Class information for:
Level 1: COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
36 3       COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS 110484
1587 2             DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION 7461
8097 1                   COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT 1316

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 COMPUTERS & SECURITY journal 1354423 20% 21% 269
2 INFORMATION SECURITY authKW 1227769 15% 26% 200
3 INFORMATION SECURITY MANAGEMENT authKW 728460 3% 78% 39
4 INFORMATION SYSTEMS SECURITY authKW 544303 2% 78% 29
5 INFORMATION SECURITY POLICY authKW 463614 2% 88% 22
6 GRAPHICAL PASSWORD authKW 386338 2% 73% 22
7 INFORMATION SECURITY AWARENESS authKW 364247 1% 89% 17
8 INFORMATION SECURITY CULTURE authKW 239473 1% 100% 10
9 IS SECURITY authKW 238058 1% 76% 13
10 PASSWORDS authKW 208215 2% 43% 20

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Information Systems 54491 53% 0% 698
2 Information Science & Library Science 19288 19% 0% 251
3 Computer Science, Software Engineering 8806 19% 0% 252
4 Management 5495 14% 0% 190
5 Computer Science, Hardware & Architecture 3680 10% 0% 127
6 Computer Science, Theory & Methods 3675 15% 0% 197
7 Computer Science, Cybernetics 2054 4% 0% 50
8 Ergonomics 1736 3% 0% 46
9 Operations Research & Management Science 671 6% 0% 73
10 Computer Science, Artificial Intelligence 530 6% 0% 77

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 IS SECUR 153260 1% 80% 8
2 STAND BANK INFORMAT TECHNOL 95789 0% 100% 4
3 TUCKS GLASSMEYER MCNAMEE DIGITAL STRATEGIES 71842 0% 100% 3
4 INFORMAT SECUR NETWORK GRP 53880 0% 75% 3
5 INFORMAT PROC SCI 53662 1% 12% 19
6 COMMAND CONTROL INFORMAT WARFARE 47895 0% 100% 2
7 MANAGEMENT TECHNOL SECUR 47895 0% 100% 2
8 SYST COMP TECHNOL 47895 0% 100% 2
9 INFORMAT CYBER SECUR 35918 0% 50% 3
10 INFORMAT TECHNOL OPERAT MANAGEMENT 28156 1% 12% 10

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 COMPUTERS & SECURITY 1354423 20% 21% 269
2 IEEE SECURITY & PRIVACY 121218 4% 9% 58
3 JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 24852 2% 4% 27
4 MIS QUARTERLY 18394 2% 3% 30
5 COMMUNICATIONS OF THE ACM 15746 4% 1% 53
6 JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING 13740 1% 6% 9
7 EUROPEAN JOURNAL OF INFORMATION SYSTEMS 12210 2% 3% 20
8 INFORMATION & MANAGEMENT 11516 2% 2% 30
9 INFORMATION SYSTEMS RESEARCH 10583 1% 2% 19
10 DECISION SUPPORT SYSTEMS 10309 3% 1% 34

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 INFORMATION SECURITY 1227769 15% 26% 200 Search INFORMATION+SECURITY Search INFORMATION+SECURITY
2 INFORMATION SECURITY MANAGEMENT 728460 3% 78% 39 Search INFORMATION+SECURITY+MANAGEMENT Search INFORMATION+SECURITY+MANAGEMENT
3 INFORMATION SYSTEMS SECURITY 544303 2% 78% 29 Search INFORMATION+SYSTEMS+SECURITY Search INFORMATION+SYSTEMS+SECURITY
4 INFORMATION SECURITY POLICY 463614 2% 88% 22 Search INFORMATION+SECURITY+POLICY Search INFORMATION+SECURITY+POLICY
5 GRAPHICAL PASSWORD 386338 2% 73% 22 Search GRAPHICAL+PASSWORD Search GRAPHICAL+PASSWORD
6 INFORMATION SECURITY AWARENESS 364247 1% 89% 17 Search INFORMATION+SECURITY+AWARENESS Search INFORMATION+SECURITY+AWARENESS
7 INFORMATION SECURITY CULTURE 239473 1% 100% 10 Search INFORMATION+SECURITY+CULTURE Search INFORMATION+SECURITY+CULTURE
8 IS SECURITY 238058 1% 76% 13 Search IS+SECURITY Search IS+SECURITY
9 PASSWORDS 208215 2% 43% 20 Search PASSWORDS Search PASSWORDS
10 INFORMATION SECURITY GOVERNANCE 206968 1% 79% 11 Search INFORMATION+SECURITY+GOVERNANCE Search INFORMATION+SECURITY+GOVERNANCE

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 27314 PHISHING//ANTI PHISHING//PHISHING ATTACKS
2 26816 ATTACK GRAPH//SECURITY METRICS//ATTACK TREES
3 29924 CROSS SITE SCRIPTING//SQL INJECTION ATTACK//SQL INJECTION
4 27015 KEYSTROKE DYNAMICS//MOUSE DYNAMICS//CONTINUOUS AUTHENTICATION
5 37108 COMP IND ENGN//CO WORKERS AFFLUENCE//CRITICAL SUCCESSFUL FACTORS CSF
6 23671 CYBERLOAFING//CYBERSLACKING//NON WORK RELATED COMPUTING
7 12401 INFORMATION PRIVACY//PRIVACY CONCERN//PRIVACY CALCULUS
8 29557 72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION
9 26843 CYBER WAR//CYBER CONFLICT//STRATEGIC THEORY
10 23479 FEAR APPEALS//THREAT APPEALS//PROTECTION MOTIVATION

Go to start page