{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:57:18Z","timestamp":1769511438452,"version":"3.49.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3375910","type":"journal-article","created":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T18:13:55Z","timestamp":1710180835000},"page":"40350-40367","source":"Crossref","is-referenced-by-count":8,"title":["A Scientometrics Analysis of Cybersecurity Using e-CSTI"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-4454","authenticated-orcid":false,"given":"Kazumasa","family":"Omote","sequence":"first","affiliation":[{"name":"Department of Cabinet Office, Government of Japan, Tokyo, Japan"}]},{"given":"Yoko","family":"Inoue","sequence":"additional","affiliation":[{"name":"Department of Cabinet Office, Government of Japan, Tokyo, Japan"}]},{"given":"Yoshihide","family":"Terada","sequence":"additional","affiliation":[{"name":"National Graduate Institute for Policy Studies, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8564-5144","authenticated-orcid":false,"given":"Naohiro","family":"Shichijo","sequence":"additional","affiliation":[{"name":"National Graduate Institute for Policy Studies, Tokyo, Japan"}]},{"given":"Toshiyuki","family":"Shirai","sequence":"additional","affiliation":[{"name":"Department of Cabinet Office, Government of Japan, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03222-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03334-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/00220410810844150"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.102217"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/0194262X.2020.1840487"},{"key":"ref6","volume-title":"15 Top Threats in 2020","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.122.3159.108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref9","volume-title":"10 Major Security Threats 2020","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5958\/2249-5576.2020.00014.X"},{"key":"ref11","volume-title":"Top 10 Cybersecurity Threats in 2020","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/asi.5090140103"},{"key":"ref13","volume-title":"Effect of Shadow Education Vouchers and the Implications for Evidence-Based Policymaking","author":"Kobayashi","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-007-1898-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102376"},{"key":"ref16","article-title":"Scientometrics","author":"Leydesdorff","year":"2012","journal-title":"arXiv:1208.4566"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/GKMC-09-2020-0148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"issue":"86","key":"ref19","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5523-2_20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1787\/data-00182-en"},{"key":"ref22","first-page":"182","volume-title":"Evidence in Education: Linking Research and Policy","year":"2007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1708-1"},{"key":"ref24","first-page":"3769","article-title":"Global research trend on cyber security: A scientometric analysis","volume":"3339","author":"Rai","year":"2019","journal-title":"Library Philosophy Pract. (e-J.)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-021-03948-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630240406"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2014.02.005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.01.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.71"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-41695-z"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/pa\/52.4.582"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18356\/9789210059060"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62223-7_9"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10466531.pdf?arnumber=10466531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:03:56Z","timestamp":1711487036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10466531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3375910","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}