Scientograph-Based Visualization of Computer Forensics Research Literature

Scientograph-Based Visualization of Computer Forensics Research Literature

Jahir Hussain Haneefa Mohamed
Copyright: © 2018 |Pages: 15
ISBN13: 9781522534570|ISBN10: 1522534571|EISBN13: 9781522534587
DOI: 10.4018/978-1-5225-3457-0.ch010
Cite Chapter Cite Chapter

MLA

Mohamed, Jahir Hussain Haneefa. "Scientograph-Based Visualization of Computer Forensics Research Literature." Innovations in Measuring and Evaluating Scientific Information, edited by J. John Jeyasekar and P. Saravanan, IGI Global, 2018, pp. 148-162. https://doi.org/10.4018/978-1-5225-3457-0.ch010

APA

Mohamed, J. H. (2018). Scientograph-Based Visualization of Computer Forensics Research Literature. In J. Jeyasekar & P. Saravanan (Eds.), Innovations in Measuring and Evaluating Scientific Information (pp. 148-162). IGI Global. https://doi.org/10.4018/978-1-5225-3457-0.ch010

Chicago

Mohamed, Jahir Hussain Haneefa. "Scientograph-Based Visualization of Computer Forensics Research Literature." In Innovations in Measuring and Evaluating Scientific Information, edited by J. John Jeyasekar and P. Saravanan, 148-162. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3457-0.ch010

Export Reference

Mendeley
Favorite

Abstract

Studying the communication pattern of scientific information produced as a result of academic and industrial research using mapping techniques is part of scientometric studies. In this chapter, the bibliographic data related to computer forensics retrieved from SCOPUS is subjected to mapping and visualizing. The results showed that the computer forensics literature grows exponentially. USA ranks first among the countries contributing to the literature growth. The University of South Australia is top ranking institution and K.K.R. Choo is the top-ranking author. Conference proceedings are the dominant form of communication flow. The scientograph of keywords reveals six clusters and the keywords with high frequency of occurrences are computer crime, security of data, network security, electronic crime countermeasures, digital forensic, internet, cryptography, cloud computing, cyber security, malware, and intrusion detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.