Font Size: a A A

Social Network Analysis Of Information Security Research In China

Posted on:2017-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:M J QinFull Text:PDF
GTID:2348330485456922Subject:Information Science
Abstract/Summary:PDF Full Text Request
Information technologydevelopedrapidly,at the same time,information security has become a hot focus of mankind and the most attention in recent years of increasingly high level of information security,the research of information security in the field after another,based on this,to enable a comprehensive review of information security development of the paper,from the perspective of metrology,expand the network through a variety of methods of complex analysis.This article aims to CNKI 2005-2014 Papers field of information security for the data source.Papers from institutions,journals,keywords,author,etc.viewpoint,on this basis,the use of co-word analysis,quantitative analysis of complex network analysis,quantitative survey,and use SATI to analysis the literature,use VOSviewer to analysis the cluster,use PAJEK to analysis the co-author,data processing computing co-author of a point,center,density,zoning,etc..Finally,the data summarized the results of in-depth analysis to identify the core group of institutions in the field of information security thesis,core journals,research focus,group and author law.Basically reflected the research and development of information security papers.After reading a lot of information about the content and security information about foreign security papers and articles on the basis of in-depth discussions of research objectives,the following article will explore the theoretical research and practice:First,the information from the field of metrology,information security,social network analysis and so on,starting the research literature conducted in-depth discussion.Secondly,the establishment of the research object,select appropriateresearch methods and research tools,to process the data processing.Then,the co-word analysis,social network analysis,network analysis of complex institutions from paper co-author,keyword co-occurrence,co-author and other aspects of research.Finally,the results of in-depth analysis of the data,summarized,development status of information security in the field of research and progress in order to obtain,the relevant parties to facilitate the research field of information security.
Keywords/Search Tags:Information security, Social network analysis, PAJEK, Metrology, The research progress
PDF Full Text Request
Related items