Skip to main content
Have a personal or library account? Click to login
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI Cover

Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI

Open Access
|Sep 2025

Figures & Tables

Figure 1.

Total of Publications Activity from 2000 until 2025

Figure 2.

The most important area research on Information Security Risk Management (Source: WoS Research Category Analysis)

Figure 3.

Top 10 Most Productive Countries Publishing on Information Security Risk Management

Figure 4.

Cooperation Network Between Countries in Information Security Risk Management

Figure 5.

Keyword Analysis ResultsNotes (Figure 5):High Connectivity: Terms like “Information Security” and “Security” are highly linked, indicating their foundational roles across multiple clusters.Cross-Cluster Relevance: Keywords such as “Risk” and “Management” connect multiple themes, reflecting their broad applicability in the field.Cluster Differentiation: Each cluster represents a specific aspect of cybersecurity, from high-level frameworks to specific vulnerabilities and emerging technologies.

Summarise of Bibliometric Studies on Information Security

Study (Reference)Focus/ScopeBibliometric Methods/ToolsData SourceKey Findings / TrendsResearch Gaps / Future Directions
Sharma et al. 2023 [21]Cybersecurity and cyber forensics research (2011–2021); mapping a decade of digital security literature.Co-authorship, co-citation, citation and keyword analysis using full vs. fractional counting; timeline trends and burst detection (CiteSpace-like approach).Web of Science (WoS), 2011–2021 publications.
  • Steady growth in cybersecurity/forensics publications over the decade.

  • Top contributors identified: key authors, institutions, countries leading the field.

  • Major topics include anomaly detection, malware analysis, cyberattacks, machine learning in security.

  • Collaboration networks show global research clusters (with certain countries forming hubs).

  • Points out underinvestigated areas at the intersection of cybersecurity and forensics.

  • Emphasizes need for future work linking preventative security and post-incident forensics.

  • Provides a decade-long baseline to guide future research directions in emerging cybersecurity threats.

Cybersecurity & Forensics
Arroyabe et al. 2024 [22]Intersection of SME digitalization and cybersecurity – how digital transformation in small businesses relates to security issues.Bibliometric (R) used for co-occurrence (keyword) clustering and citation analysis. Four main thematic clusters identified via co-word analysis.WoS + Scopus (417 papers, up to ~2022) on “SMEs + cybersecurity/digitalization”.
  • Research splits into 4 clusters: (1) Industry 4.0 & smart factories, (2) Industry 4.0 & SMEs, (3) SMEs & cybersecurity practices, (4) SME digitalization & entrepreneurship.

  • Increasing digitalization - higher cyber risk for SMEs, but current

  • literature often treats these topics separately (tech adoption vs. security).

  • Few studies integrate business innovation and security preparedness, indicating a silo effect.

  • Identifies a gap: lack of integrated studies on SME digitalization and security.

  • Predicts cybersecurity in SMEs will emerge as its own research stream, distinct from general digitalization research. Recommends bridging the gap by focusing future research on security as an integral part of SME digital transformation strategies.

Cybersecurity & Digitalization in SMEs
Guembe et al. 2025 [23]Artificial Intelligence in cybersecurity, specifically AI-driven cyberattack and intrusion detection (2014–2024).Comprehensive bibliometric review using Bibliometric/Bibliophagy (R). Co-authorship networks, keyword co-occurrence maps, and citation metrics analysed. Also used dominance factor for author influence.Scopus (2014–2024): 2,338 documents (journals, conferences, etc.) on AI-based cyber defence.
  • Machine learning & deep learning are the dominant approaches in cybersecurity, showing rapid growth in research interest.

  • USA is the top-producing country, with India, China and others also major contributors. Strong collaboration networks among leading countries (USA–China–Europe etc.).

  • High impact work from countries like Canada and Italy despite fewer papers (high citations per paper). Keywords show emphasis on network security, intrusion detection, IoT security, federated learning, etc., indicating trending research topics.

  • Calls for future research in federated learning and privacy-preserving AI to secure IoT/IoMT systems.

  • Notes the need to address emerging threats (e.g., adversarial attacks on AI) and to integrate AI with privacy/security by design.

  • Suggests strengthening international collaborations and interdisciplinary approaches (combining AI with domain knowledge) to tackle complex cyber threats.

AI for Cyberattack Detection
Judijanto et al. 2024 [24]Global landscape of cybersecurity research (2010–2024); evolution of research themes and international collaboration patterns.VOS viewer used for network visualization (co-authorship, co-word, co-citation networks). Analysed publication counts, collaborative networks and topic clusters over time.Scopus (2010–2024): cybersecurity-related publications worldwide.
  • Dramatic growth in cybersecurity publications over the period, reflecting rising importance of security R&D.

  • Shift in focus from basic IT security to advanced tech integration: recent literature heavily features AI, IoT, blockchain in cybersecurity context.

  • Global collaboration network is mapped: USA, China, India, Germany, UK are key hubs driving research and cooperating internationally.

  • Highlights the field’s increasingly interdisciplinary nature (technical, human, policy angles) to address complex cyber challenges.

  • Stresses the need for continuous innovation and broad collaboration to keep pace with evolving threats.

  • Recommends interdisciplinary approaches in future research – integrating fields (technical and human factors) and expanding analytical frameworks.

  • Suggests using more diverse data sources (beyond just one index, and including real-time threat data) in bibliometric analyses to fully capture the fast-changing cybersecurity landscape.

Global Cybersecurity Research Mapping
Erdoğan & Akmeşe 2025 [25]Cybercrime studies (2000–2023); literature on illegal cyber activities (hacking, cyber fraud, etc.) and countermeasures.Bibliometric (R) and Excel for bibliometric analysis. Examined publication trends, prolific authors, top journals, citation counts; visualized author and country collaboration networks.Web of Science (2000–2023): 2,566 publications on “cybercrime” related keywords.
  • Steady long-term growth in cybercrime research output as cyber threats proliferate.

  • Top author: K. Jaishankar (21 papers) – a leading scholar in cyber criminology.

  • Leading journal: IEEE Access (151 papers on cybercrime); indicates a tech-oriented approach to cybercrime issues is common.

  • Most-cited work on Stuxnet (cyber warfare), showing crossover between cybercrime and national security topics. Major contributing institutions and countries identified (e.g., strong output from certain universities and cross-country collaborations visualized); reflects an international research effort against cybercrime.

  • Provides a baseline for future cybercrime research, helping identify less-explored topics.

  • Implies need for further study in emerging crime areas (e.g., AI-enabled crimes, crypto crimes) as well as underrepresented regions, though specific future directions are general.

  • Emphasizes using these findings to guide policy and research focus, given the dynamic nature of cybercrime (“moving target” requiring ongoing study).

Cybercrime Research Trends

Top 10 Most Productive Countries Publishing on Information Security Risk Management

Top 10 CountryTotal of Publications
USA101
China24
England18
Australia14
India14
South Korea13
Spain12
Taiwan12
Canada10
Norway10

Analysis Tools for Bibliometric Research

No.CriteriaVOS viewerCiteSpacePower BIGephi
1.PurposePrimarily used for constructing and visualizing bibliometric networks, such as citation, co-citation, and co-authorship networks.An open-source software for network visualization and analysis.A business analytics tool by Microsoft, used for data visualization and business intelligence.An open-source software for network visualization and analysis.
2.StrengthPreferably for text mining and creating co-occurrence networks of terms from scientific literature.Suitable for detecting emerging trends and sudden bursts of activity in research.Integrates well with various data sources, provides robust data analysis, and interactive dashboards.Supports large-scale network analysis and offers various layout algorithms for better visualization.
3.VisualisationOffers detailed and interactive visualizations of bibliometric maps.Provides temporal visualizations and cluster views, highlighting key areas of research.It offers a variety of visualization options that can be combined into interactive dashboards, allowing users to explore the data dynamically and gain deeper insights into bibliometric patterns and trends.Highly versatile with numerous options for editing and customizing network visualizations.
4.CustomisationCustomized visualizations to highlight important nodes and connections.Tailored visualizations to emphasize co-citation networks, keyword co-occurrences, and citation bursts.Power BI allows extensive customization for business reports and dashboards, while Gephi offers detailed options for visualizing complex network structures.Rank nodes by metrics such as degree centrality or PageRank.

Top Ten Journals with Highest Total of Publication Activities (2000 – 2025)

Top Ten JournalsTotal of Publication
Computers & Security28
Information Security Journal16
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems11
IEEE Access11
Information and Computer Security11
International Journal of Information Security9
Journal of Information Security And Applications8
International Journal of Advanced Computer Science and Applications7
International Journal of Computer Science and Network Security6
IET Information Security5
International Journal of Information Management5

Keywords Analysis Results

KeywordsLinksTotal Links StrengthOccurrences
Cluster 1 (Red Coding) : Information System Risk Governance & Performance
Framework175528
Governance112211
Impact144721
Management156238
Performance123217
Technology102313
Information Security Management112119
Cluster 2 (Green Coding): Integrated Risk Assessment & Analysis
Computer Security92110
Cybersecurity167147
Risk Analysis102314
Risk Assessment124835
Cluster 3 (Blue Coding): Risks & Vulnerability
Risks136030
Security168757
Systems124627
Vulnerability112614
Cluster 4 (Yellow Coding): Information Security & Privacy
Cloud Computing61111
Information Security17185159
Privacy122616

Usage of the Risk Management Related to Information Security Term In the Academic Writings

Used in TitleSourceTotal of Academic Writings

2000 – 20052006 – 20112012 – 20172018 – 20232024 – 2025
Information Security AND Risk ManagementWoS147411218038

Top 10 Publisher With Highest Total of Publications

Top Ten PublisherTotal Publication
Emerald Group Publishing Ltd32
Springer29
Elsevier Advanced Technology28
Elsevier25
MDPI25
Taylor & Francis Inc22
IEEE-Inst Electrical Electronics Engineers Inc15
IGI Global12
Syngress11
Elsevier Sci Ltd9

The Top 10 Most Essential Authors of Publications Related to Information Security Risk Management from 2000 to 2025 in the WoS Database Core Collection

First Author Full NameTotal of PublicationTotal of CitationArticle Title and Doi
Schuett, Jonas1332
  • Risk Management in the Artificial Intelligence Act

  • DOI: 10.1111/risa.17665

  • Summary: Analyzes Article 9 of the EU AI Act, focusing on its risk management provisions.

Massimino, Brett1238
  • On the Inattention to Digital Confidentiality in Operations and Supply Chain Research

  • DOI: 10.1111/poms.12983

  • Summary: Discusses the lack of focus on digital confidentiality in operations and supply chain management literature.

Knowles, William1229
  • A Survey of Cyber Security Management in Industrial Control Systems

  • DOI: 10.1016/j.ijcip.2015.02.002

  • Summary: Explores cybersecurity management practices in industrial control systems.

Uddin, Md. Hamid1214
  • Cybersecurity Hazards and Financial System Vulnerability: A Synthesis of Literature

  • DOI: 10.1016/j.ijcip.2015.02.002

  • Summary: Reviews literature on cybersecurity risks affecting financial systems.

Tarei, Pradeep Kumar2202
  • Benchmarking the Relationship Between Supply Chain Risk Mitigation Strategies and Practices: An Integrated Approach

  • DOI: 10.1108/BIJ-12-2019-0523

  • Summary: Proposes a framework linking risk mitigation strategies to practices in supply chains.

Etemadi, Nilofar1198
  • An ISM Modelling of Barriers for Blockchain/Distributed Ledger Technology Adoption in Supply Chains Towards Cybersecurity

  • DOI: 10.1145/3450588.3450600

  • Summary: Identifies barriers to adopting blockchain for cybersecurity in supply chains.

Shiau, Wen -Lung1196
  • What Are the Trend and Core Knowledge of Information Security? A Citation and Co-Citation Analysis

  • DOI: 10.1016/j.im.2023.103774

  • Summary: Analyzes trends and core knowledge areas in information security research.

Culot, Giovanna1189
  • The ISO/IEC 27001 Information Security Management Standard: Literature Review and Theory-Based Research Agenda

  • DOI: 10.1108/TQM-09-2020-0202

  • Summary: Provides a literature review and research agenda for the ISO/IEC 27001 standard.

Fenz, Stefan5166
  • Information Security Risk Management: In Which Security Solutions Is It Worth Investing?

  • DOI: 10.28963/ais.2011.022

  • Summary: Evaluates the effectiveness of various security solutions in risk management.

Di Lernia, Cary1165
  • Cyber-Related Risk Disclosure in Australia: Evidence from the ASX200

  • DOI: 10.3316/agispt.20200324027433

  • Summary: Investigates the disclosure of cyber-related risks among Australian companies.

Top Ten Journals with Highest Citation (2000 – 2025)

Top 10 JournalTimes Cited, WoS Core
Computers & Security882
MIS Quarterly391
International Journal of Information Management327
Information & Management191
International Journal of Critical Infrastructure Protection170
Journal of Management Information Systems167
Information Systems Research156
Decision Support Systems141
International Journal of Information Security111
Journal of Information Security and Applications90
DOI: https://doi.org/10.2478/ias-2025-0006 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 86 - 105
Published on: Sep 12, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.