全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Comparative Analysis of the Current Status and Trends of Domestic and International Privacy Protection Research—CiteSpace-Based Bibliometric Study (1976-2022)

DOI: 10.4236/ojbm.2022.106150, PP. 3024-3047

Keywords: Privacy Protection, Comparative Analysis, Bibliography, CiteSpace

Full-Text   Cite this paper   Add to My Lib

Abstract:

Objective: This paper analyzes the literature on the topic of privacy protection based on the core databases included in China Knowledge Network (CNKI) and Web of Science (WOS) from 1976 to 2022, and provides reference for the subsequent research on privacy protection in China by comparing and summarizing the status of domestic and foreign research. Methods: The Web of science core collection database was used as the foreign data source, and the China Knowledge Network database was used as the domestic data source to retrieve the relevant literature built up to August 2, 2022, and the authors, countries, institutions, and keywords were compared and visualized by CiteSpace 6.1.R2 (64-bit). Results: A total of 8223 English-language and 4573 Chinese-language papers were included, and the number of relevant studies both at home and abroad was on the rise. Foreign scholars and institutions cooperate closely with each other and build a stable cooperation network; while the number of domestic research teams is small and cooperation is limited. Privacy concern and privacy protection are common research focuses at home and abroad, while foreign research focuses on online privacy concern and domestic research pays more attention to computer science privacy protection model. Privacy information is a current international research hotspot, and domestic AI privacy protection concerns are high. Conclusion: Domestic and foreign research in this field is increasingly concerned but each has its own focus, and domestic research has problems such as lack of cooperation and lagging research that need to be improved, and privacy protection is a direction worthy of in-depth research in the future.

References

[1]  Chen, Y. et al. (2015). The Methodological Function of CiteSpace Knowledge Graph. Scientology Research, 33, 242-253.
[2]  China Association for Science and Technology (2018). Blue Book on the Development of Chinese Science and Technology Journals/2017. Science Press.
[3]  Feng, Y. F., Yan, C., & Hu, C. P. (2020). Structural Features and Hotspot Perspective of Domestic Privacy Field Research in the Past 20 Years. Journal of Information Resource Management, 10, 65-74+101.
[4]  Gu, L. P., & Fan, H. C. (2018). The Academic Field of Ten Years of Research on Online Privacy—An Analysis Based on the CiteSpace Visual Scientific Knowledge Graph (2008- 2017). Journalism and Communication Research, 25, 57-73+127.
[5]  Guo, W.-P., & He, D.-X. (2019). Characteristic Distribution and Hotspot Analysis of Archival Research in Chinese Universities in the Last Decade—A Bibliometric and Visual Analysis Based on CNKI Core Journals. Archival Research, No. 2, 25-30.
[6]  Gutierrez, A. et al. (2019). Using Privacy Calculus Theory to Explore Entrepreneurial Directions in Mobile Location-Based Advertising: Identifying Intrusiveness as the Critical Risk Factor. Computers in Human Behavior, 95, 295-306.
https://doi.org/10.1016/j.chb.2018.09.015
[7]  Han, L. L. et al. (2022). A Visual Analysis of Hotspots of Domestic and International Research on Fear of Childbirth Based on CiteSpace. Nursing Research, 36, 2093-2100.
[8]  Huang, H. et al. (2020). An Approach to Privacy Preservation of Large-Scale Social Network Data with Weights. Computer Research and Development, 57, 363-377.
[9]  Huang, H. P., Wang, K., Tang, X., & Zhang, D. J. (2019). A Differential Privacy Preservation Scheme Based on the Edge Mediation Model. Journal of Communication, 40, 88-97.
[10]  Kar, A. K., & Dwivedi, Y. K. (2020). Theory Building with Big Data-Driven Research— Moving Away from the “What” towards the “Why”. International Journal of Information Management, 54, Article ID: 102205.
https://doi.org/10.1016/j.ijinfomgt.2020.102205
[11]  Lee, D.-J., Ahn, J.-H., & Bang, Y. (2011). Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection. MIS Quarterly, 35, 423-444.
https://doi.org/10.2307/23044050
[12]  Li, W.-P., Yang, J., Zhang, J.-P., & Yin, G.-S. (2015). Personalized Trajectory Privacy Protection Algorithm Based on CCA. Journal of Jilin University (Engineering Edition), 45, 630-638.
[13]  Li, J., & Chen, C. M. (2017). CiteSpace Technology Text Mining and Visualization (2nd ed.). Capital University of Economics and Business Press.
http://www.yunzhan365.com/basic/91432764.html
[14]  Li, Y. P., Cao, Q., Zhang, K., & Ren, F. (2021). A Secure Index Resisting Keyword Privacy Leakage from Access and Search Patterns in Searchable Encryption. Journal of Systems Architecture, 115, Article ID: 102006.
https://doi.org/10.1016/j.sysarc.2021.102006
[15]  Liu, T. T., & Lai, Z. S. (2022). From Non-Player Characters to Othered Participants: Chinese Women’s Gaming Experience in the “Free” Digital Market. Information, Communication & Society, 25, 376-394.
https://doi.org/10.1080/1369118X.2020.1791217
[16]  Minsky, N. (1976). Intentional Resolution of Privacy Protection in Database Systems. Communications of the ACM, 19, 148-159.
https://doi.org/10.1145/360018.360027
[17]  Ni, W. W., Chen, G., Chong, Z. H., & Wu, Y. J. (2012). A Study on Clustering-Oriented Data Hiding and Publishing. Computer Research and Development, 49, 1095-1104.
[18]  Oberg, C., & Alexander, A. T. (2019). The Openness of Open Innovation in Ecosystems— Integrating Innovation and Management Literature on Knowledge Linkages. Journal of Innovation & Knowledge, 4, 211-218.
https://doi.org/10.1016/j.jik.2017.10.005
[19]  Ozdemir, Z. D., Jeff Smith, H., & Benamati, J. H. (2017). Antecedents and Outcomes of Information Privacy Concerns in a Peer Context: an Exploratory Study. European Journal of Information Systems, 26, 642-660.
https://doi.org/10.1057/s41303-017-0056-z
[20]  Rong, H. G., Ma, Y. X., Du, M. J., & Fei, Y. T. (2022). Hotspots and Frontier Analysis of Chinese Herbal Medicine Management Research Based on CiteSpace Visualization Mapping in China. Chinese Herbal Medicine, 53, 4075-4083.
[21]  Shu, S., & Liu, Y. (2021). Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research. Journal of Theoretical and Applied Electronic Commerce Research, 16, 727-747.
https://doi.org/10.3390/jtaer16040042
[22]  Sundaram, R., & Shetty, S. (2022). Privacy Concerns and Protection Behavior during the Covid-19 Pandemic. Problems and Perspectives in Management, 20, 57-70.
https://doi.org/10.21511/ppm.20(2).2022.06
[23]  Wan, S. et al. (2016). Advances in Location Privacy Protection Technology Research. Journal of Communication, 37, 124-141.
[24]  Wang, H. (2021). A Study on the Rise of Personal Privacy Protection Awareness in the Era of Big Data—A Visual Knowledge Graph Analysis Based on CiteSpace. Henan Science and Technology, 40, 11-14.
[25]  Wang, Z. Y. et al. (2020). Research Progress and Development Trend of Social Media Big Data (SMBD): Knowledge Mapping Analysis Based on CiteSpace. ISPRS International Journal of Geo-Information, 9, Article No. 632.
https://doi.org/10.3390/ijgi9110632
[26]  Xu, J. H., Hou, W. P., & Hu, S. M. (2020). Historical Changes and Frontier Hotspots in a Century of Privacy Research in English Academia—A CiteSpace Analysis Based on the Web of Science Database. Governance Studies, 36, 109-122.
[27]  Xu, Z. Q., Xiang, D., & He, J. L. (2021). Data Privacy Protection in News Crowdfunding in the Era of Artificial Intelligence. Journal of Global Information Management, 30, 1-17.
https://doi.org/10.4018/JGIM.286760
[28]  Yang, J., Zhao, J. S., & Zhang, J. P. (2013). A Privacy Preserving Approach for High- Dimensional Data Mining. Journal of Electronics, 41, 2187-2192.
[29]  Zhang, L., Ma, C. G., Yang, S. T., & Li, Z. P. (2017). An Approach to Location Privacy Preservation with Indistinguishable Association Probabilities. Journal of Communication, 38, 37-49.
[30]  Zhang, Y. F., & Xu, H. X. (2022). Accountable Monero System with Privacy Protection. Security and Communication Networks, 2022, Article ID: 7746341.
https://doi.org/10.1155/2022/7746341
[31]  Zhu, S., & Yang, G. (2022). PCA Differential Privacy Data Publishing Algorithm in Transversal Federated Learning. Computer Applications Research, 39, 236-239+248.
[32]  Zhu, W. (2013). A Survey and Analysis of Domestic and Foreign Social Network Privacy Protection Research. Information Technology Research, 39, 5-9.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133