A Comparative Analysis of the Current Status and Trends of Domestic and International Privacy Protection Research—CiteSpace-Based Bibliometric Study (1976-2022)
Objective: This paper analyzes
the literature on the topic of privacy protection based on the core databases
included in China Knowledge Network (CNKI) and Web of Science (WOS) from 1976
to 2022, and provides reference for the subsequent research on privacy
protection in China by comparing and summarizing the status of domestic and
foreign research. Methods: The Web of science core collection database
was used as the foreign data source, and the China Knowledge Network database
was used as the domestic data source to retrieve the relevant literature built
up to August 2, 2022, and the authors, countries, institutions, and keywords
were compared and visualized by CiteSpace 6.1.R2 (64-bit). Results: A total of 8223 English-language
and 4573 Chinese-language papers were included, and the number of relevant
studies both at home and abroad was on the rise. Foreign scholars and
institutions cooperate closely with each other and build a stable cooperation network;
while the number of domestic research teams is small and cooperation is
limited. Privacy concern and privacy protection are common research focuses at
home and abroad, while foreign research focuses on online privacy concern and
domestic research pays more attention to computer science privacy protection
model. Privacy information is a current international research hotspot, and
domestic AI privacy protection concerns are high. Conclusion: Domestic
and foreign research in this field is increasingly concerned but each has its
own focus, and domestic research has problems such as lack of cooperation and
lagging research that need to be improved, and privacy protection is a
direction worthy of in-depth research in the future.
References
[1]
Chen, Y. et al. (2015). The Methodological Function of CiteSpace Knowledge Graph. Scientology Research, 33, 242-253.
[2]
China Association for Science and Technology (2018). Blue Book on the Development of Chinese Science and Technology Journals/2017. Science Press.
[3]
Feng, Y. F., Yan, C., & Hu, C. P. (2020). Structural Features and Hotspot Perspective of Domestic Privacy Field Research in the Past 20 Years. Journal of Information Resource Management, 10, 65-74+101.
[4]
Gu, L. P., & Fan, H. C. (2018). The Academic Field of Ten Years of Research on Online Privacy—An Analysis Based on the CiteSpace Visual Scientific Knowledge Graph (2008- 2017). Journalism and Communication Research, 25, 57-73+127.
[5]
Guo, W.-P., & He, D.-X. (2019). Characteristic Distribution and Hotspot Analysis of Archival Research in Chinese Universities in the Last Decade—A Bibliometric and Visual Analysis Based on CNKI Core Journals. Archival Research, No. 2, 25-30.
[6]
Gutierrez, A. et al. (2019). Using Privacy Calculus Theory to Explore Entrepreneurial Directions in Mobile Location-Based Advertising: Identifying Intrusiveness as the Critical Risk Factor. Computers in Human Behavior, 95, 295-306. https://doi.org/10.1016/j.chb.2018.09.015
[7]
Han, L. L. et al. (2022). A Visual Analysis of Hotspots of Domestic and International Research on Fear of Childbirth Based on CiteSpace. Nursing Research, 36, 2093-2100.
[8]
Huang, H. et al. (2020). An Approach to Privacy Preservation of Large-Scale Social Network Data with Weights. Computer Research and Development, 57, 363-377.
[9]
Huang, H. P., Wang, K., Tang, X., & Zhang, D. J. (2019). A Differential Privacy Preservation Scheme Based on the Edge Mediation Model. Journal of Communication, 40, 88-97.
[10]
Kar, A. K., & Dwivedi, Y. K. (2020). Theory Building with Big Data-Driven Research— Moving Away from the “What” towards the “Why”. International Journal of Information Management, 54, Article ID: 102205. https://doi.org/10.1016/j.ijinfomgt.2020.102205
[11]
Lee, D.-J., Ahn, J.-H., & Bang, Y. (2011). Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection. MIS Quarterly, 35, 423-444. https://doi.org/10.2307/23044050
[12]
Li, W.-P., Yang, J., Zhang, J.-P., & Yin, G.-S. (2015). Personalized Trajectory Privacy Protection Algorithm Based on CCA. Journal of Jilin University (Engineering Edition), 45, 630-638.
[13]
Li, J., & Chen, C. M. (2017). CiteSpace Technology Text Mining and Visualization (2nd ed.). Capital University of Economics and Business Press. http://www.yunzhan365.com/basic/91432764.html
[14]
Li, Y. P., Cao, Q., Zhang, K., & Ren, F. (2021). A Secure Index Resisting Keyword Privacy Leakage from Access and Search Patterns in Searchable Encryption. Journal of Systems Architecture, 115, Article ID: 102006. https://doi.org/10.1016/j.sysarc.2021.102006
[15]
Liu, T. T., & Lai, Z. S. (2022). From Non-Player Characters to Othered Participants: Chinese Women’s Gaming Experience in the “Free” Digital Market. Information, Communication & Society, 25, 376-394. https://doi.org/10.1080/1369118X.2020.1791217
[16]
Minsky, N. (1976). Intentional Resolution of Privacy Protection in Database Systems. Communications of the ACM, 19, 148-159. https://doi.org/10.1145/360018.360027
[17]
Ni, W. W., Chen, G., Chong, Z. H., & Wu, Y. J. (2012). A Study on Clustering-Oriented Data Hiding and Publishing. Computer Research and Development, 49, 1095-1104.
[18]
Oberg, C., & Alexander, A. T. (2019). The Openness of Open Innovation in Ecosystems— Integrating Innovation and Management Literature on Knowledge Linkages. Journal of Innovation & Knowledge, 4, 211-218. https://doi.org/10.1016/j.jik.2017.10.005
[19]
Ozdemir, Z. D., Jeff Smith, H., & Benamati, J. H. (2017). Antecedents and Outcomes of Information Privacy Concerns in a Peer Context: an Exploratory Study. European Journal of Information Systems, 26, 642-660. https://doi.org/10.1057/s41303-017-0056-z
[20]
Rong, H. G., Ma, Y. X., Du, M. J., & Fei, Y. T. (2022). Hotspots and Frontier Analysis of Chinese Herbal Medicine Management Research Based on CiteSpace Visualization Mapping in China. Chinese Herbal Medicine, 53, 4075-4083.
[21]
Shu, S., & Liu, Y. (2021). Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research. Journal of Theoretical and Applied Electronic Commerce Research, 16, 727-747. https://doi.org/10.3390/jtaer16040042
[22]
Sundaram, R., & Shetty, S. (2022). Privacy Concerns and Protection Behavior during the Covid-19 Pandemic. Problems and Perspectives in Management, 20, 57-70. https://doi.org/10.21511/ppm.20(2).2022.06
[23]
Wan, S. et al. (2016). Advances in Location Privacy Protection Technology Research. Journal of Communication, 37, 124-141.
[24]
Wang, H. (2021). A Study on the Rise of Personal Privacy Protection Awareness in the Era of Big Data—A Visual Knowledge Graph Analysis Based on CiteSpace. Henan Science and Technology, 40, 11-14.
[25]
Wang, Z. Y. et al. (2020). Research Progress and Development Trend of Social Media Big Data (SMBD): Knowledge Mapping Analysis Based on CiteSpace. ISPRS International Journal of Geo-Information, 9, Article No. 632. https://doi.org/10.3390/ijgi9110632
[26]
Xu, J. H., Hou, W. P., & Hu, S. M. (2020). Historical Changes and Frontier Hotspots in a Century of Privacy Research in English Academia—A CiteSpace Analysis Based on the Web of Science Database. Governance Studies, 36, 109-122.
[27]
Xu, Z. Q., Xiang, D., & He, J. L. (2021). Data Privacy Protection in News Crowdfunding in the Era of Artificial Intelligence. Journal of Global Information Management, 30, 1-17. https://doi.org/10.4018/JGIM.286760
[28]
Yang, J., Zhao, J. S., & Zhang, J. P. (2013). A Privacy Preserving Approach for High- Dimensional Data Mining. Journal of Electronics, 41, 2187-2192.
[29]
Zhang, L., Ma, C. G., Yang, S. T., & Li, Z. P. (2017). An Approach to Location Privacy Preservation with Indistinguishable Association Probabilities. Journal of Communication, 38, 37-49.
[30]
Zhang, Y. F., & Xu, H. X. (2022). Accountable Monero System with Privacy Protection. Security and Communication Networks, 2022, Article ID: 7746341. https://doi.org/10.1155/2022/7746341
[31]
Zhu, S., & Yang, G. (2022). PCA Differential Privacy Data Publishing Algorithm in Transversal Federated Learning. Computer Applications Research, 39, 236-239+248.
[32]
Zhu, W. (2013). A Survey and Analysis of Domestic and Foreign Social Network Privacy Protection Research. Information Technology Research, 39, 5-9.