
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
"So-called privacy breeds evil"
Rosanna Bellini, Emily Tseng, Nora McDonald, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 4, Iss. CSCW3, pp. 1-27
Open Access | Times Cited: 9
Rosanna Bellini, Emily Tseng, Nora McDonald, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 4, Iss. CSCW3, pp. 1-27
Open Access | Times Cited: 9
Showing 9 citing articles:
Paying the Price: When Intimate Partners Use Technology for Financial Harm
Rosanna Bellini
(2023), pp. 1-17
Closed Access | Times Cited: 24
Rosanna Bellini
(2023), pp. 1-17
Closed Access | Times Cited: 24
SoK: Safer Digital-Safety Research Involving At-Risk Users
Rosanna Bellini, Emily Tseng, Noel Warford, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 5, pp. 635-654
Closed Access | Times Cited: 6
Rosanna Bellini, Emily Tseng, Noel Warford, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 5, pp. 635-654
Closed Access | Times Cited: 6
Co-creating conditions for social justice in digital societies: modes of resistance in HCI collaborative endeavors and evolving socio-technical landscapes
Clara Crivellaro, Lizzie Coles-Kemp, Alan Dix, et al.
ACM Transactions on Computer-Human Interaction (2025)
Closed Access
Clara Crivellaro, Lizzie Coles-Kemp, Alan Dix, et al.
ACM Transactions on Computer-Human Interaction (2025)
Closed Access
Privacy Silence: Trust and Boundary-Setting in Mobile Phone Use Within Intimate Relationships
Sima Amirkhani, Farzaneh Gerami, Fatemeh Alizadeh, et al.
(2025), pp. 1-7
Closed Access
Sima Amirkhani, Farzaneh Gerami, Fatemeh Alizadeh, et al.
(2025), pp. 1-7
Closed Access
Digital Technologies and Human Trafficking: Combating Coercive Control and Navigating Digital Autonomy
Sophie Stephenson, Lana Ramjit, Thomas Ristenpart, et al.
(2025), pp. 1-21
Closed Access
Sophie Stephenson, Lana Ramjit, Thomas Ristenpart, et al.
(2025), pp. 1-21
Closed Access
Abusive Partner Perspectives on Technology Abuse: Implications for Community-based Violence Prevention
Rosanna Bellini
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-25
Closed Access | Times Cited: 2
Rosanna Bellini
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-25
Closed Access | Times Cited: 2
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints
Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, et al.
(2024), pp. 1-20
Open Access | Times Cited: 2
Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, et al.
(2024), pp. 1-20
Open Access | Times Cited: 2
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya
Collins W. Munyendo, Yasemin Acar, Adam J. Aviv
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 570-587
Closed Access | Times Cited: 5
Collins W. Munyendo, Yasemin Acar, Adam J. Aviv
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 570-587
Closed Access | Times Cited: 5
Cyber Dating Abuse Among Korean College Students: An Exploratory Study of Risk and Protective Factors
Riccardo Ferraresso, Chunrye Kim
SAGE Open (2024) Vol. 14, Iss. 3
Open Access
Riccardo Ferraresso, Chunrye Kim
SAGE Open (2024) Vol. 14, Iss. 3
Open Access
Stop Following Me! Evaluating the Malicious Uses of Personal Item Tracking Devices and Their Anti-Stalking Features
Kieron Ivy Turk, Alice Hutchings
(2024), pp. 277-289
Closed Access
Kieron Ivy Turk, Alice Hutchings
(2024), pp. 277-289
Closed Access
Libel Inc: An Analysis of the Libel Site Ecosystem
Rasika Bhalerao, Damon McCoy
(2022), pp. 01-10
Closed Access
Rasika Bhalerao, Damon McCoy
(2022), pp. 01-10
Closed Access