42
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities

&
Pages 37-67 | Published online: 07 Jul 2014
 

Abstract

What are the key topics for Information Systems (IS) security researchers? How have these topics been changing, and what topics are emerging to offer new opportunities for research? We address these questions by analyzing the abstracts of 261 articles focusing on IS security that have appeared in leading IS journals and journals devoted to this area. Using Latent Semantic Analysis (LSA) to analyze the text of these abstracts uncovers five primary research topics: Security Design & Management, Business Operations Security, Behavioral Aspects, Authentication & Integrity Controls, and Prevention & Detection. These five primary topics are aggregates of more granular topics that are utilized to find trends to understand the changing complexion of IS security research. Our study contributes by developing the key topics and their trends in this area using an analytical and replicable method to synthesize the existing research.

Additional information

Notes on contributors

Roger Blake

Roger Blake is an Assistant Professor in the Management Science and Information Systems department of the College of Management at the University of Massachusetts Boston. His primary areas of interest are in data mining, data and information quality, text analysis, and business intelligence, and his research has appeared journals including Behaviour & Information Technology, Computers in Human Behavior, and the ACM Journal of Data and Information Quality. He holds an S.M. from the Massachusetts Institute of Technology and a Ph.D. from the University of Rhode Island.

Ramakrishna Ayyagari

Ramakrishna Ayyagari is an Assistant Professor in Information Systems at the University of Massachusetts at Boston. He earned his doctorate in management from Clemson University. His work has been published or forthcoming in outlets such as MIS Quarterly, European Journal of Information Systems, Journal of the AIS, Decision Sciences, Journal of Information Privacy & Security and the proceedings of various conferences.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.