2020
DOI: 10.3897/jucs.2020.042
|View full text |Cite
|
Sign up to set email alerts
|

Bibliometric Mapping of Research on User Training for Secure Use of Information Systems

Abstract: Information systems are pervasive in organizations of all sizes. To use them securely, users must be properly trained. Because of the pervasiveness of information systems the number of scientific publications reporting on user training for secure use of information systems is increasing year by year. To overcome the issue of manually surveying such a vast body of knowledge and to keep up with research trends, we conducted bibliometric mapping of research on user training for secure use of information systems. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 46 publications
0
3
0
2
Order By: Relevance
“…Massive amounts of bibliographic data can now be managed by researchers without bias 16 . The scholarly discipline that pertains to the quantitative analysis of books and other literary works is commonly referred to as "bibliometrics" 24 . Bibliometrics is a field of study that seeks to describe the process of textual communication and its developmental patterns by utilizing the quantitative analysis of various communication features 18 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Massive amounts of bibliographic data can now be managed by researchers without bias 16 . The scholarly discipline that pertains to the quantitative analysis of books and other literary works is commonly referred to as "bibliometrics" 24 . Bibliometrics is a field of study that seeks to describe the process of textual communication and its developmental patterns by utilizing the quantitative analysis of various communication features 18 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the network visualization, there is an item. The size of this item indicates the number of publications (Fujs et al, 2020). In this network visualization, the keyword cooccurrence in VOSviewer was set at a minimum of two occurrences.…”
Section: 12countriesmentioning
confidence: 99%
“…Overlay visualization of keywords (Figure 8) indicates early and late appearances of keywords in publications (Fujs et al, 2020). Although the meritocracy item has the highest link and total link strength, the published article of this item is on average around the year 2018.…”
Section: 22overlay Visualizationmentioning
confidence: 99%
“…Pomanjkanje ustrezne informacijske varnosti lahko vodi v izgubo dobička in slab ugled organizacije (Roy Sarkar, 2010). Da bi dobili vpogled v dejansko stanje informacijske varnosti moramo implementirati ustrezne merilne mehanizme (Prislan et al, 2020), kot so kvantitativne in kvalitativne metrike (Fujs et al, 2020(Fujs et al, , 2019. Informacijska varnost se je tradicionalno zago-tavljala s pomočjo tehničnih varnostnih mehanizmov (kot so npr.…”
Section: Uvodunclassified
“…požarni zidovi), kljub temu, pa ne smemo zanemariti pomembnosti človeških vidikov zagotavljanja varnosti (Wiley et al, 2020). Da bi uporabniki z informacijskimi sistemi ravnali varno, morajo biti ustrezno usposobljeni, pri čemer pa univerzalni pristopi niso optimalni, saj ne upoštevajo varnostnih karakteristik posameznega uporabnika (Fujs et al, 2020).…”
Section: Uvodunclassified