OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34

Showing 1-25 of 34 citing articles:

Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 33

A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations
Wasswa Shafik
Advances in information security, privacy, and ethics book series (2023), pp. 56-79
Closed Access | Times Cited: 36

Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 9

Effects of socioeconomic and digital inequalities on cybersecurity in a developing country
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4

Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm
Reismary Armas, Hamed Taherdoost
Information (2025) Vol. 16, Iss. 5, pp. 336-336
Open Access

Anomaly Detection Module for Network Traffic Monitoring in Public Institutions
Łukasz Wawrowski, A. Białas, Adrian Kajzer, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 2974-2974
Open Access | Times Cited: 10

An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
Shah Khalid Khan, Nirajan Shiwakoti, Ao Wang, et al.
Future Transportation (2025) Vol. 5, Iss. 1, pp. 5-5
Open Access

Learning Models for Higher Education in Engineering: Motivation, Self-Determination, and the Role of Information and Communication Technologies
Ana Bustamante-Mora, Mauricio Diéguez, Yemsy Hormazábal, et al.
Sustainability (2023) Vol. 15, Iss. 17, pp. 12869-12869
Open Access | Times Cited: 6

Mitigating the Impact of Work Overload on Cybersecurity Behavior: The Moderating Influence of Corporate Ethics—A Mediated Moderation Analysis
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4

Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, et al.
Information Technology and People (2024)
Closed Access | Times Cited: 1

Behavior Types from Cybersecurity Perspective: An Overview
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1

Why not use facial recognition payment? From the perspective of the extended protection motivation theory
Zizhong Zhang, Xiaoxue Zhang
Journal of Retailing and Consumer Services (2024) Vol. 81, pp. 104016-104016
Closed Access | Times Cited: 1

Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia
Ali Vafaei-Zadeh, Davoud Nikbin, Kit Yik Teoh, et al.
International Journal of Bank Marketing (2024)
Closed Access | Times Cited: 1

Development of a disaster preparedness training program for community leaders: Evidence from Taiwan
Jing‐Shia Tang, Hsin‐Yi Chang, Jui‐Ying Feng
International Journal of Disaster Risk Reduction (2024) Vol. 108, pp. 104517-104517
Closed Access | Times Cited: 1

Enhancing post-training evaluation of annual performance agreement training: A fusion of fsQCA and artificial neural network approach
Md. Zohurul Islam, Munshi Muhammad Abdul Kader Jilani, Mohammad Rezaul Karim
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0305916-e0305916
Open Access

Implementing a rapid application development course in higher education and measuring its impact using Kirkpatrick’s model: a case study at Vilnius Gediminas Technical University
Urtė Radvilaitė, Diana Kalibatienė, Jelena Stankevič
New Trends in Computer Sciences (2024) Vol. 2, Iss. 2, pp. 81-90
Closed Access

Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences
Yeslam Al‐Saggaf, Julie Maclean
Information (2024) Vol. 15, Iss. 10, pp. 604-604
Open Access

Design and evaluation of TPB based anti-bullying intervention for university students
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Multimedia Tools and Applications (2024)
Closed Access

Measuring Training Contribution: Organization Design on a Training Evaluation System based on Return of Training Investment
Nafia Kusuma Indrayati, Fendy Suhariadi
Psikostudia Jurnal Psikologi (2023) Vol. 12, Iss. 2, pp. 279-279
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top