IEEE Access (Jan 2024)
Comparative Study of the Chinese and Foreign Digital Home: A Visual Analysis of Research Hotspots and Trends Using CiteSpace
Abstract
In the context of the rapid development of the digital economy, digital homes have emerged as a crucial component, significantly contributing to the output of the digital economy. This study employs CiteSpace software to conduct a quantitative analysis of journal articles containing the keywords “digital home” and “digital family” from 2005 to 2023. The study utilized CiteSpace VI software to perform keyword co-occurrence, clustering analysis, trend mapping, and emergent word analysis on data sourced from the Web of Science (WoS) and China National Knowledge Infrastructure (CNKI) databases. This approach quantitatively analyzed and compared the research hotspots and developmental trends in digital homes, both domestically and in foreign countries. The analysis reveals distinct focal points in the research topics covered in Chinese and foreign literature. Foreign publications predominantly concentrate on network construction and user experience. In contrast, Chinese works are more focused on the application of technology and network security. Moreover, Chinese studies are inclined towards exploring segmented technology application scenarios, such as the integration of smart home and Internet of Things (IoT) technologies, whereas foreign studies often discuss enhancing network efficiency and user interface convenience. The findings suggest that future developments in digital homes should increasingly consider cross-cultural user experiences and data security to adapt to global trends. Through systematic research on digital homes, this paper provides theoretical and practical guidance for planning and constructing digital homes and offers new perspectives and impetus for the development of the digital economy. Future studies could explore the application differences of digital homes across various cultural backgrounds and how to enhance the digital living experience of users while ensuring data security.
Keywords