
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Online Routine Activities and Self-Guardianship against Cyber Abuse
Zarina Vakhitova, Clair Alston‐Knox, Rob Mawby
Victims & Offenders (2022) Vol. 18, Iss. 4, pp. 623-645
Open Access | Times Cited: 7
Zarina Vakhitova, Clair Alston‐Knox, Rob Mawby
Victims & Offenders (2022) Vol. 18, Iss. 4, pp. 623-645
Open Access | Times Cited: 7
Showing 7 citing articles:
Routine activities and fraud re-victimization among older adults: Do types of routine activities matter?
Yanyu Xin, Yiwei Xia, Yu Chai
Criminology & Criminal Justice (2024)
Closed Access | Times Cited: 5
Yanyu Xin, Yiwei Xia, Yu Chai
Criminology & Criminal Justice (2024)
Closed Access | Times Cited: 5
Food fraud prevention strategies: Building an effective verification ecosystem
Louise Manning, Andrew Macleod, Christian James, et al.
Comprehensive Reviews in Food Science and Food Safety (2024) Vol. 23, Iss. 6
Open Access | Times Cited: 3
Louise Manning, Andrew Macleod, Christian James, et al.
Comprehensive Reviews in Food Science and Food Safety (2024) Vol. 23, Iss. 6
Open Access | Times Cited: 3
U.S. Young Adults’ Professional Help-Seeking in Response to Technology-Facilitated Abuse
Elizabeth A. Mumford, Emily F. Rothman, Poulami Maitra, et al.
Journal of Interpersonal Violence (2022) Vol. 38, Iss. 11-12, pp. 7063-7088
Closed Access | Times Cited: 12
Elizabeth A. Mumford, Emily F. Rothman, Poulami Maitra, et al.
Journal of Interpersonal Violence (2022) Vol. 38, Iss. 11-12, pp. 7063-7088
Closed Access | Times Cited: 12
Victim reactions to being stalked: Examining the effects of perceived offender characteristics and motivations
Ryan Randa, Bradford W. Reyns, Ashley K. Fansher
Behavioral Sciences & the Law (2022) Vol. 40, Iss. 5, pp. 715-731
Closed Access | Times Cited: 6
Ryan Randa, Bradford W. Reyns, Ashley K. Fansher
Behavioral Sciences & the Law (2022) Vol. 40, Iss. 5, pp. 715-731
Closed Access | Times Cited: 6
The Victim-Offender Overlap in Technology-Facilitated Abuse: Nationally Representative Findings Among U.S. Young Adults
Elizabeth A. Mumford, Poulami Maitra, Emily F. Rothman, et al.
Cyberpsychology Behavior and Social Networking (2023) Vol. 26, Iss. 12, pp. 904-912
Closed Access | Times Cited: 2
Elizabeth A. Mumford, Poulami Maitra, Emily F. Rothman, et al.
Cyberpsychology Behavior and Social Networking (2023) Vol. 26, Iss. 12, pp. 904-912
Closed Access | Times Cited: 2
Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach
Narjisse Nejjari, Karim Zkik, Hicham Hammouchi, et al.
IEEE Access (2024) Vol. 12, pp. 92198-92214
Open Access
Narjisse Nejjari, Karim Zkik, Hicham Hammouchi, et al.
IEEE Access (2024) Vol. 12, pp. 92198-92214
Open Access
Being phished and reporting phishing emails: emotional and knowledge antecedents and training gaps
Loretta J. Stalans, Eric Chan‐Tin, Madeline Moran, et al.
Journal of Crime and Justice (2024), pp. 1-19
Closed Access
Loretta J. Stalans, Eric Chan‐Tin, Madeline Moran, et al.
Journal of Crime and Justice (2024), pp. 1-19
Closed Access