4,930
Views
4
CrossRef citations to date
0
Altmetric
Review Article

Mapping the knowledge of national security in 21st century a bibliometric study

, , & ORCID Icon | (Reviewing editor)
Article: 1542944 | Received 09 Aug 2018, Accepted 16 Oct 2018, Published online: 04 Dec 2018

References

  • Alaimo, K., Olson, C. M., & Frongillo, E. A. (2001). Food insufficiency and american school-aged children’s cognitive, academic, and psychosocial development. Pediatrics, 108, 1.
  • Amoore, L. (2006). Biometric borders: Governing mobilities in the war on terror. Political Geography, 25(3), 336–351. doi:10.1016/j.polgeo.2006.02.001
  • Andrews, J., & Shabani, B. (2012). Re-envisioning the role of hydrogen in a sustainable energy economy. International Journal of Hydrogen Energy, 37(2), 1184–1203. doi:10.1016/j.ijhydene.2011.09.137
  • Anwar, M. A., & Rafique, Z. (2012). Defense spending and national security of Pakistan: A policy perspective. Democracy and Security, 8(4), 374–399. doi:10.1080/17419166.2012.739551
  • Ayoob, M. (1991). The Security Problematic of the Third World. World Politics, 43(2), 257–283. doi:10.2307/2010473
  • Azar, E. E., & Moon, C. (1988). National security in the third world : The management of internal and external threats. Aldershot: Edward Elgar.
  • Baldwin, D. A., & Baldwin, D. A. (1997). The concept of security *. Review of international studies, 19(1993), 5–26.
  • Bazilian, M., Rogner, H., Howells, M., Hermann, S., Arent, D., Gielen, D., … Yumkella, K. K. (2011). Considering the energy, water and food nexus : Towards an integrated modelling approach. Energy Policy, 39(12), 7896–7906. doi:10.1016/j.enpol.2011.09.039
  • Bethell, C. D., Read, D., Stein, R. E. K., Blumberg, S. J., Wells, N., & Newacheck, P. W. (2002). Identifying children with special health care needs: Development and evaluation of a short screening instrument. Ambulatory Pediatrics, 2(1), 38–48.
  • Bettencourt, L. M. A., & Kaur, J. (2011). Evolution and structure of sustainability science. Proceedings of the National Academy of Sciences of the United States of America, 108(49), 19540–19545. doi:10.1073/pnas.1102712108
  • Budd, J. M. (1988). A bibliometric analysis of higher education literature. Research in Higher Education, 28(2), 180–190.
  • Buzan, B. (1991). New Patterns of Global Security in the twenty-frst century. International Affairs, 67(3), 431–451. doi:10.2307/2621945
  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Political science. doi:10.1017/CBO9780511817762
  • Buzan, B., & Wæver, O. (2003). Regions and powers: The structure of international security. United States of America by Cambridge University Press, 190. doi:10.1017/CBO9781107415324.004
  • Buzan, B., Wæver, O., & Wilde, J. D. (1998). Security : A new framework for analysis. Boulder, Colo: Lynne Rienner Pub.
  • Chen, C. (2006). CiteSpace II : Detecting and visualizing emerging trends. Journal of the American Society for information Science and Technology, 57(3), 359–377. doi:10.1002/asi
  • Chen, C., Hu, Z., Liu, S., & Tseng, H. (2012). Emerging trends in regenerative medicine: A scientometric analysis in CiteSpace. Expert Opinion on Biological Therapy, 12(5), 593–608. doi:10.1517/14712598.2012.674507
  • Chen, C., & Ibekwe-Sanjuan, F. (2010). The structure and dynamics of cocitation clusters : A multiple-perspective cocitation analysis. Journal of the American Society for information Science and Technology, 61(7), 1386–1409. doi:10.1002/asi
  • Chen, D., Liu, Z., Luo, Z., Webber, M., & Chen, J. (2016). Bibliometric and visualized analysis of emergy research. Ecological Engineering, 90, 285–293.
  • Chen, J. (2007). Rapid urbanization in China: A real challenge to soil protection and food security. Catena, 69(1), 1–15. doi:10.1016/j.catena.2006.04.019
  • Coid, J., Yang, M., Ullrich, S., Roberts, A., Moran, P., Bebbington, P., … Hare, R. (2009). International journal of law and psychiatry psychopathy among prisoners in England and Wales ☆. International Journal of Law and Psychiatry, 32(3), 134–141. doi:10.1016/j.ijlp.2009.02.008
  • Elbe, S. (2006). Should HIV/AIDS be securitized? The ethical dilemmas of linking HIV/AIDS and security. International Studies Quaterly, 50(1), 119–144. doi:10.1111/j.1468-2478.2006.00395.x
  • Erar, A. (2002). Bibliometrics or informetrics: Displaying regularity in scientific patterns by using statistical distributions. Hacettepe Journal of Mathematics and Statistics, 31, 113–125.
  • Fairthrone, R. A. (1969). Empirical hyperbolic distributions (Bradford-Zipf-Mandelbrot) for bibliometric description and prediction. Journal of Documentation, 2(4), 319–343. doi:10.1108/eb026404
  • Fearon, J. D., & Laitin, D. D. (2001). Ethnicity, insurgency, and civil war ∗. American political science review, (April 2000), 75–89. doi:10.1017/S0003055403000534
  • Food and Agriculture Organization. (2002). The state of food insecurity in the world 2002 : Food insecurity : When people must live with hunger and fear starvation. Rome : Food and Agriculture Organization of the United Nations.
  • Foucault, M. (2007). Security, territory, population : Lectures at the Collège de France, 1977-78. (Arnold I. Davidson & G. Burchell, Eds.). Palgrave Macmillan.
  • Frost, A. (2007). The state secrets privilege and separation of powers. Fordham L. Rev., 75, 4.
  • Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., & Toulmin, C. (2010). Food security: The challenge of feeding 9 billion people. Science, 327(5967), 812–818. Retreived from https://doi.org/10.1126/science.1185383
  • Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., & Toulmin, C. (2010). Food security: The challenge of feeding 9 billion people. Science, 327(5967), 812–818.
  • Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., … Toulmin, C. (2012). The challenge of food security. Science, 327(February), 812. doi:10.4337/9780857939388
  • Greenwald, G. (2013). XKeyscore: NSA tool collects “nearly everything a user does on the internet” US news | The Guardian. Retrieved from https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
  • Gu, D., Li, J., Li, X., & Liang, C. (2017). Visualizing the knowledge structure and evolution of big data research in healthcare informatics. International Journal of Medical Informatics, 98, 22–32. Retreived from https://doi.org/10.1016/j.ijmedinf.2016.11.006
  • Hansen, L. (2000). The little mermaid’s silent security dilemma and the absence of gender in the copenhagen school. Millennium - Journal of International Studies, 29(2), 285–306. doi:10.1177/03058298000290020501
  • Harvey, D. (2005).The new imperialism. Oxford: Oxford University Press.
  • Hillyard, P. (1993). Suspect community : People’s experience of the prevention of terrorism acts in Britain. Pluto Press.
  • Katzenstein, P. J. (1996). The culture of national security: Norms and identity in world politics. Columbia University Press.
  • Khoury, C. K., Bjorkman, A. D., Dempewolf, H., Ramirez-Villegas, J., Guarino, L., Jarvis, A., … Struik, P. C. (2014). Increasing homogeneity in global food supplies and the implications for food security. Proceedings of the National Academy of Sciences, 111(11), 4001–4006. doi:10.1073/pnas.1313490111
  • Kirkpatrick, S. I., & Tarasuk, V. (2008). Food insecurity is associated with nutrient inadequacies among canadian adults and adolescents. The Journal of Nutrition, 138(3), 604–612.
  • Kruyt, B., van Vuuren, D. P., de Vries, H. J. M., & Groenenberg, H. (2009). Indicators for energy security. Energy Policy, 37(6), 2166–2181. doi:10.1016/j.enpol.2009.02.006
  • Lasswell, H. D. (1936). Politics who gets what, when, how. McGraw Hill. Retrieved from http://www.policysciences.org/classics/politics.pdf
  • Li, K., Gao, P., Xiang, P., Zhang, X., Cui, X., & Ma, L. Q. (2016). Molecular mechanisms of PFOA-induced toxicity in animals and humans: Implications for health risks. Environment International. Retreived from https://doi.org/10.1016/j.envint.2016.11.014
  • Li, X., Ma, E., & Qu, H. (2017). Knowledge mapping of hospitality research ? A visual analysis using CiteSpace. International Journal of Hospitality Management, 60, 77–93. doi:10.1016/j.ijhm.2016.10.006
  • Lipp, J. (2007). Lessons for effective renewable electricity policy from denmark, germany and the united kingdom. Energy Policy, 35(11), 5481–5495. doi:10.1016/J.ENPOL.2007.05.015
  • Lippmann, W. (1943). U.S. foreign policy: Shield of the republic. Walter Lippmann: Amazon.com: Books. Little, Brown & Company.
  • Liu, Z., Yin, Y., Liu, W., & Dunford, M. (2015). Visualizing the intellectual structure and evolution of innovation systems research: A bibliometric analysis. Scientometrics, 103(1), 135–158. doi:10.1007/s11192-014-1517-y
  • Lobell, D. B., Burke, M. B., Tebaldi, C., Mastrandrea, M. D., Falcon, W. P., & Naylor, R. L. (2008). Prioritizing climate change adaptation needs for food security in 2030. Science (New York, N.Y.), 319(5863), 607–610. doi:10.1126/science.1152339
  • Mcculloch, J., & Pickering, S. (2009). Pre-crime and counter-terrorism imagining future crime in the “ War on terror. The British Journal of Criminology, (May), 628–645. doi:10.1093/bjc/azp023
  • Mcdonald, M. (2008). Securitization and the construction of security. European journal of international relations, 14(4), 563–587. doi:10.1177/1354066108097553
  • Meltzer, H., Bebbington, P., Brugha, T., Jenkins, R., Mcmanus, S., & Stansfeld, S. (2010). Job insecurity. Socio-Economic Circumstances and Depression, 1401–1407. doi:10.1017/S0033291709991802
  • Morris, T., & Morris, T. (2012). Police practice and research : An achieving national security : Comparing four state security models Achieving national security : Comparing four state security models. Police Practice and Research, (December 2014), 37–41. doi:10.1080/15614263.2011.596689
  • Overland, S., Dahl, A. A., Ph, D., Krokstad, S., Ph, D., Bjerkeset, O., … Psych, M. R. C. (2006). A population-based cohort study of the effect of common mental disorders on disability pension awards. American journal of Psychiatry, (August), 1412–1418.
  • Paleri, P. (2008). National security : Imperatives and challenges. New Delhi: Tata McGraw-Hill Pub. Co.
  • Pantazis, C., & Pemberton, S. (2009). From the “ old ” to the “ new ” suspect community examining the impacts of recent UK counter-terrorist legislation. British Journal of Criminology, 646–666. doi:10.1093/bjc/azp031
  • Pao, M. L. (1985). Lotka’s law: A testing procedure. Information Processing and Management, 21(4), 305–320. doi:10.1016/0306-4573(85)90055-X
  • Perls, T. T., Wilmoth, J., Levenson, R., Drinkwater, M., Cohen, M., Bogan, H., … Puca, A. (2002). Life-long sustained mortality advantage of siblings of centenarians, (Track II).
  • Piantadosi, S. T. (2014). Zipf’s word frequency law in natural language: A critical review and future directions. Psychonomic Bulletin\& Review, 21(5), 1112–1130. doi:10.3758/s13423-014-0585-6
  • Pozen, D. E. (2005). The Mosaic theory, national security, and the freedom of information act. Yale Law Journal, 628–679.
  • Romm, J. J. (1993). Defining national security : The nonmilitary aspects. Council on Foreign Relations Press.
  • Ross, M. L. (2001). Does oil hinder democracy? World politics, 53(3), 325–361. doi:10.1353/wp.2001.0011
  • Rudel, T. K., Schneider, L., Uriarte, M., Turner, B. L., Defries, R. S., Lawrence, D., … Grau, R. (2009). Agricultural intensification and changes in cultivated areas, 1970-2005. Proceedings of the National Academy of Sciences of the United States of America, 106(49), 20675–20680. doi:10.1073/pnas.0812540106
  • Safran, C., Bloomrosen, M., Hammond, W. E., Labkoff, S., Markel-Fox, S., & Tang, P. C. (2007). Toward a national framework for the secondary use of health data: An American Medical Informatics Association White Paper. Journal of the American Medical Informatics Association : JAMIA, 14(1),1–9. Retreived from https://doi.org/10.1197/jamia.M2273
  • Schmidhuber, J., & Tubiello, F. N. (2007). Global food security under climate change. Proceedings of the National Academy of Sciences of the United States of America, 104(50), 19703–19708. doi:10.1073/pnas.0701976104
  • Seligman, H. K., Bindman, A. B., Vittinghoff, E., Kanaya, A. M., & Kushel, M. B. (2007). Food insecurity is associated with diabetes mellitus: Results from the National Health Examination and Nutrition Examination Survey (NHANES) 1999-2002. Journal of General Internal Medicine, 22(7), 1018–1023. doi:10.1007/s11606-007-0192-6
  • Seligman, H. K., Bindman, A. B., Vittinghoff, E., Kanaya, A. M., & Kushel, M. B. (2007). Food insecurity is associated with diabetes mellitus: Results from the national health examination and nutrition examination survey (nhanes) 1999-2002. Journal of General Internal Medicine, 22(7), 1018–23. doi:10.1007/s11606-007-0192-6
  • Seligman, H. K., Laraia, B. A., & Kushel, M. B. (2009). Food insecurity is associated with chronic disease among low-income. The Journal of Nutrition\, 140, 304–310. doi:10.3945/jn.109.112573.number
  • Seyedghorban, Z., Matanda, M. J., & LaPlaca, P. (2016). Advancing theory and knowledge in the business-to-business branding literature. Journal of Business Research, 69(8), 2664–2677. doi:10.1016/j.jbusres.2015.11.002
  • Shiau, C. S. N., Samaras, C., Hauffe, R., & Michalek, J. J. (2009). Impact of battery weight and charging patterns on the economic and environmental benefits of plug-in hybrid vehicles. Energy Policy, 37(7), 2653–2663. doi:10.1016/j.enpol.2009.02.040
  • Shiau, W.-L. (2015). The intellectual core of enterprise information systems: A co-citation analysis. Enterprise Information Systems, 7575(March), 1–30. doi:10.1080/17517575.2015.1019570
  • Smith, S. (1999). The increasing insecurity of security studies: Conceptualizing security in the last twenty years. Contemporary Security Policy, 20(3), 72–101.
  • Sparke, M. B. (2006). A neoliberal nexus: Economy, security and the biopolitics of citizenship on the border. Political Geography, 25(2), 151–180. doi:10.1016/j.polgeo.2005.10.002
  • Stolle, D., Soroka, S., & Johnston, R. (2008). When does diversity erode trust? Neighborhood diversity, interpersonal trust and the mediating effect of social interactions. Political Studies, 56(1), 57–75. doi:10.1111/j.1467-9248.2007.00717.x
  • Stone, M. (2009). Security according to Buzan: A comprehensive security analysis. Security Discussion Papers. Series 1 edn. Grouped’ Etudesetd’ Expertise “Sécuritéet Technologies” GEEST-2009. New York
  • Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and Beyond. European Journal of International Relations, 13(3), 357–383. doi:10.1177/1354066107080128
  • Topalli, M., & Ivanaj, S. (2016). Mapping the evolution of the impact of economic transition on Central and Eastern European enterprises: A co-word analysis. Journal of World Business, 51(5), 744–759. doi:10.1016/j.jwb.2016.06.003
  • Turner, B. S. (2001). The erosion of citizenship. British Journal of Sociology, 2(52), 189–209. doi:10.1080/00071310120044944
  • Wæver, O. (1993). Securitization and desecuritization. Copenhagen: Centre for Peace and Conflict Research.
  • Wang, Y., Lai, N., Zuo, J., Chen, G., & Du, H. (2016). Characteristics and trends of research on waste-to-energy incineration: A bibliometric analysis, 1999–2015. Renewable and Sustainable Energy Reviews, 66, 95–104. doi:10.1016/j.rser.2016.07.006
  • Waxman, M. C. (2012). National security federalism in the age of terror | stanford law review. Stanford Law Review, 64, 2.
  • Web of Science. (2016). The citaton connection - real facts - ip & science - thomson reuters.United Kingdom : Clarivate Analytics
  • White, H. D., & Griffith, B. C. (1981). Author cocitation: A literature measure of intellectual structure. Journal of the American Society for Information Science, 32(3), 163–171. doi:10.1002/asi.4630320302
  • Wolfers, A. (1952). National security as an ambiguous symbol. Political Science Quarterly, 67(4), 481.
  • Yang, H., & Li, X. (2000). Cultivated land and food supply in China. Land Use Policy, 17(2), 73–88. doi:10.1016/S0264-8377(00)00008-9