Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022;2(1):4.
doi: 10.1007/s43545-021-00305-4. Epub 2022 Jan 6.

Research trends in cybercrime victimization during 2010-2020: a bibliometric analysis

Affiliations
Review

Research trends in cybercrime victimization during 2010-2020: a bibliometric analysis

Huong Thi Ngoc Ho et al. SN Soc Sci. 2022.

Abstract

Research on cybercrime victimization is relatively diversified; however, no bibliometric study has been found to introduce the panorama of this subject. The current study aims to address this research gap by performing a bibliometric analysis of 387 Social Science Citation Index articles relevant to cybercrime victimization from Web of Science database during the period of 2010-2020. The purpose of the article is to examine the research trend and distribution of publications by five main fields, including time, productive authors, prominent sources, active institutions, and leading countries/regions. Furthermore, this study aims to determine the global collaborations and current gaps in research of cybercrime victimization. Findings indicated the decidedly upward trend of publications in the given period. The USA and its authors and institutions were likely to connect widely and took a crucial position in research of cybercrime victimization. Cyberbullying was identified as the most concerned issue over the years and cyber interpersonal crimes had the large number of research comparing to cyber-dependent crimes. Future research is suggested to concern more about sample of the elder and collect data in different countries which are not only European countries or the USA. Cross-nation research in less popular continents in research map was recommended to be conducted more. This paper contributed an overview of scholarly status of cybercrime victimization through statistical evidence and visual findings; assisted researchers to optimize their own research direction; and supported authors and institutions to build strategies for research collaboration.

Keywords: Bibliometric analysis; Co-authorship analysis; Co-occurrence analysis; Cybercrime victimization; Web of science.

PubMed Disclaimer

Conflict of interest statement

Conflict of interestThe authors declare that they have no competing interest.

Figures

Fig. 1
Fig. 1
PRISMA diagram depicts data collection from WoS database
Fig. 2
Fig. 2
Annual distribution of publications
Fig. 3
Fig. 3
Top productive countries based on the number of publications
Fig. 4
Fig. 4
Collaboration among authors via network visualization (threshold three articles for an author, displayed 80 authors)
Fig. 5
Fig. 5
Collaboration among authors via network visualization (threshold three articles for an author, displayed 23 authors)
Fig. 6
Fig. 6
Collaboration among institutions via network visualization (threshold two articles for an institution, 156 institutions were displayed)
Fig. 7
Fig. 7
Collaboration among countries via overlay visualization
Fig. 8
Fig. 8
Co-occurrence between author keywords via network visualization (the minimum number of occurrences per word is seven, 36 keywords were displayed)

References

    1. Abdullah ATM, Jahan I. Causes of cybercrime victimization: a systematic literature review. Int J Res Rev. 2020;7(5):89–98.
    1. Al-Nemrat A, Benzaïd C (2015) Cybercrime profiling: Decision-tree induction, examining perceptions of internet risk and cybercrime victimisation. In: Proceedings—14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, vol 1, pp 1380–1385. 10.1109/Trustcom.2015.534
    1. Alalehto TI, Persson O. The Sutherland tradition in criminology: a bibliometric story. Crim Justice Stud. 2013;26(1):1–18. doi: 10.1080/1478601X.2012.706753. - DOI
    1. Algarni A, Xu Y, Chan T. An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook. Eur J Inf Syst. 2017;26(6):661–687. doi: 10.1057/s41303-017-0057-y. - DOI
    1. Altarturi HHM, Saadoon M, Anuar NB. Cyber parental control: a bibliometric study. Child Youth Serv Rev. 2020 doi: 10.1016/j.childyouth.2020.105134. - DOI

LinkOut - more resources