
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Role of Employees’ Information Security Awareness on the Intention to Resist Social Engineering
Tanja Grassegger, Dietmar Nedbal
Procedia Computer Science (2021) Vol. 181, pp. 59-66
Open Access | Times Cited: 43
Tanja Grassegger, Dietmar Nedbal
Procedia Computer Science (2021) Vol. 181, pp. 59-66
Open Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia
Saqib Saeed
Sustainability (2023) Vol. 15, Iss. 7, pp. 6019-6019
Open Access | Times Cited: 26
Saqib Saeed
Sustainability (2023) Vol. 15, Iss. 7, pp. 6019-6019
Open Access | Times Cited: 26
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?
Amina Mollazehi, Israa Abuelezz, Mahmoud Barhamgi, et al.
Lecture notes in business information processing (2024), pp. 273-288
Closed Access | Times Cited: 5
Amina Mollazehi, Israa Abuelezz, Mahmoud Barhamgi, et al.
Lecture notes in business information processing (2024), pp. 273-288
Closed Access | Times Cited: 5
An interdisciplinary view of social engineering: A call to action for research
Amy Hetro Washo
Computers in Human Behavior Reports (2021) Vol. 4, pp. 100126-100126
Open Access | Times Cited: 29
Amy Hetro Washo
Computers in Human Behavior Reports (2021) Vol. 4, pp. 100126-100126
Open Access | Times Cited: 29
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang
Information (2022) Vol. 13, Iss. 7, pp. 335-335
Open Access | Times Cited: 17
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang
Information (2022) Vol. 13, Iss. 7, pp. 335-335
Open Access | Times Cited: 17
The Moderating Role of Personal Innovativeness in Tourists’ Intention to Use Web 3.0 Based on Updated Information Systems Success Model
Mohammed Abdo Albaom, Fatimah Sidi, Marzanah A. Jabar, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 13935-13935
Open Access | Times Cited: 17
Mohammed Abdo Albaom, Fatimah Sidi, Marzanah A. Jabar, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 13935-13935
Open Access | Times Cited: 17
Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
Sandro Waelchli, Yoshija Walter
Computers & Security (2024), pp. 104137-104137
Open Access | Times Cited: 3
Sandro Waelchli, Yoshija Walter
Computers & Security (2024), pp. 104137-104137
Open Access | Times Cited: 3
The Power of Persuasion: Exploring Social Engineering in the Digital Age
Rand K. Abdelhamid, Mahmoud Maqableh
Studies in computational intelligence (2024), pp. 307-330
Closed Access | Times Cited: 2
Rand K. Abdelhamid, Mahmoud Maqableh
Studies in computational intelligence (2024), pp. 307-330
Closed Access | Times Cited: 2
Location-based service information disclosure on social networking sites: The effect of privacy calculus, subjective norms, trust, and cultural difference
Tu Van Binh, Tien Minh Dinh, Le Thi Hue Linh, et al.
Information Services & Use (2023) Vol. 43, Iss. 1, pp. 39-62
Open Access | Times Cited: 4
Tu Van Binh, Tien Minh Dinh, Le Thi Hue Linh, et al.
Information Services & Use (2023) Vol. 43, Iss. 1, pp. 39-62
Open Access | Times Cited: 4
Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001:2013: A Case Study of XYZ Financial Institution
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 4
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 4
Understanding the adoption of digital payment in Indonesian SMEs using modified technology acceptance model
Adriani Kala’lembang, Sudarmiatin Sudarmiatin, Budi Eko Soetjipto, et al.
Journal of Social Economics Research (2024) Vol. 11, Iss. 2, pp. 213-227
Open Access | Times Cited: 1
Adriani Kala’lembang, Sudarmiatin Sudarmiatin, Budi Eko Soetjipto, et al.
Journal of Social Economics Research (2024) Vol. 11, Iss. 2, pp. 213-227
Open Access | Times Cited: 1
Identifying Key Issues to Enhance the Cybersecurity Awareness Strategy within Organizations
Anawin Kaewsa-ard, Nattavee Utakrit
Lecture notes in networks and systems (2024), pp. 1-11
Closed Access | Times Cited: 1
Anawin Kaewsa-ard, Nattavee Utakrit
Lecture notes in networks and systems (2024), pp. 1-11
Closed Access | Times Cited: 1
Renewable energy adoption among Türkiye's future generation: What influences their intentions?
Furkan Açıkgöz, Özlem Yorulmaz
Energy Sustainable Development/Energy for sustainable development (2024) Vol. 80, pp. 101467-101467
Closed Access | Times Cited: 1
Furkan Açıkgöz, Özlem Yorulmaz
Energy Sustainable Development/Energy for sustainable development (2024) Vol. 80, pp. 101467-101467
Closed Access | Times Cited: 1
Social Engineering Attacks: How to Prevent
Lilit Manukyan, Mariam Gevorgyan
Journal of Digital Science (2024) Vol. 6, Iss. 1, pp. 28-35
Closed Access | Times Cited: 1
Lilit Manukyan, Mariam Gevorgyan
Journal of Digital Science (2024) Vol. 6, Iss. 1, pp. 28-35
Closed Access | Times Cited: 1
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees
I Al-Shanfari, Warusia Yassin, Nasser Tabook, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 7
I Al-Shanfari, Warusia Yassin, Nasser Tabook, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 7
Trends in Cybersecurity Management Issues Related to Human Behaviour and Machine Learning
Jasmine Scott, Michael Kyobe
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-8
Closed Access | Times Cited: 9
Jasmine Scott, Michael Kyobe
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-8
Closed Access | Times Cited: 9
The impact of a cause–effect elaboration procedure on information security risk perceptions: a construal fit perspective
Zhang Hao Goh, Minzheng Hou, Hichang Cho
Journal of Cybersecurity (2022) Vol. 8, Iss. 1
Open Access | Times Cited: 6
Zhang Hao Goh, Minzheng Hou, Hichang Cho
Journal of Cybersecurity (2022) Vol. 8, Iss. 1
Open Access | Times Cited: 6
A Comprehensive Assessment of Human Factors in Relation to Cyber Security Compliance of Healthcare Staff in a Paperless Hospital
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang
(2022)
Open Access | Times Cited: 6
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang
(2022)
Open Access | Times Cited: 6
Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: a systematic review
Maryam Nasser Al-Nuaimi
Global Knowledge Memory and Communication (2022) Vol. 73, Iss. 1/2, pp. 1-23
Closed Access | Times Cited: 6
Maryam Nasser Al-Nuaimi
Global Knowledge Memory and Communication (2022) Vol. 73, Iss. 1/2, pp. 1-23
Closed Access | Times Cited: 6
Cyber Literacy Skills of Estonians: Activities and Policies For Encouraging Knowledge-Based Cyber Security Attitudes
Kate‐Riin Kont
Information & Media (2023) Vol. 96, pp. 80-94
Open Access | Times Cited: 3
Kate‐Riin Kont
Information & Media (2023) Vol. 96, pp. 80-94
Open Access | Times Cited: 3
Adéle da Veiga, Marianne Loock, Karen Renaud
The Electronic Journal of Information Systems in Developing Countries (2021) Vol. 88, Iss. 1
Open Access | Times Cited: 6
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022)
Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Abdul Ghani
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-08
Closed Access | Times Cited: 3
Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Abdul Ghani
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-08
Closed Access | Times Cited: 3
Reducing the Risk of Social Engineering At-Tacks Using Soar Measures in a Real World Environment: A Case Study
Sandro Waelchli, Yoshija Walter
(2024)
Closed Access
Sandro Waelchli, Yoshija Walter
(2024)
Closed Access