OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DATA BREACH MANAGEMENT: AN INTEGRATED RISK MODEL
Freeha Khan, Jung Hwan Kim, Lars Mathiassen, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103392-103392
Closed Access | Times Cited: 48

Showing 1-25 of 48 citing articles:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 189

Antecedents and consequences of data breaches: A systematic review
Frederic Schlackl, Nico Link, Hartmut Hoehle
Information & Management (2022) Vol. 59, Iss. 4, pp. 103638-103638
Closed Access | Times Cited: 82

A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77

Shaping the future of AI in healthcare through ethics and governance
Rabaï Bouderhem
Humanities and Social Sciences Communications (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 25

Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
Faheem Ahmed Shaikh, Mikko Siponen
Computers & Security (2022) Vol. 124, pp. 102974-102974
Open Access | Times Cited: 61

Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 201-201
Open Access | Times Cited: 9

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
Humza Naseer, Kevin C. Desouza, Sean B. Maynard, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 2, pp. 200-220
Closed Access | Times Cited: 16

Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities
Ayesha Naseer, Humza Naseer, Atif Ahmad, et al.
Computers & Security (2023) Vol. 135, pp. 103525-103525
Open Access | Times Cited: 15

A privacy risk identification framework of open government data: A mixed-method study in China
Ying Li, Rui Yang, Yikun Lu
Government Information Quarterly (2024) Vol. 41, Iss. 1, pp. 101916-101916
Closed Access | Times Cited: 5

Supply Chain Risk Factors, Technological Capabilities, and Firm Performance of Small to Medium Enterprises (SMEs)
James Kanyepe, James Kanyepe, Wilbert Manyanga
Journal of Small Business Strategy (2025) Vol. 35, Iss. 1
Open Access

Identifying the Root Cause of a Cyber Attack Through Log Data Analysis: An Overview of the Challenges Faced by Novice Learners
Priya V. Nagvekar, Syaamantak Das, Sridhar Iyer
Communications in computer and information science (2025), pp. 147-160
Closed Access

The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment
Driss El Majdoubi, Hanan El Bakkali, Souad Sadki, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-26
Open Access | Times Cited: 17

Developing a data breach protection capability framework in retailing
Mohammad Rajib Uddin, Shahriar Akter, Wai Jin Thomas Lee
International Journal of Production Economics (2024) Vol. 271, pp. 109202-109202
Open Access | Times Cited: 3

Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring
Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre
Children (2025) Vol. 12, Iss. 3, pp. 317-317
Open Access

Cybersecurity Risk Through the Supply Chain: Evidence From Relationship-Specific Investment
K. Trung, Henry Hongren Huang, Anh‐Tuan Le
˜The œInternational journal of accounting/International journal of accounting (2025)
Closed Access

Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses
Paras Bhatt, Rohit Valecha, Hengyi Rao
International Journal of Information Management (2025) Vol. 83, pp. 102902-102902
Closed Access

Subject Matter Experts’ Feedback on Cybersecurity Footprint Index Measures to Assess Organizational Cyber Posture of Manufacturing Companies
John Del Vecchio, Yair Levy, Ling Wang, et al.
Communications in computer and information science (2025), pp. 280-295
Closed Access

Fairness of Ratemaking for Catastrophe Insurance: Lessons from Machine Learning
Nan Zhang, Heng Xu
Information Systems Research (2023) Vol. 35, Iss. 2, pp. 469-488
Closed Access | Times Cited: 8

Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
Antonio Santos-Olmo, Luis Sánchez, David G. Rosado, et al.
Frontiers of Computer Science (2023) Vol. 18, Iss. 3
Open Access | Times Cited: 8

Agile incident response (AIR): Improving the incident response process in healthcare
Ying He, Efpraxia D. Zamani, Stefan Lloyd, et al.
International Journal of Information Management (2021) Vol. 62, pp. 102435-102435
Open Access | Times Cited: 17

Spillover effects of data breach on consumer perceptions: evidence from the E-commerce industry
Jaeyoung Park, Woosik Shin, Beomsoo Kim, et al.
Internet Research (2024)
Closed Access | Times Cited: 2

Knowledge Leaks in Data-Driven Business Models? Exploring Different Types of Knowledge Risks and Protection Measures
Michael Fruhwirth, Viktoria Pammer‐Schindler, Stefan Thalmann
Schmalenbach Journal of Business Research (2024) Vol. 76, Iss. 3, pp. 357-396
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top