PhD Researcher, Sumy State University, Ukraine
Issues of national security are of particular scientific interest because without it. It is impossible to imagine the existence of any state. Protecting the economic and social interests of the population has long been one of the prerogatives of public policy, which has expanded to information security of the people in the face of rapid digitalization of all spheres of life and the introduction of information attack as a new form of weapon. In this context, it is essential to conduct a thorough study of primary scientific papers on economic, social and information security. In this work, it is proposed to use quantitative and qualitative bibliometric analysis methods, which allows to identify the main trends and form a basis for further research. The information basis for this work was the international scientometric database Scopus and SciVal by Elsevier, which allows you to analyze bibliographic data using built-in tools and import them for external use in the software VOSviewer. Bibliographic information is presented from the 1930s to June 2021. The results show that in the world, the most researched is the topic of first, social, second, information, and third, economic security. At the same time, these studies are interdisciplinary, mainly at the intersection of economic and social sciences and information security at the intersection of economic and mathematical, computer sciences. The analysis of time trends changes the number of scientific papers on economic, social and information security in Scopus database shows their gradual growth. In contrast, information security has the fastest growth rate. The study of geographical trends shows that economic security research occurs mainly in the United States, the Russian Federation and Ukraine (the funding of research confirms this at the expense of the relevant ministries and foundations). Social security is mostly studied in English-speaking and European countries (United States, United Kingdom, Germany). Information security research is concentrated in English-speaking (United States, United Kingdom) and China, India. The qualitative bibliographic analysis allowed to analyze the most cited, and hence the trend works on selected topics, confirming the multidisciplinary nature of the work. In addition, a cluster analysis of co-occurrence of keywords was coducted, which formed clusters devoted to social, economic, socio-psychological, legal and other issues.
Keywords: economic security, social security, information security, bibliometric analysis, scientometric Scopus database, SciVal database.
JEL Classification: A13, F52.
Cite as: Novikov V. (2021). Bibliometric Analysis of Economic, Social and Information Security Research. SocioEconomic Challenges, 5(2), 120-128. https://doi.org/10.21272/sec.5(2).120-128.2021
This work is licensed under a Creative Commons Attribution 4.0 International License
- Anderson, J. R. (2018). Concepts of food stability in food security. In: Ferranti, P., Berry, E., Anderson, J.R. (Eds.), Encyclopedia of Food Security and Sustainability. Elsevier, Oxford. Available at: [CrossRef].
- Ariely, D., Loewenstein, G., & Prelec, D. (2003). “Coherent arbitrariness”: Stable demand curves without stable preferences. Quarterly Journal of Economics, 118(1), 73-105. Available at: [CrossRef].
- Barro, R. J. (1974). Are government bonds net wealth? Journal of Political Economy, 82(6), 1095-1117. Available at: [CrossRef].
- Becker, G. S., & Barro, R. J. (1988). A reformulation of the economic theory of fertility. Quarterly Journal of Economics, 103(1), 1-25. Available at: [CrossRef].
- Botero, J. C., Djankov, S., La Porta, R., Lopez-De-Silanes, F., & Shleifer, A. (2004). The regulation of labor. Quarterly Journal of Economics, 119(4), 1339-1382. Available at: [CrossRef].
- Bouchetara, M., Nassour, A., Eyih, S. (2020). Macroprudential policy and financial stability, role and tools. Financial Markets, Institutions and Risks, 4(4), 45-54. Available at: [CrossRef].
- Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, 34(SPEC. ISSUE 3), 523-548. Available at: [CrossRef].
- Datta, P. B., & Gailey, R. (2012). Empowering women through social entrepreneurship: Case study of a women’s cooperative in India. Entrepreneurship: Theory and Practice, 36(3), 569-587. Available at: [CrossRef].
- Holmes, K. R. (2015). What Is National Security? Index of U.S. Military Strength. The Heritage foundation, 17-26. Available at: [Link].
- Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information s ecurity behaviors: An empirical study. MIS Quarterly: Management Information Systems, 34(SPEC. ISSUE 3), 549-566. Available at: [CrossRef].
- Madrian, B. C., & Shea, D. F. (2001). The power of suggestion: Inertia in 401(k) participation and savings behavior. Quarterly Journal of Economics, 116(4), 1149-1187. Available at: [CrossRef].
- Musa A. Subeh, Boychenko V. (2018). Causes, Features and Consequences of Financial Crises: a retrospective cross-country analysis. Financial Markets, Institutions and Risks, 2(2), 111-122. Available at: [CrossRef].
- Osberg, L., & Sharpe, A. (2002). An index of economic well-being for selected OECD countries. Review of Income and Wealth, 48(3), 291-316. Available at: [CrossRef].
- Partha, D., & David, P. A. (1994). Toward a new economics of science. Research Policy, 23(5), 487-521. Available at: [CrossRef].
- Pavlou, P. A., Huigang, L., & Yajiong, X. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly: Management Information Systems, 31(1), 105-135. Available at: [CrossRef].
- Peng, W., Berry, E.M. (2019). The Concept of Food Security. In: Ferranti, P., Berry,E.M., Anderson, J.R. (Eds.), Encyclopedia of Food Security and Sustainability, vol. 2,pp. 1–7. Elsevier. Available at: [CrossRef].
- Salihaj, T., Pryimenko, S. (2017). Modification of the International Energy Agency Model (the IEA Model of Short-term Energy Security) for Assessing the Energy Security of Ukraine. SocioEconomic Challenges, 1(4), 95-103. Available at: [CrossRef].
- Schuler, S. R., Hashemi, S. M., & Riley, A. P. (1997). The influence of women’s changing roles and status in bangladesh’s fertility transition: Evidence from a study of credit programs and contraceptive use. World Development, 25(4), 563-575. Available at: [CrossRef].
- Shiller, R. J. (2009). The new financial order: Risk in the 21st century. The new financial order: Risk in the 21st century (pp. 1-366) Available at: [Link].
- Straub Jr., D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255-276. Available at: [CrossRef].
- Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly: Management Information Systems, 22(4), 441-464. Available at: [CrossRef].
- Van Eck N.J., Waltman L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. Available at: [CrossRef].
- Yarovenko, H., Kuzmenko, O., Stumpo, M. (2020). Strategy for Determining Country Ranking by Level of Cybersecurity. Financial Markets, Institutions and Risks, 4(3), 124-137. Available at: [CrossRef].
- Ziabina, Ye., Pimonenko, T., Starchenko, L. (2020). Energy Efficiency Of National Economy: Social, Economic And Ecological Indicators. SocioEconomic Challenges, 4(4), 160-174. Available at: [CrossRef].
- Zurlini, G., Mu ̈ller, F. (2008). Environmental Security. In Sven Erik Jørgensen and Brian D. Fath (Editor-in-Chief), Systems Ecology. Vol.  of Encyclopedia of Ecology,5 vols. pp. 1350-1356. Oxford: Elsevier. Available at: [CrossRef].