PL EN RU
Mapping the Role of Social Sciences in Cybersecurity Research
 
Więcej
Ukryj
1
War Studies University
 
2
University of Warsaw
 
3
University Rey Juan Carlos
 
 
Data publikacji: 19-09-2025
 
 
Studia Politologiczne 2025;77
 
SŁOWA KLUCZOWE
STRESZCZENIE
The rapid evolution of cyberspace and the growing engagement of individuals in digital environments have led to a paradigm shift in cybersecurity research towards a human-centric approach. This perspective acknowledges the complexity of cybersecurity threats and their far-reaching impact on individuals, communities and society as a whole. Cybersecurity therefore needs to be studied from a multidisciplinary perspective. With a dataset of 8,330 articles from the Scopus database, this study uses bibliometric analysis and co-occurrence techniques to map the field of social cybersecurity, examine research trends and assess the overall state of cybersecurity from the perspective of social sciences. VOSviewer software was used to create network maps to illustrate the relationships between key terms and to present the advancement of thematic areas in cybersecurity research. The study reveals a significant expansion in the field of social cybersecurity, moving from conventional topics related to cyber threats, such as malware and phishing, to more nuanced areas like social media and disinformation. The analysis of major research themes in social cybersecurity research indicates that cybersecurity has been integrated with various domains such as ethics, psychology, education, and law. This paper makes an important contribution by offering an overview of social cybersecurity research, an analysis of research trends and a roadmap for future research and policy development aimed at protecting the digital ecosystem through a holistic understanding of human factors in cybersecurity.
INFORMACJE O RECENZOWANIU
Sprawdzono w systemie antyplagiatowym
REFERENCJE (47)
1.
Akrivopoulou C., Psygkas A. (eds.), Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices, IGI Global 2011.
 
2.
Ali O., Jaradat A., Kulakli A., Abuhalimeh A., A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities, «IEEE Access» 2021, Vol. 9, DOI: 10.1109/ ACCESS.2021.3050241.
 
3.
Alieva I., Moffitt J. D., Carley K. M., How Disinformation Operations Against Russian Opposition Leader Alexei Navalny Influence the International Audience on Twitter, «Social Network Analysis and Mining» 2022, Vol. 12, № 1, DOI: 10.1007/s13278-022-00908-6.
 
4.
Ascher D. L., Umoja Noble S., Unmasking Hate on Twitter: Disrupting Anonymity by Tracking Trolls, [in:] S. J. Brison, K. Gelber (eds.), Free Speech in the Digital Age, New York 2019.
 
5.
Brantly A., Utopia Lost – Human Rights in a Digital World, «Applied Cybersecurity & Internet Governance» 2022, Vol. 1, № 1, DOI: 10.5604/01.3001.0016.1238.
 
6.
Brechbühl H., Bruce R., Dynes S., Johnson M. E., Protecting Critical Information Infrastructure: Developing Cybersecurity Policy, «Information Technology for Development» 2010, Vol. 16, № 1, DOI: 10.1002/itdj.20096.
 
7.
Burns A. J., Roberts T. L., Posey C., Lowry P. B., The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking, «Information Systems Research» 2019, Vol. 30, № 4, DOI: 10.1287/isre.2019.0860.
 
8.
Casassa Mont M., Beres Y., Pym D., Shiu S., Economics of Identity and Access Management: a Case Study on Enterprise Business Services, «HP Laboratories Technical Report HPL» 2010, № 10.
 
9.
Catal C., Tekinerdogan B., Aligning Education for the Life Sciences Domain to Support Digitalization and Industry 4.0, «Procedia Computer Science» 2019, Vol. 158, DOI: 10.1016/j.procs.2019.09.032.
 
10.
Chua Y. T., et al., Identifying Unintended Harms of Cybersecurity Countermeasures, [in:] 2019 APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, PA, USA 2019.
 
11.
Council of the European Union, Draft Council Conclusions on Cyber Diplomacy, 2015, https://data.consilium.europa.....
 
12.
Dwivedi Y. K., et al., Opinion Paper: “So What if ChatGPT Wrote it?” Multidisciplinary Perspectives on Opportunities, Challenges and Implications of Generative Conversational AI for Research, Practice and Policy, «International Journal of Information Management» 2023, Vol. 71, DOI: 10.1016/j.ijinfomgt.2023.102642.
 
13.
Domalewska D., Gasztold A., Wrońska A., Humans in the Cyber Loop. Perspectives on Social Cybersecurity, Leiden 2025.
 
14.
European Commission, The EU’s Cybersecurity Strategy for the Digital Decade, 2020, https://digital-strategy.ec.eu....
 
15.
Ghazal T. M., et al., IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare – A Review, «Future Internet» 2021, Vol. 13, № 8, DOI: 10.3390/fi13080218.
 
16.
Hellinger D. C., Conspiracies and Conspiracy Theories in the Age of Trump, Cham 2019.
 
17.
Holt T. J., Burruss G. W., Bossler A. M., Social Learning and Cyber-Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World, «Journal of Crime and Justice» 2010, Vol. 33, № 2, DOI: 10.1080/0735648X.2010.9721287.
 
18.
Howells L., Henry L. A., Varieties of Digital Authoritarianism, «Communist and Post-Communist Studies» 2021, Vol. 54, № 4, DOI: 10.1525/j.postcomstud.2021.54.4.1.
 
19.
Hutchings A., Clayton R., Anderson R., Taking down websites to prevent crime, [in:] 2016 APWG Symposium on Electronic Crime Research (eCrime), Toronto, ON 2016.
 
20.
Hutchings A., Holt T. J., The online stolen data market: disruption and intervention approaches, «Global Crime» 2017, Vol. 18, № 1, DOI: 10.1080/17440572.2016.1197123.
 
21.
Kemp S., et al., Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19, «Journal of Contemporary Criminal Justice» 2021, Vol. 37, № 4, DOI: 10.1177/10439862211027986.
 
22.
Lallie H. S., et al., Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks During the Pandemic, «Computers & Security» 2021, Vol. 105, DOI: 10.1016/j.cose.2021.102248.
 
23.
Leong Y. R., Tajudeen F. P., Yeong W. C., Bibliometric and Content Analysis of the Internet of Things Research: A Social Science Perspective, «Online Information Review» 2021, Vol. 45, № 6, DOI: 10.1108/OIR-08-2020-0358.
 
24.
Leukfeldt E. R., Yar M., Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis, «Deviant Behavior» 2016, Vol. 37, № 3, DOI: 10.1080/01639625.2015.1012409.
 
25.
Liaropoulos A., A Human-Centric Approach to Cybersecurity: Securing the Human in the Era of Cyberphobia, «Journal of Information Warfare» 2015, Vol. 14, № 4.
 
26.
Lipschultz J. H., Social Media Communication. Concepts, Practices, Data, Law and Ethics, New York 2020.
 
27.
Lowry P. B., Dinev T., Willison R., Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda, «European Journal of Information Systems» 2017, Vol. 26, № 6, DOI: 10.1057/s41303-017-0066-x.
 
28.
Mitnick K., Simon W., The Art of deception: Controlling the Human Element of Security, New York 2002.
 
29.
Moosavi J., Naeni L. M., Fathollahi-Fard A. M., Fiore U., Blockchain in Supply Chain Management: A Review, Bibliometric, and Network Analysis, «Environmental Science and Pollution Research» 2021, DOI: 10.1007/s11356-021-13094-3, http://link.springer.com/10.10....
 
30.
Murphy C., Understanding Cybercrime, European Parliamentary Research Service, https:// www.europarl.europa.eu/RegData/etudes/BRIE/2024/760356/EPRS_BRI(2024)760356_EN.pdf.
 
31.
Ng L. H. X., Cruickshank I. J., Carley K. M., Cross-Platform Information Spread During the January 6th Capitol Riots, «Social Network Analysis and Mining» 2022, Vol. 12, № 1, DOI: 10.1007/s13278-022-00937-1.
 
32.
Rajbhandari J., Rana K., Cyberbullying on Social Media: an Analysis of Teachers’ Unheard Voices and Coping Strategies in Nepal, «International Journal of Bullying Prevention» 2023, Vol. 5, № 2, DOI: 10.1007/s42380-022-00121-1.
 
33.
Rost Rublee M., et al., Do You Feel Welcome? Gendered Experiences in International Security Studies, «Journal of Global Security Studies» 2020, Vol. 5, Issue 1, DOI: 10.1093/jogss/ogz053.
 
34.
Sajikumar S., Ajithkumar N., Understanding the emergence and significance of behavioral cybersecurity: A bibliometric analysis, «Multidisciplinary Reviews» 2024, Vol. 6, DOI: 10.31893/multirev.2023ss102.
 
35.
Satumtira G., Dueñas-Osorio L., Synthesis of Modeling and Simulation Methods on Critical Infrastructure Interdependencies Research, [in:] K. Gopalakrishnan, S. Peeta (eds.), Sustainable and Resilient Critical Infrastructure Systems, Berlin–Heidelberg 2010.
 
36.
Shoker S., Making Gender Visible in Digital ICTs and International Security, «SRRN Paper» 2020, March 23.
 
37.
Slupska J., Safe at Home: Towards a Feminist Critique of Cybersecurity, «St Antony’s International Review» 2019, Vol. 15, No. 1.
 
38.
Smith A. D., Rupp W. T., Issues in Cybersecurity: Understanding the Potential Risks Associated with Hackers/ rackers, «Information Management & Computer Security» 2002, Vol. 10, № 4, DOI: 10.1108/09685220210436976.
 
39.
Smith Ochoa C., Gadinger F., Yildiz T., Surveillance under Dispute: Conceptualising Narrative Legitimation Politics, «European Journal of International Security» 2021, Vol. 6, № 2, DOI: 10.1017/eis.2020.23.
 
40.
Stahl B. C., et al., Artificial Intelligence for Human Flourishing – Beyond Principles for Machine Learning, «Journal of Business Research» 2021, Vol. 124, DOI: 10.1016/j.jbusres.2020.11.030.
 
41.
Sulich A., Zema T., Kulhanek L., Towards a Secure Future: A Bibliometric Analysis of the Relations Between Cybersecurity and Sustainable Development, «Procedia Computer Science» 2023, Vol. 225, DOI: 10.1016/j.procs.2023.10.133.
 
42.
Sun Yin H. H., et al., Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain, «Journal of Management Information Systems» 2019, Vol. 36, № 1, DOI: 10.1080/07421222.2018.1550550.
 
43.
Tsamados A., et al., The Ethics of Algorithms: Key Problems and Solutions, [in:] L. Floridi (eds.), Ethics, Governance, and Policies in Artificial Intelligence, Cham 2021.
 
44.
Visvizi A., Lytras M. D. (eds.), Smart Cities: Issues and Challenges, Amsterdam 2019.
 
45.
Vu A. V., et al., Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras, [in:] Proceedings of the ACM Internet Measurement Conference, Virtual Event USA 2020.
 
46.
Willison R., Lowry P. B., Paternoster R., A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research, «Journal of the Association for Information Systems» 2018, Vol. 19, № 12.
 
47.
Zhang S., Leidner D., Cao X., Liu N., Workplace Cyberbullying: A Criminological and Routine Activity Perspective, «Journal of Information Technology» 2022, Vol. 37, № 1, DOI: 10.1177/02683962211027888.
 
ISSN:1640-8888
Journals System - logo
Scroll to top