Analyzing Social Engineering Research through Co-authorship Networks Using Scopus Database during ۱۹۲۶-۲۰۲۰

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 171

This Paper With 33 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_DCM-3-1_001

تاریخ نمایه سازی: 6 فروردین 1401

Abstract:

Purpose: Hacking the human brain and manipulating human trust to obtain information and get monetary gains is called social engineering. This study aims to visualize and analyze the co-authorship networks in the Scopus citation database's social engineering research from ۱۹۲۶ to ۲۰۲۰. Method: The present quantitative study used the bibliometric method and social network analysis. The study collected data from the Scopus database. A total number of ۱۹۹۴ records were taken as the sample of the study. Researchers used descriptive and inferential statistics and social network analysis to obtain results; to do this, different software types were used in the study (SPSS, Microsoft Excel, Text Statistics Analyzer, ISI.exe, Pajek, and VOSviewer). Findings: The findings indicate the top three sources of publishing and the related subject areas. Furthermore, the top three core authors and countries were identified. Also, the authors with high centrality measures in the co-authorship networks were identified. A large majority of papers had only one author. The Collaborative Coefficient among researchers was ۰.۳۶. Based on the results of Spearman's test, there was a significant association between the number of documents, the number of citations, and the rate of total link strength of the countries. Likewise, there was a positive and high significant association between degree and closeness centralities. Conclusion: The researchers' frequently used keywords in this area were social engineering, phishing, and information security; in addition, the frequency of keywords was not compatible with Zipf’s Law. A small sample of keywords will not properly follow Zipf’s distribution.

Authors

Leila Khalili

Azarbaijan Shahid Madani University

Nayana Darshani Wijayasundara

University of Sri Jayewardenepura,Nugegoda, Sri Lanka