From Technical Security to Human Awareness: A Bibliometric Review of Cybersecurity Education Research
DOI:
https://doi.org/10.5281/zenodo.19897820Keywords:
Cybersecurity Education, Bibliometric Analysis, Security Awareness, Research TrendsAbstract
The rapid advancement of information technology has increased cybersecurity threats, emphasizing the importance of education in building security awareness and human-centered defense capabilities. As research on cybersecurity education continues to grow, a systematic understanding of its research trends and thematic evolution is required. This study analyzes global research trends in cybersecurity education using a bibliometric approach. A total of 189 Scopus-indexed publications from 2020 to 2026 were analyzed using the bibliometrix R package and the Biblioshiny interface. The analysis examines annual publication growth, dominant keywords, evolving research topics, and geographical research contributions. The results indicate a steady increase in scientific production, confirming cybersecurity education as an expanding research domain. While technical topics such as network and data security remain prominent, recent research shows a clear shift toward education, training, and security awareness, highlighting the growing importance of human factors in cybersecurity. In addition, the findings reveal an imbalance in global research contributions and relatively limited international collaboration. This study provides a concise overview of the development and structure of cybersecurity education research and offers insights to support future studies, curriculum development, and policy formulation.
Downloads
References
Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
Ahmed, M., Kambam, H. R., Liu, Y., Jaidka, S., & Petrova, K. (2023). Impact and Significance of Human Factors in Digital Information Security. International Journal of Information Science & Technology. http://innove.org/ijist/
Ahmed Shan-A-Alahi. (2024). Cybersecurity Training and Its Influence on Employee Behavior in Business Environments. Computer Fraud and Security, 506–515. https://doi.org/10.52710/cfs.689
Al-Badayneh, D. M., Al-Badayneh, D. D., & Hashish, R. K. (2025). Human Factors of Cybersecurity. Journal of Posthumanism, 5(4). https://doi.org/10.63332/joph.v5i4.1242
De Bruin, M., & Mersinas, K. (2022). Individual and Contextual Variables of Cyber Security Behaviour.
Fida Hasan, K., Hughes, W., & Rahman, A. (2025). Gamifying Cyber Governance: A Virtual Escape Room to Transform Cybersecurity Policy Education.
Kennison, S. M., & Chan-Tin, E. (2020). Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.546546
Khadka, K., & Ullah, A. B. (2025). Human factors in cybersecurity: an interdisciplinary review and framework proposal. International Journal of Information Security, 24(3), 119. https://doi.org/10.1007/s10207-025-01032-0
Kumar, R. (2025). Bibliometric Analysis: Comprehensive Insights into Tools, Techniques, Applications, and Solutions for Research Excellence. Spectrum of Engineering and Management Sciences, 3(1), 45–62. https://doi.org/10.31181/sems31202535k
Ngandu, M. R., Mwansa, G., & Mkabe, Z. (2025). Strengthening cybersecurity in a government department by addressing password management challenges and human factor vulnerabilities. Discover Computing, 28(1), 148. https://doi.org/10.1007/s10791-025-09659-2
Oner, U., Cetin, O., & Savas, E. (2025). Human factors in phishing: Understanding susceptibility and resilience. Computer Standards & Interfaces, 94, 104014. https://doi.org/10.1016/j.csi.2025.104014
Passas, I. (2024). Bibliometric Analysis: The Main Steps. Encyclopedia, 4(2), 1014–1025. https://doi.org/10.3390/encyclopedia4020065
Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. https://doi.org/10.1016/j.cose.2023.103585
Qureshi, R., & Koo, I. (2026). A Comprehensive Survey of Cybersecurity Threats and Data Privacy Issues in Healthcare Systems. Applied Sciences, 16(3), 1511. https://doi.org/10.3390/app16031511
Sharma, D., Mittal, R., Sekhar, R., Shah, P., & Renz, M. (2023). A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization, 10, 100204. https://doi.org/10.1016/j.rico.2023.100204
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119, 102756. https://doi.org/10.1016/j.cose.2022.102756
Singh, P., Dutta, S., & Pranav, P. (2025). Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis. Recent Advances in Computer Science and Communications, 18(2). https://doi.org/10.2174/0126662558280232231213053002
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, & Samuel Onimisi Dawodu. (2024). CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY. Computer Science & IT Research Journal, 5(1), 100–119. https://doi.org/10.51594/csitrj.v5i1.708
Verma, R., Gupta, N., & Kumar, A. (2025). A comprehensive scientometric study of research trends in cybersecurity from 2000 to 2024 using Biblioshiny and VOSviewer. Discover Networks, 1(1). https://doi.org/10.1007/s44354-025-00011-0
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Cindy Muhdiantini, Mega Fitri Yani, Istifa Shania Putri (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Share
Most read articles by the same author(s)
- Cindy Muhdiantini, Mega Fitri Yani, Ibnu Zulkarnain, Trends and Innovations in CRM for Patient Management: A Literature Review , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 2 (2025): April
- Mega Fitri Yani, Istifa Shania Putri, Cindy Muhdiantini, Farid Munadhil, A Bibliometric Analysis of Research Trends in AI Integration within Cloud Computing , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 3 No. 2 (2026): April
Similar Articles
- Muhammad Fauzan Nasrullah, RD. Rohmat Saedudin, Faqih Hamami, COMPARISON ACCURACY OF C4.5 ALGORITHM AND K-NEAREST NEIGHBORS FOR RAINFALL CLASSIFICATION , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 2 (2024): July
- Nenden Eva, Rahma Karina, Septiya Mutiara, RD. Rohmat Saedudin, ANALISIS JAMINAN KUALITAS SISTEM KEAMANAN SIBER PADA SISTEM INFORMASI : SEBUAH STUDI LITERATUR , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 2 (2024): July
- Hasyim Sri Wahyudi, Ferian Fauzi Abdulloh, Optimization of Random Forest Algorithm Using Random Search for Alzheimer's Disease Detection , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Karisma Septa Kresna, Kusnawi, Performance Analysis of SVM and Random Forest Algorithms in the Case of the Influence of Music on Mental Health , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 2 (2025): April
- RIYAN BAYU SATRIYA, Kusnawi Kusnawi, Random Search Optimization Using Random Forest Algorithm For Liver Disease Prediction , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Hasan Abdullah Muhammad, Fitri Adini Firdaus, Ni Ketut Mega Diana Putri, Customer Relationship Management (CRM) Strategy of PT ASDP Indonesia Ferry (Persero): A Customer Satisfaction and Digital Transformation Approach , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 2 (2025): April
- Nenden Eva Meilani Herlina, Sayyid Taufiq Abdulhafizh, Ihfan Aditya Ghafur, RD. Rohmat Saedudin, EVALUATING AND IMPLEMENTING BUSINESS MODEL BASED ON BPEL STRUCTURE: ASYSTEMATIC LITERATURE REVIEW , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 1 (2024): January
You may also start an advanced similarity search for this article.

