• Abstract

    This thorough bibliometric analysis, using R-Studio and Biblioshiny, presents a comprehensive view of the evolving field of behavioral cybersecurity. It explores how human behaviors in online cyber activities have become a crucial area of research. Despite being relatively new, behavioral cybersecurity has gained considerable attention in academia and practical applications. The analysis reveals essential details such as key sources, influential authors, participating countries, affiliated institutions, and prevalent research themes in this field. It's an essential guide for new researchers, helping them identify gaps in knowledge and understand the importance of this growing research area. Examining 468 literature sources from Scopus up to January 11, 2024, shows a gradual start followed by significant growth, especially after 2012. This dynamic field offers numerous research opportunities by incorporating human aspects into cybersecurity discussions. The focus is on understanding behavioral patterns to shape strategies, guidelines, and user-centered software solutions. Spotlighting behavior in cybersecurity highlights user cognitive biases and the impact of emotions and social factors on decision-making in the cybersecurity landscape. This holistic approach underscores the crucial role of human behavior in shaping cybersecurity practices and strengthening digital defenses.

  • References

    1. Anderson, R. (2005). Why information security is hard - an economic perspective. Seventeenth Annual Computer Security Applications Conference.
    2. Anderson, Ross, & Moore, T. (2006). The economics of information security. Science (New York, N.Y.), 314(5799), 610–613. https://doi.org/10.1126/science.1130992
    3. Cattell, Raymond B. (1930). Cattell group intelligence scale. London: Harrap.
    4. Chellappandi, P., & Vijayakumar, C. S. (2018). Bibliometrics, Scientometrics, Webometrics/ Cybermetrics, Informetrics and Altmetrics - An Emerging Field in Library and Information Science Research. International Journal of Education. https://doi.org/10.5281/ZENODO.2529398
    5. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10), 13–21. https://doi.org/10.22215/timreview835
    6. Duffy, B. M., & Duffy, V. G. (2020). Data mining methodology in support of a systematic review of human aspects of cybersecurity. In Lecture Notes in Computer Science (pp. 242–253). Springer International Publishing.
    7. Kemmerer, R. A. (2003). Cybersecurity. 25th International Conference on Software Engineering, 2003. Proceedings.
    8. Marcinkowski, S. J., & Stanton, J. M. (2003). Motivational aspects of information security policies. SMC’03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
    9. Patterson, W., & Winston-Proctor, C. E. (2019). Behavioral cybersecurity: Applications of personality psychology and computer science. CRC Press.
    10. Pritchard, A. (1969) Statistical Bibliography or Bibliometrics. Journal of Documentation, 25, 348-349.
    11. Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. The Journal of Digital Forensics Security and Law. https://doi.org/10.15394/jdfsl.2017.1476
    12. Smith, S. W. (2003). Humans in the loop: human-computer interaction and security. IEEE Security & Privacy, 1(3), 75–79. https://doi.org/10.1109/msecp.2003.1203228

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2023 Malque Publishing

How to cite

Sajikumar, S., & Ajithkumar, N. (2024). Understanding the emergence and significance of behavioral cybersecurity: A bibliometric analysis. Multidisciplinary Reviews, 6, 2023ss102. https://doi.org/10.31893/multirev.2023ss102
  • Article viewed - 73
  • PDF downloaded - 27