
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Usability analysis of shared device ecosystem security
Simon Parkin, Trupti Patel, Isabel López-Neira, et al.
(2019), pp. 1-15
Closed Access | Times Cited: 30
Simon Parkin, Trupti Patel, Isabel López-Neira, et al.
(2019), pp. 1-15
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things
Julia Slupska, Leonie Maria Tanczer
Emerald Publishing Limited eBooks (2021), pp. 663-688
Open Access | Times Cited: 64
Julia Slupska, Leonie Maria Tanczer
Emerald Publishing Limited eBooks (2021), pp. 663-688
Open Access | Times Cited: 64
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices
Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, et al.
(2024)
Open Access | Times Cited: 10
Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, et al.
(2024)
Open Access | Times Cited: 10
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
A black-box assessment of authentication and reliability in consumer IoT Devices
Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, et al.
Pervasive and Mobile Computing (2025), pp. 102045-102045
Open Access
Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, et al.
Pervasive and Mobile Computing (2025), pp. 102045-102045
Open Access
Tech Abuse Personas: Exploring Help-Seeking Behaviours and Support Needs of Victim/Survivors of Technology-Facilitated Abuse
Madeleine Janickyj, Leonie Maria Tanczer
(2025), pp. 1-11
Closed Access
Madeleine Janickyj, Leonie Maria Tanczer
(2025), pp. 1-11
Closed Access
Online Information Disclosure and Information Privacy Practices During Significant Life Transitions: A Scoping Review
Ryan Colin Gibson, Ramsay Meiklem, Wendy Moncur, et al.
(2025), pp. 42-56
Closed Access
Ryan Colin Gibson, Ramsay Meiklem, Wendy Moncur, et al.
(2025), pp. 42-56
Closed Access
What Can HCI Learn from Sexual Consent?
Yolande Strengers, Jathan Sadowski, Zhuying Li, et al.
(2021), pp. 1-13
Closed Access | Times Cited: 22
Yolande Strengers, Jathan Sadowski, Zhuying Li, et al.
(2021), pp. 1-13
Closed Access | Times Cited: 22
Meet Malexa, Alexa’s malicious twin: Malware-induced misperception through intelligent voice assistants
Filipo Sharevski, Peter Jachim, Paige Treebridge, et al.
International Journal of Human-Computer Studies (2021) Vol. 149, pp. 102604-102604
Open Access | Times Cited: 15
Filipo Sharevski, Peter Jachim, Paige Treebridge, et al.
International Journal of Human-Computer Studies (2021) Vol. 149, pp. 102604-102604
Open Access | Times Cited: 15
Safety as a Grand Challenge in Pervasive Computing: Using Feminist Epistemologies to Shift the Paradigm From Security to Safety
Angelika Strohmayer, Rosanna Bellini, Julia Slupska
IEEE Pervasive Computing (2022) Vol. 21, Iss. 3, pp. 61-69
Open Access | Times Cited: 10
Angelika Strohmayer, Rosanna Bellini, Julia Slupska
IEEE Pervasive Computing (2022) Vol. 21, Iss. 3, pp. 61-69
Open Access | Times Cited: 10
Voice assistants in private households: a conceptual framework for future research in an interdisciplinary field
Bettina Minder, Patricia Wolf, Matthias Baldauf, et al.
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 6
Bettina Minder, Patricia Wolf, Matthias Baldauf, et al.
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 6
Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies
Leena Alghamdi, Mamtaj Akter, Jess Kropczynski, et al.
(2023), pp. 1-16
Open Access | Times Cited: 5
Leena Alghamdi, Mamtaj Akter, Jess Kropczynski, et al.
(2023), pp. 1-16
Open Access | Times Cited: 5
Identifying Unintended Harms of Cybersecurity Countermeasures
Yi Ting Chua, Simon Parkin, Matthew Edwards, et al.
(2019), pp. 1-15
Open Access | Times Cited: 13
Yi Ting Chua, Simon Parkin, Matthew Edwards, et al.
(2019), pp. 1-15
Open Access | Times Cited: 13
Simulation-based research for digital health pathologies: A multi-site mixed-methods study
Isabel Straw, Joanna Dobbin, Demelza Luna-Reaver, et al.
Digital Health (2024) Vol. 10
Open Access | Times Cited: 1
Isabel Straw, Joanna Dobbin, Demelza Luna-Reaver, et al.
Digital Health (2024) Vol. 10
Open Access | Times Cited: 1
User identification using deep learning and human activity mobile sensor data
Luay Alawneh, Mohammad Al-Zinati, Mahmoud Al‐Ayyoub
International Journal of Information Security (2022) Vol. 22, Iss. 1, pp. 289-301
Closed Access | Times Cited: 7
Luay Alawneh, Mohammad Al-Zinati, Mahmoud Al‐Ayyoub
International Journal of Information Security (2022) Vol. 22, Iss. 1, pp. 289-301
Closed Access | Times Cited: 7
"So-called privacy breeds evil"
Rosanna Bellini, Emily Tseng, Nora McDonald, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 4, Iss. CSCW3, pp. 1-27
Open Access | Times Cited: 9
Rosanna Bellini, Emily Tseng, Nora McDonald, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 4, Iss. CSCW3, pp. 1-27
Open Access | Times Cited: 9
Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices
Vanessa Z. Lin, Simon Parkin
(2020)
Open Access | Times Cited: 9
Vanessa Z. Lin, Simon Parkin
(2020)
Open Access | Times Cited: 9
Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions”
Diarmaid Harkin, Robert Merkel
Violence Against Women (2022) Vol. 29, Iss. 3-4, pp. 648-670
Closed Access | Times Cited: 6
Diarmaid Harkin, Robert Merkel
Violence Against Women (2022) Vol. 29, Iss. 3-4, pp. 648-670
Closed Access | Times Cited: 6
Are Smart Home Devices Abandoning IPV Victims?
Ahmed Alshehri, Malek Ben Salem, Lei Ding
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1368-1375
Open Access | Times Cited: 8
Ahmed Alshehri, Malek Ben Salem, Lei Ding
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1368-1375
Open Access | Times Cited: 8
Gender Approaches to Cybersecurity: Design, Defence and Response
Katharine Millar, James Shires, Tatiana Tropina
(2021)
Open Access | Times Cited: 5
Katharine Millar, James Shires, Tatiana Tropina
(2021)
Open Access | Times Cited: 5
Domestic Abuse During the UK’s Covid-19 Lockdown: From Normal to New Normal and What Survivors’ Experiences Might Teach Us
A M P Kellam
Amicus Curiae (2020) Vol. 1, Iss. 3, pp. 361-378
Open Access | Times Cited: 4
A M P Kellam
Amicus Curiae (2020) Vol. 1, Iss. 3, pp. 361-378
Open Access | Times Cited: 4
SoK: The Dual Nature of Technology in Sexual Abuse
Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 2320-2343
Closed Access | Times Cited: 3
Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 2320-2343
Closed Access | Times Cited: 3
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance
Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, et al.
(2024), pp. 773-789
Closed Access
Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, et al.
(2024), pp. 773-789
Closed Access
Click Here to Exit: An Evaluation of Quick Exit Buttons
Kieron Ivy Turk, Alice Hutchings
(2023), pp. 1-15
Open Access | Times Cited: 1
Kieron Ivy Turk, Alice Hutchings
(2023), pp. 1-15
Open Access | Times Cited: 1
Simulation based research for digital health pathologies: a multi-site mixed-methods study
Isabel Straw, Joanna Dobbin, Demelza Luna-Reaver, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Isabel Straw, Joanna Dobbin, Demelza Luna-Reaver, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1