
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe, et al.
Computers & Security (2022) Vol. 124, pp. 102954-102954
Open Access | Times Cited: 34
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe, et al.
Computers & Security (2022) Vol. 124, pp. 102954-102954
Open Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
Trustworthy Recommender Systems
Shoujin Wang, Xiuzhen Zhang, Yan Wang, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 15, Iss. 4, pp. 1-20
Open Access | Times Cited: 44
Shoujin Wang, Xiuzhen Zhang, Yan Wang, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 15, Iss. 4, pp. 1-20
Open Access | Times Cited: 44
Cyber Resilience Framework: Strengthening Defenses and Enhancing Continuity in Business Security
Ahmad AL-Hawamleh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1315-1331
Open Access | Times Cited: 23
Ahmad AL-Hawamleh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1315-1331
Open Access | Times Cited: 23
The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities
Lázaro Florido-Benítez
Smart Cities (2024) Vol. 7, Iss. 1, pp. 475-495
Open Access | Times Cited: 18
Lázaro Florido-Benítez
Smart Cities (2024) Vol. 7, Iss. 1, pp. 475-495
Open Access | Times Cited: 18
A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations
Wasswa Shafik
Advances in information security, privacy, and ethics book series (2023), pp. 56-79
Closed Access | Times Cited: 36
Wasswa Shafik
Advances in information security, privacy, and ethics book series (2023), pp. 56-79
Closed Access | Times Cited: 36
Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach
Ala’a M. Al-Momani, T. Ramayah, Mohammed A. Al‐Sharafi
Technology in Society (2024) Vol. 77, pp. 102592-102592
Closed Access | Times Cited: 11
Ala’a M. Al-Momani, T. Ramayah, Mohammed A. Al‐Sharafi
Technology in Society (2024) Vol. 77, pp. 102592-102592
Closed Access | Times Cited: 11
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 6
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 6
Exploring the economic role of cybersecurity in SMEs: A case study of the UK
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Technology in Society (2024) Vol. 78, pp. 102670-102670
Open Access | Times Cited: 6
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Technology in Society (2024) Vol. 78, pp. 102670-102670
Open Access | Times Cited: 6
Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies
Anna Cartwright, Edward Cartwright, Esther Solomon Edun
Computers & Security (2023) Vol. 131, pp. 103288-103288
Open Access | Times Cited: 11
Anna Cartwright, Edward Cartwright, Esther Solomon Edun
Computers & Security (2023) Vol. 131, pp. 103288-103288
Open Access | Times Cited: 11
Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business
Francisco Isaí Morales Sáenz, José Melchor Medina Quintero, Miguel Reyna-Castillo
Sustainability (2024) Vol. 16, Iss. 14, pp. 5884-5884
Open Access | Times Cited: 4
Francisco Isaí Morales Sáenz, José Melchor Medina Quintero, Miguel Reyna-Castillo
Sustainability (2024) Vol. 16, Iss. 14, pp. 5884-5884
Open Access | Times Cited: 4
Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access
Target Profile Model to Improve Cybersecurity Capabilities of Educational Institutions Against Cyber-Attacks
J. De La Cruz, Andrés La Rosa Toro, Juan-Pablo Mansilla, et al.
Communications in computer and information science (2025), pp. 334-349
Closed Access
J. De La Cruz, Andrés La Rosa Toro, Juan-Pablo Mansilla, et al.
Communications in computer and information science (2025), pp. 334-349
Closed Access
Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, et al.
Information Systems Frontiers (2025)
Open Access
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, et al.
Information Systems Frontiers (2025)
Open Access
Cybersecurity Resilience in SMEs. A Machine Learning Approach
Juan Carlos Fernández de Arróyabe, Marta F. Arroyabe, Ignacio Fernández, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 6, pp. 711-727
Open Access | Times Cited: 10
Juan Carlos Fernández de Arróyabe, Marta F. Arroyabe, Ignacio Fernández, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 6, pp. 711-727
Open Access | Times Cited: 10
Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence
Angélica Pigola, Priscila Rezende da Costa
Information and Computer Security (2025)
Closed Access
Angélica Pigola, Priscila Rezende da Costa
Information and Computer Security (2025)
Closed Access
Building a thematic framework of cybersecurity: a systematic literature review approach
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 3
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 3
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Digitalization and Cybersecurity in SMEs: A Bibliometric Analysis
Marta F. Arroyabe, Carlos F.A. Arranz, Juan Carlos Fernández de Arróyabe, et al.
Procedia Computer Science (2024) Vol. 237, pp. 80-87
Open Access | Times Cited: 2
Marta F. Arroyabe, Carlos F.A. Arranz, Juan Carlos Fernández de Arróyabe, et al.
Procedia Computer Science (2024) Vol. 237, pp. 80-87
Open Access | Times Cited: 2
Integrated debris flow hazard and risk assessment using UAV data and RAMMS, a case study in northern Pakistan
Naseem Ahmad, Muhammad Shafique, Mian Luqman Hussain, et al.
Natural Hazards (2024)
Closed Access | Times Cited: 2
Naseem Ahmad, Muhammad Shafique, Mian Luqman Hussain, et al.
Natural Hazards (2024)
Closed Access | Times Cited: 2
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Journal of Computer Information Systems (2024), pp. 1-21
Open Access | Times Cited: 2
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Journal of Computer Information Systems (2024), pp. 1-21
Open Access | Times Cited: 2
What Hinders Adoption of Artificial Intelligence for Cybersecurity in the Banking Sector
Aishatu Garga Ali, Mahmood Shah
Information (2024) Vol. 15, Iss. 12, pp. 760-760
Open Access | Times Cited: 2
Aishatu Garga Ali, Mahmood Shah
Information (2024) Vol. 15, Iss. 12, pp. 760-760
Open Access | Times Cited: 2
Assessment of existing cyber-attack detection models for web-based systems
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Provably efficient security-aware service function tree composing and embedding in multi-vendor networks
Danyang Zheng, Huanlai Xing, Li Feng, et al.
Computer Networks (2024) Vol. 254, pp. 110843-110843
Closed Access | Times Cited: 1
Danyang Zheng, Huanlai Xing, Li Feng, et al.
Computer Networks (2024) Vol. 254, pp. 110843-110843
Closed Access | Times Cited: 1
Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach
Ignacio Fernandez De Arroyabe, Tim Watson, Iain Phillips
Future Internet (2024) Vol. 16, Iss. 11, pp. 395-395
Open Access | Times Cited: 1
Ignacio Fernandez De Arroyabe, Tim Watson, Iain Phillips
Future Internet (2024) Vol. 16, Iss. 11, pp. 395-395
Open Access | Times Cited: 1
Empirically evaluating the effect of security precautions on cyber incidents
Neil Gandal, Tyler Moore, Michael Riordan, et al.
Computers & Security (2023) Vol. 133, pp. 103380-103380
Open Access | Times Cited: 3
Neil Gandal, Tyler Moore, Michael Riordan, et al.
Computers & Security (2023) Vol. 133, pp. 103380-103380
Open Access | Times Cited: 3
Enhancing cybersecurity capability investments: Evidence from an experiment
Angélica Pigola, Priscila Rezende da Costa, Marcos Ferasso, et al.
Technology in Society (2023) Vol. 76, pp. 102449-102449
Closed Access | Times Cited: 3
Angélica Pigola, Priscila Rezende da Costa, Marcos Ferasso, et al.
Technology in Society (2023) Vol. 76, pp. 102449-102449
Closed Access | Times Cited: 3