2023
DOI: 10.3390/fi15120393
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research

Thiago Poleto,
Thyago Celso Cavalcante Nepomuceno,
Victor Diogho Heuer de Carvalho
et al.

Abstract: This paper aims to analyze the intellectual structure and research fronts in application information security in smart cities to identify research boundaries, trends, and new opportunities in the area. It applies bibliometric analyses to identify the main authors and their influences on information security and the smart city area. Moreover, this analysis focuses on journals indexed in Scopus databases. The results indicate that there is an opportunity for further advances in the adoption of information securi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 364 publications
0
4
0
Order By: Relevance
“…At the organizational level, companies can use green ISs to reduce costs and enhance their market image. At the community level, smart cities employ green ISs to improve the quality of life for citizens by providing more efficient public services and addressing urban challenges by creating innovative solutions [11]. The multitude of interconnected mini-devices that provide rapid access to information and services comes with numerous benefits but also disadvantages such as resource consumption, CO 2 emissions, e-waste, and unknown effects on the health of citizens exposed to the invisible connections between devices.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…At the organizational level, companies can use green ISs to reduce costs and enhance their market image. At the community level, smart cities employ green ISs to improve the quality of life for citizens by providing more efficient public services and addressing urban challenges by creating innovative solutions [11]. The multitude of interconnected mini-devices that provide rapid access to information and services comes with numerous benefits but also disadvantages such as resource consumption, CO 2 emissions, e-waste, and unknown effects on the health of citizens exposed to the invisible connections between devices.…”
Section: Discussionmentioning
confidence: 99%
“…We deemed this approach suitable for finding answers to our questions as presented in the previous section. Bibliometric analysis uses statistical methods to evaluate the evolution of a particular research area [11]. It provides the opportunity to analyse a large number of publications, the correlations between concepts used in a specific domain, the most productive journals, countries, and authors, and the most popular themes and articles.…”
Section: Methodsmentioning
confidence: 99%
“…The importance of cyber security in the IoT layer is emphasized in the European Cyber Security strategy [21] as well as studies from both academic and international organizations [22,23]. Research from the literature on the standards, protocols, and technologies used in the IoT space further highlight the fragmentation of the landscape, which in turns introduces additional difficulties in implementing an effective strategy against cyber attacks [24][25][26][27]. Recent advances in the cyber threat mitigation strategies increasingly make use of statistical and machine learning methods, which rely on access to large datasets and real time information from the IoT layer [28][29][30][31].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Criminal databases belonging to police agencies may contain numerous texts that can describe detailed relationships between data such as the type of crime, suspects, victims, and locations so text mining tools aid in relationship discovery. Considering this context, the area of cybersecurity, aimed at combating incidents that could compromise the security of users of cyber systems, has a notable participation, providing strategic plans and tools to guarantee the integrity of systems and the information that flows through them [14].…”
Section: Introductionmentioning
confidence: 99%