Esta es un versión antigua publicada el 2026-01-07. Consulte la versión más reciente.

Desde los fundamentos a las fronteras: un examen bibliométrico de estudios de inteligencia sobre Ciberamenazas

Autores/as

Palabras clave:

Inteligencia sobre ciberamenazas (CTI); análisis bibliométrico; Ciberseguridad

Resumen

Objetivo. La inteligencia de ciberamenazas (CTI), que se centra en la recopilación, el análisis y el intercambio de datos sobre nuevas amenazas y adversarios, se ha convertido en un área crucial de la ciberseguridad. Comprender el entorno académico y práctico de la CTI es esencial dada la creciente relevancia de las medidas de defensa proactiva y el desarrollo de las ciberamenazas. En este artículo se presenta un análisis bibliométrico exhaustivo de la literatura sobre CTI desde su inicio, que abarca artículos de 2012 a 2023. Diseño/Metodología/Enfoque. Utilizando una colección de más de 611 publicaciones académicas de la base de datos Scopus, nuestro objetivo es monitorear el crecimiento, las tendencias y las tendencias de investigación de este tema en desarrollo. En nuestro análisis, se identifican autores, grupos y países como contribuyentes significativos a la investigación sobre CTI, junto con temas recurrentes que han influido en el discurso a lo largo del tiempo. Resultados/Discusión. Los hallazgos clave indican un aumento significativo en las publicaciones sobre CTI desde 2012, con una clara transición de las discusiones teóricas a las aplicaciones prácticas y los estudios de casos reales. Las redes de colaboración entre investigadores e instituciones resaltan la naturaleza interdisciplinaria de la CTI, aprovechando la experiencia de campos como la informática, la seguridad de la información y las relaciones internacionales. El estudio también identifica áreas emergentes de interés, incluyendo la integración de la inteligencia artificial en la CTI y los desafíos del intercambio de inteligencia sobre amenazas en un panorama digital globalizado. Conclusiones. En conclusión, el estudio bibliométrico subraya la naturaleza dinámica y evolutiva de la inteligencia sobre ciberamenazas, destacando su creciente importancia en la lucha contra las ciberamenazas. La investigación continua, la colaboración interdisciplinaria y la innovación son vitales para anticiparse a estas amenazas y proteger los activos digitales en un mundo cada vez más interconectado. Originalidad/Valor. Al proporcionar una visión general del panorama de la investigación sobre CTI, este análisis bibliométrico ofrece información valiosa para académicos, profesionales y legisladores que participan en esfuerzos continuos para mejorar la ciberresiliencia y la seguridad.

Descargas

Los datos de descargas todavía no están disponibles.

Biografía del autor/a

Jeena Joseph, Marian College Kuttikkanam Autonomous, Kerala, India

 

 

 

 

Binu Thomas, Marian College Kuttikkanam Autonomous, Kerala, India

 

 

 

 

Jobin Jose, Marian College Kuttikkanam Autonomous, Kerala, India

 

 

 

 

 

Citas

Abbas, A.F., Jusoh, A., Masod, A. and Ali, J. (2021), “A Bibliometric Analysis of Publications on Social Media Influencers Using Vosviewer”, Journal of Theoretical and Applied Information Technology, Vol. 99 No. 23, pp. 5662–5676. https://www.jneonatalsurg.com/index.php/jns/article/view/2478

Abu, M.S., Selamat, S.R., Ariffin, A. and Yusof, R. (2018), “Cyber threat intelligence–issue and challenges”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10 No. 1, pp. 371–379. https://ijeecs.iaescore.com/index.php/IJEECS/article/view/11065

Agbo, F.J., Oyelere, S.S., Suhonen, J. and Tukiainen, M. (2021), “Scientific production and thematic breakthroughs in smart learning environments: a bibliometric analysis”, Smart Learning Environments, 8, (1), 1, https://orcid.org/10.1186/s40561-020-00145-4

Al Mamun, M.A., Azad, M.A.K., Al Mamun, M.A. and Boyle, M. (2022), Review of flipped learning in engineering education: Scientific mapping and research horizon, Education and Information Technologies, 27 (1), 1261–1286, https://orcid.org/10.1007/s10639-021-10630-z

Aria, M. and Cuccurullo, C. (2017), “bibliometrix: An R-tool for comprehensive science mapping analysis”, Journal of Informetrics, 11, (4), 959–975, https://orcid.org/10.1016/j.joi.2017.08.007

Bales, M.E., Wright, D.N., Oxley, P.R. and Wheeler, T.R. (2020), Bibliometric visualization and analysis software: State of the art, workflows, and best practices. https://ecommons.cornell.edu/items/e3561c0c-1651-4632-abbd-3a22c62a874f

Barnum, S. (2012), Standardizing cyber threat intelligence information with the structured threat information expression (stix), Mitre Corporation, 11, 1–22. https://www.mitre.org/sites/default/files/publications/stix.pdf

Barrot, J.S. (2023), Trends in automated writing evaluation systems research for teaching, learning, and assessment: A bibliometric analysis, Education and Information Technologies, https://orcid.org/10.1007/s10639-023-12083-y

Chen, C., Dubin, R. and Kim, M.C. (2014), Emerging trends and new developments in regenerative medicine: a scientometric update (2000 – 2014), Expert Opinion on Biological Therapy, 14 (9), 1295–1317, https://orcid.org/10.1517/14712598.2014.920813

Conti, M., Dargahi, T. and Dehghantanha, A. (2018), Cyber Threat Intelligence: Challenges and Opportunities”, in Dehghantanha, A., Conti, M. and Dargahi, T. (Eds.), Cyber Threat Intelligence, Springer International Publishing, Cham, 1–6, https://orcid.org/10.1007/978-3-319-73951-9_1

D. Schlette, M. Caselli, and G. Pernul. (2021), A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, IEEE Communications Surveys & Tutorials, 23 (4), 2525–2556, https://orcid.org/10.1109/COMST.2021.3117338

Dao, L.T., Tran, T., Van Le, H., Nguyen, G.N. and Trinh, T.P.T. (2023), A bibliometric analysis of Research on Education 4.0 during the 2017–2021 period. Education and Information Technologies, 28 (3), 2437–2453, https://orcid.org/10.1007/s10639-022-11211-4

Dennehy, D., Griva, A., Pouloudi, N., Mäntymäki, M. and Pappas, I. (2022), Artificial intelligence for decision-making and the future of work, International Journal of Information Management, Elsevier Ltd, https://orcid.org/10.1016/j.ijinfomgt.2022.102574

Dibbern, T.A., Rampasso, I.S., Pavan Serafim, M., Bertazzoli, R., Leal Filho, W. and Anholon, R. (2023), Bibliometric study on SDG 6: analysing main content aspects by using Web of Science data from 2015 to 2021, Kybernetes, 52 No.( 9) 3119–3135, https://orcid.org/10.1108/K-05-2021-0393

Donthu, N., Kumar, S., Mukherjee, D., Pandey, N. and Lim, W.M. (2021), How to conduct a bibliometric analysis: An overview and guidelines, Journal of Business Research, 133, 285–296, https://orcid.org/10.1016/j.jbusres.2021.04.070

van Eck, N.J. and Waltman, L. (2014), Visualizing Bibliometric Networks, in Ding, Y., Rousseau, R. and Wolfram, D. (Eds.), Measuring Scholarly Impact: Methods and Practice, Springer International Publishing, Cham, pp. 285–320, https://orcid.org/10.1007/978-3-319-10377-8_13

Fauzi, M.A. (2023), Cyberbullying in higher education: a review of the literature based on bibliometric analysis. Kybernetes, https://orcid.org/10.1108/K-12-2022-1667

Godin, B. (2006), On the origins of bibliometrics Scientometrics, 68 (1), 109–133, https://orcid.org/10.1007/s11192-006-0086-0

Guleria, D. and Kaur, G. (2021), Bibliometric analysis of ecopreneurship using VOSviewer and RStudio Bibliometrix, 1989–2019, Library Hi Tech, Emerald Publishing Limited, 39 (4), 1001–1024, https://orcid.org/10.1108/LHT-09-2020-0218

Husaeni, D.F.A. and Nandiyanto, A.B.D. (2022), Bibliometric computational mapping analysis of publications on mechanical engineering education using Vosviewer, 17. https://jestec.taylors.edu.my/Vol%2017%20Issue%202%20April%20%202022/17_2_23.pdf

Kattamuri, S.J., Penmatsa, R.K.V., Chakravarty, S. and Madabathula, V.S.P. (2023), Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence, Electronics, MDPI, 12, (2), 342. https://www.mdpi.com/2079-9292/12/2/342

Kayode-Ajala, O. (2023), Applications of Cyber Threat Intelligence (CTI) in Financial Institutions and Challenges in Its Adoption, Applied Research in Artificial Intelligence and Cloud Computing, 6, (8), 1–21. https://core.ac.uk/download/pdf/588488097.pdf

Kotsias, J., Ahmad, A. and Scheepers, R. (2023), Adopting and integrating cyber-threat intelligence in a commercial organisation, European Journal of Information Systems, Taylor & Francis, 32 (1), 35–51, https://orcid.org/10.1080/0960085X.2022.2088414

Lee, M. (2023), Cyber Threat Intelligence, John Wiley & Sons. https://www.wiley.com/en-us/Cyber+Threat+Intelligence-p-00370670

Mukherjee, B. (2020), Analysis of Global Research Trends in Coronaviruses: A Bibliometric Investigation, Journal of Scientometric Research, 9 (2), 185–194, https://orcid.org/10.5530/jscires.9.2.22

Nandiyanto, A.B.D., Husaeni, D.N.A. and Husaeni, D.F.A. (2021), A bibliometric analysis of chemical engineering research using Vosviewer and its correlation with covid-19 pandemic condition, vol. 16. https://jestec.taylors.edu.my/Vol%2016%20Issue%206%20December%20%202021/16_6_4.pdf

Pinto, M., Fernández-Pascual, R., Caballero-Mariscal, D., Sales, D., Guerrero, D. and Uribe, A. (2019), Scientific production on mobile information literacy in higher education: a bibliometric analysis (2006–2017), Scientometrics, 120 (1 ), 57–85, https://orcid.org/10.1007/s11192-019-03115-x

Racine, J.S. (2012). “RStudio: a platform-independent IDE for R and Sweave”, JSTOR.

Rojas-Sánchez, M.A., Palos-Sánchez, P.R. and Folgado-Fernández, J.A. (2023), “Systematic literature review and bibliometric analysis on virtual reality and education”, Education and Information Technologies, 28 ,(1), 155–192, https://orcid.org/10.1007/s10639-022-11167-5

Salim, N., Gopal, K. and Ayub, A. (2019). Effects of using RStudio on statistics performance of Malaysian undergraduates” Malaysian Journal of Mathematical Sciences, 13 (3), 419–437. https://mjms.upm.edu.my/fullpaper/2019-September-13-3/Salim,%20N.%20R.-419-437.pdf

Sawangwong, A. and Chaopaisarn, P. (2023). The impact of applying knowledge in the technological pillars of Industry 4.0 on supply chain performance, Kybernetes, 52 (3), 1094–1126, https://orcid.org/10.1108/K-07-2021-0555

Schlette, D., Böhm, F., Caselli, M. and Pernul, G. (2021), Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20. 1, 21–38, https://orcid.org/10.1007/s10207-020-00490-y

Scientific Mapping of Gravity Model of International Trade Literature: A Bibliometric Analysis. Journal of Scientometric Research, 11 (3), 447–457, https://orcid.org/110.5530/jscires.11.3.48

Shekhar, S.K. and Shah, M.A. (2023), Sports Marketing and Conceptual Evolution: A Bibliometric Analysis, SAGE Open, Vol. 13 No. 3, p. 21582440231192915, https://orcid.org/10.1177/21582440231192915

Singh, S., Solkhe, A. and Gautam, P. (2022). What do we know about Employee Productivity?: Insights from Bibliometric Analysis, Journal of Scientometric Research, 11 (2), 183–198, https://orcid.org/10.5530/jscires.11.2.20

Souza de Cursi, E. (2023), Some Tips to Use R and RStudio, in Souza de Cursi, E. (Ed.), Uncertainty Quantification Using R, Springer International Publishing, Cham, 1–108 https://orcid.org/10.1007/978-3-031-17785-9_1

Sufi, F. (2023), A New Social Media-Driven Cyber Threat Intelligence. Electronics, 2 (5), https://orcid.org/10.3390/electronics12051242

Thomson, R., Mosier, R. and Worosz, M. (2023), COVID research across the social sciences in 2020: a bibliometric approach. Scientometrics 128 (6), 3377–3399, https://orcid.org/10.1007/s11192-023-04714-5

Tomaszewski, R. (2023), Visibility, impact, and applications of bibliometric software tools through citation analysis. Scientometrics, 128 (7), 4007–4028, https://orcid.org/10.1007/s11192-023-04725-2

V. Mavroeidis and S. Bromander. (2017), Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence, 2017 European Intelligence and Security Informatics Conference (EISIC), presented at the 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98, https://orcid.org/10.1109/EISIC.2017.20

Wagner, T.D., Mahbub, K., Palomar, E. and Abdallah, A.E. (2019), Cyber threat intelligence sharing: Survey and research directions, Computers & Security. 87, 101589, https://orcid.org/10.1016/j.cose.2019.101589

Waltman, L., van Eck, N.J. and Noyons, E.C.M. (2010), A unified approach to mapping and clustering of bibliometric networks, Journal of Informetrics, 4 (4), 629–635, https://orcid.org/10.1016/j.joi.2010.07.002

Descargas

Publicado

2026-01-07

Versiones

Cómo citar

Joseph, J., Thomas, B., & Jose, J. (2026). Desde los fundamentos a las fronteras: un examen bibliométrico de estudios de inteligencia sobre Ciberamenazas. Bibliotecas. Anales De investigación, 21(3), 1–19. Recuperado a partir de https://revistasbnjm.sld.cu/index.php/BAI/article/view/1107