
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk Disclosures
Richmond Y. Wong, Andrew Chong, R. Cooper Aspegren
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 27
Richmond Y. Wong, Andrew Chong, R. Cooper Aspegren
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities
Subash Neupane, Shaswata Mitra, Ivan Fernandez, et al.
IEEE Access (2024) Vol. 12, pp. 22072-22097
Open Access | Times Cited: 13
Subash Neupane, Shaswata Mitra, Ivan Fernandez, et al.
IEEE Access (2024) Vol. 12, pp. 22072-22097
Open Access | Times Cited: 13
HARMONIZING TEAMS AND REGULATIONS: STRATEGIES FOR DATA PROTECTION COMPLIANCE IN U.S. TECHNOLOGY COMPANIES
Excel G Chukwurah, Samuel Aderemi
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 4, pp. 824-838
Open Access | Times Cited: 12
Excel G Chukwurah, Samuel Aderemi
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 4, pp. 824-838
Open Access | Times Cited: 12
Exploring Privacy Practices of Female mHealth Apps in a Post-Roe World
Lisa Mekioussa Malki, Ina Kaleva, Dilisha Patel, et al.
(2024), pp. 1-24
Open Access | Times Cited: 8
Lisa Mekioussa Malki, Ina Kaleva, Dilisha Patel, et al.
(2024), pp. 1-24
Open Access | Times Cited: 8
Who’s afraid of AI? socio-technological perspectives on artificial intelligence in the workforce: an Israeli case study
Vlad Vasiliu, Gal Yavetz
Aslib Journal of Information Management (2024)
Closed Access | Times Cited: 4
Vlad Vasiliu, Gal Yavetz
Aslib Journal of Information Management (2024)
Closed Access | Times Cited: 4
“Model Cards for Model Reporting” in 2024: Reclassifying Category of Ethical Considerations in Terms of Trustworthiness and Risk Management
DeBrae Kennedy-Mayo, Jake Gord
Lecture notes in networks and systems (2025), pp. 179-196
Closed Access
DeBrae Kennedy-Mayo, Jake Gord
Lecture notes in networks and systems (2025), pp. 179-196
Closed Access
Artificial Intelligence for Big Data in Modern Marketing: A Review about Trends, Applications, and Challenges.
Chantal Uwimana, Clemence Niyigena, Gedeon Nshutiyimana, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2025) Vol. 14, Iss. 2, pp. 165-183
Closed Access
Chantal Uwimana, Clemence Niyigena, Gedeon Nshutiyimana, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2025) Vol. 14, Iss. 2, pp. 165-183
Closed Access
Transparency and Privacy on Social Media: Privacy Policies for Enhancing Users’ Control on Social Media
Yineng Xiao
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Yineng Xiao
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Mapping the Tool Landscape for Stakeholder Involvement in Participatory AI: Strengths, Gaps, and Future Directions
Emma Kallina, Jatinder Singh
(2025), pp. 1-8
Closed Access
Emma Kallina, Jatinder Singh
(2025), pp. 1-8
Closed Access
Holistic Cyber Security Framework for Deep Web using Federated Learning in Healthcare and Distributed Computing
Subrata Paul, Anirban Mitra, Shreya Shambhavi, et al.
Procedia Computer Science (2025) Vol. 258, pp. 2405-2414
Open Access
Subrata Paul, Anirban Mitra, Shreya Shambhavi, et al.
Procedia Computer Science (2025) Vol. 258, pp. 2405-2414
Open Access
Agile privacy in practice: Integrating CCPA and GDPR within agile frameworks in the U.S. tech scene
Excel G Chukwurah
International Journal of Scientific Research Updates (2024) Vol. 7, Iss. 2, pp. 024-036
Open Access | Times Cited: 3
Excel G Chukwurah
International Journal of Scientific Research Updates (2024) Vol. 7, Iss. 2, pp. 024-036
Open Access | Times Cited: 3
“Our Users' Privacy is Paramount to Us”: A Discourse Analysis of How Period and Fertility Tracking App Companies Address the Roe v Wade Overturn
Qiurong Song, Rie Helene Hernandez, Yubo Kou, et al.
(2024), pp. 1-21
Open Access | Times Cited: 3
Qiurong Song, Rie Helene Hernandez, Yubo Kou, et al.
(2024), pp. 1-21
Open Access | Times Cited: 3
Learn, Unlearn and Relearn: Adaptive Cybersecurity Culture Model
Tapiwa Gundu
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 95-102
Open Access | Times Cited: 2
Tapiwa Gundu
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 95-102
Open Access | Times Cited: 2
Understanding Chinese Internet Users' Perceptions of, and Online Platforms' Compliance with, the Personal Information Protection Law (PIPL)
Morgana Mo Zhou, Zhiyan Qu, Jinhan Wan, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 2
Morgana Mo Zhou, Zhiyan Qu, Jinhan Wan, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 2
An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy Preferences
Sarah Radway, Katherine Quintanilla, Cordelia Ludden, et al.
(2024), pp. 1-35
Open Access | Times Cited: 2
Sarah Radway, Katherine Quintanilla, Cordelia Ludden, et al.
(2024), pp. 1-35
Open Access | Times Cited: 2
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
Languaging Ethics in Technology Practice
Colin M. Gray, Shruthi Sai Chivukula, Janna Johns, et al.
ACM Journal on Responsible Computing (2024) Vol. 1, Iss. 2, pp. 1-15
Open Access | Times Cited: 1
Colin M. Gray, Shruthi Sai Chivukula, Janna Johns, et al.
ACM Journal on Responsible Computing (2024) Vol. 1, Iss. 2, pp. 1-15
Open Access | Times Cited: 1
Legal Trouble?: UX Practitioners' Engagement with Law and Regulation
Colin M. Gray, Ritika Gairola, Nayah Boucaud, et al.
Designing Interactive Systems Conference (2024), pp. 106-110
Open Access | Times Cited: 1
Colin M. Gray, Ritika Gairola, Nayah Boucaud, et al.
Designing Interactive Systems Conference (2024), pp. 106-110
Open Access | Times Cited: 1
Why is Accessibility So Hard? Insights From the History of Privacy
Xinru Tang
(2024), pp. 362-368
Open Access | Times Cited: 1
Xinru Tang
(2024), pp. 362-368
Open Access | Times Cited: 1
Navigating Data Privacy in Industry 5.0: Advanced Strategies for Sustainability
J. Vijay Arputharaj, J Sandeep, D. Grace Prasad, et al.
(2024), pp. 117-143
Closed Access | Times Cited: 1
J. Vijay Arputharaj, J Sandeep, D. Grace Prasad, et al.
(2024), pp. 117-143
Closed Access | Times Cited: 1
Investigating Methods to Enhance Data Privacy in Business, Especially in sectors like Analytics and Finance
Tanvir Rahman Akash, Dennis J. Lessard, Nayem Rahman Reza, et al.
Journal of Computer Science and Technology Studies (2024) Vol. 6, Iss. 5, pp. 143-151
Open Access | Times Cited: 1
Tanvir Rahman Akash, Dennis J. Lessard, Nayem Rahman Reza, et al.
Journal of Computer Science and Technology Studies (2024) Vol. 6, Iss. 5, pp. 143-151
Open Access | Times Cited: 1
The Impact of Deep Fakes in Markets and Economies
Iris-Panagiota Efthymiou, Theocharis Efthymiou Egleton
Advances in business information systems and analytics book series (2024), pp. 19-50
Closed Access | Times Cited: 1
Iris-Panagiota Efthymiou, Theocharis Efthymiou Egleton
Advances in business information systems and analytics book series (2024), pp. 19-50
Closed Access | Times Cited: 1
ULDP: A User-Centric Local Differential Privacy Optimization Method
Wenjun Yang, Eyhab Al‐Masri
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 0316-0322
Closed Access
Wenjun Yang, Eyhab Al‐Masri
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 0316-0322
Closed Access
IoT Cyber Attacks Detection - Survey
Alaa Abdul Al Muhsen Hussain Al Zubaidi
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Alaa Abdul Al Muhsen Hussain Al Zubaidi
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Smart Governance among Smart Cities for Legal Consideration to International Data Migration in Cloud Using Machine Learning , Nlp and Blockchain Smart Contract
Refika Komala, B. R. Arun Kumar, Mahadeshwara Prasad, et al.
(2024)
Open Access
Refika Komala, B. R. Arun Kumar, Mahadeshwara Prasad, et al.
(2024)
Open Access
The Impact of Federated Learning on Urban Computing
José R. F. Souza, Shéridan Z. L. N. Oliveira, Helder Oliveira
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 380-409
Open Access
José R. F. Souza, Shéridan Z. L. N. Oliveira, Helder Oliveira
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 380-409
Open Access