77 research outputs found

    Scientometric dimensions of cryptographic research

    Get PDF
    Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard the digital information assets as well as to defend the invasion of privacy in modern information society, and likely to have far reaching impact on national security policies. This paper demonstrates the intellectual development of cryptographic research based on quantifiable characteristics of scholarly publications over a decade of the present century (2001 to 2010). The study critically examines the publication growth, authorship pattern, collaboration trends, and predominant areas of research in cryptology. Rank list of prolific contributors, productive institutions, and predominant countries have been carried out using fractional counting method. Strenuous efforts have been made to perform the activity index (performance indicator) of JOC, to determine the degree of collaboration in quantitative terms, to ascertain the collaboration density, as well as to test the empirical validation of Lotka’s law in this scientific specialty. Major findings reveal that performance of JOC in cryptographic research corresponds precisely to the growth of world’s publication activity (activity index = 1.1) over a decade of time; single-authored papers count only 25 % and average authorship accounts for 2.4 per paper; an increasing trend of multi-authored publications and a significant degree of collaboration (DC = 0.74) implies that cryptographers prefer to work in highly collaborative manner; author productivity distribution data partially fits the Lotka’s law, when the value of α (productivity parameter) approximated to 2.35 (instead of 2) and the number of articles does not exceed two. While large majority of collaborations constituted across the countries (56 %), then adequate amount of inter-country bilateral and multilateral collaboration signifies higher density or greater strength in the research network; most of the potential collaborators are emanated from 10 institutions of 5 different countries; however, cryptographic research is dominated by USA and Israel. More interestingly, vast majority among top-twenty ranked productive authors are affiliated in USA and Israel; Yehuda Lindell is found to be the most prolific author followed by Rosario Gennaro (USA), Tamir Tassa (Israel), Jonathan Katz (USA), etc.; Anglo-American institutions are more open than their overseas competitors; University of California (six centers) is placed on the top of the productive institutions. The study entails distinct subject clusters (research streams); and author-assigned keyword frequencies revealed that cryptanalysis, discrete logarithm, elliptic curve, block cipher, provable security, cryptography, secure computation, oblivious transfer, public-key encryption, zero-knowledge are more prevalent and active topics of research in cryptology. The implications of empirical results to the field are discussed thoroughly, and further analyzes are proposed to visualize this assessment in a better way

    Algorithmic means of ensuring network security and websites: trends, models, future cases

    Get PDF
    The purpose of the study is to establish probable trends in the development of algorithmic means of network security and the protection of web resources in the future. The research methods used in this publication are a bibliometric analysis of 500 relevant publications, which allowed us to establish probable trends in the future development of the subject field. The study found that currently the most likely algorithmic means of network security and website protection that will be intensively developed in the future are blockchain technologies (to protect inter-resource contact), deep and machine learning (to analyze and detect attacks and digital anomalies), artificial intelligence and neural networks (to develop complex security algorithms), and predictive analysis (to prevent possible attacks and malicious data injections). At the same time, technological development makes it possible to identify alternative security tools, including quantum and post-quantum cryptography (which is possible due to the development of quantum computing), augmented reality (which is the next iteration of the development of the interface between machine-human interaction), biometric identification (which is the next iteration of authentication and recognition systems) and DevSecOps (which is a promising technology for the production of digital tools and systems that have a relatively lower level of vulnerability to known digital threats). The correlative impact of Industry 4.0 technologies and solutions on the studied aspects of the security sector of the World Wide Web has been established. The growth of the network of devices requires the improvement of security algorithms in the paradigm of Industry 4.0 technologies, which will allow more effective detection and prevention of cyberattacks and protection of user data

    Understanding research productivity in the realm of evaluative scientometrics

    Get PDF
    The combination of a variety of inputs (both tangible and intangible) enables the numerous outputs in varying degrees to realize the research productivity. To select appropriate metrics and translate into the practical situation through empirical design is a cumbersome task. A single indicator cannot work well in different situations, but selecting the 'most suitable' one from dozens of indicators is very confusing. Nevertheless, establishing benchmarks in research evaluation and implementing all-factor productivity is almost impossible. Understanding research productivity is, therefore, a quintessential need for performance evaluations in the realm of evaluative scientometrics. Many enterprises evaluate the research performance with little understanding of the dynamics of research and its counterparts. Evaluative scientometrics endorses the measures that emerge during the decision-making process through relevant metrics and indicators expressing the organizational dynamics. Evaluation processes governed by counting, weighting, normalizing, and then comparing seem trustworthy

    Understanding research productivity in the realm of evaluative scientometrics

    Get PDF
    67-69The combination of a variety of inputs (both tangible and intangible) enables the numerous outputs in varying degrees to realize the research productivity. To select appropriate metrics and translate into the practical situation through empirical design is a cumbersome task. A single indicator cannot work well in different situations, but selecting the 'most suitable' one from dozens of indicators is very confusing. Nevertheless, establishing benchmarks in research evaluation and implementing all-factor productivity is almost impossible. Understanding research productivity is, therefore, a quintessential need for performance evaluations in the realm of evaluative scientometrics. Many enterprises evaluate the research performance with little understanding of the dynamics of research and its counterparts. Evaluative scientometrics endorses the measures that emerge during the decision-making process through relevant metrics and indicators expressing the organizational dynamics. Evaluation processes governed by counting, weighting, normalizing, and then comparing seem trustworthy

    Understanding Research Productivity in the Realm of Evaluative Scientometrics

    Get PDF
    Selecting appropriate metrics and translate into the practical situation through empirical design is a cumbersome task in measuring the research productivity. A single indicator cannot work well in different situations, but selecting the'most suitable'one from dozens of indicators is very confusing. Nevertheless, establishing benchmarks in research evaluation and implementing all-factor productivity is almost impossible. Understanding research productivity is, therefore, a quintessential need for performance evaluations in the realm of evaluative scientometrics. Evaluative scientometrics endorses the measures that emerge during the decision-making process through relevant metrics and indicators expressing the organizational dynamics. Evaluation processes governed by counting, weighting, normalizing, and then comparing seem trustworthy

    Evaluation of Institutional Research Productivity

    Get PDF
    The quantification of scholarly performance has become an obvious necessity in many academic pursuits. Evaluation of research output is, therefore, an integral element of R&D institutions worldwide. This paper critically scrutinizes the literature on research productivity concerning scientific institutions (include universities and departments) in an informational context. It provides a thorough review to map the quantum of knowledge relating to ‘institutional research productivity’ correlating the Indian vista. The paper also offers a few recommendations to undertake evaluative studies with caution. Thus it shows a coherent picture of this emerging area in the sociology of science

    Expanding Australia\u27s defence capabilities for technological asymmetric advantage in information, cyber and space in the context of accelerating regional military modernisation: A systemic design approach

    Get PDF
    Introduction. The aim of the project was to conduct a systemic design study to evaluate Australia\u27sopportunities and barriers for achieving a technological advantage in light of regional military technological advancement. It focussed on the three domains of (1) cybersecurity technology, (2) information technology, and (3) space technology. Research process. Employing a systemic design approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding of the interdisciplinary nature of defence technologies, identifying key areas for further exploration. The subsequent survey study, engaging 828 professionals across STEM, space, aerospace, defence/ law enforcement, and ICT, aimed to assess the impact, deployment likelihood, and developmental timelines of the identified technologies. Finally, five experts were interviewed to help elaborate on the findings in the survey and translate them into implications for the ADF. Findings. Key findings revealed significant overlaps in technology clusters, highlighting ten specific technologies or trends as potential force multipliers for the ADF. Among these, cybersecurity of critical infrastructure and optimisation and other algorithmic technologies were recognised for their immediate potential and urgency, suggesting a prioritisation for development investment. The analysis presented a clear imperative for urgent and prioritised technological investments, specifically in cybersecurity and information technologies, followed by space technologies. The research also suggested partnerships that Australia should develop to keep ahead in terms of regional military modernisation. Implications. To maintain a competitive edge, there is an urgent need for investment in the development and application of these technologies, as nearly all disruptive technologies identified for their potential impact, deployment/utilization likelihood, extensive use, and novelty for defence purposes are needed in the near-term (less than 5 years – cybersecurity and information technologies) or medium-term (less than 10 years – space technologies). In line with this, technology investments should be prioritized as follows: Priority 1 includes Cyber Security of critical infrastructure and optimization algorithms; Priority 2 encompasses Unmanned and autonomous systems and weapons, Deep/Machine Learning, and Space-based command and communications systems; and Priority 3 involves Industry 4.0 technologies, Quantum technology, Electromagnetic and navigation warfare systems, Hypersonic weapons, and Directed energy weapons. At the policy level, underfunding, bureaucratic inertia and outdated procurement models needed to be addressed to enhance agility of innovation. More critically, Australia needed to come up with creative ways to recruit, train and retain human capital to develop, manage and use these sophisticated technologies. Finally, in order to maintain a lead over competitors (China, Russia, Iran, North Korea) in the regional military technology competition, the survey and interviews indicate that Australia should continue its military technology alliances with long-standing partners (US, Europe, Israel), broaden its collaborations with more recent partners (Japan, Singapore, South Korea), and establish partnerships with new ones (India, Malaysia, Vietnam, Pacific Island nations). Conclusion. This study sheds light on the future direction for the ADF and Defence in general, underscoring the importance of strategic investments in up-and-coming technologies. By pinpointing strategic voids, potential partnerships, and sovereign technologies with high potential, this report acts as a roadmap for bolstering Australia’s defence capabilities and safeguarding its strategic interests amidst regional technological changes

    Blockchain implications for auditing: a systematic literature review and bibliometric analysis

    Get PDF
    Blockchain technology, smart contracts, and asset tokenization have relevant implications for the auditing environment. This paper evaluates the current stage of blockchain application in auditing, analyzing scientific publications and identifying the impact of what is already a reality and the potential effects of its improvements in audit professionals’ activities performance. The article considers the proposals and suggestions on the leading research indexed by the Scopus and Web of Science databases. We analyzed 374 papers on the topic of blockchain and provide a summary and analysis of the current state of auditing research. The bibliometric analysis was performed using the Bibliometrix R Package and the VOSviewer software. After a systematic study of abstracts and a general review of the papers to only include those directly related to our work’s objectives, we found 78 papers. The work results in a framework of potential and effective implications of blockchain technology for auditing, pointing out several new challenges in terms of skills and knowledge needed in this new reality of audit professionals

    A Systematic Overview of Blockchain Research

    Get PDF
    Blockchain has been receiving growing attention from both academia and practices. This paper aims to investigate the research status of blockchain-related studies and to analyze the development and evolution of this latest hot area via bibliometric analysis. We selected and explored 2451 papers published between 2013 and 2019 from the Web of Science Core Collection database. The analysis considers different dimensions, including annual publications and citation trends, author distribution, popular research themes, collaboration of countries (regions) and institutions, top papers, major publication journals (conferences), supportive funding agencies, and emerging research trends. The results show that the number of blockchain literature is still increasing, and the research priorities in blockchain-related research shift during the observation period from bitcoin, cryptocurrency, blockchain, smart contract, internet of thing, to the distributed ledger, and challenge and the inefficiency of blockchain. The findings of this research deliver a holistic picture of blockchain research, which illuminates the future direction of research, and provides implications for both academic research and enterprise practice.publishedVersio
    corecore