Bibliometric Analysis of Trends in Theory-related Policy Publications

Abitassha Az Zahra, Achmad Nurmandi, Christine B. Tenario, Riska Rahayu, Samantha Herector Benectitos, Faye Lorraine P. Mina, Ken M. Haictin

Abstract


This study's bibliometric analysis evaluates the scope and trends of theory-related policy publications in various international journals. The method used the Scopus search engine on random journals in identifying policy-related publications. The study also used a data visualization software called VOSviewer to analyze the results, underlying network linkages, and information production trends in policy analysis. The findings shows that only a few proportions of policy-related researches apply theories in their study. Field-specialized journals were having practitioners publish less research as compared to interdisciplinary science and technology journals. This article calls for greater engagements among scholars, and for policy researchers to more explicitly consider how their work might contribute to the understanding of the policy challenges. The findings also shows that it is important to recognize the approach and theory behind policy development to determine the incremental nature of aspects involved in policy development. It is extremely valuable to be clear that if one deals only with conceptual level of policy research without testing those ideas against independent empirical information, then scientific theory development is not possible. Thus, failure to consistently and clearly make theory connection towards policy research is a lost opportunity for scholars to influence policy thinking and public argument.

 

Doi: 10.28991/esj-2021-01261

Full Text: PDF


Keywords


Policy Research; Policy Thinking; Higher Education; Bibliometric; VOSviewer.

References


Zainab, A. N., Kevin Wan Utap Anyi, and Nor Badrul Anuar. "A single journal study: Malaysian Journal of Computer Science." arXiv preprint arXiv:1301.5375 (2013). doi:10.22452/mjcs.vol22no1.1.

Liao, Huchang, Ming Tang, Zongmin Li, and Benjamin Lev. “Bibliometric Analysis for Highly Cited Papers in Operations Research and Management Science from 2008 to 2017 Based on Essential Science Indicators.” Omega 88 (October 2019): 223–236. doi:10.1016/j.omega.2018.11.005.

Zhang, Nan, Shanshan Wan, Peiling Wang, Peng Zhang, and Qiang Wu. “A Bibliometric Analysis of Highly Cited Papers in the Field of Economics and Business Based on the Essential Science Indicators Database.” Scientometrics 116, no. 2 (May 28, 2018): 1039–1053. doi:10.1007/s11192-018-2786-7.

Alsufyani, Abdulaziz Mohsen. "Role of theory and research in policy development in health care system." American Journal of Public Health Research 8, no. 2 (2020): 61-66.

Boswell, Christina, and Katherine Smith. “Rethinking Policy ‘impact’: Four Models of Research-Policy Relations.” Palgrave Communications 3, no. 1 (December 2017). doi:10.1057/s41599-017-0042-z..

Sekhri, Sofiane. "The role approach as a theoretical framework for the analysis of foreign policy in third world countries." African Journal of Political Science and International Relations 3, no. 10 (2009): 423-432.

Ingold, Karin. “Network Structures Within Policy Processes: Coalitions, Power, and Brokerage in Swiss Climate Policy.” Policy Studies Journal 39, no. 3 (July 27, 2011): 435–459. doi:10.1111/j.1541-0072.2011.00416.x.

James, Thomas E., and Paul D. Jorgensen. “Policy Knowledge, Policy Formulation, and Change: Revisiting a Foundational Question.” Policy Studies Journal 37, no. 1 (February 2009): 141–162. doi:10.1111/j.1541-0072.2008.00300.x.

Puhakainen, Petri, and Mikko Siponen. "Improving employees' compliance through information systems security training: an action research study." MIS quarterly (2010): 757-778. doi:10.2307/25750704.

Sabatier, P. A. "The Need for Better Theories in Theories of the Policy Process." (1999): 3-17.

Weible, Christopher M., Tanya Heikkila, Peter deLeon, and Paul A. Sabatier. “Understanding and Influencing the Policy Process.” Policy Sciences 45, no. 1 (November 18, 2011): 1–21. doi:10.1007/s11077-011-9143-5.

Nowlin, Matthew C. “Theories of the Policy Process: State of the Research and Emerging Trends.” Policy Studies Journal 39 (March 8, 2011): 41–60. doi:10.1111/j.1541-0072.2010.00389_4.x.

Kleinman, Arthur. “Four Social Theories for Global Health.” The Lancet 375, no. 9725 (May 2010): 1518–1519. doi:10.1016/s0140-6736(10)60646-0.

Brooks, Thom. “In Defence of Political Theory: Impact and Opportunities.” Political Studies Review 11, no. 2 (April 16, 2013): 209–215. doi:10.1111/1478-9302.12007.

K. Lewin, “Intention, will and need. In D. Rapaport, Organization and pathology of thought: Selected sources,” Columbia Univ. Press, (1951): 95–153.

Teisman, Geert R., and Erik-Hans Klijn. “Complexity Theory and Public Management.” Public Management Review 10, no. 3 (May 2008): 287–297. doi:10.1080/14719030802002451.

Cairney, Paul, Donley T. Studlar, and Hadii M. Mamudu. "Understanding public policy: theories and issues." Public Administration 91, no. 3 (2013): 782-793.

Schlager, Edella, and Christopher M. Weible. “New Theories of the Policy Process.” Policy Studies Journal 41, no. 3 (August 2013): 389–396. doi:10.1111/psj.12030.

Lasswell, Harold D. “The Emerging Conception of the Policy Sciences.” Policy Sciences 1, no. 1 (1970): 3–14. doi:10.1007/bf00145189.

Birckmayer, Johanna D., and Carol Hirschon Weiss. “Theory-Based Evaluation in Practice.” Evaluation Review 24, no. 4 (August 2000): 407–431. doi:10.1177/0193841x0002400404.

Weiss, Carol H. "Research for Policy's Sake: The Enlightenment Function of Social Research." Policy Analysis 3, no. 4 (1977): 531-45.

Weiss, Carol H. "The Many Meanings of Research Utilization." Public Administration Review 39, no. 5 (1979): 426-31.

Hird, John A. “Policy Analysis for What? The Effectiveness of Nonpartisan Policy Research Organizations.” Policy Studies Journal 33, no. 1 (January 27, 2005): 83–105. doi:10.1111/j.1541-0072.2005.00093.x.

Radaelli, Claudio M., and Bruno Dente. “Evaluation Strategies and Analysis of the Policy Process.” Evaluation 2, no. 1 (January 1996): 51–66. doi:10.1177/135638909600200105.

Schmidt, Vivien A. “Discursive Institutionalism: The Explanatory Power of Ideas and Discourse.” Annual Review of Political Science 11, no. 1 (June 2008): 303–326. doi:10.1146/annurev.polisci.11.060606.135342.

Hall, Peter A. “Policy Paradigms, Social Learning, and the State: The Case of Economic Policymaking in Britain.” Comparative Politics 25, no. 3 (April 1993): 275-296. doi:10.2307/422246.

Smith, Kevin B., and Christopher W. Larimer. “The Public Policy Theory Primer.” Westview Press, (2016).

M. Yvonne, “Scopus Indexing: Why all the Fuss?,” IAFOR J. Educ., (2020).

Pan, Xuelian, Erjia Yan, Ming Cui, and Weina Hua. “Examining the Usage, Citation, and Diffusion Patterns of Bibliometric Mapping Software: A Comparative Study of Three Tools.” Journal of Informetrics 12, no. 2 (May 2018): 481–493. doi:10.1016/j.joi.2018.03.005.

Virani, Altaf, Adam Wellstead, and Michael P. Howlett. “Where Is the Policy? A Bibliometric Review of the State of Policy Research on Medical Tourism.” SSRN Electronic Journal (2019). doi:10.2139/ssrn.3445235.

Blume, Stuart S. “Policy as Theory: A Framework for Understanding the Contribution of Social Science to Welfare Policy 1.” Acta Sociologica 20, no. 3 (July 1977): 247–262. doi:10.1177/000169937702000302.

Caplan, Nathan. “The Two-Communities Theory and Knowledge Utilization.” American Behavioral Scientist 22, no. 3 (January 1979): 459–470. doi:10.1177/000276427902200308.

Rein, Martin. "Methodology for the Study of the Interplay between Social Science and Social Policy." International Social Science Journal 32, no. 2 (1980): 361-68.

Bennett, Colin J. "Regulating privacy: Data protection and public policy in Europe and the United States." Cornell University Press, (1992).

Fay, Daniel L., and Jeffrey B. Wenger. “The Political Structure of Policy Diffusion.” Policy Studies Journal 44, no. 3 (August 13, 2015): 349–365. doi:10.1111/psj.12122.

Virtue, Timothy, and Justin Rainey. “Information Governance and Risk Management.” HCISPP Study Guide (2015): 91–130. doi:10.1016/b978-0-12-802043-2.00005-7.

Taylor, Laura P. “Understanding the FISMA Compliance Process.” FISMA Compliance Handbook (2013): 27–40. doi:10.1016/b978-0-12-405871-2.00004-x.

Wilhelm, Thomas. “Compromising a System and Privilege Escalation.” Professional Penetration Testing (2010): 339–369. doi:10.1016/b978-1-59749-425-0.00017-8.

Crossler, Robert E., Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, and Richard Baskerville. “Future Directions for Behavioral Information Security Research.” Computers & Security 32 (February 2013): 90–101. doi:10.1016/j.cose.2012.09.010.

Moody, Gregory D., Mikko Siponen, and Seppo Pahnila. “Toward a Unified Model of Information Security Policy Compliance.” MIS Quarterly 42, no. 1 (January 1, 2018): 285–311. doi:10.25300/misq/2018/13853.

Lowry, Paul Benjamin, and Gregory D. Moody. “Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies.” Information Systems Journal 25, no. 5 (July 8, 2014): 433–463. doi:10.1111/isj.12043.

Baskerville, Richard, and Mikko Siponen. “An Information Security Meta‐policy for Emergent Organizations.” Logistics Information Management 15, no. 5/6 (December 2002): 337–346. doi:10.1108/09576050210447019.

Dhillon, Gurpreet, and Steve Moores. “Computer Crimes: Theorizing About the Enemy Within.” Computers & Security 20, no. 8 (December 2001): 715–723. doi:10.1016/s0167-4048(01)00813-6.

Siponen, Mikko, and Anthony Vance. “Guidelines for Improving the Contextual Relevance of Field Surveys: The Case of Information Security Policy Violations.” European Journal of Information Systems 23, no. 3 (May 2014): 289–305. doi:10.1057/ejis.2012.59.

Vance, Anthony, and Mikko T. Siponen. “IS Security Policy Violations.” Journal of Organizational and End User Computing 24, no. 1 (January 2012): 21–41. doi:10.4018/joeuc.2012010102.

Radaelli, Claudio M. “The Role of Knowledge in the Policy Process.” Journal of European Public Policy 2, no. 2 (June 1995): 159–183. doi:10.1080/13501769508406981.

E. Bardach, “The Implementation Game: What Happens After a Bill Becomes a Law. Cambridge, MA: The MIT Press.,” (1977).

Thomas C. Schelling. “T Game Theory: A Practitioner’s Approach.” Economics and Philosophy 26, no. 1 (March 2010): 27–46. doi:10.1017/S0266267110000040.

Woolcock, Michael, Michael Bamberger, and Vijayendra Rao. “Using Mixed Methods in Monitoring and Evaluation: Experiences from International Development.” SSRN Electronic Journal (2010). doi:10.2139/ssrn.1545914.

Sharkey, Siobhan, and Anne Sharples. “From the Beginning.” Evaluation 14, no. 3 (July 2008): 363–380. doi:10.1177/1356389008090860.

Silva, Marta, Luís Pereira Gomes, and Isabel Cristina Lopes. “Explanatory Factors of the Capital Structure.” Emerging Science Journal 4, no. 6 (December 1, 2020): 519–529. doi:10.28991/esj-2020-01249.

Scharpf, Fritz W. “Economic Integration, Democracy and the Welfare State.” Journal of European Public Policy 4, no. 1 (January 1997): 18–36. doi:10.1080/135017697344217.

Tomé, Eduardo. “Current and Historical Application of Knowledge Management in Economy.” Emerging Science Journal 4, no. 6 (December 1, 2020): 454–465. doi:10.28991/esj-2020-01245.

Obeidi, Amer, Keith W. Hipel, and D. Marc Kilgour. “Canadian Bulk Water Exports: Analyzing the Sun Belt Conflict Using the Graph Model for Conflict Resolution.” Knowledge, Technology & Policy 14, no. 4 (December 2002): 145–163. doi:10.1007/s12130-002-1020-2.

Hermans, Leon, Scott Cunningham, and Jill Slinger. “The Usefulness of Game Theory as a Method for Policy Evaluation.” Evaluation 20, no. 1 (January 2014): 10–25. doi:10.1177/1356389013516052.

Bulgurcu, Cavusoglu, and Benbasat. “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.” MIS Quarterly 34, no. 3 (2010): 523-548. doi:10.2307/25750690.

Han, JinYoung, Yoo Jung Kim, and Hyungjin Kim. “An Integrative Model of Information Security Policy Compliance with Psychological Contract: Examining a Bilateral Perspective.” Computers & Security 66 (May 2017): 52–65. doi:10.1016/j.cose.2016.12.016.

Siponen, Mikko, Seppo Pahnila, and M. Adam Mahmood. “Compliance with Information Security Policies: An Empirical Investigation.” Computer 43, no. 2 (February 2010): 64–71. doi:10.1109/mc.2010.35.

Blackstock, K.L., J. Ingram, R. Burton, K.M. Brown, and B. Slee. “Understanding and Influencing Behaviour Change by Farmers to Improve Water Quality.” Science of the Total Environment 408, no. 23 (November 2010): 5631–5638. doi:10.1016/j.scitotenv.2009.04.029.

Jasanoff, Sheila, ed. “States of Knowledge” London: Routledge, (July 31, 2004). doi:10.4324/9780203413845.

D’Arcy, John, and Tejaswini Herath. “A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings.” European Journal of Information Systems 20, no. 6 (November 2011): 643–658. doi:10.1057/ejis.2011.23.

Li, Han, Jie Zhang, and Rathindra Sarathy. “Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory.” Decision Support Systems 48, no. 4 (March 2010): 635–645. doi:10.1016/j.dss.2009.12.005.

Safarzadeh, Soroush, and Morteza Rasti-Barzoki. “A Game Theoretic Approach for Assessing Residential Energy-Efficiency Program Considering Rebound, Consumer Behavior, and Government Policies.” Applied Energy 233–234 (January 2019): 44–61. doi:10.1016/j.apenergy.2018.10.032.

Son, Jai-Yeol. “Out of Fear or Desire? Toward a Better Understanding of Employees’ Motivation to Follow IS Security Policies.” Information & Management 48, no. 7 (October 2011): 296–302. doi:10.1016/j.im.2011.07.002.

Hall, C. Michael, Allan M. Williams, and Alan A. Lew. "Tourism: Conceptualizations, institutions, and issues." A Companion to Tourism, Oxford, UK: Blackwell Publishing Ltd (2004): 3-21.

Watermeyer, Richard, and Adam Hedgecoe. “Selling ‘impact’: Peer Reviewer Projections of What Is Needed and What Counts in REF Impact Case Studies. A Retrospective Analysis.” Journal of Education Policy 31, no. 5 (April 18, 2016): 651–665. doi:10.1080/02680939.2016.1170885.

Murphy, Tony. “Revising the Research Excellence Framework: Ensuring Quality in REF2021, or New Challenges Ahead?” Perspectives: Policy and Practice in Higher Education 21, no. 1 (November 8, 2016): 34–39. doi:10.1080/13603108.2016.1246386.

Kingdon, John W., and Eric Stano. "Agendas, Alternatives, and Public Policies." Policies Stud. J. 45 (1984).

Dye, Thomas. “Top Down Policymaking” CQ Press (2001). doi:10.4135/9781483330150.

Mackenbach, J. P. “Political Determinants of Health.” The European Journal of Public Health 24, no. 1 (January 24, 2014): 2–2. doi:10.1093/eurpub/ckt183.


Full Text: PDF

DOI: 10.28991/esj-2021-01261

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Achmad Nurmandi, Christine B Tenario, Abitassha Az Zahra, Riska B Rahayu