{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:05:14Z","timestamp":1762643114885,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000269","name":"Economic and Social Research Council (ESRC)","doi-asserted-by":"publisher","award":["ES\/V003666\/1"],"award-info":[{"award-number":["ES\/V003666\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Digital Security by Design (DSbD) is an initiative supported by the UK government aimed at transforming digital technology to deliver necessary digital resilience and prosperity across the UK. As emerging challenges in the field of digital security evolve, it becomes essential to explore how entities involved in DSbD interact and change over time. Understanding these dynamic relationships can provide crucial insights for the development and improvement of security practices. This paper presents a data-driven analysis of the evolving landscape of DSbD from 2019 to 2024, gathering insights from textual documents referencing DSbD. Using a combination of text mining techniques and network analysis, a large corpus of textual documents was examined to identify key entities, including organisations, individuals, and the relationships between them. A network was then visualised to analyse the structural connections between these entities, revealing how key concepts and actors have evolved. The results and discussion demonstrate that the network analysis offers a unique advantage in tracking and visualising these evolving relationships, providing insights into shifts in focus, emerging trends, and changes in technological adoption over time. For example, a notable finding from the analysis is the substantial increase in node relationships associated with Artificial Intelligence (AI). We hypothesise that this surge reflects the growing integration of AI into digital security strategies, driven by the need for more adaptive and autonomous solutions to tackle evolving cyber threats, as well as the rapid introduction of new AI tools to the market and their swift adoption across various industries. By mapping such connections, such results are useful, helping practitioners and researchers recognise new security demands and adjust strategies to better respond to the evolving landscape of DSbD.<\/jats:p>","DOI":"10.3390\/informatics12010008","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:53:32Z","timestamp":1737442412000},"page":"8","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Evolution of Digital Security by Design Using Temporal Network Analysis"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3794-6145","authenticated-orcid":false,"given":"Lowri","family":"Williams","sequence":"first","affiliation":[{"name":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7917-0486","authenticated-orcid":false,"given":"Hamza","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0396-633X","authenticated-orcid":false,"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1111\/j.1540-6261.1993.tb04757.x","article-title":"Security design","volume":"48","author":"Boot","year":"1993","journal-title":"J. Financ."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","article-title":"The protection of information in computer systems","volume":"63","author":"Saltzer","year":"1975","journal-title":"Proc. IEEE"},{"unstructured":"Microsoft (2006). The Security Development Lifecycle, Microsoft Press.","key":"ref_3"},{"unstructured":"(2024, October 18). Digital Security by Design. Available online: https:\/\/www.dsbd.tech\/.","key":"ref_4"},{"unstructured":"Department for Digital, Culture, Media, and Sport (2024, October 18). Digital Security by Design: Overview of Programme and Projects. Available online: https:\/\/www.nao.org.uk\/wp-content\/uploads\/2023\/03\/dcms-departmental-overview.pdf.","key":"ref_5"},{"unstructured":"Arm Limited (2024, October 18). Digital Security by Design (DSbD): Transforming Digital Infrastructure Security Through Secure Hardware. Available online: https:\/\/www.arm.com\/.","key":"ref_6"},{"key":"ref_7","first-page":"74","article-title":"Awareness: The building blocks of security","volume":"7","author":"Shrobe","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"ref_8","first-page":"1","article-title":"A survey on security and privacy issues in wireless sensor networks","volume":"15","author":"Bhattacharya","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","first-page":"1","article-title":"AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions","volume":"8","author":"Sarker","year":"2021","journal-title":"J. Big Data"},{"unstructured":"UK Research and Innovation (UKRI) (2024, November 01). Available online: https:\/\/www.ukri.org\/.","key":"ref_10"},{"unstructured":"The National Cyber Security Centre (NCSC) (2024, November 01). Available online: https:\/\/www.ncsc.gov.uk\/.","key":"ref_11"},{"unstructured":"Watson, R., Moore, S., Sewell, P., Davis, B., and Neumann, P. (2024, October 18). Capability Hardware Enhanced RISC Instructions (CHERI). Available online: https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/cheri\/.","key":"ref_12"},{"unstructured":"Wang, Z., and Hu, Y. (2022). Towards a High-performance and Secure Memory System and Architecture for Emerging Applications. arXiv.","key":"ref_13"},{"unstructured":"He, Z., Elizarov, M.S., Li, N., Xiang, F., and Fratalocchi, A. (2024). Quantum-activated neural reservoirs on-chip open up large hardware security models for resilient authentication. arXiv.","key":"ref_14"},{"doi-asserted-by":"crossref","unstructured":"Malatji, M., and Tolah, A. (2024). Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI. AI Ethics, 1\u201328.","key":"ref_15","DOI":"10.1007\/s43681-024-00427-4"},{"doi-asserted-by":"crossref","unstructured":"Hashmi, E., Yamin, M.M., and Yayilgan, S.Y. (2024). Securing tomorrow: A comprehensive survey on the synergy of Artificial Intelligence and information security. AI Ethics, 1\u201319.","key":"ref_16","DOI":"10.1007\/s43681-024-00529-z"},{"doi-asserted-by":"crossref","unstructured":"Sarker, I.H. (2024). Introduction to AI-Driven Cybersecurity and Threat Intelligence. AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability, Springer.","key":"ref_17","DOI":"10.1007\/978-3-031-54497-2"},{"doi-asserted-by":"crossref","unstructured":"de Azambuja, A.J.G., Plesker, C., Sch\u00fctzer, K., Anderl, R., Schleich, B., and Almeida, V.R. (2023). Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0\u2014A Survey. Electronics, 12.","key":"ref_18","DOI":"10.3390\/electronics12081920"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"258","DOI":"10.11591\/csit.v4i3.pp258-267","article-title":"Exploring network security threats through text mining techniques: A comprehensive analysis","volume":"4","author":"Wahyuningsih","year":"2023","journal-title":"Comput. Sci. Inf. Technol."},{"unstructured":"Mukhopadhyay, A., and Sharma, K. (2024, October 18). A Text-Mining Approach to Cyberrisk Management. Available online: https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2021\/volume-6\/a-text-mining-approach-to-cyberrisk-management.","key":"ref_20"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3462477","article-title":"Text mining in cybersecurity: A systematic literature review","volume":"54","author":"Ignaczak","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_22","first-page":"80","article-title":"A comparative study on the application of text mining in cybersecurity","volume":"16","author":"Barik","year":"2023","journal-title":"Recent Adv. Comput. Sci. Commun. (Formerly Recent Patents Comput. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1057\/s41284-024-00435-3","article-title":"Digital security by Design","volume":"37","author":"Radanliev","year":"2024","journal-title":"Secur. J."},{"doi-asserted-by":"crossref","unstructured":"Saqr, M. (2024). Temporal Network Analysis: Introduction, Methods and Analysis with R. Learning Analytics Methods and Tutorials: A Practical Guide Using R, Springer.","key":"ref_24","DOI":"10.1007\/978-3-031-54464-4"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"20211164","DOI":"10.1098\/rspb.2021.1164","article-title":"From temporal network data to the dynamics of social relationships","volume":"288","author":"Gelardi","year":"2021","journal-title":"Proc. R. Soc. B"},{"doi-asserted-by":"crossref","unstructured":"Mishra, M., Vishwakarma, S.K., Malviya, L., and Anjana, S. (2024). Temporal analysis of computational economics: A topic modeling approach. Int. J. Data Sci. Anal., 1\u201315.","key":"ref_26","DOI":"10.1007\/s41060-024-00596-9"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"5353","DOI":"10.1007\/s11192-022-04273-1","article-title":"Identification of topic evolution: Network analytics with piecewise linear representation and word embedding","volume":"127","author":"Huang","year":"2022","journal-title":"Scientometrics"},{"unstructured":"Zhang, D.C., and Lauw, H. (2022, January 17\u201323). Dynamic topic models for temporal document networks. Proceedings of the International Conference on Machine Learning, Baltimore, MD, USA.","key":"ref_28"},{"doi-asserted-by":"crossref","unstructured":"Jing, X., Hu, Q., Zhang, Y., and Rayz, J.T. (2021). Tracing topic transitions with temporal graph clusters. arXiv.","key":"ref_29","DOI":"10.32473\/flairs.v34i1.128547"},{"unstructured":"Scrapy (2024, October 18). Available online: https:\/\/scrapy.org.","key":"ref_30"},{"unstructured":"Pandas (2024, October 08). Available online: https:\/\/pandas.pydata.org\/.","key":"ref_31"},{"unstructured":"SpaCy (2024, October 18). Available online: https:\/\/spacy.io\/.","key":"ref_32"},{"doi-asserted-by":"crossref","unstructured":"Zhong, Z., and Chen, D. (2020). A frustratingly easy approach for entity and relation extraction. arXiv.","key":"ref_33","DOI":"10.18653\/v1\/2021.naacl-main.5"}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/1\/8\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:31:04Z","timestamp":1759919464000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["informatics12010008"],"URL":"https:\/\/doi.org\/10.3390\/informatics12010008","relation":{},"ISSN":["2227-9709"],"issn-type":[{"type":"electronic","value":"2227-9709"}],"subject":[],"published":{"date-parts":[[2025,1,17]]}}}