OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Information security governance challenges and critical success factors: Systematic review
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Computers & Security (2020) Vol. 99, pp. 102030-102030
Closed Access | Times Cited: 86

Showing 1-25 of 86 citing articles:

Advanced data analytics in internal audits: A conceptual framework for comprehensive risk assessment and fraud detection
Oluwatosin Ilori, Nelly Tochi Nwosu, Henry Nwapali Ndidi Naiho
Finance & Accounting Research Journal (2024) Vol. 6, Iss. 6, pp. 931-952
Open Access | Times Cited: 21

Strengthening corporate governance and financial compliance: Enhancing accountability and transparency
Christianah Pelumi Efunniyi, Angela Omozele Abhulimen, Anwuli Nkemchor Obiki-Osafiele, et al.
Finance & Accounting Research Journal (2024) Vol. 6, Iss. 8, pp. 1597-1616
Open Access | Times Cited: 18

Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
Faheem Ahmed Shaikh, Mikko Siponen
Computers & Security (2022) Vol. 124, pp. 102974-102974
Open Access | Times Cited: 61

Methodology for Predictive Cyber Security Risk Assessment (PCSRA)
Daniel Jorge Ferreira, Nuno Mateus-Coelho, Henrique São Mamede
Procedia Computer Science (2023) Vol. 219, pp. 1555-1563
Open Access | Times Cited: 26

A comprehensive review of it governance: effective implementation of COBIT and ITIL frameworks in financial institutions
Oluwatosin Ilori, Nelly Tochi Nwosu, Henry Nwapali Ndidi Naiho
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 6, pp. 1391-1407
Open Access | Times Cited: 15

Enhancing IT audit effectiveness with agile methodologies: A conceptual exploration
Oluwatosin Ilori, Nelly Tochi Nwosu, Henry Nwapali Ndidi Naiho
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 6, pp. 1969-1994
Open Access | Times Cited: 14

A systematic synthesis of critical success factors for cybersecurity
William Yeoh, Shan Wang, Aleš Popovič, et al.
Computers & Security (2022) Vol. 118, pp. 102724-102724
Open Access | Times Cited: 29

A Dynamic and Adaptive Cybersecurity Governance Framework
Henock Mulugeta Melaku
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 327-350
Open Access | Times Cited: 22

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 20

Security Issues for Banking Systems
Mohammed Khodayer Hassan, Aymen Mohammed Khodayer Al-Dulaimi, Hassan Ali, et al.
Lecture notes in networks and systems (2023), pp. 117-131
Closed Access | Times Cited: 11

Universal Information Security Governance System: Organizational and Legal Principles
Musadaq A. Hadi, Mohammed Najm Abdulredha
Journal of Digital Technologies and Law (2025) Vol. 3, Iss. 1, pp. 125-142
Open Access

"Perfect is the Enemy of Good": The CISO's Role in Enterprise Security as a Business Enabler
Kimberly Ruth, Veronica A. Rivera, Gautam Akiwate, et al.
(2025), pp. 1-19
Closed Access

Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach
In Lee
Information (2022) Vol. 13, Iss. 9, pp. 404-404
Open Access | Times Cited: 18

An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Tejaswini Herath, Hemantha S. B. Herath, David Cullum
Information Systems Frontiers (2022)
Closed Access | Times Cited: 17

A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies
Mohamed Zaoui, Yousra Belfaik, Yassine Sadqi, et al.
IEEE Access (2024) Vol. 12, pp. 72224-72241
Open Access | Times Cited: 3

Theoretical Framework and Hypotheses Development
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 77-100
Closed Access

Characteristics of approaches to the formation of security systems at enterprises
О. С. Ремез
Economics Finances Law (2025) Vol. 3/2024, Iss. -, pp. 20-24
Open Access

CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7

The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation
Feng Xu, Carol Hsu, Tawei Wang, et al.
Information Systems Journal (2023) Vol. 34, Iss. 4, pp. 1144-1174
Open Access | Times Cited: 7

Firm performance and information security technology intellectual property
Martin Kang, Andrew S. Miller, Kyungmyung Jang, et al.
Technological Forecasting and Social Change (2022) Vol. 181, pp. 121735-121735
Closed Access | Times Cited: 11

Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method
In Lee
Computers & Security (2023) Vol. 129, pp. 103185-103185
Closed Access | Times Cited: 6

Pencil shell matrix based image steganography with elevated embedding capacity
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
Journal of Information Security and Applications (2021) Vol. 62, pp. 102955-102955
Closed Access | Times Cited: 14

Developing a QFD model for prioritizing the CSFs of ERP based on the enablers of organizational agility
Ali Ahmadzadeh, Abbas Sheikh Aboumasoudi, Arash Shahin, et al.
Benchmarking An International Journal (2020) Vol. 28, Iss. 4, pp. 1164-1185
Closed Access | Times Cited: 13

Information Technology Governance Design in DevOps-Based E-Marketplace Companies Using COBIT 2019 Framework
Merryana Lestari, Ade Iriani, Hendry Hendry
INTENSIF Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi (2022) Vol. 6, Iss. 2, pp. 233-252
Open Access | Times Cited: 8

Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001:2013: A Case Study of XYZ Financial Institution
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top