OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
Jae Kyu Lee, Younghoon Chang, Hun-Yeong Kwon, et al.
Information Systems Frontiers (2020) Vol. 22, Iss. 1, pp. 45-57
Open Access | Times Cited: 36

Showing 1-25 of 36 citing articles:

Data security governance in the era of big data: status, challenges, and prospects
Liyuan Sun, Hongyun Zhang, Chao Fang
Data Science and Management (2021) Vol. 2, pp. 41-44
Open Access | Times Cited: 50

Cyberattacks, cyber threats, and attitudes toward cybersecurity policies
Keren L. G. Snider, Ryan Shandler, Shay Zandani, et al.
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 47

Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects
Maad M. Mijwil, Ruchi Doshi, Kamal Kant Hiran, et al.
Deleted Journal (2022), pp. 1-4
Open Access | Times Cited: 34

Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective
Ben Krishna, Satish Krishnan, M. P. Sebastian
Information Systems Frontiers (2022) Vol. 25, Iss. 5, pp. 1713-1741
Closed Access | Times Cited: 23

Enhancing Healthcare Supply Chains In Developing Countries: The Role Of Blockchain Technology
Amira Nabli, Asmae El Mokrini, Tarik Aouam
Procedia Computer Science (2025) Vol. 253, pp. 2327-2336
Open Access

Introduction to digital transformation in the construction industry
Amin Khoshkenar, Makram Bou Hatoum, Nisa Zahin, et al.
Elsevier eBooks (2025), pp. 3-24
Closed Access

Development of a risk index for cross-border data movement
Li Jin, Wanting Dong, Chong Zhang, et al.
Data Science and Management (2022) Vol. 5, Iss. 3, pp. 97-104
Open Access | Times Cited: 16

User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse
Paras Bhatt, Naga Vemprala, Rohit Valecha, et al.
Information Systems Frontiers (2022) Vol. 25, Iss. 5, pp. 1667-1682
Open Access | Times Cited: 15

Factors impacting cybersecurity transformation: An Industry 5.0 perspective
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2

A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance
Muhammad Umair Shah, Farkhund Iqbal, Umair Rehman, et al.
IEEE Access (2023) Vol. 11, pp. 87970-87984
Open Access | Times Cited: 5

Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why
Jae Yeon Kim, Jaeung Sim, Daegon Cho
Information Systems Frontiers (2022) Vol. 25, Iss. 5, pp. 1683-1694
Closed Access | Times Cited: 8

Analysis of Patient Rights Protection through Medical Record Confidentiality and Information Disclosure System in Indonesian Hospitals
Ns. I Komang Upadana Putra, Raden Ayu Tuty Kuswardhani, Sagung Putri M.E Purwani
Journal La Sociale (2024) Vol. 5, Iss. 2, pp. 539-549
Open Access | Times Cited: 1

Balancing talent and technology: Navigating cybersecurity and privacy in SMEs
Yang Hoong, Davar Rezania
Telematics and Informatics Reports (2024) Vol. 15, pp. 100151-100151
Open Access | Times Cited: 1

Privacy Engineering Methodologies: A survey
Yaqoob Al-Slais
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (2020)
Closed Access | Times Cited: 11

ISF Editorial 2020
Ram Ramesh, H. Raghav Rao
Information Systems Frontiers (2020) Vol. 22, Iss. 1, pp. 1-9
Open Access | Times Cited: 9

Viewpoint: Information systems research strategy
Guy G. Gable
The Journal of Strategic Information Systems (2020) Vol. 29, Iss. 2, pp. 101620-101620
Open Access | Times Cited: 9

Information Privacy Assimilation in IT Organizations
V. S. Prakash Attili, Saji K. Mathew, Vijayan Sugumaran
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1497-1513
Closed Access | Times Cited: 9

Improving the governance of information technology: Insights from the history of Internet governance
Neena Pandey, Rahul Dè, M. N. Ravishankar
Journal of Information Technology (2022) Vol. 37, Iss. 3, pp. 266-287
Open Access | Times Cited: 6

Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
Mohammed Alweshah, Saleh Alkhalaileh, Majdi Beseiso, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 10, pp. 12278-12309
Closed Access | Times Cited: 6

Internet of Behavior in Cybersecurity: Opportunities and Challenges
Sagar Patel, Nishant Doshi
Lecture notes in electrical engineering (2022), pp. 219-227
Closed Access | Times Cited: 6

Special Issue on Bright Information and Communication Technologies in the 21st Century
Dan J. Kim, Indranil Bose, Arunabha Mukhopadhyay
Information Systems Frontiers (2023) Vol. 25, Iss. 5, pp. 1661-1665
Open Access | Times Cited: 3

A System to Access Online Services with Minimal Personal Information Disclosure
Antonia Russo, Gianluca Lax, Baptiste Dromard, et al.
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1563-1575
Open Access | Times Cited: 6

The Paradoxical Impact of Information Privacy on Privacy Preserving Technology: The Case of Self-Sovereign Identities
Jannik Lockl, Nico Thanner, Manuel Utz, et al.
International Journal of Innovation and Technology Management (2023) Vol. 20, Iss. 04
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top