|
| Ref | Topic covered | RQ1 score | RQ2 score | Aggregate score |
|
| [21] | Security-as-a-service for identity access management | 1 | 1 | 2 |
| [33] | Identity provision and user access provision through IDP session | 1 | 1 | 2 |
| [34] | Role based access for system security | 1 | 1 | 2 |
| [10] | AI and the applications for user interface and others | 1 | 0.5 | 1.5 |
| [6] | Organizational information security management through management success factors (MSF) | 1 | 0.5 | 1.5 |
| [35] | Single-sign-on service for identity management | 0.5 | 1 | 1.5 |
| [36] | Attribute based access control for IAM to achieve total attribute quality management (TAQM) | 1 | 0.5 | 1.5 |
| [17] | Policy perspective of dynamic identity and user management | 1 | 0.5 | 1.5 |
| [25] | Information security with predictive mechanisms | 0.5 | 1 | 1.5 |
| [37] | Integration of artificial intelligence activities in software development processes | 0.5 | 1 | 1.5 |
| [38] | Predictive intelligence to the edge of the IoT network. | 0.5 | 1 | 1.5 |
| [39] | Attribute-centric access control | 1 | 0.5 | 1.5 |
| [13] | Role-based access control | 1 | 0.5 | 1.5 |
| [40] | Cleaning unauthorized access | 1 | 0.5 | 1.5 |
| [41] | Comprehensive overview of AI-based techniques used in wireless sensor networks (WSN) | 0.5 | 0.5 | 1 |
| [19] | Entitlement decision and prediction with the help of AI | 0.5 | 0.5 | 1 |
| [42] | Functional requirement for authority data and for subject authority data-related models | 1 | 0 | 1 |
| [43] | AI systems and applications | 0.5 | 0.5 | 1 |
| [44] | Applications of artificial intelligence, deep learning, and machine learning | 0.5 | 0.5 | 1 |
| [39] | Decentralized IAM | 1 | 0 | 1 |
| [30] | Modelling for predictive algorithms to provide information security, transparency, and accountability in decision-making | 0 | 0.5 | 0.5 |
| [45] | Virtual engineering process, predictive management, and allied concepts for effective decision-making | 0 | 0.5 | 0.5 |
| [46] | AI tools for user behaviour assessment and interaction with environment | 0.5 | 0 | 0.5 |
| [47] | Knowledge representation model for prediction mechanism | 0 | 0.5 | 0.5 |
| [29] | Development of system compatible with advanced technologies such as AI, which ensure security | 0.5 | 0 | 0.5 |
| [20] | Application of AI for entitlement review | 0.5 | 0 | 0.5 |
| [48] | AI and accessibility | 0.5 | 0 | 0.5 |
| [49] | Unexplored areas of computer science applications | 0.5 | 0 | 0.5 |
| [50] | Perspectives on digital identity systems | 0.5 | 0 | 0.5 |
| [40] | Predictive intelligence | 0 | 0.5 | 0.5 |
|