
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Ethical Frameworks for Cybersecurity
Michele Loi, Markus Christen
The International library of ethics, law and technology (2020), pp. 73-95
Open Access | Times Cited: 18
Michele Loi, Markus Christen
The International library of ethics, law and technology (2020), pp. 73-95
Open Access | Times Cited: 18
Showing 18 citing articles:
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
In Lee
Future Internet (2020) Vol. 12, Iss. 9, pp. 157-157
Open Access | Times Cited: 174
In Lee
Future Internet (2020) Vol. 12, Iss. 9, pp. 157-157
Open Access | Times Cited: 174
Management Practices for Mitigating Cybersecurity Threats to Biotechnology Companies, Laboratories, and Healthcare Research Organizations
Allison J. Huff, Darrell Norman Burrell, Calvin Nobles, et al.
Advances in human and social aspects of technology book series (2023), pp. 1-12
Closed Access | Times Cited: 44
Allison J. Huff, Darrell Norman Burrell, Calvin Nobles, et al.
Advances in human and social aspects of technology book series (2023), pp. 1-12
Closed Access | Times Cited: 44
A principlist framework for cybersecurity ethics
Paul Formosa, Michael Wilson, Deborah Richards
Computers & Security (2021) Vol. 109, pp. 102382-102382
Open Access | Times Cited: 73
Paul Formosa, Michael Wilson, Deborah Richards
Computers & Security (2021) Vol. 109, pp. 102382-102382
Open Access | Times Cited: 73
The Future of Ethical Hacking: Charting the Uncharted in Cybersecurity
Gleuto M. Serafim
Lecture notes in networks and systems (2025), pp. 17-30
Closed Access
Gleuto M. Serafim
Lecture notes in networks and systems (2025), pp. 17-30
Closed Access
Ethics For Responsible Data Research: Integrating Cybersecurity Perspectives In Digital Era
Sheetal Temara
SSRN Electronic Journal (2025)
Open Access
Sheetal Temara
SSRN Electronic Journal (2025)
Open Access
Cybersecurity Behavior Change: A conceptualization of Ethical Principles for Behavioral Interventions
Konstantinos Mersinas, Maria Bada, Steven Furnell
Computers & Security (2024) Vol. 148, pp. 104025-104025
Open Access | Times Cited: 2
Konstantinos Mersinas, Maria Bada, Steven Furnell
Computers & Security (2024) Vol. 148, pp. 104025-104025
Open Access | Times Cited: 2
Global Legislation Muzzling Freedom of Speech in the Guise of Cyber Security
Muhammad Arif Leghari, Muhammad Farooq Wasiq, Javeria Younes, et al.
Advanced sciences and technologies for security applications (2024), pp. 263-279
Closed Access | Times Cited: 1
Muhammad Arif Leghari, Muhammad Farooq Wasiq, Javeria Younes, et al.
Advanced sciences and technologies for security applications (2024), pp. 263-279
Closed Access | Times Cited: 1
Overview of the Complex Landscape and Future Directions of Ethics in Light of Emerging Technologies
Marianne A. Azer, Rasha Samir
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access | Times Cited: 1
Marianne A. Azer, Rasha Samir
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access | Times Cited: 1
Ethics for Responsible Data Research
Sheetal Temara
Advances in data mining and database management book series (2024), pp. 103-144
Closed Access | Times Cited: 1
Sheetal Temara
Advances in data mining and database management book series (2024), pp. 103-144
Closed Access | Times Cited: 1
Cyber Security & IoT Vulnerabilities Threats Intruders and Attacks Research Review
Asma’a Bassam Alamareen, Malak Hamad Al-mashagbeh, Sara Abuasal
Journal of Namibian Studies History Politics Culture (2023) Vol. 33
Open Access | Times Cited: 2
Asma’a Bassam Alamareen, Malak Hamad Al-mashagbeh, Sara Abuasal
Journal of Namibian Studies History Politics Culture (2023) Vol. 33
Open Access | Times Cited: 2
A Discussion on Ethical Cybersecurity Issues in Digital Service Chains
Frédéric Tronnier, Sebastian Pape, Sascha Löbner, et al.
Lecture notes in computer science (2022), pp. 222-256
Open Access | Times Cited: 4
Frédéric Tronnier, Sebastian Pape, Sascha Löbner, et al.
Lecture notes in computer science (2022), pp. 222-256
Open Access | Times Cited: 4
Disentangling (Cyber)Security from the Privacy Debate in the IoT
Pier Giorgio Chiara
Law, governance and technology series (2024), pp. 29-63
Closed Access
Pier Giorgio Chiara
Law, governance and technology series (2024), pp. 29-63
Closed Access
Cybersecurity Ethics and Ethical Hackers: A Systematic Overview on Data Availability and Understanding the Need for Moral Hazard Philosophy in Cyberspace
A. R. Mubarak, Fairouz M. Aldhmour
Contributions to management science (2024), pp. 129-140
Closed Access
A. R. Mubarak, Fairouz M. Aldhmour
Contributions to management science (2024), pp. 129-140
Closed Access
Capacities of Western Balkan Economies (and Their Public Sectors) to Respond to Ransomware Attacks
Đorđe Krivokapić, Andrea Nikolić, Ivona Živković
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 1
Đorđe Krivokapić, Andrea Nikolić, Ivona Živković
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 1
Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns
Ivan Fléchais, George Chalhoub
New Security Paradigms Workshop (2023), pp. 62-75
Open Access | Times Cited: 1
Ivan Fléchais, George Chalhoub
New Security Paradigms Workshop (2023), pp. 62-75
Open Access | Times Cited: 1
(Un)ethical behaviors of police officers in South Korea: a structural equation analysis
Seungmug Lee, Jae‐Jin Joo, Hye-Rim Kwon, et al.
Policing An International Journal (2022) Vol. 45, Iss. 2, pp. 282-297
Closed Access | Times Cited: 1
Seungmug Lee, Jae‐Jin Joo, Hye-Rim Kwon, et al.
Policing An International Journal (2022) Vol. 45, Iss. 2, pp. 282-297
Closed Access | Times Cited: 1
Capacities of Western Balkan Economies (and Their Public Sectors) to Respond to Ransomware Attacks**
Djordje Krivokapić, Andrea Nikolić, Ivona Živković
(2023), pp. 1508-1514
Closed Access
Djordje Krivokapić, Andrea Nikolić, Ivona Živković
(2023), pp. 1508-1514
Closed Access
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
Jyri Rajamäki, Heikki Hämäläinen
Information & Security An International Journal (2021) Vol. 50, pp. 103-116
Open Access
Jyri Rajamäki, Heikki Hämäläinen
Information & Security An International Journal (2021) Vol. 50, pp. 103-116
Open Access