
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Kybernetes (2021) Vol. 52, Iss. 1, pp. 401-421
Closed Access | Times Cited: 24
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Kybernetes (2021) Vol. 52, Iss. 1, pp. 401-421
Closed Access | Times Cited: 24
Showing 24 citing articles:
The Road to corporate sustainability: The importance of artificial intelligence
Pengyu Chen, Zhongzhu Chu, Miao Zhao
Technology in Society (2023) Vol. 76, pp. 102440-102440
Closed Access | Times Cited: 33
Pengyu Chen, Zhongzhu Chu, Miao Zhao
Technology in Society (2023) Vol. 76, pp. 102440-102440
Closed Access | Times Cited: 33
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Technology in Society (2022) Vol. 70, pp. 102055-102055
Closed Access | Times Cited: 28
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Technology in Society (2022) Vol. 70, pp. 102055-102055
Closed Access | Times Cited: 28
Komparatif Epistemologi-Aksiologis Kurikulum K13 dengan Kurikulum Merdeka
Ella Kristiani, Papin Andrianti, Enjelie Enjelie, et al.
Jurnal Pengajaran Sekolah Dasar (2023) Vol. 2, Iss. 1, pp. 76-92
Open Access | Times Cited: 16
Ella Kristiani, Papin Andrianti, Enjelie Enjelie, et al.
Jurnal Pengajaran Sekolah Dasar (2023) Vol. 2, Iss. 1, pp. 76-92
Open Access | Times Cited: 16
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12
Effects of service providers’ self-disclosure on booking platforms on consumers’ trust, hesitation, and booking intentions: moderating role of social media influencers
Naeem Akhtar, Umar Iqbal Siddiqi
Journal of Hospitality Marketing & Management (2023) Vol. 33, Iss. 4, pp. 470-498
Closed Access | Times Cited: 10
Naeem Akhtar, Umar Iqbal Siddiqi
Journal of Hospitality Marketing & Management (2023) Vol. 33, Iss. 4, pp. 470-498
Closed Access | Times Cited: 10
Cyberbullying victimization among university students- a national study of Pakistan
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Security Journal (2025) Vol. 38, Iss. 1
Closed Access
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Security Journal (2025) Vol. 38, Iss. 1
Closed Access
Artificial Intelligence in Cybersecurity: A Review and a Case Study
Selçuk Ökdem, Sema Okdem
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10487-10487
Open Access | Times Cited: 3
Selçuk Ökdem, Sema Okdem
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10487-10487
Open Access | Times Cited: 3
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, et al.
Information Technology and People (2024)
Closed Access | Times Cited: 1
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, et al.
Information Technology and People (2024)
Closed Access | Times Cited: 1
sExplanatory and Predictive Modeling of Cybersecurity Behaviors using Protection Motivation Theory
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1
Determination of Cyber Security Awareness Levels of Students with Machine Learning Methods
Mahmut TOKMAK
Yüzüncü Yıl Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2023) Vol. 28, Iss. 2, pp. 451-466
Open Access | Times Cited: 2
Mahmut TOKMAK
Yüzüncü Yıl Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2023) Vol. 28, Iss. 2, pp. 451-466
Open Access | Times Cited: 2
An empirical investigation of the social web gendered privacy model
Regine Frener
Behaviour and Information Technology (2023) Vol. 43, Iss. 6, pp. 1254-1267
Closed Access | Times Cited: 2
Regine Frener
Behaviour and Information Technology (2023) Vol. 43, Iss. 6, pp. 1254-1267
Closed Access | Times Cited: 2
The Link Between Privacy and Disclosure Behavior in Social Networks
Mohammad Daradkeh
Advances in human and social aspects of technology book series (2023), pp. 38-61
Closed Access | Times Cited: 2
Mohammad Daradkeh
Advances in human and social aspects of technology book series (2023), pp. 38-61
Closed Access | Times Cited: 2
Design and evaluation of TPB based anti-bullying intervention for university students
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Multimedia Tools and Applications (2024)
Closed Access
Sumera Saleem, Naurin Farooq Khan, Saad Zafar, et al.
Multimedia Tools and Applications (2024)
Closed Access
Artificial Intelligence Indulgence in Protection of Cybercrime
Radhika Nautiyal, Radhey Shyam Jha, Samta Kathuria, et al.
(2023) Vol. 102, pp. 518-522
Closed Access | Times Cited: 1
Radhika Nautiyal, Radhey Shyam Jha, Samta Kathuria, et al.
(2023) Vol. 102, pp. 518-522
Closed Access | Times Cited: 1
The Integration of Internet of Things (IoT) Technology into Fire Evacuation Plan in High-rise Buildings
Siyao Chen, Khoo Terh Jing, Shi Yangle, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 42, Iss. 1, pp. 239-253
Open Access
Siyao Chen, Khoo Terh Jing, Shi Yangle, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 42, Iss. 1, pp. 239-253
Open Access
Construction of Digital Media AI Intelligence Based on Deep Learning and 5G Network Technology
Yan Zhao
(2024), pp. 535-541
Closed Access
Yan Zhao
(2024), pp. 535-541
Closed Access
Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability Metrics
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access
Structural Modelling on Factors of Adopting FinTech Among Malaysian Millennials
Mohammad Imtiaz Hossain, Md. Kausar Alam, Zainudin Johari, et al.
Advances in business strategy and competitive advantage book series (2023), pp. 134-156
Closed Access
Mohammad Imtiaz Hossain, Md. Kausar Alam, Zainudin Johari, et al.
Advances in business strategy and competitive advantage book series (2023), pp. 134-156
Closed Access
Active-Knowledge-Sharing-Method through High School Students at Kalimantan Tengah
Lian Eukaristia, Dorthea Aryani Wadibar, Rendy Winathae, et al.
Al-Hijr Journal of Adulearn World (2023) Vol. 2, Iss. 1, pp. 66-80
Open Access
Lian Eukaristia, Dorthea Aryani Wadibar, Rendy Winathae, et al.
Al-Hijr Journal of Adulearn World (2023) Vol. 2, Iss. 1, pp. 66-80
Open Access
AI in Changing the Way People Engage and Communicate in Media: A Review
Miharaini Md Ghani, Wan Azani Mustafa, Hafizul Fahri Hanafi, et al.
2022 5th International Conference on Engineering Technology and its Applications (IICETA) (2023), pp. 51-56
Closed Access
Miharaini Md Ghani, Wan Azani Mustafa, Hafizul Fahri Hanafi, et al.
2022 5th International Conference on Engineering Technology and its Applications (IICETA) (2023), pp. 51-56
Closed Access
Structured Equation Model of Antecedents to Performative Action from Social Media Exchanges
Michael Workman
(2023), pp. 1868-1875
Closed Access
Michael Workman
(2023), pp. 1868-1875
Closed Access
Remote Learning Amidst the Pandemic: Measuring the Relationships of Internet Usage and Cybersecurity Awareness of Primary School Students in Malaysia
Norliza Katuk, Mohd Hasbullah Omar, Adi Ahmad, et al.
SSRN Electronic Journal (2022)
Closed Access
Norliza Katuk, Mohd Hasbullah Omar, Adi Ahmad, et al.
SSRN Electronic Journal (2022)
Closed Access
Cybersecurity and Cyberthreats in Social Media
Agnieszka Orłowska
Humanities & Social Sciences Reviews (2022) Vol. 10, Iss. 6, pp. 45-48
Open Access
Agnieszka Orłowska
Humanities & Social Sciences Reviews (2022) Vol. 10, Iss. 6, pp. 45-48
Open Access