{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:36:36Z","timestamp":1758634596701},"reference-count":23,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:p>An important part of an organisation\u2019s mission is protecting its information assets from inside or outside threats. As the information environment has become more diverse and inclusive, security concern has shifted from information assets resided in the organisation to information assets and networked devices exposed to broader cyberspace, such as cloud or Internet of things environment and mobile Internet. Organisations have to keep up with the knowledge and trends in information security and cyber-security to safeguard their information assets. Knowledge mapping will aid in this sort of knowledge management process. Mandatory standards and government regulations help industries establish best practices in cyber-security. Knowledge mapping and scientometric analysis across disciplines also provide a tracking system to notify researchers and practitioners should the new solutions and technology facilitating threat detection emerge. While various topics in information security and cyber-security have been extensively investigated in academia, identifying salient themes and development trajectories in information security and cyber-security research is relatively unexplored. This study employs scientometric analysis and topic modelling to develop knowledge maps that visualise core concepts associated with information security and cyber-security research over time and across disciplines. With scientometric analysis and knowledge mapping using topic models, this study identifies the commonality, difference, and relationship between information security and cyber-security research domains. This approach could gain insights into how these research areas have evolved and might be improved concerning learning and teaching cyber-security. The proposed approach to developing the knowledge map may be extended to other research areas.<\/jats:p>","DOI":"10.1142\/s0219649216500441","type":"journal-article","created":{"date-parts":[[2016,12,30]],"date-time":"2016-12-30T07:00:58Z","timestamp":1483081258000},"page":"1650044","source":"Crossref","is-referenced-by-count":6,"title":["The Synergy of Scientometric Analysis and Knowledge Mapping with Topic Models: Modelling the Development Trajectories of Information Security and Cyber-Security Research"],"prefix":"10.1142","volume":"15","author":[{"given":"Hsia-Ching","family":"Chang","sequence":"first","affiliation":[{"name":"University of North Texas, USA"}]}],"member":"219","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"S0219649216500441BIB001","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"S0219649216500441BIB002","first-page":"993","volume":"3","author":"Blei DM","year":"2003","journal-title":"Journal of Machine Learning Research"},{"issue":"2","key":"S0219649216500441BIB003","first-page":"102","volume":"49","author":"Bookstein A","year":"1998","journal-title":"Journal of the American Society for Information Science"},{"key":"S0219649216500441BIB004","doi-asserted-by":"publisher","DOI":"10.1002\/kpm.194"},{"key":"S0219649216500441BIB005","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20317"},{"key":"S0219649216500441BIB006","doi-asserted-by":"publisher","DOI":"10.1517\/14712598.2012.674507"},{"key":"S0219649216500441BIB007","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21525"},{"issue":"10","key":"S0219649216500441BIB008","doi-asserted-by":"crossref","first-page":"13","DOI":"10.22215\/timreview\/835","volume":"4","author":"Craigen D","year":"2014","journal-title":"Technology Innovation Management Review"},{"key":"S0219649216500441BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"S0219649216500441BIB011","first-page":"189","volume-title":"Handbook on Knowledge Management","author":"Eppler M","year":"2002"},{"key":"S0219649216500441BIB012","doi-asserted-by":"publisher","DOI":"10.1002\/kpm.299"},{"issue":"45","key":"S0219649216500441BIB013","first-page":"5","volume":"7","author":"Garfield E","year":"1994","journal-title":"Current Contents: Social & Behavioural Sciences"},{"issue":"13","key":"S0219649216500441BIB015","first-page":"1","volume":"40","author":"Hornik K","year":"2011","journal-title":"Journal of Statistical Software"},{"key":"S0219649216500441BIB016","doi-asserted-by":"crossref","DOI":"10.4135\/9781446220443","volume-title":"Mapping Strategic Knowledge","author":"Huff A","year":"2002"},{"key":"S0219649216500441BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1595-5"},{"key":"S0219649216500441BIB019","doi-asserted-by":"publisher","DOI":"10.1108\/13673271311300714"},{"key":"S0219649216500441BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-007-1898-2"},{"key":"S0219649216500441BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1765-5"},{"key":"S0219649216500441BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1708-1"},{"key":"S0219649216500441BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10377-8_11"},{"key":"S0219649216500441BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"S0219649216500441BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.014"},{"issue":"8","key":"S0219649216500441BIB027","first-page":"10","volume":"2","author":"Vail EF","year":"1999","journal-title":"Knowledge Management Review"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219649216500441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T07:43:22Z","timestamp":1658303002000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219649216500441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":23,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2016,12,29]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1142\/S0219649216500441"],"URL":"https:\/\/doi.org\/10.1142\/s0219649216500441","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"type":"print","value":"0219-6492"},{"type":"electronic","value":"1793-6926"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}