期刊论文详细信息
Iranian Journal of Information Processing & Management
Visualization and Analysis of Conceptual Network of Information Security
Nadjla Hariri1  Adeleh Ahangar2  Maryam Khademi3  Fahimeh Babalhavaeji4  Molouk Sadat Hosseini Beheshti5 
[1] Communication and Knowledge Sciences;Science and Research Branch;Department of Science and Research Branch;Islamic Azad University;Theran, Iran;
关键词: optimal search engines;    conceptual network;    co-word analysis;    information security;    information clustering;    information visualization;   
DOI  :  
来源: DOAJ
【 摘 要 】

Nowadays, with the expansion of semantic web services, the need of search engines for conceptual networks and domain ontology to infer semantically from user queries and to retrieve optimal (accurate and relevant) information has also increasedThe present study is an applied research aiming to analyze the conceptual network of “Information security”, which its domain structure was discovered using a mixed method of co-word and social networks analysis. The statistical society included 10227 scientific documents (books and international journal and conference papers) which was searched on Scopus and Web of Science citation databases from 2013 to 2017. After preprocessing keywords and tags by Zotero, an extension of the Firefox web-browser, Excel was used to match 8 prominent information security glossaries. Gephi and VOSviewer were used to visualize and analyze the conceptual network. By analyzing 19648 keywords and tags, a total of 207 keywords were extracted from the last edition of the information security glossary. The results showed that this network includes 14 clusters, of which 5 are mature, 7 are half-mature, and 2 are immature, and it was sufficiently coherent and dense. The most important concepts of this network with the highest betweenness centrality are “Security”, “Information Security”, “Information Systems”, “Privacy”, “Information” “Telecommunication, “Encryption” and “Cryptography”, “Authentication”, “Cyber security”, “Network”, “Cloud Computing”, “Security Attacks”, “Access Control”, “Intrusion Detection Systems (IDS)”, “Security Protocols”, “Risk”, “Risk Management and its Frameworks”, and “Service Level Agreement (SLA)”. These concepts are directly inter-related and connected.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次