How to identify emerging research fields using scientometrics: An example in the field of Information Security

In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the natio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Scientometrics 2008-09, Vol.76 (3), p.503-525
1. Verfasser: Lee, Woo Hyoung
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 525
container_issue 3
container_start_page 503
container_title Scientometrics
container_volume 76
creator Lee, Woo Hyoung
description In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security field, we presented a variety of technology mapping. The results showed that the Information Security field has some established research theme and also rapidly transforms to embrace new themes.
doi_str_mv 10.1007/s11192-007-1898-2
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_57702969</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>57702969</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-10642ac5f26de88b500f3fb0eb94fc4856267664d5f015a793cdbd99ef7c33b43</originalsourceid><addsrcrecordid>eNp9kE9v1DAQxa0KpC6lH6A3X8otxX8Sx-ZWVUArVeIAnC3HGW9dJfbiSQT77etVqh45zdPM7z1pHiFXnN1wxvrPyDk3oqmy4droRpyRHe90FVrxd2THuNSN4ZKdkw-Iz6yCkukdSff5L10yjSOkJYYjhRnKPqY9LYDgin-iIcI0Il3xtEUfK5hnWEr0-IXeJgr_3HyYgMZElyfYcJoDfUghl9ktMSf6E_xa4nL8SN4HNyFcvs4L8vvb1193983jj-8Pd7ePjZetWRrOVCuc74JQI2g9dIwFGQYGg2mDb3WnhOqVascuMN653kg_DqMxEHov5dDKC_Jpyz2U_GcFXOwc0cM0uQR5Rdv1PRNGmQryDfQlIxYI9lDi7MrRcmZPzdqtWXuSp2atqJ7r13CH3k2huOQjvhkFU0JLwSonNg7rKe2h2Oe8llT__k_4C_jcigM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>57702969</pqid></control><display><type>article</type><title>How to identify emerging research fields using scientometrics: An example in the field of Information Security</title><source>SpringerNature Journals</source><creator>Lee, Woo Hyoung</creator><creatorcontrib>Lee, Woo Hyoung</creatorcontrib><description>In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security field, we presented a variety of technology mapping. The results showed that the Information Security field has some established research theme and also rapidly transforms to embrace new themes.</description><identifier>ISSN: 0138-9130</identifier><identifier>EISSN: 1588-2861</identifier><identifier>DOI: 10.1007/s11192-007-1898-2</identifier><identifier>CODEN: SCNTDX</identifier><language>eng</language><publisher>Dordrecht: Springer Netherlands</publisher><subject>Bibliometrics. Scientometrics ; Bibliometrics. Scientometrics. Evaluation ; Computer Science ; Data security ; Exact sciences and technology ; Information and communication sciences ; Information science. Documentation ; Information Storage and Retrieval ; Library and information science. General aspects ; Library Science ; Scholarly publishing ; Sciences and techniques of general use ; Scientometrics</subject><ispartof>Scientometrics, 2008-09, Vol.76 (3), p.503-525</ispartof><rights>Springer Science+Business Media B.V. 2008</rights><rights>2009 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-10642ac5f26de88b500f3fb0eb94fc4856267664d5f015a793cdbd99ef7c33b43</citedby><cites>FETCH-LOGICAL-c349t-10642ac5f26de88b500f3fb0eb94fc4856267664d5f015a793cdbd99ef7c33b43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11192-007-1898-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11192-007-1898-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=20628320$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Lee, Woo Hyoung</creatorcontrib><title>How to identify emerging research fields using scientometrics: An example in the field of Information Security</title><title>Scientometrics</title><addtitle>Scientometrics</addtitle><description>In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security field, we presented a variety of technology mapping. The results showed that the Information Security field has some established research theme and also rapidly transforms to embrace new themes.</description><subject>Bibliometrics. Scientometrics</subject><subject>Bibliometrics. Scientometrics. Evaluation</subject><subject>Computer Science</subject><subject>Data security</subject><subject>Exact sciences and technology</subject><subject>Information and communication sciences</subject><subject>Information science. Documentation</subject><subject>Information Storage and Retrieval</subject><subject>Library and information science. General aspects</subject><subject>Library Science</subject><subject>Scholarly publishing</subject><subject>Sciences and techniques of general use</subject><subject>Scientometrics</subject><issn>0138-9130</issn><issn>1588-2861</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNp9kE9v1DAQxa0KpC6lH6A3X8otxX8Sx-ZWVUArVeIAnC3HGW9dJfbiSQT77etVqh45zdPM7z1pHiFXnN1wxvrPyDk3oqmy4droRpyRHe90FVrxd2THuNSN4ZKdkw-Iz6yCkukdSff5L10yjSOkJYYjhRnKPqY9LYDgin-iIcI0Il3xtEUfK5hnWEr0-IXeJgr_3HyYgMZElyfYcJoDfUghl9ktMSf6E_xa4nL8SN4HNyFcvs4L8vvb1193983jj-8Pd7ePjZetWRrOVCuc74JQI2g9dIwFGQYGg2mDb3WnhOqVascuMN653kg_DqMxEHov5dDKC_Jpyz2U_GcFXOwc0cM0uQR5Rdv1PRNGmQryDfQlIxYI9lDi7MrRcmZPzdqtWXuSp2atqJ7r13CH3k2huOQjvhkFU0JLwSonNg7rKe2h2Oe8llT__k_4C_jcigM</recordid><startdate>20080901</startdate><enddate>20080901</enddate><creator>Lee, Woo Hyoung</creator><general>Springer Netherlands</general><general>Springer</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>E3H</scope><scope>F2A</scope></search><sort><creationdate>20080901</creationdate><title>How to identify emerging research fields using scientometrics: An example in the field of Information Security</title><author>Lee, Woo Hyoung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-10642ac5f26de88b500f3fb0eb94fc4856267664d5f015a793cdbd99ef7c33b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Bibliometrics. Scientometrics</topic><topic>Bibliometrics. Scientometrics. Evaluation</topic><topic>Computer Science</topic><topic>Data security</topic><topic>Exact sciences and technology</topic><topic>Information and communication sciences</topic><topic>Information science. Documentation</topic><topic>Information Storage and Retrieval</topic><topic>Library and information science. General aspects</topic><topic>Library Science</topic><topic>Scholarly publishing</topic><topic>Sciences and techniques of general use</topic><topic>Scientometrics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Woo Hyoung</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><jtitle>Scientometrics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Woo Hyoung</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>How to identify emerging research fields using scientometrics: An example in the field of Information Security</atitle><jtitle>Scientometrics</jtitle><stitle>Scientometrics</stitle><date>2008-09-01</date><risdate>2008</risdate><volume>76</volume><issue>3</issue><spage>503</spage><epage>525</epage><pages>503-525</pages><issn>0138-9130</issn><eissn>1588-2861</eissn><coden>SCNTDX</coden><abstract>In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security field, we presented a variety of technology mapping. The results showed that the Information Security field has some established research theme and also rapidly transforms to embrace new themes.</abstract><cop>Dordrecht</cop><pub>Springer Netherlands</pub><doi>10.1007/s11192-007-1898-2</doi><tpages>23</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0138-9130
ispartof Scientometrics, 2008-09, Vol.76 (3), p.503-525
issn 0138-9130
1588-2861
language eng
recordid cdi_proquest_miscellaneous_57702969
source SpringerNature Journals
subjects Bibliometrics. Scientometrics
Bibliometrics. Scientometrics. Evaluation
Computer Science
Data security
Exact sciences and technology
Information and communication sciences
Information science. Documentation
Information Storage and Retrieval
Library and information science. General aspects
Library Science
Scholarly publishing
Sciences and techniques of general use
Scientometrics
title How to identify emerging research fields using scientometrics: An example in the field of Information Security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T20%3A19%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=How%20to%20identify%20emerging%20research%20fields%20using%20scientometrics:%20An%20example%20in%20the%20field%20of%20Information%20Security&rft.jtitle=Scientometrics&rft.au=Lee,%20Woo%20Hyoung&rft.date=2008-09-01&rft.volume=76&rft.issue=3&rft.spage=503&rft.epage=525&rft.pages=503-525&rft.issn=0138-9130&rft.eissn=1588-2861&rft.coden=SCNTDX&rft_id=info:doi/10.1007/s11192-007-1898-2&rft_dat=%3Cproquest_cross%3E57702969%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=57702969&rft_id=info:pmid/&rfr_iscdi=true