Nitin Singh, Venkataraghavan Krishnaswamy, Z. Zhang
{"title":"企业信息系统中网络安全知识结构研究","authors":"Nitin Singh, Venkataraghavan Krishnaswamy, Z. Zhang","doi":"10.1080/17517575.2022.2025545","DOIUrl":null,"url":null,"abstract":"ABSTRACT Enterprises aspire for ongoing and effective information systems security. Cybersecurity frameworks ensure the availability, confidentiality, and integrity of information. Inspired by the omnipresent challenges and ever-increasing spending by enterprises, we identify the state of research on cybersecurity in enterprises. We employ citation, co-citation, centrality, and citation-path analysis to uncover its intellectual core. Our study reveals five core themes of cybersecurity research: (a) artificial intelligence in cybersecurity, (b) grids, networks, and platform security, (c) algorithms & methods, (d) optimisation & modelling, and (e) cybersecurity management. We discuss the implications for EIS and opportunities for research in each of these themes.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4000,"publicationDate":"2022-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Intellectual structure of cybersecurity research in enterprise information systems\",\"authors\":\"Nitin Singh, Venkataraghavan Krishnaswamy, Z. Zhang\",\"doi\":\"10.1080/17517575.2022.2025545\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Enterprises aspire for ongoing and effective information systems security. Cybersecurity frameworks ensure the availability, confidentiality, and integrity of information. Inspired by the omnipresent challenges and ever-increasing spending by enterprises, we identify the state of research on cybersecurity in enterprises. We employ citation, co-citation, centrality, and citation-path analysis to uncover its intellectual core. Our study reveals five core themes of cybersecurity research: (a) artificial intelligence in cybersecurity, (b) grids, networks, and platform security, (c) algorithms & methods, (d) optimisation & modelling, and (e) cybersecurity management. We discuss the implications for EIS and opportunities for research in each of these themes.\",\"PeriodicalId\":11750,\"journal\":{\"name\":\"Enterprise Information Systems\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2022-01-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Enterprise Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/17517575.2022.2025545\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2022.2025545","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Intellectual structure of cybersecurity research in enterprise information systems
ABSTRACT Enterprises aspire for ongoing and effective information systems security. Cybersecurity frameworks ensure the availability, confidentiality, and integrity of information. Inspired by the omnipresent challenges and ever-increasing spending by enterprises, we identify the state of research on cybersecurity in enterprises. We employ citation, co-citation, centrality, and citation-path analysis to uncover its intellectual core. Our study reveals five core themes of cybersecurity research: (a) artificial intelligence in cybersecurity, (b) grids, networks, and platform security, (c) algorithms & methods, (d) optimisation & modelling, and (e) cybersecurity management. We discuss the implications for EIS and opportunities for research in each of these themes.
期刊介绍:
Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.