistry"},{"issue":"4","key":"1708_CR71","first-page":"327","volume":"49","author":"HD White","year":"1998","unstructured":"White, H. D., & McCain, K. W. (1998). Visualizing a discipline: An author co-citation analysis of information science, 1972\u20131995. Journal of the American Society for Information Science, 49(4), 327\u2013355.","journal-title":"Journal of the American Society for Information Science"},{"key":"1708_CR72","volume-title":"Principles of information security","author":"ME Whitman","year":"2009","unstructured":"Whitman, M. E., & Mattord, H. J. (2009). Principles of information security (3rd ed.). Boston, MA: Thomson Course Technology.","edition":"3"},{"issue":"6","key":"1708_CR73","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1109\/TPAMI.2007.1110","volume":"29","author":"G Zhao","year":"2007","unstructured":"Zhao, G., & Pietikainen, M. (2007). Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6), 915\u2013928.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1708_CR74","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02291-3","volume-title":"Analysis and visualization of citation networks","author":"D Zhao","year":"2015","unstructured":"Zhao, D., & Strotmann, A. (2015). Analysis and visualization of citation networks. New York, NY: Morgan & Claypool."}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-015-1708-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-015-1708-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-015-1708-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T14:50:34Z","timestamp":1691938234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-015-1708-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":74,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1708"],"URL":"https:\/\/doi.org\/10.1007\/s11192-015-1708-1","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"value":"0138-9130","type":"print"},{"value":"1588-2861","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,30]]}}}