OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Kybernetes (2021) Vol. 52, Iss. 1, pp. 401-421
Closed Access | Times Cited: 24

Showing 24 citing articles:

The Road to corporate sustainability: The importance of artificial intelligence
Pengyu Chen, Zhongzhu Chu, Miao Zhao
Technology in Society (2023) Vol. 76, pp. 102440-102440
Closed Access | Times Cited: 33

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34

Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Technology in Society (2022) Vol. 70, pp. 102055-102055
Closed Access | Times Cited: 28

Komparatif Epistemologi-Aksiologis Kurikulum K13 dengan Kurikulum Merdeka
Ella Kristiani, Papin Andrianti, Enjelie Enjelie, et al.
Jurnal Pengajaran Sekolah Dasar (2023) Vol. 2, Iss. 1, pp. 76-92
Open Access | Times Cited: 16

Effects of socioeconomic and digital inequalities on cybersecurity in a developing country
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12

Effects of service providers’ self-disclosure on booking platforms on consumers’ trust, hesitation, and booking intentions: moderating role of social media influencers
Naeem Akhtar, Umar Iqbal Siddiqi
Journal of Hospitality Marketing & Management (2023) Vol. 33, Iss. 4, pp. 470-498
Closed Access | Times Cited: 10

Cyberbullying victimization among university students- a national study of Pakistan
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Security Journal (2025) Vol. 38, Iss. 1
Closed Access

Artificial Intelligence in Cybersecurity: A Review and a Case Study
Selçuk Ökdem, Sema Okdem
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10487-10487
Open Access | Times Cited: 3

Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, et al.
Information Technology and People (2024)
Closed Access | Times Cited: 1

sExplanatory and Predictive Modeling of Cybersecurity Behaviors using Protection Motivation Theory
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1

Determination of Cyber Security Awareness Levels of Students with Machine Learning Methods
Mahmut TOKMAK
Yüzüncü Yıl Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2023) Vol. 28, Iss. 2, pp. 451-466
Open Access | Times Cited: 2

An empirical investigation of the social web gendered privacy model
Regine Frener
Behaviour and Information Technology (2023) Vol. 43, Iss. 6, pp. 1254-1267
Closed Access | Times Cited: 2

The Link Between Privacy and Disclosure Behavior in Social Networks
Mohammad Daradkeh
Advances in human and social aspects of technology book series (2023), pp. 38-61
Closed Access | Times Cited: 2

Design and evaluation of TPB based anti-bullying intervention for university students
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Multimedia Tools and Applications (2024)
Closed Access

Artificial Intelligence Indulgence in Protection of Cybercrime
Radhika Nautiyal, Radhey Shyam Jha, Samta Kathuria, et al.
(2023) Vol. 102, pp. 518-522
Closed Access | Times Cited: 1

The Integration of Internet of Things (IoT) Technology into Fire Evacuation Plan in High-rise Buildings
Siyao Chen, Khoo Terh Jing, Shi Yangle, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 42, Iss. 1, pp. 239-253
Open Access

Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability Metrics
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access

Structural Modelling on Factors of Adopting FinTech Among Malaysian Millennials
Mohammad Imtiaz Hossain, Md. Kausar Alam, Zainudin Johari, et al.
Advances in business strategy and competitive advantage book series (2023), pp. 134-156
Closed Access

Active-Knowledge-Sharing-Method through High School Students at Kalimantan Tengah
Lian Eukaristia, Dorthea Aryani Wadibar, Rendy Winathae, et al.
Al-Hijr Journal of Adulearn World (2023) Vol. 2, Iss. 1, pp. 66-80
Open Access

AI in Changing the Way People Engage and Communicate in Media: A Review
Miharaini Md Ghani, Wan Azani Mustafa, Hafizul Fahri Hanafi, et al.
2022 5th International Conference on Engineering Technology and its Applications (IICETA) (2023), pp. 51-56
Closed Access

Cybersecurity and Cyberthreats in Social Media
Agnieszka Orłowska
Humanities & Social Sciences Reviews (2022) Vol. 10, Iss. 6, pp. 45-48
Open Access

Page 1

Scroll to top