Analisis Bibliometrik Tren Publikasi pada Kajian Risiko Sistem Manajemen Keamanan Informasi

Authors

  • Nuraini Rahmad Program Studi Teknik Industri, Institut Teknologi Perkebunan Pelalawan Indonesia
  • Riri Nasirly Program Studi Teknik Industri, Institut Teknologi Perkebunan Pelalawan Indonesia
  • Fadli Arsi Program Studi Teknik Industri, Institut Teknologi Perkebunan Pelalawan Indonesia
  • Fachri Ibrahim Nasution Program Studi Teknologi Pascapanen, Institut Teknologi Perkebunan Pelalawan Indonesia

DOI:

https://doi.org/10.31004/jutin.v7i3.33423

Keywords:

Information Security, Risk Management, Bibliometrics, Vosviewer

Abstract

Security risks cover all aspects, including users usually feel lost or there is a leak of personal data, so there are often complaints by users who feel dissatisfied with a company. Risk management of information security is a methodology to identify and assess security risks by implementing, controlling and handling risks to protect an organization's interests. This research examines the bibliometric characteristics and trends of articles on “Risk of Information Security Management System”. Data from the Scopus database was collected, published between 1987 and 2023. Through searching the Scopus database, 1,351 articles were found. Bibliometric analysis was conducted using the vosviewer tool to visualize the research trends of this study. “Risk Management” and ‘Information Security Management Systems’ articles were found in 165 institutions and 87 countries. The bibliometric analysis revealed that Norges Teknisk-Naturvitenskapelige University had the most “Risk Management” and “Information Security Management Systems” research publications, with a total of 28 documents.

References

Alosaimi, R., & Alnuem, M. (2016). A survey on security risk management frameworks in cloud computing. Computer Science and Information Technology. 1-11. doi : 10.5121/csit.2016.60901

Beckers, K., Heisel, K., Solhaug, B., & Stolen, K. (2014). ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems. 8431, 315-344. doi : 10.1007/978-3-319-07452-8_13

Bernsmed, K., Bour, G., Lundgren, M., & Erik Bergstrom. (2022). An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects. Journal of Air Transport Management. 102 (3), 1-18. doi: 10.1016/j.jairtraman.2022.102223

Damenu, T. K., Chris, B. (2017). Analysing information security in a bank using soft systems methodology. Information and Computer Security. 25 (3), 240-258. doi : 10.1108/ICS-07-2016-0053

Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research. 133, 285-296. https://doi.org/10.1016/j.jbusres.2021.04.070

Ernst & Young. (2012). Global Information Security Survey 2012: Fighting to Close the Gap, EYGM Limited, EYG No. AU1889

Jadwani, B., Parkhi, S., & Mitra, P. K. (2024). Operational Risk Management in Banks: A Bibliometric Analysis and Opportunities for Future Research. J. Risk Financial Manag. 17 (3). 95. doi: 10.3390/jrfm17030095

Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2022). Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry. Sustainability. 4 (2), 2-19. doi : 10.3390/su14031269

Korhan, O., & Ersoy, M. (2016). Usability and functionality factors of the social network site application users from the perspective of uses and gratification theory. Quality and Quantity. 50 (4), 1799– 1816. doi : 10.1007/s11135-015-0236-7

Lundgren, M. (2020). Rethinking capabilities in information security risk management: a systematic literature review. International Journal Risk Assessment and Management. 23 (2), 169-190. doi : 10.1504/IJRAM.2020.106978

Razikin, K., & Soewito, B. (2022). Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egyptian Informatics Journal. 28 (3), 383-404. doi: https://doi.org/10.1016/j.eij.2022.03.001

Shiwi, S., Andriyanto, F., & Anggrainingsih, R. (2016). An expert system for risk assessment of information system security based on ISO 27002. IEEE International Conference on Knowledge Engineering and Applications. 57-61. doi : 10.1109/ICKEA.2016.7802992

Putra, S. J., Gunawan, M. N., Sobri A. F., Muslimin, J.M., Amilin & Saepudin, D. (2020). Information Security Risk Management Analysis Using ISO 27005: 2011 For The Telecommunication Company. IEE (Institute of Electrical and Electronics Engineers), doi : 10.1109/CITSM50537.2020.9268845

Sikman, L., Latinovic, T., &Sarajlic, N. (2022). Modelling of Fuzzy Expert System for an Assessment of Security Information Management System UIS (University Information System). Tehnicki Vjesnik. 22 (10), 60-65.

Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management, MIS Quartely. 34 (3), 503–522. doi : 10.2307/25750689

Szczepaniuk, K., Szczepaniuk, H., Rokicki, T., & Klepack, B. (2020). Information security assessment in public administration. Computers and Security. 90 (10), 2-11. https://doi.org/10.1016/j.cose.2019.101709

Wangen. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security. 17, 681-699. DOI:10.1007/s10207-017-0382-0

Yustanti, W., Qoiriah, A., Bisma, R., & Prihanto, A. (2018). An analysis of Indonesia's information security index: A case study in a public university. IOP Conference Series: Material Science and Engineering. 296 (1), 1-7. doi : 10.1088/1757-899X/296/1/012038

Downloads

Published

2024-07-10

How to Cite

Rahmad, N., Nasirly, R. ., Arsi, F. ., & Nasution, F. I. . (2024). Analisis Bibliometrik Tren Publikasi pada Kajian Risiko Sistem Manajemen Keamanan Informasi. Jurnal Teknik Industri Terintegrasi (JUTIN), 7(3), 1971–1979. https://doi.org/10.31004/jutin.v7i3.33423

Issue

Section

Articles of Research