From Technical Security to Human Awareness: A Bibliometric Review of Cybersecurity Education Research
DOI:
https://doi.org/10.5281/zenodo.19897820Keywords:
Cybersecurity Education, Bibliometric Analysis, Security Awareness, Research TrendsAbstract
The rapid advancement of information technology has increased cybersecurity threats, emphasizing the importance of education in building security awareness and human-centered defense capabilities. As research on cybersecurity education continues to grow, a systematic understanding of its research trends and thematic evolution is required. This study analyzes global research trends in cybersecurity education using a bibliometric approach. A total of 189 Scopus-indexed publications from 2020 to 2026 were analyzed using the bibliometrix R package and the Biblioshiny interface. The analysis examines annual publication growth, dominant keywords, evolving research topics, and geographical research contributions. The results indicate a steady increase in scientific production, confirming cybersecurity education as an expanding research domain. While technical topics such as network and data security remain prominent, recent research shows a clear shift toward education, training, and security awareness, highlighting the growing importance of human factors in cybersecurity. In addition, the findings reveal an imbalance in global research contributions and relatively limited international collaboration. This study provides a concise overview of the development and structure of cybersecurity education research and offers insights to support future studies, curriculum development, and policy formulation.
Downloads
References
Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
Ahmed, M., Kambam, H. R., Liu, Y., Jaidka, S., & Petrova, K. (2023). Impact and Significance of Human Factors in Digital Information Security. International Journal of Information Science & Technology. http://innove.org/ijist/
Ahmed Shan-A-Alahi. (2024). Cybersecurity Training and Its Influence on Employee Behavior in Business Environments. Computer Fraud and Security, 506–515. https://doi.org/10.52710/cfs.689
Al-Badayneh, D. M., Al-Badayneh, D. D., & Hashish, R. K. (2025). Human Factors of Cybersecurity. Journal of Posthumanism, 5(4). https://doi.org/10.63332/joph.v5i4.1242
De Bruin, M., & Mersinas, K. (2022). Individual and Contextual Variables of Cyber Security Behaviour.
Fida Hasan, K., Hughes, W., & Rahman, A. (2025). Gamifying Cyber Governance: A Virtual Escape Room to Transform Cybersecurity Policy Education.
Kennison, S. M., & Chan-Tin, E. (2020). Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.546546
Khadka, K., & Ullah, A. B. (2025). Human factors in cybersecurity: an interdisciplinary review and framework proposal. International Journal of Information Security, 24(3), 119. https://doi.org/10.1007/s10207-025-01032-0
Kumar, R. (2025). Bibliometric Analysis: Comprehensive Insights into Tools, Techniques, Applications, and Solutions for Research Excellence. Spectrum of Engineering and Management Sciences, 3(1), 45–62. https://doi.org/10.31181/sems31202535k
Ngandu, M. R., Mwansa, G., & Mkabe, Z. (2025). Strengthening cybersecurity in a government department by addressing password management challenges and human factor vulnerabilities. Discover Computing, 28(1), 148. https://doi.org/10.1007/s10791-025-09659-2
Oner, U., Cetin, O., & Savas, E. (2025). Human factors in phishing: Understanding susceptibility and resilience. Computer Standards & Interfaces, 94, 104014. https://doi.org/10.1016/j.csi.2025.104014
Passas, I. (2024). Bibliometric Analysis: The Main Steps. Encyclopedia, 4(2), 1014–1025. https://doi.org/10.3390/encyclopedia4020065
Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. https://doi.org/10.1016/j.cose.2023.103585
Qureshi, R., & Koo, I. (2026). A Comprehensive Survey of Cybersecurity Threats and Data Privacy Issues in Healthcare Systems. Applied Sciences, 16(3), 1511. https://doi.org/10.3390/app16031511
Sharma, D., Mittal, R., Sekhar, R., Shah, P., & Renz, M. (2023). A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization, 10, 100204. https://doi.org/10.1016/j.rico.2023.100204
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119, 102756. https://doi.org/10.1016/j.cose.2022.102756
Singh, P., Dutta, S., & Pranav, P. (2025). Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis. Recent Advances in Computer Science and Communications, 18(2). https://doi.org/10.2174/0126662558280232231213053002
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, & Samuel Onimisi Dawodu. (2024). CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY. Computer Science & IT Research Journal, 5(1), 100–119. https://doi.org/10.51594/csitrj.v5i1.708
Verma, R., Gupta, N., & Kumar, A. (2025). A comprehensive scientometric study of research trends in cybersecurity from 2000 to 2024 using Biblioshiny and VOSviewer. Discover Networks, 1(1). https://doi.org/10.1007/s44354-025-00011-0
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Cindy Muhdiantini, Mega Fitri Yani, Istifa Shania Putri (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Share
Most read articles by the same author(s)
- Cindy Muhdiantini, Mega Fitri Yani, Ibnu Zulkarnain, Trends and Innovations in CRM for Patient Management: A Literature Review , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 2 (2025): April
- Mega Fitri Yani, Istifa Shania Putri, Cindy Muhdiantini, Farid Munadhil, A Bibliometric Analysis of Research Trends in AI Integration within Cloud Computing , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 2 (2026): April
Similar Articles
- Mega Fitri Yani, Istifa Shania Putri, Cindy Muhdiantini, Farid Munadhil, A Bibliometric Analysis of Research Trends in AI Integration within Cloud Computing , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 2 (2026): April
- Saskiya Farannisa, Artificial Intelligence Adoption and Implementation In Indonesia: Policy Frameworks, Sectoral Applications, and Future Prospects , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 1 (2026): January
- Muhammad Rizq Dzaki Asyam, Integrating Augmented Reality (AR) in Education in the Era of Society 5.0: A Systematic Literature Review , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 4 (2025): October
- Elsa Ayu Wardani, Ahmad Baijuri, Citra Ayu Pratiwi, Perancangan Sistem Arsip Digital menggunakan Fitur QR Code di BPJS Ketenagakerjaan Kabupaten Banyuwangi , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 4 (2025): October
- Tegar Wirawan, Kusnawi, Performance Analysis of Support Vector Machine and Gradient Boosting Machine Algorithms for Heart Disease Prediction , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 2 (2025): April
- Farhana Zahra, Analysis of Digital Governance Framework Implementation to Enhance Digital Transformation , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Muhammad Irvan Shandika, Kusnawi, S.Kom, M.Eng, AI Web-based Computer Service Management System at PUSCOM , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Irfan Fahmi Ahmadi, A Systematic Literature Review on AI Architecture Frameworkfor Product Analysis & Recommendation System in Electronic Service , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 1 (2026): January
- Alvan Dhan, Angelina Apriyani Pandiangan, Nadita, Ratih Echa Kurnia, Rafi Akmal Rizqullah, Information System Requirements Analysis for MSME Digitalization Using the SDLC Waterfall Approach , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 2 (2026): April
- Mega Fitri Yani, Cindy Muhdiantini, Syifa Nur Aini, Risk Management in Financial Technology: A Systematic Literature Reviewto Support Sustainability and Security of Digital Financial Services , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 1 (2025): January
You may also start an advanced similarity search for this article.

