Analisis Bibliometrik Tren Publikasi pada Kajian Risiko Sistem Manajemen Keamanan Informasi
DOI:
https://doi.org/10.31004/jutin.v7i3.33423Keywords:
Information Security, Risk Management, Bibliometrics, VosviewerAbstract
Security risks cover all aspects, including users usually feel lost or there is a leak of personal data, so there are often complaints by users who feel dissatisfied with a company. Risk management of information security is a methodology to identify and assess security risks by implementing, controlling and handling risks to protect an organization's interests. This research examines the bibliometric characteristics and trends of articles on “Risk of Information Security Management System”. Data from the Scopus database was collected, published between 1987 and 2023. Through searching the Scopus database, 1,351 articles were found. Bibliometric analysis was conducted using the vosviewer tool to visualize the research trends of this study. “Risk Management” and ‘Information Security Management Systems’ articles were found in 165 institutions and 87 countries. The bibliometric analysis revealed that Norges Teknisk-Naturvitenskapelige University had the most “Risk Management” and “Information Security Management Systems” research publications, with a total of 28 documents.References
Alosaimi, R., & Alnuem, M. (2016). A survey on security risk management frameworks in cloud computing. Computer Science and Information Technology. 1-11. doi : 10.5121/csit.2016.60901
Beckers, K., Heisel, K., Solhaug, B., & Stolen, K. (2014). ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems. 8431, 315-344. doi : 10.1007/978-3-319-07452-8_13
Bernsmed, K., Bour, G., Lundgren, M., & Erik Bergstrom. (2022). An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects. Journal of Air Transport Management. 102 (3), 1-18. doi: 10.1016/j.jairtraman.2022.102223
Damenu, T. K., Chris, B. (2017). Analysing information security in a bank using soft systems methodology. Information and Computer Security. 25 (3), 240-258. doi : 10.1108/ICS-07-2016-0053
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research. 133, 285-296. https://doi.org/10.1016/j.jbusres.2021.04.070
Ernst & Young. (2012). Global Information Security Survey 2012: Fighting to Close the Gap, EYGM Limited, EYG No. AU1889
Jadwani, B., Parkhi, S., & Mitra, P. K. (2024). Operational Risk Management in Banks: A Bibliometric Analysis and Opportunities for Future Research. J. Risk Financial Manag. 17 (3). 95. doi: 10.3390/jrfm17030095
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2022). Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry. Sustainability. 4 (2), 2-19. doi : 10.3390/su14031269
Korhan, O., & Ersoy, M. (2016). Usability and functionality factors of the social network site application users from the perspective of uses and gratification theory. Quality and Quantity. 50 (4), 1799– 1816. doi : 10.1007/s11135-015-0236-7
Lundgren, M. (2020). Rethinking capabilities in information security risk management: a systematic literature review. International Journal Risk Assessment and Management. 23 (2), 169-190. doi : 10.1504/IJRAM.2020.106978
Razikin, K., & Soewito, B. (2022). Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egyptian Informatics Journal. 28 (3), 383-404. doi: https://doi.org/10.1016/j.eij.2022.03.001
Shiwi, S., Andriyanto, F., & Anggrainingsih, R. (2016). An expert system for risk assessment of information system security based on ISO 27002. IEEE International Conference on Knowledge Engineering and Applications. 57-61. doi : 10.1109/ICKEA.2016.7802992
Putra, S. J., Gunawan, M. N., Sobri A. F., Muslimin, J.M., Amilin & Saepudin, D. (2020). Information Security Risk Management Analysis Using ISO 27005: 2011 For The Telecommunication Company. IEE (Institute of Electrical and Electronics Engineers), doi : 10.1109/CITSM50537.2020.9268845
Sikman, L., Latinovic, T., &Sarajlic, N. (2022). Modelling of Fuzzy Expert System for an Assessment of Security Information Management System UIS (University Information System). Tehnicki Vjesnik. 22 (10), 60-65.
Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management, MIS Quartely. 34 (3), 503–522. doi : 10.2307/25750689
Szczepaniuk, K., Szczepaniuk, H., Rokicki, T., & Klepack, B. (2020). Information security assessment in public administration. Computers and Security. 90 (10), 2-11. https://doi.org/10.1016/j.cose.2019.101709
Wangen. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security. 17, 681-699. DOI:10.1007/s10207-017-0382-0
Yustanti, W., Qoiriah, A., Bisma, R., & Prihanto, A. (2018). An analysis of Indonesia's information security index: A case study in a public university. IOP Conference Series: Material Science and Engineering. 296 (1), 1-7. doi : 10.1088/1757-899X/296/1/012038
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nuraini Rahmad, Riri Nasirly, Fadli Arsi, Fachri Ibrahim Nasution
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.