Bibliometric Analysis of Cybersecurity and Risk Management in Accounting
DOI:
https://doi.org/10.58812/wsis.v3i11.2386Keywords:
Cybersecurity, Risk Management, Accounting Information Systems, Bibliometric Analysis, Digitalization, Cyber Risk AssessmentAbstract
This study performs a thorough bibliometric analysis to investigate the intellectual landscape and thematic evolution of cybersecurity and risk management research in the field of accounting. The study used Scopus-indexed articles and visual analytics produced via VOSviewer and Bibliometrix to delineate keyword co-occurrences, author collaborations, institutional networks, and contributions by countries. The findings indicate that cybersecurity, risk management, and risk assessment constitute the conceptual foundation of the discipline, acting as fundamental elements that link diverse related subjects such as network security, information management, cloud computing, blockchain, and data privacy. Temporal overlay analysis reveals a transition from an initial focus on technical vulnerabilities and fundamental risk assessment to a contemporary emphasis on digitalization, accounting system security, and developing technologies. Co-authorship and institutional networks exhibit fragmented yet expanding collaboration patterns, with the United States serving as the principal worldwide center. This study enhances the literature by delineating predominant topics, upcoming research frontiers, and collaboration deficiencies, so establishing a systematic basis for future investigations. These insights assist scholars and practitioners in formulating more cohesive, robust, and proactive cybersecurity measures inside accounting frameworks.
References
[1] H. Liang, Y. Xue, A. Pinsonneault, and Y. “Andy” Wu, “What Users Do besides Problem-Focused Coping When Facing IT Security Threats,” MIS Q., vol. 43, no. 2, pp. 373-A18, 2019.
[2] D. Dang-Pham and S. Pittayachawan, “Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach,” Comput. Secur., vol. 48, pp. 281–297, 2015.
[3] Y. A. Jasim and M. B. Raewf, “Impact of the information technology on the accounting system,” Cihan Univ. J. Humanit. Soc. Sci., vol. 4, no. 1, pp. 50–57, 2020.
[4] G. Kruss, I. Petersen, M. Sanni, D. Adeyeye, and A. Egbetokun, “Do we measure what should be measured? Towards a research and theoretical agenda for STI measurement in Africa,” Innov. Dev., pp. 1–25, 2025.
[5] L. L. P. PricewaterhouseCoopers, “Committee of Sponsoring Organizations of the Treadway Commission (COSO).(2017) Enterprise Risk Management: Integrating with Strategy and Performance,” New York COSO, pp. 69–74.
[6] D. Ganji, C. Kalloniatis, H. Mouratidis, and S. M. Gheytassi, “Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review,” Int. J. Adv. Softw, vol. 12, no. 3, 2019.
[7] AICPA, Guide: Reporting on an Entity’s Cybersecurity Risk Management Program and Controls, 2017. John Wiley & Sons, 2017.
[8] K. M. Zakaria, A. Nawawi, and A. S. A. P. Salin, “Internal controls and fraud–empirical evidence from oil and gas company,” J. Financ. crime, vol. 23, no. 4, pp. 1154–1168, 2016.
[9] H. Carvey and C. Altheide, Digital forensics with open source tools. Elsevier, 2011.
[10] M. A. Vasarhelyi, A. Kogan, and B. M. Tuttle, “Big data in accounting: An overview,” Account. Horizons, vol. 29, no. 2, pp. 381–396, 2015.
[11] D. Yermack, “Corporate governance and blockchains,” Rev. Financ., vol. 21, no. 1, pp. 7–31, 2017.
[12] C. Liu and M. A. Babar, “Corporate cybersecurity risk and data breaches: A systematic review of empirical research,” Aust. J. Manag., p. 03128962241293658, 2024.
[13] N. Donthu, S. Kumar, D. Mukherjee, N. Pandey, and W. M. Lim, “How to conduct a bibliometric analysis: An overview and guidelines,” J. Bus. Res., vol. 133, pp. 285–296, 2021.
[14] S. Masmoudi, “Unveiling the human factor in cybercrime and cybersecurity: Motivations, behaviors, vulnerabilities, mitigation strategies, and research methods,” in Cybercrime unveiled: Technologies for analysing legal complexity, Springer, 2025, pp. 41–91.
[15] W. Chen, H. Ren, and Z. Huang, “Does carbon emission trading system facilitate corporate digital transformation? Evidence from China,” Total Qual. Manag. Bus. Excell., vol. 36, no. 11–12, pp. 1301–1329, 2025.
[16] G. Tan, “Uncovering Role of Information Security Awareness, Compliance Knowledge & Organizational Citizenship Behaviour Towards Information Security Compliance in Chinese Public & Private Universities,” Prof. la Inf., vol. 33, no. 5, 2024.
[17] P. Mongeon and A. Paul-Hus, “The journal coverage of Web of Science and Scopus: a comparative analysis,” Scientometrics, vol. 106, no. 1, pp. 213–228, 2016.
[18] N. Van Eck and L. Waltman, “Software survey: VOSviewer, a computer program for bibliometric mapping,” Scientometrics, vol. 84, no. 2, pp. 523–538, 2010.
[19] M. Aria and C. Cuccurullo, “bibliometrix: An R-tool for comprehensive science mapping analysis,” J. Informetr., vol. 11, no. 4, pp. 959–975, 2017.
[20] S. Walton, P. R. Wheeler, Y. Zhang, and X. Zhao, “An integrative review and analysis of cybersecurity research: Current state and future directions,” J. Inf. Syst., vol. 35, no. 1, pp. 155–186, 2021.
[21] E. Haapamäki and J. Sihvonen, “Cybersecurity in accounting research,” Manag. Audit. J., vol. 34, no. 7, pp. 808–834, 2019.
[22] A. R. Neigel, V. L. Claypoole, G. E. Waldfogle, S. Acharya, and G. M. Hancock, “Holistic cyber hygiene education: Accounting for the human factors,” Comput. Secur., vol. 92, p. 101731, 2020.
[23] N. M. Scala, A. C. Reilly, P. L. Goethals, and M. Cukier, “Risk and the five hard problems of cybersecurity,” Risk Anal., vol. 39, no. 10, pp. 2119–2126, 2019.
[24] L. D. Bodin, L. A. Gordon, M. P. Loeb, and A. Wang, “Cybersecurity insurance and risk-sharing,” J. Account. Public Policy, vol. 37, no. 6, pp. 527–544, 2018.
[25] J. A. Paul and M. Zhang, “Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker,” Eur. J. Oper. Res., vol. 291, no. 1, pp. 349–364, 2021.
[26] J. A. Rodger and J. A. George, “Triple bottom line accounting for optimizing natural gas sustainability: A statistical linear programming fuzzy ILOWA optimized sustainment model approach to reducing supply chain global cybersecurity vulnerability through information and communications technology,” J. Clean. Prod., vol. 142, pp. 1931–1949, 2017.
[27] A. Sardi, A. Rizzi, E. Sorano, and A. Guerrieri, “Cyber risk in health facilities: A systematic literature review,” Sustainability, vol. 12, no. 17, p. 7002, 2020.
[28] T. V Eaton, J. H. Grenier, and D. Layman, “Accounting and cybersecurity risk management,” Curr. Issues Audit., vol. 13, no. 2, pp. C1–C9, 2019.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Loso Judijanto

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








