OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 27 citing articles:

Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List
Mohammad Tahaei, Kami Vaniea
CHI Conference on Human Factors in Computing Systems (2022)
Open Access | Times Cited: 31

Unveiling Digital Manipulation and Persuasion in e-Commerce: A Systematic Literature Review of Dark Patterns and Digital Nudging
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Internet Commerce (2024) Vol. 23, Iss. 2, pp. 144-171
Closed Access | Times Cited: 8

Understanding Privacy-Related Advice on Stack Overflow
Mohammad Tahaei, Tianshi Li, Kami Vaniea
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 2, pp. 114-131
Open Access | Times Cited: 28

Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
Christine Utz, Sabrina Amft, Martin Degeling, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 5-28
Open Access | Times Cited: 14

Profit over principles: unveiling the motivating factors behind dark patterns in e-commerce through the lens of agency theory
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Enterprise Information Management (2025)
Closed Access

Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks
Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 3, pp. 33-56
Open Access | Times Cited: 16

Helping Mobile Application Developers Create Accurate Privacy Labels
Jack Gardner, Yuanyuan Feng, Kayla Reiman, et al.
(2022), pp. 212-230
Closed Access | Times Cited: 15

Embedding Privacy Into Design Through Software Developers: Challenges and Solutions
Mohammad Tahaei, Kami Vaniea, Awais Rashid
IEEE Security & Privacy (2022) Vol. 21, Iss. 1, pp. 49-57
Open Access | Times Cited: 12

How Can We Design Privacy-Friendly Apps for Children? Using a Research through Design Process to Understand Developers' Needs and Challenges
Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW2, pp. 1-29
Open Access | Times Cited: 7

SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2

Navigating the Data Avalanche
Anirudh Ekambaranathan, Jun Zhao, George Chalhoub
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-24
Closed Access | Times Cited: 6

DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs
Daniel Kirkman, Kami Vaniea, Daniel Woods
(2023), pp. 847-867
Open Access | Times Cited: 6

“Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2024, Iss. 1, pp. 151-170
Open Access | Times Cited: 6

Emerging Transdisciplinary Perspectives to Confront Dark Patterns
Colin M. Gray, Shruthi Sai Chivukula, Kerstin Bongard-Blanchy, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 3

This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration
Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 1065-1081
Open Access | Times Cited: 7

On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before Deployment
Vafa Andalibi, Eliot Lear, DongInn Kim, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 137-157
Closed Access | Times Cited: 5

Overview of Usable Privacy Research: Major Themes and Research Directions
Simone Fischer‐Hübner, Farzaneh Karegar
Synthesis lectures on information security, privacy, and trust (2024), pp. 43-102
Closed Access

COVID-19 Mobile Applications: A Study of Trackers and Data Leaks
Nicolás Serrano, Gustavo Betarte, Juan Diego Campo
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 139-159
Open Access

Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities
K C Pragyan, Rambod Ghandiparsi, Rocky Slavin, et al.
(2024), pp. 241-250
Open Access

The role of online communities in supporting mental health during the COVID-19 pandemic
Chengcheng Qu, Renwen Zhang
XRDS Crossroads The ACM Magazine for Students (2021) Vol. 28, Iss. 1, pp. 38-41
Closed Access | Times Cited: 1

"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups
Dilara Keküllüoğlu, Yasemin Acar
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2015-2031
Open Access

Optimizing floor price in Real Time Bidding
Víctor Dugo, David Gávez
(2023), pp. 249-257
Open Access

5th International Conference on Advanced Research Methods and Analytics (CARMA 2023)
CARMA Scientific Committee, María del Rocío Martínez Torres, S. L. Toral
(2023)
Open Access

Page 1 - Next Page

Scroll to top