Next Article in Journal
Big-Data Platform for Performance Monitoring of Telecom-Service-Provider Networks
Next Article in Special Issue
Trends and Perspectives of Romanian E-Commerce Sector Based on Mathematical Simulation
Previous Article in Journal
WeaveNet: Solution for Variable Input Sparsity Depth Completion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity

Faculty of Economic Sciences and Business Administration, Transilvania University of Brașov, 500036 Brașov, Romania
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(14), 2223; https://doi.org/10.3390/electronics11142223
Submission received: 27 June 2022 / Revised: 13 July 2022 / Accepted: 14 July 2022 / Published: 16 July 2022

Abstract

:
As technology becomes more sophisticated so do cyber-attacks. The resilience of electronic commerce organisations represents a critical point nowadays because it influences consumer and digital business behaviour. In this context, the cybersecurity and electronic commerce knowledge were reviewed as a unit. The main aim of this paper is to support researchers and managers in understanding the theoretical framework and to provide a knowledge-based model. To achieve this aim, the authors performed an analysis of 14,585 papers from the Web of Science Core Collection that generated two visualized networks, analyzed with the metrics mean silhouette, modularity, betweenness centrality, and citation bursts in the context of digital resilience. The mapping process results show that the human factor represents the central junction with the fear of cyber-attacks and the perception of online shopping as risky. The adoption of electronic commerce and mobile commerce are two challenging research lines in the global economic resilience. Their adoption enabled by big data, artificial intelligence, machine learning, and even blockchain technology can strengthen resilience even when cybersecurity education is needed.

1. Introduction

The entire world faced an unprecedented situation in 2020, the COVID-19 pandemic [1], which led to another major series of changes. For example, in Singapore, cybercrime accounts for almost half of the total crimes reported, and the number of ransomware attacks rose by 154% [2]. A recent study [3] demonstrated that European countries develop different sensitivities to cybersecurity issues. The Craigen et al. study revealed the definition of cybersecurity as “the organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign the jure from de facto property rights” [4]. In addition, this topic is the subject of national interest because the United States consider cyber offence and cyber defence as “vital elements of security strategies”, these being more related to national policies and defence strategies [5]. Digitization and cybersecurity play a key role in the NGEU (Next Generation EU), which are two of the main drivers of sustainable development [6]. The purpose of the NGEU is to support the sustainability-resilience relationship and the importance of cybersecurity is highlighted in this way. It becomes necessary to protect the information and data of citizens and companies (this paper highlights the need for new studies in the context of electronic commerce [3]. All of this generates a positive relationship between information systems, sustainability, and resilience [3].
All of these challenges have decisively influenced various areas, especially electronic commerce and digital business—both company and consumer behaviour.
Contrastingly, the study of Dirgantar et al. [7] brings forward the importance of the information system for electronic commerce organisations, whereby their results confirmed that system characteristics such as quality, information quality, or service quality, influence the level of use and user satisfaction of customers. An information system refers to the process of collecting, processing, storing, and transmitting relevant information to assist decision-making and foster operations in any type of organization [8]. It involves a set of interconnected components such as hardware, software devices, human resources, and networks that contribute to improving organizational productivity, efficiency, and effectiveness while ensuring business survival and resilience [9,10]. In the absence of a resilience mechanism to overcome interruptions in business, as usual, activities in electronic commerce could no longer function [11]. Resilience may be analyzed from the perspective of cyber threats to the information system, as cyber resilience can help organizations to anticipate and manage them [12,13]. At the same time, increasing resilience in electronic commerce can be achieved using Artificial Intelligence, which can contribute to ‘readying supply chains to reduce their risk of disruption’ [14]. To combat threats, function accordingly, and take on challenges, information systems must adapt through structural and operational resilience techniques [15]. So, to prevent companies from losing important components of their information systems, cybersecurity is the key to success [16,17].
Contrastingly, the COVID-19 pandemic forced ‘late’ consumers to reduce the digital gap, directing them to electronic commerce platforms [18], but it also demonstrated the resilience of consumers increases [19,20,21]. Digital resilience is not a new concept, its definition has existed in literature for many years [22]. It is “the ability for an organization to rapidly adapt to business disruptions by leveraging digital capabilities to not only restore business operations but also capitalize on the changed conditions” [23]. Contrastingly, cyber resilience is the capacity to protect data and electronic systems from cyber-attacks, but also, to rapidly resume business operations in the case of a successful attack event. [24]. Knowing these aspects, the digital resilience of electronic commerce was ascertained [25], as was the importance of long-term planning, and the need for strategic skills to make the right decisions for traders [26]. Electronic commerce is a vital element in worldwide economic resilience [27] and the adoption of digitisation and digital platforms is an ‘escape hatch’ in the development strategy and resilience of organisations [28,29,30]. Even though there are still potential consumers who perceive online shopping as risky [30], it is concerned about both the resilience of the retailer’s information system and the security of personal data [31,32].
All of these facts have revolutionized people’s lives and influenced users’ buying habits, and the way that companies sell their products or services [33]. As such, information system security became a major challenge for modern organisations, which has led to a growing interest from academia and researchers in information security knowledge. [34].
To better understand the context regarding electronic commerce, cybersecurity, and digital resilience, the authors illustrated Figure 1.
In this context, the authors tried to find resilient opportunities for electronic commerce, by aiming to analyse the research knowledge fields, respectively. The study was performed with the method of visual network analysis with Java technology by constructing and observing the connections between the scientific resources.
The results were conducted to relevant outcomes for proposing a new conceptual model by including all relevant key concepts regarding the knowledge fields included in the study. (The Resilience Right Decisions for Electronic Commerce and Cybersecurity Model).
All the concepts existing in the literature, the methods used, and the results are presented in the subsequent sections. The article finishes with a discussion and conclusion section, followed by two sections that highlight the importance of the study and the its necessity to the scientific community.

2. Materials and Methods

Due to the complexity of the materials and method used, this section is presented in three parts. The first one is allocated to data collection, followed by project configurations, whereas the final part introduces details about the analysis method. For a better understanding, Table 1 introduces the abbreviations used before any methodological considerations.

2.1. Data Collection

Following the framework guidelines published by Mukherjee et al., 2022 [35] and Donthu et al., 2021 [36], the authors created a comparative narrative report based on three areas of knowledge, respectively. The primary source for the dataset was the Web of Science. Using the basic search of the database, bibliometrics such as topic or keyword were applied to the timespan between 2000 and 2022. The analysis started by inserting the keyword in the search field for the following terms related to the topics of interest: electronic commerce, cybersecurity, and digital resilience.
This action was performed first because the authors were interested in mapping the network and visualizing the connections between all research publications related to these fields. The basic search found only two results (papers), which was an astonishing surprise as the authors discovered the potential of the research knowledge in these areas. Therefore, the study framework was supposed to analyse each field one-by-one, by creating individual databases with the scientific papers published. Firstly, “electronic commerce” was searched for, using the period between 2000 and 2022. The search generated 1579 results from the Web of Science Core Collection. They were displayed by relevance, aiming to increase the quality of papers included in the study. Moreover, the authors observed and collected the number of citations of the most relevant published paper in the field. The same process was followed for each topic, resulting in a generous number of papers as follows in Table 2. Each of them were downloaded as plain text files and prepared in a data file for analysis.

2.2. Project Configuration

The network construction process was represented by configuring the time-slicing parameter from 2000 to 2022, and text processing by checking title, abstract, author keywords (DE), and keywords. After that, the network was set up with the default node type (cited reference). The selection criteria for all the items included in the study are represented by top N = 50, which means that the software selected the fifty most cited items for each slice to construct the network. In the same row, the top N% per slice was set up to 10%, indicating that the selection was made for 10% of the most cited items or most frequent items per slice. The selection criteria used for each slice are the modified g-index (the alternative for the older h-index) and the scale factor k = 25.
g 2 = k Σ   i g c i ,   k Z +
where k is the number of publications and c is the number of citations.

2.3. Analysis Method

Several CiteSpace [37] features were used. The first one is a clustering function used to identify a specific theme, topic, or line of research. The second one is the metric modularity Q, which measures the extent to which a network can be discomposed into multiple components. Then, the mean silhouette highlights the overall structure of the network.
For example, the authors used this to show the homogeneity of the cluster. Its value ranges between −1 and 1, hence the higher the score, the more consistent the cluster members are. The labelling of the clusters process was performed to characterise the nature of identified clusters. The authors extracted the noun phrases from titles, keywords, and abstracts.
To find out where one may find the major areas of research, the authors set up the nodes and the font sizes, and the transparency of the links. After that, to see how these major areas are connected, the authors used the betweenness centrality indicator to highlight the nodes with high scores.
The burst detection process is supposed to use citation on burst indicator to find where the most active areas are in the field. The parameter provides information about the publications that attracted an extraordinary degree of attention during the time based on Kleinberg’s algorithm [38]. To run the analysis, the selected node type was the keyword for a time span between 2000 and 2022, slice length = 1, and Top N = 100. Additionally, the citation burst history helped the authors to summarise the list of articles associated with citation bursts for each field.
Lastly, a cluster exploration was run to analyse the clusters in more depth and a timeline view was set up to position each cluster arranged on a horizontal timeline.

3. Results

The network mapping process generated the comparative outcome illustrated in Figure 2.

3.1. Electronic Commerce

Running the project for this knowledge field, 1570 references were included in the study and due to software criteria, in the final, 1559 were qualified records (2000–2022). To visualise some relevant groupings for this research area, the clustering process generated 280 groups with the top research lines labelled according to the dimension of each one. The authors characterised the nature of the groupings by choosing to select noun phrases from the titles and showing labels by the log-likelihood ratio (LLR). The cluster labels are shown as follows in Figure 2. The modularity Q (0.9559) and the mean Silhouette S (0.9806), the metrics that describe the structural properties of the network, show a high homogeneity of the clusters and dense connections between nodes within them. Therefore, the network is divided into five co-citations clusters (Figure 3) and the most relevant ones with their sizes and top terms are presented as follows in Table 3.
To find what the most active areas in the electronic commerce field of knowledge are, a burst detection was performed. To do so, the reference node was selected to showcase the landmark’s papers in this field by this indicator [39].
Another useful result is related to the centrality indicator that shows how the major areas are connected, presenting the paper with the highest centrality papers [40], Bastl M, 2012, INT J OPER PROD MAN, 32, 650, Bennett D, 2012, INT J OPER PROD MAN, 32, 1281, Cai SH, 2010, J OPER MANAG, 28, 257.
Therefore, the burst detection by keywords determined the authors to present the big picture of the topics of interest in the electronic commerce field (Table 4).
In generating the top keywords report, the authors wanted to discover more details relating to it, so a mapping of clusters (Figure 4) by keyword node was performed. The results exhibit 146 clusters for the same time span; the selection criteria are represented by the Top 10% per slice and 1.00% nodes labelled, without pruning (network, N = 18,325, E = 57,424, and density = 0.0003).
By title node, the electronic commerce research area is divided into thirteen co-citations clusters for 1559 qualified records. The timeline view illustrates the evolution of the main topics of research as follows in Figure 5. The generated data shows the most relevant topics in electronic commerce by clusters (Table 5).

3.2. Cybersecurity

The labelling process of the clusters for cybersecurity was based on 10,245 qualified records and generated 234 groups with high homogeneity (S = 0.9268). Table 6 shows that the size of each cluster is relevant enough to present the major research lines.
To see how the major areas are interconnected (Figure 6), the betweenness centrality analysis was used. By the reference node, the item with the higher centrality (47) is associated with the process of attack detection using deep learning for IoT[] [45], which is ranked in Cluster #1.
Afterwards, the authors discovered what the most active areas in cybersecurity are, with the help of burst detection for reference nodes. The results showed that three of the topics are related to the law applicable to Cyber operations [46] and cybersecurity in the Smart Grid (next-generation power systems) [47].
To enable a comparison between electronic commerce and cybersecurity fields of research by keyword node, a new analysis for 10,242 qualified records was run. The major themes for cybersecurity are divided into sixty-nine clusters with the three preeminent presented in Table 7.
The Silhouette means shows a relatively high homogeneity which is associated with the large sizes of the clusters. Therefore, the keyword nodes associated with the most relevant citers for each cluster highlight the impact of their work on the related topic of research. By comparing cybersecurity with electronic commerce (Figure 7), the authors aimed to find a possible nexus path between them. Analysing the models, cluster #0, cybersecurity awareness in cybersecurity, and cluster #2, electronic commerce adoption emerged.
Both seem to represent major areas in each network; therefore, a detailed analysis by keyword nodes was performed for further analysis of cybersecurity knowledge. The top keywords are shown in Table 8.

4. Discussion

The paper enriches the literature by bringing together three major themes that are strongly inter-connected. Remembering Figure 1 presented in the introduction (where the existing scientific contribution related to electronic commerce, cybersecurity, and digital resilience were illustrated), the authors exhibit a single big picture of the findings, connecting the current state of knowledge. Thus, to illustrate the important outcomes of the study, a conceptual model of Resilience Right Decisions for Electronic Commerce and Cybersecurity was created (Figure 8).
Electronic commerce, as a vital element in worldwide economic resilience, gains a lot of attention currently from the point of view of implementing the necessary technology to use it. Electronic commerce adoption and mobile commerce adoption are two important challenging research lines for this field in the global economic resilience [27]; the largest group of references by the keywords criteria validated it. Electronic commerce, customer experience, social media, search engine marketing, and big data perspective represent the guideline topics for digital business owners. This fact highlights the global impact.
The study revealed that cybersecurity with specific threats, the quality of information security, and the security of personal data were found as the main challenges for the resilience and the right decisions for stakeholders [26].
The analysis performed centred on the human factor in the middle of the pursuit of the risk faced when cybersecurity is referred to. The fear of cyber-attacks, such as ransomware or other types of cyber threats, is no longer a novel issue. What is now a real concern refers to facing the perception of online shopping as being risky, especially from the point of view of personal data security. Consumers who perceive online shopping as risky and who are concerned about the resilience of the retailer’s infrastructure and the security of the personal data [31,32] draw a connection with cybersecurity awareness, which requires the need for fraud mitigation in the online environment. The connection between cybersecurity and electronic commerce adoption asks for cybersecurity education, cyber awareness, data protection with lasting attention to purchasing behaviour, e-WOM, social commerce, and fast shipping to increase the resilience of digital businesses. A relevant outcome of this study revealed that aiding better development requires the use of data, even in the face of challenges related to global cybersecurity. Adding blockchain and machine learning alongside Artificial Intelligence [14] as technologies in use for strengthening resilience can represent the right decision for traders to accelerate the recovery to pre-COVID-19 levels. Additionally, the results of the study can complement other knowledge research fields, such as digital transformation (addressed with bibliometric analysis) [48], cyber threat and cyber-attack literature for higher education [49], but also, a global perspective on cybersecurity trends [50].

5. Conclusions

The authors bring to light a summary of the electronic commerce research and cybersecurity knowledge field, strongly connected with global digital resilience, by presenting to the academic world: the big picture, which is easy to understand. The Resilience Right Decisions for Electronic Commerce and Cybersecurity Model promotes the top priorities and useful information, increasing the awareness of the global impact of cybersecurity on commerce performed in the digital environment.
The managerial implications point to the priority of deploying cybersecurity optimisation actions to shape marketing strategies for purchase, re-purchase behaviour, and technology adoption. The most important detail business owners should understand is related to the nature of the human factor, which influences the competitiveness of organisations and their resilience, especially during hard times. Knowing about factors such as purchase behaviour, customer experience, blockchain technology, big data, and data protection, organisations can develop a strong resilience. Additionally, business owners have the opportunity to deploy solutions regarding the quality and security of the infrastructure and know-how for the safe use of resources: both for customers and employees.
The theoretical implications consist of collaborating with organisations, researchers, and publishers to develop and promote new theoretical frameworks to implement cybersecurity solutions for electronic commerce. Among the types of study they could create in the research field are: sentiment analysis, latent transition analysis, literature reviews, and empirical investigations.
The first limit comes from studying the research papers by only using the Web of Science Core Collection database. The second limit is represented by the probability of including several articles that are less relevant for the analysis because of the selection made automatically by the software. Additionally, the authors decided to choose only two research knowledge fields—the possibilities being endless.
These facts can turn into research directions by extending the number of both research knowledge fields. Additionally, an extension from the Web of Science Core Collection to the SCOPUS database may enlarge the analysis opportunities. It is also possible to conduct direct research on the perception of electronic commerce site owners, regarding the impact of cybersecurity, to develop their businesses.

Author Contributions

Conceptualization, D.R.V., E.N., O.M.Ț., A.Z., I.B.C., T.F. and G.B.; methodology, E.N., G.B.; literature review, I.B.C., D.R.V., A.Z.; analysis and writing the results, E.N. and O.M.Ț.; discussion and conclusions, E.N., I.B.C., O.M.Ț., D.R.V., A.Z., T.F. and G.B.; writing—original draft preparation, E.N., I.B.C., A.Z.; writing—review and editing, I.B.C., O.M.Ț., D.R.V., A.Z., T.F. and G.B.; supervision, G.B.; project administration, G.B.; funding acquisition, G.B. All authors have read and agreed to the published version of the manuscript.

Funding

This APC was funded by Transilvania University of Brașov.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available online at shorturl.at/dfiEP (last accessed on 23 June 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Scutariu, A.-L.; Șuşu, Ș.; Huidumac-Petrescu, C.-E.; Gogonea, R.-M. A Cluster Analysis Concerning the Behavior of Enterprises with E-Commerce Activity in the Context of the COVID-19 Pandemic. J. Theor. Appl. Electron. Commer. Res. 2021, 17, 47–68. [Google Scholar] [CrossRef]
  2. CSA Singapore. Ransomware Incidents, Online Scams, and COVID-19-Related Phishing Activities Dominated Cyber Landscape in 2020. Available online: https://www.csa.gov.sg/News/Press-Releases/ransomware-incidents-online-scams-and-covid19-related-phishing-activities-dominated-cyber-landscape-in-2020 (accessed on 10 February 2022).
  3. D’Adamo, I.; González-Sánchez, R.; Medina-Salgado, M.S.; Settembre-Blundo, D. E-Commerce Calls for Cyber-Security and Sustainability: How European Citizens Look for a Trusted Online Environment. Sustainability 2021, 13, 6752. [Google Scholar] [CrossRef]
  4. Craigen, D.; Diakun-Thibault, N.; Purse, R. Defining Cybersecurity. Technol. Innov. Manag. Rev. 2014, 4, 13–21. [Google Scholar] [CrossRef]
  5. Ukhanova, E. Cybersecurity and cyber defence strategies of Japan. SHS Web Conf. 2022, 134, 00159. [Google Scholar] [CrossRef]
  6. Uniunea Europeana. Next Generation EU. Available online: https://europa.eu/next-generation-eu/index_ro (accessed on 10 February 2022).
  7. Dirgantari, P.D.; Hidayat, Y.M.; Mahphoth, M.H.; Nugraheni, R. Level of Use and Satisfaction of E-Commerce Customers in Covid-19 Pandemic Period: An Information System Success Model (ISSM) Approach. Indones. J. Sci. Technol. 2020, 5, 261–270. [Google Scholar] [CrossRef]
  8. Hailu, T. The Impact of Information System (IS) on Organziational Performace: With Special Refernce to Ethio-Telecom Southern Region, Hawassa. Eur. J. Bus. Manag. 2014, 6, 331–338. [Google Scholar]
  9. Salem, A.M.; Yaser, H.; Shamsuddin, A.; Aziati, A. The Role of Different Types of Information Systems in Business Organization: A Review. Int. J. Res. 2014, 1, 1279–1286. [Google Scholar]
  10. Setyowati, W.; Widayanti, R.; Supriyanti, D. Implementation Of E-Business Information System in Indonesia: Prospects And Challenges. Int. J. Cyber IT Serv. Manag. (IJCITSM) 2021, 1, 180–188. [Google Scholar] [CrossRef]
  11. Spagnoletti, P.; Ceci, F.; Bygstad, B. Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark. Inf. Syst. Front. 2021, 9, 10187. [Google Scholar] [CrossRef]
  12. Carias, J.F.; Borges, M.R.S.; Labaka, L.; Arrizabalaga, S.; Hernantes, J. Systematic Approach to Cyber Resilience Operationalization in SMEs. IEEE Access 2020, 8, 174200–174221. [Google Scholar] [CrossRef]
  13. van Haastrecht, M.; Ozkan, B.Y.; Brinkhuis, M.; Spruit, M. Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Appl. Sci. 2021, 11, 6909. [Google Scholar] [CrossRef]
  14. Modgil, S.; Singh, R.K.; Hannibal, C. Artificial intelligence for supply chain resilience: Learning from Covid-19. Int. J. Logist. Manag. 2021. ahead-of-print. [Google Scholar] [CrossRef]
  15. Dobson, S.; Hutchison, D.; Mauthe, A.; Schaeffer-Filho, A.; Smith, P.; Sterbenz, J.P.G. Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues. Proc. IEEE 2019, 107, 819–834. [Google Scholar] [CrossRef] [Green Version]
  16. Lezzi, M.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comput. Ind. 2018, 103, 97–110. [Google Scholar] [CrossRef]
  17. Jbair, M.; Ahmad, B.; Maple, C.; Harrison, R. Threat modelling for industrial cyber physical systems in the era of smart manufacturing. Comput. Ind. 2022, 137, 103611. [Google Scholar] [CrossRef]
  18. Cavallo, C.; Sacchi, G.; Carfora, V. Resilience effects in food consumption behaviour at the time of Covid-19: Perspectives from Italy. Heliyon 2020, 6, e05676. [Google Scholar] [CrossRef]
  19. Guthrie, C.; Fosso-Wamba, S.; Arnaud, J.B. Online consumer resilience during a pandemic: An exploratory study of e-commerce behavior before, during and after a COVID-19 lockdown. J. Retail. Consum. Serv. 2021, 61, 102570. [Google Scholar] [CrossRef]
  20. Kirk, C.P.; Rifkin, L.S. I’ll trade you diamonds for toilet paper: Consumer reacting, coping and adapting behaviors in the COVID-19 pandemic. J. Bus. Res. 2020, 117, 124–131. [Google Scholar] [CrossRef]
  21. Hamilton, R.W.; Mittal, C.; Shah, A.; Thompson, D.V.; Griskevicius, V. How Financial Constraints Influence Consumer Behavior: An Integrative Framework. J. Consum. Psychol. 2018, 29, 285–305. [Google Scholar] [CrossRef]
  22. Weller, M.; Anderson, T. Digital resilience in higher education. Eur. J. Open Distance e-Learn. 2013, 16, 53. [Google Scholar]
  23. IDC. Digital Resiliency. Redefining Resiliency. 2020. Available online: https://www.idc.com/eu/research/key-trends/digital-resiliency (accessed on 27 June 2022).
  24. European Central Bank. What is Cyber Resilience? Available online: https://www.ecb.europa.eu/paym/cyber-resilience/html/index.en.html (accessed on 27 June 2022).
  25. Han, B.R.; Sun, T.; Chu, L.Y.; Wu, L. COVID-19 and E-Commerce Operations: Evidence from Alibaba. Manuf. Serv. Oper. Manag. 2022, 24, 1388–1405. [Google Scholar] [CrossRef]
  26. Weber, A.N. Responding to supply chain disruptions caused by the COVID-19 pandemic: A Black Swan event for omnichannel retailers. J. Transp. Supply Chain Manag. 2021, 15, 16. [Google Scholar] [CrossRef]
  27. Presto, M.M. Evaluating the Significant Role of E-Commerce to the Resiliency of MSMEs During the COVID-19 Pandemic. Ascendens Asia J. Multidiscip. Res. Conf. Proc. 2021, 4. Available online: https://ojs.aaresearchindex.com/index.php/aajmrcp/article/view/533 (accessed on 27 June 2022).
  28. Costa, J.; Castro, R. SMEs Must Go Online—E-Commerce as an Escape Hatch for Resilience and Survivability. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 3043–3062. [Google Scholar] [CrossRef]
  29. Appel, A.; Hardaker, S. Strategies in Times of Pandemic Crisis—Retailers and Regional Resilience in Würzburg, Germany. Sustainability 2021, 13, 2643. [Google Scholar] [CrossRef]
  30. Anatan, L. A review on MSMEs resilience: Strategies and policies post covid-19 pandemic. Rev. Integr. Bus. Econ. Res. 2021, 10, 386–394. [Google Scholar]
  31. Velimirovic, J.D.; Janjic, A.; Velimirovic, L.Z. Modelling electronic trust using bayesian networks. In Proceedings of the International May Conference on Strategic Management—IMCSM18, Bor, Serbia, 25–27 May 2018; Volume XIV, pp. 460–465. [Google Scholar]
  32. Charandabi, S.; Ghanadiof, O. Evaluation of Online Markets Considering Trust and Resilience: A Framework for Predicting Customer Behavior in E-Commerce. J. Bus. Manag. Stud. 2022, 4, 23–33. [Google Scholar] [CrossRef]
  33. Treiblmaier, H.; Mirkovski, K.; Lowry, P.B.; Zacharia, Z.G. The physical internet as a new supply chain paradigm: A systematic literature review and a comprehensive framework. Int. J. Logist. Manag. 2020, 31, 239–287. [Google Scholar] [CrossRef]
  34. Eslamkhah, M.; Seno, S.A.H. Identifying and Ranking Knowledge Management Tools and Techniques Affecting Organizational Information Security Improvement. Knowl. Manag. Res. Pract. 2019, 17, 276–305. [Google Scholar] [CrossRef]
  35. Mukherjee, D.; Lim, W.M.; Kumar, S.; Donthu, N. Guidelines for advancing theory and practice through bibliometric research. J. Bus. Res. 2022, 148, 101–115. [Google Scholar] [CrossRef]
  36. Donthu, N.; Kumar, S.; Mukherjee, D.; Pandey, N.; Lim, W.M. How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 2021, 133, 285–296. [Google Scholar] [CrossRef]
  37. Chen, C.; Ibekwe-SanJuan, F.; Hou, J. The structure and dynamics of cocitation clusters: A multiple-perspective cocitation analysis. J. Am. Soc. Inf. Sci. Technol. 2010, 61, 1386–1409. [Google Scholar] [CrossRef] [Green Version]
  38. Chen, C. CiteSpace: A Practical Guide for Mapping Scientific Literature; Nova Science Publishers: New York, NY, USA, 2016; pp. 41–44. [Google Scholar]
  39. Molla, A.; Licker, P.S. eCommerce adoption in developing countries: A model and instrument. Inf. Manag. 2005, 42, 877–899. [Google Scholar] [CrossRef]
  40. Bordonaba-Juste, V.; Cambra-Fierro, J.J. Managing supply chain in the context of SMEs: A collaborative and customized partnership with the suppliers as the key for success. Supply Chain Manag. Int. J. 2009, 14, 393–402. [Google Scholar] [CrossRef]
  41. Putra, P.O.H.; Santoso, H.B. Contextual factors and performance impact of e-business use in Indonesian small and medium enterprises (SMEs). Heliyon 2020, 6, e03568. [Google Scholar] [CrossRef] [PubMed]
  42. Li, B.; Yin, Z.; Ding, J.; Xu, S.; Zhang, B.; Ma, Y.; Zhang, L. Key influencing factors of consumers’ vegetable e-commerce adoption willingness, behavior, and willingness-behavior consistency in Beijing, China. Br. Food J. 2020, 122, 3741–3756. [Google Scholar] [CrossRef]
  43. Fesenmaier, D.R.; Xiang, Z.; Pan, B.; Law, C.H.R. A Framework of Search Engine Use for Travel Planning. J. Travel Res. 2010, 50, 587–601. [Google Scholar] [CrossRef]
  44. Chatterjee, S.; Goyal, D.; Prakash, A.; Sharma, J. Exploring healthcare/health-product ecommerce satisfaction: A text mining and machine learning application. J. Bus. Res. 2020, 131, 815–825. [Google Scholar] [CrossRef]
  45. Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Futur. Gener. Comput. Syst. 2018, 82, 761–768. [Google Scholar] [CrossRef]
  46. Schmitt, M.N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar] [CrossRef]
  47. Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
  48. Shi, L.; Mai, Y.; Wu, Y.J. Digital Transformation: A Bibliometric Analysis. J. Organ. End User Comput. 2022, 34, 1–20. [Google Scholar] [CrossRef]
  49. Sarfraz, M. Cybersecurity Threats with New Perspectives; IntechOpen: London, UK, 2021. [Google Scholar] [CrossRef]
  50. Rai, S.; Singh, K.; Varma, A.K. Global Research Trend on Cyber Security: A Scientometric Analysis. Libr. Philos. Pract. 2019, 3769. [Google Scholar]
Figure 1. Literature review summary designed by authors.
Figure 1. Literature review summary designed by authors.
Electronics 11 02223 g001
Figure 2. Visualized comparative analysis: (a) Network for electronic commerce field of research; (b) Network for cybersecurity field of research, designed by authors. Note: The more obvious the color, the more recent the publications.
Figure 2. Visualized comparative analysis: (a) Network for electronic commerce field of research; (b) Network for cybersecurity field of research, designed by authors. Note: The more obvious the color, the more recent the publications.
Electronics 11 02223 g002
Figure 3. Labelled clusters for electronic commerce, designed by authors. Note: The more obvious the color, the more recent the publications.
Figure 3. Labelled clusters for electronic commerce, designed by authors. Note: The more obvious the color, the more recent the publications.
Electronics 11 02223 g003
Figure 4. Cluster mapping by keyword node was performed (electronic commerce).
Figure 4. Cluster mapping by keyword node was performed (electronic commerce).
Electronics 11 02223 g004
Figure 5. Timeline view for cluster labelling by title node.
Figure 5. Timeline view for cluster labelling by title node.
Electronics 11 02223 g005
Figure 6. The interconnection of major lines for cybersecurity.
Figure 6. The interconnection of major lines for cybersecurity.
Electronics 11 02223 g006
Figure 7. Comparative analysis by cluster mapping (keyword node): (a) clusters for cybersecurity; (b) clusters for electronic commerce.
Figure 7. Comparative analysis by cluster mapping (keyword node): (a) clusters for cybersecurity; (b) clusters for electronic commerce.
Electronics 11 02223 g007
Figure 8. The Resilience Right Decisions for Electronic Commerce and Cybersecurity Model.
Figure 8. The Resilience Right Decisions for Electronic Commerce and Cybersecurity Model.
Electronics 11 02223 g008
Table 1. List of abbreviations.
Table 1. List of abbreviations.
AbbreviationMeaning
QModularity metric
LLRLog-likelihood ratio
SMean silhouette
Table 2. Basic search results for topics of interest in the timespan between 2000–2022.
Table 2. Basic search results for topics of interest in the timespan between 2000–2022.
TopicNumber of Results in Web of
Science Core Collection
Citations of the
Most Relevant Paper
Ecommerce157010
Cybersecurity10,3888
Digital resilience262714
Table 3. Top terms by cluster labels and indicators for electronic commerce.
Table 3. Top terms by cluster labels and indicators for electronic commerce.
Cluster IDSizeSilhouetteMean (Year)Label (LLR)
1310.9622016e-commerce adoption (18.1, 1.0 × 10−4); influencing beliefs formation (15.79, 1.0 × 10−4); social commerce (15.79, 1.0 × 10−4); SME travel agencies (15.79, 1.0 × 10−4); mobile commerce adoption (13.49, 0.001)
22812012social media (23.99, 1.0 × 10−4); latent transition analysis (23.99, 1.0 × 10−4); trip experience (23.99, 1.0 × 10−4); tourism design (19.05, 1.0 × 10−4); smart tourism development (14.18, 0.001)
3270.9852018opinion mining (21.68, 1.0 × 10−4); fuzzy logic (21.68, 1.0 × 10−4); salient research topics (17.97, 1.0 × 10−4); analysing e-wom (14.31, 0.001); stochastic dominance (14.31, 0.001)
6220.9782017attention-based item collaborative (21.02, 1.0 × 10−4); fast shipping ecommerce (18.33, 1.0 × 10−4); case study (18.33, 1.0 × 10−4); inbound logistics operation (18.33, 1.0 × 10−4); purchasing attitude (15.65, 1.0 × 10−4)
10180.9782015empirical investigation (22.2, 1.0 × 10−4); big data perspective (22.2, 1.0 × 10−4); online review helpfulness (22.2, 1.0 × 10−4); specific word entropy (17.64, 1.0 × 10−4); purchasing behaviour (13.14, 0.001)
Table 4. Burst detection by keywords for electronic commerce.
Table 4. Burst detection by keywords for electronic commerce.
KeywordsStrengthsBeginEnd2000–2022
social media5.8920162019 Electronics 11 02223 i001
online review5.8220202022 Electronics 11 02223 i002
destination marketing5.5920072011 Electronics 11 02223 i003
web service4.9320012005 Electronics 11 02223 i004
e-commerce4.6520112013 Electronics 11 02223 i005
social network4.6420152017 Electronics 11 02223 i006
sentiment analysis4.5820182022 Electronics 11 02223 i007
information search4.3420092014 Electronics 11 02223 i008
service3.9820192022 Electronics 11 02223 i009
web3.9720112017 Electronics 11 02223 i010
perceived risk3.9320182019 Electronics 11 02223 i011
data mining3.7220122015 Electronics 11 02223 i012
purchase intention3.6120192022 Electronics 11 02223 i013
online shopping3.4920142019 Electronics 11 02223 i014
experience3.3420172019 Electronics 11 02223 i015
electronic commerce3.2820082013 Electronics 11 02223 i016
tourism3.1820082017 Electronics 11 02223 i017
Table 5. Most relevant topics in electronic commerce by clusters.
Table 5. Most relevant topics in electronic commerce by clusters.
Cluster IDSizeSilhouetteLabel (LLR)YearThe Most Relevant Topics
0420.643repurchase behaviour (144.12, 1.0 × 10−4)2011factors and performance impact of electronic business [41]
1420.727a developing country (327.66, 1.0 × 10−4)2010Electronic commerce adoption willingness and behaviour [42]
2380.736search engine marketing (255.83, 1.0 × 10−4)2012search engine use [43]
3310.586purchase intention (194.09, 1.0 × 10−4)2015Electronic commerce satisfaction [44]
Table 6. Clusters of cybersecurity are labelled by major research lines.
Table 6. Clusters of cybersecurity are labelled by major research lines.
Cluster IDSizeSilhouetteMean (Year)Label (LLR)
0990.922016human factor (1038.26, 1.0 × 10−4); machine learning (760.94, 1.0 × 10−4); health care (678.93, 1.0 × 10−4); scoping review (601.43, 1.0 × 10−4); smart grid (593.5, 1.0 × 10−4)
1950.9152017network intrusion detection (1797.74, 1.0 × 10−4); using machine (933.96, 1.0 × 10−4); objective comparison (863.01, 1.0 × 10−4); IoT network (829.85, 1.0 × 10−4); intrusion detection system (790.24, 1.0 × 10−4)
2780.8732016blockchain technology (2099.46, 1.0 × 10−4); smart cities (1690.93, 1.0 × 10−4); blockchain technologies (928.62, 1.0 × 10−4); IoT device (826.53, 1.0 × 10−4); using blockchain (643.47, 1.0 × 10−4)
3690.9142015adversarial machine learning (1756.66, 1.0 × 10−4); adversarial example (1053.93, 1.0 × 10−4); deep learning (861.22, 1.0 × 10−4); machine learning (854.89, 1.0 × 10−4); adversarial attack (660.04, 1.0 × 10−4)
4650.8842016industrial control system (2556.12, 1.0 × 10−4); in-vehicle network (1172, 1.0 × 10−4); attack detection (894.82, 1.0 × 10−4); case study (782.27, 1.0 × 10−4); behavioural model (770.93, 1.0 × 10−4)
5610.9442014national cybersecurity (682.86, 1.0 × 10−4); shared responsibility (610.77, 1.0 × 10−4); global cybersecurity (538.74, 1.0 × 10−4); political economy (472.75, 1.0 × 10−4); theorising cyber coercion (466.76, 1.0 × 10−4)
6540.9492012load redistribution attack (1494.73, 1.0 × 10−4); advanced metering infrastructure (747.5, 1.0 × 10−4); power system adequacy assessment (741.01, 1.0 × 10−4); power grid (656.86, 1.0 × 10−4); 3d printing cybersecurity (656.86, 1.0 × 10−4)
Table 7. Labels and clusters for cybersecurity by keyword node.
Table 7. Labels and clusters for cybersecurity by keyword node.
Cluster IDSizeSilhouetteMean (Year)Label (LLR)
01420.6982017cybersecurity awareness (4192.79, 1.0 × 10−4)
11320.6282017smart cities (5279.12, 1.0 × 10−4)
21050.7252016machine learning (6747.1, 1.0 × 10−4)
Table 8. Top keywords for cybersecurity research line.
Table 8. Top keywords for cybersecurity research line.
KeywordsStrengthsBeginEnd2000–2022
cyber security19.2220122017 Electronics 11 02223 i018
smart grid12.3620102017 Electronics 11 02223 i019
cybersecurity education7.7620142018 Electronics 11 02223 i020
vulnerability assessment6.2820052018 Electronics 11 02223 i021
information security6.2120082014 Electronics 11 02223 i022
moving target defence5.8820162018 Electronics 11 02223 i023
cloud computing5.8220112017 Electronics 11 02223 i024
cyber defence5.4220142018 Electronics 11 02223 i025
information sharing5.4220152017 Electronics 11 02223 i026
static analysis5.1720182019 Electronics 11 02223 i027
computer security5.0920092015 Electronics 11 02223 i028
critical infrastructure520152017 Electronics 11 02223 i029
security4.9920132015 Electronics 11 02223 i030
crime4.9420172018 Electronics 11 02223 i031
attack graph4.9320122018 Electronics 11 02223 i032
data protection4.8920172018 Electronics 11 02223 i033
social network4.8720162018 Electronics 11 02223 i034
big data4.8320122018 Electronics 11 02223 i035
software security4.8120162018 Electronics 11 02223 i036
game theory4.6320142018 Electronics 11 02223 i037
situation awareness4.4620162019 Electronics 11 02223 i038
smart home4.4220192020 Electronics 11 02223 i039
critical infrastructure protection4.420152016 Electronics 11 02223 i040
malware4.1620192020 Electronics 11 02223 i041
cybersecurity training4.1320172018 Electronics 11 02223 i042
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Vuță, D.R.; Nichifor, E.; Țierean, O.M.; Zamfirache, A.; Chițu, I.B.; Foris, T.; Brătucu, G. Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity. Electronics 2022, 11, 2223. https://doi.org/10.3390/electronics11142223

AMA Style

Vuță DR, Nichifor E, Țierean OM, Zamfirache A, Chițu IB, Foris T, Brătucu G. Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity. Electronics. 2022; 11(14):2223. https://doi.org/10.3390/electronics11142223

Chicago/Turabian Style

Vuță, Daniela Roxana, Eliza Nichifor, Ovidiu Mircea Țierean, Alexandra Zamfirache, Ioana Bianca Chițu, Tiberiu Foris, and Gabriel Brătucu. 2022. "Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity" Electronics 11, no. 14: 2223. https://doi.org/10.3390/electronics11142223

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop