Abstract
In spite of the advancement of information security (IS) technology, information leakage incidents and accidents are continuously occurring. Its reason is because only technical countermeasures are devised rather than implementing countermeasures based on business perspective regarding IS. Accordingly, the purpose of this study is to design a classification system in the area of IS to solve such problem and seek balanced advancement, as well as examine the trend of IS researches that have been conducted. Upon designing the classification system based on the areas of IS technology and IS management for the IS academic areas, Korea domestic and international academic journals in the area of IS were selected to research and analyze theses that have been published in the last 5 years. The research result showed that there were more studies on IS technology area than IS management area, thereby confirming the greater research emphasis in the area of technology. In specific according to area, number of Korea domestic researches on infrastructure security technology was the highest in the area of IS technology. In the case of international researches, number of researches on the security of infrastructure was the highest. As for the IS management area, number of Korea domestic researches on IS level diagnosis was the highest, while number international researches on IS human resource management was the highest. The significance of this study is to contribute to the balanced advancement of IS area by designing IS classification system to present IS research trend and future research direction.




Similar content being viewed by others
References
Allen m (1999) The role of meta-analysis for connecting critical and scientific approaches: the need to develop a sense of collaboration. Crit Stud Mass Commun 16:373–379
Cockcroft S (2002) Securing the commercial internet: lessons learned in developing a postgraduate course in information security management. J Inf Syst Educ 13(3):205–210
Cooper H (2009) “Research synthesis and meta-analysis: A step-by-step approach” Sage Publications
Logan P (2002) Crafting an undergraduate information security emphasis within information technology. J Inf Syst Educ 13(3):177–182
Nelson HD, Vesco KK, Haney E, FU R, Nedrow A, Miller J, Nicolaidis C, Walker M, Humphrey L (2006) Nonhormonal therapies for menopausal hot flashes: systematic review and meta-analysis. JAMA 295(17):2057–2071
Veiga AD, Eloff JH (2007) An information security governance framework. Inf Syst Manag 24(4):361–372
Venter H, Eloff JH (2003) A taxonomy for information security technologies. Comput Secur 22(4):299–307
Wallace WI (1992) Metatheory, conceptual standardization, and the future of sociology. In: Ritzer G (ed) Metatheorizing. Sage, New York, pp 53–68
Wolf FM (1986) “Meta-analysis: Quantitative methods for research synthesis,” Sage Publications
Wright MA (1998) The need for information security education. Comput Fraud Secur 1998(8):14–17
Wu Y, Lee M, Tsai C (2009) Research trends in science education from 2003 to 2007: a content analysis of publications in selected journal. Int J Sci Educ 31(15):1999–2020
Acknowledgments
This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-H8501-15-1018) supervised by the IITP (Institute for Information & communications Technology Promotion).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, H., Kim, Y. & Chang, H. Information security research classification for future multimedia environment. Multimed Tools Appl 75, 14795–14806 (2016). https://doi.org/10.1007/s11042-015-2638-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2638-x