dc.contributor.author | İstanbullu, Aslıhan | |
dc.date.accessioned | 2024-03-12T19:38:27Z | |
dc.date.available | 2024-03-12T19:38:27Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | 2146-7455 | |
dc.identifier.uri | https://doi.org/10.19126/suje.1219710 | |
dc.identifier.uri | https://search.trdizin.gov.tr/yayin/detay/1173645 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12450/3147 | |
dc.description.abstract | The aim of this study is to discover the research trends in the field of cyber security with performance analysis and to reveal the intellectual structure of the field of cyber security with scientific mapping. For this purpose, articles published in the field of cyber security between 1998-2021 in the WoS database were examined. The research was carried out in accordance with the bibliometric analysis guide. In the data collection phase, 1,631 articles were included in the study by taking into account the criteria determined among 15,781 studies using the PRISMA procedure. R program was used in bibliometric analysis. According to the findings of the study, there has been a significant increase in article productivity in the field of cyber security after 2020. Although IEEE Access is the journal with the highest number of publications in the field, IEEE Transactions on Smart Grid ranks first according to h-index and g-index values. Considering the topics studied according to the years, it is seen that in the first years, issues related to the law such as cybercrime and cyber terrorism were examined, and recently, in addition to these, current technological issues have been included. It is observed that the most effective publication is 'The Internet of Things for Health Care: a Comprehensive Survey' by Islam et al. which examines the security of the Internet of Things in health care, which is also a current issue. | en_US |
dc.language.iso | eng | en_US |
dc.relation.ispartof | Sakarya University Journal of Education | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.title | How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data | en_US |
dc.type | article | en_US |
dc.department | Amasya Üniversitesi | en_US |
dc.identifier.volume | 13 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.startpage | 119 | en_US |
dc.identifier.endpage | 139 | en_US |
dc.relation.publicationcategory | Makale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.trdizinid | 1173645 | en_US |
dc.identifier.doi | 10.19126/suje.1219710 | |
dc.department-temp | Amasya Üniversitesi, Amasya, Türkiye | en_US |