Decision-making in Cybersecurity: A Bibliometric analysis

Authors

  • Mohammad Aljanabi Department of Computer, College of Education, Al-Iraqia University, Baghdad, Iraq
  • Ahmed Hussein Ali Department of Computer, College of Education, Al-Iraqia University, Baghdad, Iraq
  • Mohanad Ghazi Yaseen Imam Aladham University College, Iraq
  • Mostafa Abdulghafoor Mohammed Computer Science Department, Computer Science &Information Technology College, Anbar University, Anbar, 31001, Iraq
  • Sahar Yousif Mohammed Computer Science Department, Computer Science &Information Technology College, Anbar University, Anbar, 31001, Iraq

DOI:

https://doi.org/10.31185/wjcms.208

Abstract

This bibliometric analysis explores research trends and patterns in the intersection of decision-making and cybersecurity. Using Scopus data, we conducted a systematic search and identified 4,637 relevant documents published between 2018-2024. Quantitative analysis reveals rising annual publications with a peak in 2023, the predominance of journal articles, and robust international collaboration networks. China and the USA lead global scientific production. Key topics include risk assessment, network security, decision support systems, and emerging technologies like machine learning and artificial intelligence. Core journals with high citation impact such as IEEE Access and Expert Systems with Applications highlight significant sources of literature. The study provides a holistic overview of the landscape, evolution, contributors, and themes within decision-making and cybersecurity research.

References

M. Golovianko, S. Gryshko, V. Terziyan, and T. Tuunanen, “Responsible cognitive digital clones as decision-makers:a design science research study,” European Journal of Information Systems, vol. 32, no. 5, pp. 879 – 901, 2023, doi: 10.1080/0960085X.2022.2073278.

G. Rathee, S. Garg, G. Kaddoum, D. N. K. Jayakody, J. Piran, and G. Muhammad, “A Trusted Social Network Using Hypothetical Mathematical Model and Decision-Based Scheme,” IEEE Access, vol. 9, pp. 4223 – 4232, 2021, doi: 10.1109/ACCESS.2020.3048077.

R. Diesch, M. Pfaff, and H. Krcmar, “A comprehensive model of information security factors for decision-makers,” Comput Secur, vol. 92, 2020, doi: 10.1016/j.cose.2020.101747.

T. Kravchenko and T. Shevgunov, “DEVELOPMENT OF EXPERT UNSTRUCTURED DECISIONMAKING SUPPORT SYSTEM,” J Theor Appl Inf Technol, vol. 100, no. 18, pp. 5418 – 5437, 2022, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139662088&partnerID=40&md5=0caeb1360c36e4452e09a7e17d08bf75

L. Previti, “The cyber risk management in the algorithmic administrative decisions; [La gestione del rischio informatico nella decisione amministrativa robotica],” Rivista Italiana di Informatica e Diritto, vol. 2022, no. 2, pp. 67 – 74, 2022, doi: 10.32091/RIID0086.

M. Farina, “Intellectual property rights in the era of Italian ‘artificial’ public decisions: time to collapse?; [La proprietà intellettuale nell’era delle decisioni amministrative ‘artificiali’: rischi di collisione?],” Rivista Italiana di Informatica e Diritto, vol. 5, no. 1, pp. 127 – 142, 2023, doi: 10.32091/RIID0104.

E. Weishäupl, E. Yasasin, and G. Schryen, “Information security investments: An exploratory multiple case study on decision-making, evaluation and learning,” Comput Secur, vol. 77, pp. 807 – 823, 2018, doi: 10.1016/j.cose.2018.02.001.

I. Dikmen, G. Atasoy, H. Erol, H. D. Kaya, and M. T. Birgonul, “A decision-support tool for risk and complexity assessment and visualization in construction projects,” Comput Ind, vol. 141, 2022, doi: 10.1016/j.compind.2022.103694.

S. Zeijlemaker, E. A. J. A. Rouwette, G. Cunico, S. Armenia, and M. von Kutzschenbach, “Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers,” Systems, vol. 10, no. 2, 2022, doi: 10.3390/systems10020049.

S. A. Bening, M. Dachyar, N. R. Pratama, J. Park, and Y. Chang, “E-Commerce Technologies Adoption Strategy Selection in Indonesian SMEs Using the Decision-Makers, Technological, Organizational and Environmental (DTOE) Framework,” Sustainability (Switzerland), vol. 15, no. 12, 2023, doi: 10.3390/su15129361.

C. Maciel, L. Roque, and A. C. B. Garcia, “Maturity in decision-making: A method to measure e-participation systems in virtual communities,” International Journal of Web Based Communities, vol. 14, no. 4, pp. 395 – 416, 2018, doi: 10.1504/IJWBC.2018.096257.

L. Cheng and A. Chouldechova, “Heterogeneity in Algorithm-Assisted Decision-Making: A Case Study in Child Abuse Hotline Screening,” Proc ACM Hum Comput Interact, vol. 6, 2022, doi: 10.1145/3555101.

X. Qian, W. Yang, J. Pei, X. Liu, and P. M. Pardalos, “A game of information security investment considering security insurance and complementary information assets,” International Transactions in Operational Research, vol. 29, no. 3, pp. 1791 – 1824, 2022, doi: 10.1111/itor.12972.

S. Schinagl and A. Shahim, “What do we know about information security governance?: ‘From the basement to the boardroom’: towards digital security governance,” Information and Computer Security, vol. 28, no. 2, pp. 261 – 292, 2020, doi: 10.1108/ICS-02-2019-0033.

L. James, “Making cyber-security a strategic business priority,” Network Security, vol. 2018, no. 5, pp. 6 – 8, 2018, doi: 10.1016/S1353-4858(18)30042-4.

S. Janssen, A. van den Berg, and A. Sharpanskykh, “Agent-based vulnerability assessment at airport security checkpoints: A case study on security operator behavior,” Transp Res Interdiscip Perspect, vol. 5, 2020, doi: 10.1016/j.trip.2020.100139.

Downloads

Published

2023-12-30

Issue

Section

Computer

How to Cite

[1]
Mohammad Aljanabi, Ahmed Hussein Ali, Mohanad Ghazi Yaseen, Mostafa Abdulghafoor Mohammed, and Sahar Yousif Mohammed, “Decision-making in Cybersecurity: A Bibliometric analysis”, WJCMS, vol. 2, no. 4, pp. 47–67, Dec. 2023, doi: 10.31185/wjcms.208.