Journal
INFORMATION & MANAGEMENT
Volume 60, Issue 3, Pages -Publisher
ELSEVIER
DOI: 10.1016/j.im.2023.103774
Keywords
Information security; Privacy; Security policy; Co-citation analysis
Ask authors/readers for more resources
Information technology presents both business success opportunities and potential safety hazards to organizations. This study systematically explores information security research and identifies eight core knowledge groups, including intrusion detection, privacy protection, secure machine learning, cryptosystem, data service security, malware analysis, security decision-making, and security management. The detection of research hotspots reveals that data service security and risk management receive the most research attention. Additionally, a comprehensive information security framework is established to facilitate a systematic understanding and achievement of information security.
Information technology brings business success opportunities, but also causes potential safety hazards to orga-nizations. In response to the increasing academia and industry concerns regarding information security (ISec), this study systematically explored extant ISec research and identified eight core knowledge groups, including (1) intrusion detection, (2) privacy protection, (3) secure machine learning, (4) cryptosystem, (5) data service se-curity, (6) malware analysis, (7) security decision-making, and (8) security management. The detection of research hotspots shows that data service security and risk management garner the most current research attention. Furthermore, we establish a comprehensive ISec framework to help systematically understand and achieve ISec.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available