Three Decades of Publications on Hacking and The Law: A Bibliometric Analysis

Authors

Ani Munirah Mohamad

Universiti Utara Malaysia (Malaysia)

Zaiton Hamin

Universiti Teknologi MARA (Malaysia)

Mohd Bahrin Othman

Universiti Teknologi MARA (Malaysia)

Article Information

DOI: 10.47772/IJRISS.2026.10100127

Subject Category: Social science

Volume/Issue: 10/1 | Page No: 1567-1578

Publication Timeline

Submitted: 2026-01-02

Accepted: 2026-01-10

Published: 2026-01-24

Abstract

This study examines three decades of scholarly output on hacking and the law, addressing the growing need to understand how legal, regulatory and ethical dimensions of hacking have evolved in response to rapid technological change. Despite the proliferation of cybersecurity incidents and corresponding policy developments, there has been limited systematic assessment of the intellectual landscape shaping this field. To address this gap, the study employed a structured bibliometric methodology. Data were collected using Scopus advanced searching, covering publications from 1995 to 2025, yielding an initial dataset of 246 documents that was subsequently refined to 236 through the application of inclusion criteria. Statistical trends and distributional patterns were analysed using the Scopus Analyzer, while OpenRefine was used to clean, standardise and harmonise author names, keywords and source information to ensure data accuracy. VOSviewer was then applied to generate visualisations of co-authorship networks, keyword co occurrence structures and thematic clusters, enabling the identification of dominant research themes and collaborative patterns. The results demonstrate a marked increase in publication activity after 2010, with notable peaks between 2020 and 2025, and reveal substantial thematic concentration around ethical hacking, cybersecurity, penetration testing and legal governance of digital intrusions. Co-authorship mapping further highlights the central roles of the United States, India and the United Kingdom, alongside emerging contributions from Malaysia and selected European countries. The analysis shows that research in this domain is expanding, diversifying and becoming increasingly interdisciplinary. The study concludes that bibliometric insights provide a robust foundation for understanding how legal scholarship is adapting to the complexities of contemporary cyber threats and regulatory transformations, while also identifying future research directions in technology law and governance.

Keywords

hacking, cybercrime, law, legal

Downloads

References

1. M. Pisarić, “The Use of Policeware to Hack Electronic Evidence in Germany and the Netherlands,” NBP. Nauk. bezbednost, Polic., vol. 28, no. 1, pp. 16–26, 2023, doi: 10.5937/nabepo28-43759. [Google Scholar] [Crossref]

2. P. Sommer, “Criminalising hacking tools,” Digit. Investig., vol. 3, no. 2, pp. 68–72, 2006, doi: 10.1016/j.diin.2006.04.005. [Google Scholar] [Crossref]

3. Q.-H. Wang, R. Geng, and S. H. Kim, “Chilling Effect of the Enforcement of Computer Misuse Act: Evidence from Publicly Accessible Hack Forums,” Inf. Syst. Res., vol. 35, no. 3, pp. 1195–1215, 2024, doi: 10.1287/isre.2019.0346. [Google Scholar] [Crossref]

4. S. Oh and K. Lee, “The need for specific penalties for hacking in criminal law,” Sci. World J., vol. 2014, 2014, doi: 10.1155/2014/736738. [Google Scholar] [Crossref]

5. S. Hennessey, “Lawful hacking and the case for a strategic approach to going dark,” in Brookings Big Ideas for America, 2017, pp. 241–250. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85037867658&partnerID=40&md5=800f2d8548cbf87c87fed35e4e84f45a [Google Scholar] [Crossref]

6. K. Best, “The Hacker’s challenge: Active access to information, visceral democracy and discursive practice,” Soc. Semiot., vol. 13, no. 3, pp. 263–282, 2003, doi: 10.1080/1035033032000167015. [Google Scholar] [Crossref]

7. Z. Hamin and W. R. W. Rosli, “Managing cyber stalking in electronic workplaces,” Adv. Sci. Lett., vol. 23, no. 8, pp. 7895–7899, 2017, doi: 10.1166/asl.2017.9603. [Google Scholar] [Crossref]

8. G. Ziccardi, “The European Parliament study on hacking activities by law enforcement: A legal-informatics analysis (and legislative policy),” Arch. Penal., vol. 69, no. 2, pp. 512–537, 2017, doi: 10.12871/9788674101948. [Google Scholar] [Crossref]

9. G. Ziccardi, “The hacking tools in the ‘Riforma Orlando’: Some legal informatics reflections,” Arch. Penal., vol. 2018, pp. 497–511, 2018, doi: 10.12871/978883318026725. [Google Scholar] [Crossref]

10. A. Ghappour, “Searching places unknown: Law enforcement jurisdiction on the dark web,” Stanford Law Rev., vol. 69, no. 4, pp. 1197–1236, 2017, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019227158&partnerID=40&md5=29fe4eee581b427e142667134dba57ec [Google Scholar] [Crossref]

11. S. D. Brown, “Hacking for evidence: the risks and rewards of deploying malware in pursuit of justice,” ERA Forum, vol. 20, no. 3, pp. 423–438, 2020, doi: 10.1007/s12027-019-00571-z. [Google Scholar] [Crossref]

12. J. Mayer, “Government hacking,” Yale Law J., vol. 127, no. 3, pp. 570–662, 2018, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042114062&partnerID=40&md5=3e99287f45827b1361b5d072585a45a8 [Google Scholar] [Crossref]

13. A. M. Mohamad et al., “Socio-Legal Enquiry into the Motivating Factors of Cyberbullying in Malaysia,” Bild Law J., vol. 7, no. 1, pp. 74–84, 2022, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140069781&partnerID=40&md5=8109b26ab4b08ce86bab80e44abd925f [Google Scholar] [Crossref]

14. J. L. Alves, I. B. Borges, and J. De Nadae, “Sustainability in complex projects of civil construction: Bibliometric and bibliographic review,” Gest. e Prod., vol. 28, no. 4, 2021, doi: 10.1590/1806-9649-2020v28e5389. [Google Scholar] [Crossref]

15. D. S. Assyakur and E. M. Rosa, “Spiritual Leadership in Healthcare: A Bibliometric Analysis,” J. Aisyah J. Ilmu Kesehat., vol. 7, no. 2, 2022, doi: 10.30604/jika.v7i2.914. [Google Scholar] [Crossref]

16. A. Verbeek, K. Debackere, M. Luwel, and E. Zimmermann, “Measuring progress and evolution in science and technology - I: The multiple uses of bibliometric indicators,” Int. J. Manag. Rev., vol. 4, no. 2, pp. 179–211, 2002, doi: 10.1111/1468-2370.00083. [Google Scholar] [Crossref]

17. Y. C. J. Wu and T. Wu, “A decade of entrepreneurship education in the Asia Pacific for future directions in theory and practice,” 2017. doi: 10.1108/MD-05-2017-0518. [Google Scholar] [Crossref]

18. B. Fahimnia, J. Sarkis, and H. Davarzani, “Green supply chain management: A review and bibliometric analysis,” 2015. doi: 10.1016/j.ijpe.2015.01.003. [Google Scholar] [Crossref]

19. A. Al-Khoury et al., “Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database,” Sustain., vol. 14, no. 18, 2022, doi: 10.3390/su141811615. [Google Scholar] [Crossref]

20. G. di Stefano, M. Peteraf, and G. Veronay, “Dynamic capabilities deconstructed: A bibliographic investigation into the origins, development, and future directions of the research domain,” Ind. Corp. Chang., vol. 19, no. 4, pp. 1187–1204, 2010, doi: 10.1093/icc/dtq027. [Google Scholar] [Crossref]

21. G. P. Khiste and R. R. Paithankar, “Analysis of Bibliometric term in Scopus,” Int. Res. J., vol. 01, no. 32, pp. 78–83, 2017. [Google Scholar] [Crossref]

22. D. Gu, T. Li, X. Wang, X. Yang, and Z. Yu, “Visualizing the intellectual structure and evolution of electronic health and telemedicine research,” Int. J. Med. Inform., vol. 130, 2019, doi: 10.1016/j.ijmedinf.2019.08.007. [Google Scholar] [Crossref]

23. N. J. van Eck and L. Waltman, “Software survey: VOSviewer, a computer program for bibliometric mapping,” Scientometrics, vol. 84, no. 2, pp. 523–538, 2010, doi: 10.1007/s11192-009-0146-3. [Google Scholar] [Crossref]

24. N. J. van Eck and L. Waltman, “Citation-based clustering of publications using CitNetExplorer and VOSviewer,” Scientometrics, vol. 111, no. 2, pp. 1053–1070, 2017, doi: 10.1007/s11192-017-2300-7. [Google Scholar] [Crossref]

25. F. P. Appio, F. Cesaroni, and A. Di Minin, “Visualizing the structure and bridges of the intellectual property management and strategy literature: a document co-citation analysis,” Scientometrics, vol. 101, no. 1, pp. 623–661, 2014, doi: 10.1007/s11192-014-1329-0. [Google Scholar] [Crossref]

26. N. J. Van Eck and L. Waltman, “Bibliometric mapping of the computational intelligence field,” in International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems, 2007, pp. 625–645. doi: 10.1142/S0218488507004911. [Google Scholar] [Crossref]

27. G. E. Coleman, Coding freedom: The ethics and aesthetics of hacking. London: Princeton University Press, 2012. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84870601883&partnerID=40&md5=4017a4f223690180a4fee54d0b36cb89 [Google Scholar] [Crossref]

28. Š. Lyócsa, P. Molnár, T. Plíhal, and M. Siranova, “Impact of macroeconomic news, regulation and hacking exchange markets on the volatility of bitcoin,” J. Econ. Dyn. Control, vol. 119, 2020, doi: 10.1016/j.jedc.2020.103980. [Google Scholar] [Crossref]

29. J.-P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Ethical hacking for IoT: Security issues, challenges, solutions and recommendations,” Internet Things Cyber-Physical Syst., vol. 3, pp. 280–308, 2023, doi: 10.1016/j.iotcps.2023.04.002. [Google Scholar] [Crossref]

30. C. C. Palmer, “Ethical hacking,” IBM Syst. J., vol. 40, no. 3, pp. 769–780, 2001, doi: 10.1147/sj.403.0769. [Google Scholar] [Crossref]

31. Y. Wang and J. Yang, “Ethical hacking and network defense: Choose your best network vulnerability scanning tool,” in Proceedings 31st IEEE International Conference on Advanced Information Networking and Applications Workshops Waina, 2017, pp. 110–113. doi: 10.1109/WAINA.2017.39. [Google Scholar] [Crossref]

32. R. S. Sri Devi and M. M. Kumar, “Testing for Security Weakness of Web Applications using Ethical Hacking,” in IEEE International Conference on Power Control Signals and Instrumentation Engineering Icpcsi, 2020, pp. 354–361. doi: 10.1109/ICOEI48184.2020.9143018. [Google Scholar] [Crossref]

33. S. Patil, A. Jangra, M. Bhale, A. Raina, and P. Kulkarni, “Ethical hacking: The need for cyber security,” in IEEE International Conference on Power Control Signals and Instrumentation Engineering Icpcsi, 2018, pp. 1602–1606. doi: 10.1109/ICPCSI.2017.8391982. [Google Scholar] [Crossref]

34. J. M. Hatfield, “Virtuous human hacking: The ethics of social engineering in penetration-testing,” Comput. Secur., vol. 83, pp. 354–366, 2019, doi: 10.1016/j.cose.2019.02.012. [Google Scholar] [Crossref]

35. D.-O. Jaquet-Chiffelle and M. Loi, “Ethical and Unethical Hacking,” in International Library of Ethics, Law and Technology, vol. 21, 2020, pp. 179–204. doi: 10.1007/978-3-030-29053-5_9. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles