Developments and Trends in Cybersecurity Against Human Factors and Time Pressure Using Bibliometric Analysis

Understanding cyber security is very important in today's digital era. Human factors play an important role in cyber security, with more than 95% of successful attacks being carried out. Apart from the human factor, time pressure should not be ignored. Research related to cybersecurity on human factors and time pressure still lacks literature. Therefore, this research aims to analyze Cyber Security developments and trends regarding human factors and time pressure from 2014 to 2023 using Bibliometric Analysis from R studio software. The data obtained in this research was 110. The research methodology included planning, keyword identification, Scopus data search, bibliometrics and biblioshiny, trends related to cybersecurity, human factors and time pressure and finally a thematic map. The results of this research provide a picture regarding the development of the number of publications which will continue to increase in 2023 with as many as 30 articles, Computer and security


INTRODUCTION
The presence of increasingly sophisticated technology has created various security challenges including cyber attacks that can threaten critical information and infrastructure [1].Having a good understanding of Cybersecurity is very important in today's digital era.A large amount of research has been conducted to understand the factors that influence the success or failure of Cybersecurity [2].Failure in Cybersecurity is not just about designing and providing sophisticated information technology (IT) artifacts, but human factors as well [3].
Experts have long recognized that human factors play an important role in Cybersecurity [3].In 2017, more than 200,000 computers in 150 countries were affected by the largest ransomware attack due to negligence in updating Windows patches and opening suspicious emails [4] and it is estimated that more than 95% of successful attacks were caused by human error [5].Apart from human factors, time pressure is also a factor that should not be ignored.Organizations often face high time pressure in a competitive and dynamic business environment, which can influence decisions related to Cybersecurity [6].
According to [7] research entitled Towards an Improved Understanding of Human Factors in Cybersecurity discusses human factors and cyber security.The results of this research show that human factors in cyber security are still the main concern rather than technology.According to [6] research A Team-Level Perspective of Human Factors in Cyber Security: Security Operations Centers which discusses a team's understanding of human factors in cyber security.The results of this research are the need to consider human factors and the need for good teamwork in improving cyber security.[8] through an article entitled The Impact of Time Pressure on Cybersecurity Behavior: a systematic literature review.This research discusses the impact of time pressure on cybersecurity behavior.The results of this research show that human firewalls under time pressure in cyber security often experience threats that have the potential to cause disaster for users.
Although several previous reports have been conducted to demonstrate an understanding of the Cybersecurity and human factors categories, there is still a lack of literature regarding the development and trends of time pressure [8].From this context, knowledge about thematic development and expansion patterns of Cybersecurity trends, human factors, and time pressure is still lacking [9].Therefore, this research aims to analyze Cybersecurity developments and trends regarding human factors and time pressure from 2014 to 2023 using Bibliometric Analysis from the R Package in RStudio.including biblioshiny which is a shiny application that provides a web interface for bibliometrics.From this context, the application of bibliometric analysis methods can summarize data, namely in the form of publication units [10].Bibliometric analysis is also

Planning
The planning stage begins with determining a theme, where the theme in this research is related to cybersecurity.This research uses data from 2014-2023.This data was obtained from the SCOPUS database which contains various quotes regarding keyword searches used for bibliometric analysis.This database is often used to retrieve data in systematic reviews [11] and bibliometric analysis [12] because it contains the highest quality scientific publications.In this case, the procedure produced a data document containing 110 articles.The metadata is then extracted in bib style format.

.2 Identify Keyword
Keyword identification is a step taken by researchers to find the keywords to be used.Keyword identification was carried out by collecting various articles and journals related to Cybersecurity, human factors, and time pressure [13].In bibliometric analysis, the use of keywords allows researchers to better measure the trends, quantity, and impact of research related to a particular topic.Apart from that, keywords are also used to facilitate searching and understanding relevant scientific literature in a knowledge domain.Researchers use Boolean logic operators such as AND/OR in determining keywords [14].
This research uses the search keywords " Cybersecurity", "Human Factor", "Time Pressure" with the search syntax: ALL (Cybersecurity OR "Cyber Security" OR "Information security" AND "human factor" AND "time pressure" OR "time limit" OR "time stress" OR "time constraint") AND (LIMIT-TO (DOCTYPE, "ar")) AND (LIMIT-TO (PUBSTAGE, "final")) AND (LIMIT-TO (SRCTYP, "j")) AND (LIMIT-TO (LANGUAGE, "English")).This keyword will be used by researchers in searching for data in the Scopus database regarding this topic.Searching for keywords in the Scopus database can be seen in Figure 2.

3 Searching Scopus Data
Research on Cybersecurity can be found in various scientific publication media, whether journals, conference proceedings, or books.These media have different qualities.One thing that determines quality is the peer review process [15].Therefore, this research chose Scopus and Web of Science as data sources because scientific articles indexed by Scopus go through a peer review process.Scopus is a citation and abstract database supervised by experts in the field [16].Based on information from the Scopus website (http://www.scopus.com)which was accessed on 07 November 2023, data was generated for 226 articles that were in accordance with the research theme.Scopus is the world's largest data center covering millions of scientific literature published decades ago by Elsevier.Scopus helps researchers to search, analyze and visualize research effectively [17].A total of 226 articles were filtered to prevent duplicate keywords and filters, such as (1) search in "all fields" (2) Selected Criteria 10 Years (2014-2023), (3) Filter based on Document Type, (4) Publication Stage, (5) Source Type, and ( 6) Language.In this case, the procedure produced a data document containing 110 articles whose metadata was then extracted in bib-style format.This results in the retrieval of a variety of information, including citations, bibliograpic, abstract & keywords.This can be seen in the figure 2.

4 Bibliometrics
Professor Massimo Aria launched Bibliometrics in 2017.Bibliometrics is a package used in R software.In R, there is also biblioshiny which is an application that provides a web interface for bibliometrics [18].To use bibliometric and biblioshiny techniques, you can install R from Rstudio.After installing, run the command "install.packages("bibliometrix"), this is used to install the bibliometrix package.When finished, then "library(bibliometrix) where this command is to load the bibliometrix package.The final step is to enter the command "biblioshiny()", this command opens the interface.The metadata is extracted in the form of bibs, the data will be imported and converted to data frame collection.The biblioshiny interface will display analysis and plot results for four different level metrics including: source, author, document, and Clustering by Coupling.Followed by an analysis of three knowledge structures (K-structures) such as: conceptual structure, intellectual structure and social structure.Of the 7 analysis menu, each contains a submenu where this supports scholars in using bibliometrix's main features easily.The biblioshiny interface can be seen in the figure 3.

Trends Cybersecurity, Human Factors, and Time Pressure
Along with technological advances and increasingly complex cyber threats, Cybersecurity trends, human factors, and time pressure continue to experience major developments.Trend analysis can be performed after importing Scopus data in bibliometrics [19].Bibliometric Cybersecurity trends, human factors, and time pressure can be seen on the thematic map which is clustered into several clusters.This thematic map will later become a reference for future researchers to research the themes of Cybersecurity, human factors, and time pressure [20].

5.1 Thematic Map
Thematic map analysis of Cybersecurity, human factors and time pressure is linked to two dimensions, namely density and centrality.Furthermore, the themes on the thematic map are grouped based on 4 different categories, namely, motorbike themes, niche themes, emerging of declining themes, and basic themes [21].Motor Themes is located in the first quadrant, top right with a cluster network that has high centrality and density, indicating that the themes have been well developed and are important for structuring research subjects [22].Niche Themes or special themes are located in the second quadrant, top left with high density themes and low centrality which indicates that its relevance is limited [23].Emerging of declining themes is located in the third quadrant, bottom left with low centrality and low density themes and indicates that they are both minimally advanced and margin [24].Lastly, Basic Themes which are located in the fourth quadrant, bottom right with high centrality and low density, these themes are very important for transdisciplinary research issues [25].In a visual representation, identifying a trajectory is shown by dividing time into segments in other words a movement towards the top right over time indicates an increasing trend while a path towards the bottom left indicates a decreasing trend.

Cybersecurity Development Against Human Factors and Time Pressure
The data used in this research amounted to 110 articles originating from the Scopus database taken from 2014-2023 which were identified based on document type, journal source type, year of research, search within "all fields" and research trends.Next, the data was processed using a bibliometric approach with R Studio software based on 110 existing article data.The processed data results display graphs of statistical data based on the data in the article.

Cybersecurity research on human factors and time pressure based on publications and average annual citations
Based on the available publication results, it describes the total number of publications and article citations so that the volume of article publications can be measured.Figure 4   Based on Figure 5, the average number of article citations per year is depicted.Since the emergence of research on Cybersecurity on human factors and time pressure in 2007, the average number of annual citations has gone through several different phases.In the first phase, the average value increased progressively from 2007 to 2008, reaching 7.03 in 2008, before decreasing to 4.62 and 2.36 respectively in 2012 and 2013.For the second phase, Cybersecurity on human factors and time pressure increased and peaked in 2016 with an average of 9.16 citations.This was accompanied by a third phase where the average value decreased to 4.04 and 0.44 in 2017 and 2018.In 2019 the average citation increased by 4.09 and continued to increase significantly in 2020 with an average citation of 7.41.Average citations peaked in 2016 and 2020 with average citations of 9.16 and 7.41 from early 2007 to the present.This shows that the period starting in 2021 and ending in 2023 continues to experience a decline in the average number of citations with the lowest value of 1.20 occurring in 2023.

Cybersecurity research on human factors and time pressure based on the most relevant journals
Table 1 Research developments based on the most relevant journals

Computers and Security 6
Behavior and Information Technology 5 Based on Table 1, there are the top 10 published journals with the highest number of publications.Computer and Security and Behavior and Information Technology journals were ranked first and second with 6 and 5 articles respectively.Information and Computer Security and the International Journal of Human-Computer Studies were ranked third with 4 articles each.The Journal of the Association for Information Systems and Sensors was ranked fourth with a total of 3 articles.Further publications such as Acm Transactions on Privacy and Security, Applied Ergonomics, Computers in Human Behavior, and Journal of Cognitive Engineering and Decision Making were ranked last with a total of 2 articles.

Cybersecurity research on human factors and time pressure based on the most relevant keywords
Word co-occurrence networks are used to map and combine terms taken from keywords, titles, or abstracts in a bibliography to analyze words and determine the conceptual structure of a framework.Describe terms from textual fields such as abstract, title, keywords, and author as well as remove words and apply a stemming algorithm porter.Stemming is the reduction of changed (or sometimes derived) words to their basic form in a written format that emphasizes the words that appear most frequently in a text or reader's collection.Cybersecurity analysis of human factors and time pressure, and identification of the most important topics, concepts, and themes are also facilitated by analyzing the most frequently used words.The frequency of the author's keywords in Cybersecurity publications regarding human factors and time pressure can be seen in Figure 6.Cybersecurity is ranked first out of 978 keywords that frequently appear with 15 occurrences, phishing, time pressure, decision making, cyber security, technostress, and human-computer.interaction, human factors, information security, and literature review with 10, 8, 5, 4, 4, 3, 3, 3, and 3 word occurrences respectively.WorldCloud can be seen in Figure 7, where WorldCloud describes the author's keywords with the font size of a term indicating its frequency level.Even though Figure 6 and Figure 7 have different shapes, the content remains the same with a different presentation concept.

Cybersecurity research on human factors and time pressure based on Collaboration
Country International cooperation between countries can be seen in Figure 8 with the red line showing connections when cooperation is found between two countries or regions.Circles are used to indicate the frequency with which a particular topic trend appears with horizontal lines indicating the range between quartiles, indicating the period in which a topic trend reaches its popularity.In this case, the line width is proportional to the degree of collaboration.Australia, Austria, Canada, and China are also centers of publication with many red lines visible between these countries and others.Australia has specifically established 6 cooperative relationships with other countries regarding the publication of 2, 1, 3, and 1 articles with Germany, Lithuania, Malaysia, and the United Kingdom.Austria currently has partnerships with the countries of Canada and Germany which have resulted in the publication of 1 and 1 articles.Canada also established partnerships and published 1 and 1 articles with New Zealand and Serbia.Lastly, China collaborated with Australia and produced 2 articles.China and the United Kingdom also collaborated and produced 1 article.

Cybersecurity research on human factors and time pressure based on trends topic
The circles that can be seen in Figure 9 show the frequency of occurrence of certain keywords, with the horizontal line showing the range between the first quartile and the third quartile.Where the circle shows the period and extent to which the keyword achieved popularity.Based on an analysis of 978 occurrences of words in Cybersecurity regarding human factors and time pressure, network security, there are 10 trending topics from 2017 to 2023.In 2019 computer security became a trending topic until 2023.Not only that, female, male, and adult, are trending topics or research that are often discussed in 2020 until 2023. in 2022.Human research and articles are trending discussion topics in 2021.Not only that, Cyber security, phishing, and computer crime, are discussions that are often discussed by research until now in 2023.However, it can be seen in Figure 13 of the thematic map, Information security, cybersecurity awareness, cybersecurity, phishing, human factors, and security are trending topics for further research.10, it can be observed that 5 clusters are grouped and interconnected, with each group represented by the most dominant element.These results, decision making, cyber security, behavioral research, computer crime, phishing, cyber security, electronic mail, and time pressure are the first clusters marked with red nodes and represent the other clusters.The second cluster is shown with blue nodes.Meanwhile, the third cluster is marked with green nodes.Human, human experiment, adult, female, and male is the fourth cluster marked in purple.Finally, cluster 5 is shown with an orange node.According to the keyword cumulative degree plot in mobile exploration, cyber security is a keyword with a plot degree of 0.867.Human is the most central keyword with a level of 1.00.This is accompanied by decision-making, computer crime, electronic mail, adult, phishing, female, male, behavioral research, Cybersecurity, computing security, and time pressure with degrees 0.926, 0.691, 0.628, 0.59, 0.569, 0.569, 0.569, 0.537, 0.521, 0.511, and 0.484.

Trends Cybersecurity to Human Factors and Time Pressure
The analysis method is responsible for the visualization of data through maps such as social networks and two-dimensional maps.Network Analysis also allows statistical analysis of the resulting map to show differences in the relationships of the various detected clusters.Visualization describes the results of analysis contained in scientific maps such as thematic maps, where thematic maps depict a network that shows the proximity between objects that have similarities [26].However, the purpose of the analysis is to determine the conceptual, intellectual, or social evolution of a field of analysis by identifying patterns, trends, seasonality, and outliers.The aim of this analysis is to identify features with high intensity in a limited time.In this context, a series of clusters and thematic areas are used to describe evolution over several periods [27].

Thematic Map
Thematic map analysis of Cybersecurity, human factors, and time pressure is associated with two dimensions, namely density and centrality.Furthermore, the themes on the thematic map are grouped based on 4 different categories, namely, motorbike themes, niche themes, emerging or declining themes, and basic themes.
used to determine global research developments, analyze distribution maps, and interpret cybersecurity regarding human factors and time pressure.This research describes questions related: RQ1: How will cybersecurity develop regarding human factors and time pressure from 2014-2023?RQ2: What are cyber security trends regarding human factors and time pressure in the future?IJCCS ISSN (print): 1978-1520, ISSN (online): 2460-7258 ◼ Developments and Trends in Cybersecurity Against Human … (Aprilia Mayang Saputri)

Figure 1
Figure 1 Methodology 2.1.2.2 Identify KeywordKeyword identification is a step taken by researchers to find the keywords to be used.Keyword identification was carried out by collecting various articles and journals related to Cybersecurity, human factors, and time pressure[13].In bibliometric analysis, the use of keywords allows researchers to better measure the trends, quantity, and impact of research related to a particular topic.Apart from that, keywords are also used to facilitate searching and understanding relevant scientific literature in a knowledge domain.Researchers use Boolean logic operators such as AND/OR in determining keywords[14].This research uses the search keywords " Cybersecurity", "Human Factor", "Time Pressure" with the search syntax: ALL (Cybersecurity OR "Cyber Security" OR "Information security" AND "human factor" AND "time pressure" OR "time limit" OR "time stress" OR "time constraint") AND (LIMIT-TO (DOCTYPE, "ar")) AND (LIMIT-TO (PUBSTAGE, "final")) AND (LIMIT-TO (SRCTYP, "j")) AND (LIMIT-TO (LANGUAGE, "English")).This keyword will be used by researchers in searching for data in the Scopus database regarding this topic.Searching for keywords in the Scopus database can be seen in Figure2.

Figure 2
Figure 2 Keyword search in the Scopus database

and Figure 5
show the development of Cybersecurity regarding human factors and time pressure from 2007 to 2023.

Figure 4 Figure 4
Figure 4 Research developments based on publications Figure 5 Research development based on average annual citations Engineering and Decision-Making 2

Figure 6
Figure 6 Research developments based on the most relevant keywords

Figure 8
Figure 8 Research developments based on country collaboration

Figure 9
Figure 9 Research developments based on trends topic 3.1.9Cybersecurity research on human factors and time pressure based on the Co-occurrence Network Based on Figure10, it can be observed that 5 clusters are grouped and interconnected, with each group represented by the most dominant element.These results, decision making, cyber security, behavioral research, computer crime, phishing, cyber security, electronic mail, and time pressure are the first clusters marked with red nodes and represent the other clusters.The second cluster is shown with blue nodes.Meanwhile, the third cluster is marked with green nodes.Human, human experiment, adult, female, and male is the fourth cluster marked in purple.Finally, cluster 5 is shown with an orange node.According to the keyword cumulative degree plot in mobile exploration, cyber security is a keyword with a plot degree of 0.867.Human is the most central keyword with a level of 1.00.This is accompanied by decision-making, computer crime, electronic mail, adult, phishing, female, male, behavioral research, Cybersecurity, computing security, and time pressure with degrees 0.926, 0.691, 0.628, 0.59, 0.569, 0.569, 0.569, 0.537, 0.521, 0.511, and 0.484.

Figure 10
Figure 10 Research developments based on co-occurrence networks

Figure 3
Figure 3 Thematic MapBased on Figure11Cyber security, human-computer interaction, attention, technostress, case study, and stress are part of the motor themes.Partial least squares and the theory of planned behavior are part of the niche themes in the upper left quadrant.Automation is in the Emerging of declining Themes section which is located in the third quadrant, bottom left.Information security, cybersecurity awareness, mechanical, cyber security, phishing, time pressure, human factors, and security are part of the Basic Themes.On basic themes Information security, cybersecurity awareness, mechanical, cyber security, phishing, time pressure, human factors, and security are important topics that are not developed optimally.However, among several topics in the basic theme quadrant cybersecurity, human factors, information security, and cybersecurity awareness have a high centrality rank and a low-density rank which can be seen in Table3.
will cybersecurity develop regarding human factors and time pressure from 2014-2023?The development of cybersecurity regarding human factors and time pressure based on article publications from 2009 to 2014 did not find any development in the number of publications.The number of article publications began to increase in 2019 with a total of 7 articles and continues to increase with a total of 30 articles in 2023.The average citation reached its peak in 2016 and 2020 with an average citation of 9.16 and 7.41.Computer and security ranked first with the highest number of publications with 6 articles.The Journal of Cognitive Engineering and Decision Making was ranked last with the number of published articles of 2. Adam Mtp and Chowdhury Nh were ranked first and second with the number of articles of 4. Based on an analysis of 978 occurrences of words in cybersecurity regarding human factors and time pressure cyber security, phishing, and computer crime are trending discussions until now in 2023.Information security, cybersecurity awareness, cybersecurity, phishing, human factors, and security are trending topics for further research.RQ2: What are cyber security trends regarding human factors and time pressure in the future?Cybersecurity trends regarding human factors and time pressure can be seen with a thematic map.There are 4 different categories in the thematic map, including motor themes, niche themes, emerging of declining themes, and basic themes.Research trends can be seen in basic themes where cybersecurity, human factors, information security, and cybersecurity awareness have a high centrality rank and a low-density rank.Cybersecurity has a RankCentrality of 9 and a RankDensity of 12, Human factor has a Rank Centrality of 10.5 and a Rank density of 1, information security has a Rank centrality of 10.5 and a Rank density of 7, and finally cybersecurity awareness has a Rank centrality of 12.5 and a rank density of 7. IJCCS ISSN (print): 1978-1520, ISSN (online): 2460-7258 ◼

Table 2
Visual interpretation based on thematic map clusters