OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk Disclosures
Richmond Y. Wong, Andrew Chong, R. Cooper Aspegren
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities
Subash Neupane, Shaswata Mitra, Ivan Fernandez, et al.
IEEE Access (2024) Vol. 12, pp. 22072-22097
Open Access | Times Cited: 13

HARMONIZING TEAMS AND REGULATIONS: STRATEGIES FOR DATA PROTECTION COMPLIANCE IN U.S. TECHNOLOGY COMPANIES
Excel G Chukwurah, Samuel Aderemi
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 4, pp. 824-838
Open Access | Times Cited: 12

Exploring Privacy Practices of Female mHealth Apps in a Post-Roe World
Lisa Mekioussa Malki, Ina Kaleva, Dilisha Patel, et al.
(2024), pp. 1-24
Open Access | Times Cited: 8

Who’s afraid of AI? socio-technological perspectives on artificial intelligence in the workforce: an Israeli case study
Vlad Vasiliu, Gal Yavetz
Aslib Journal of Information Management (2024)
Closed Access | Times Cited: 4

“Model Cards for Model Reporting” in 2024: Reclassifying Category of Ethical Considerations in Terms of Trustworthiness and Risk Management
DeBrae Kennedy-Mayo, Jake Gord
Lecture notes in networks and systems (2025), pp. 179-196
Closed Access

Artificial Intelligence for Big Data in Modern Marketing: A Review about Trends, Applications, and Challenges.
Chantal Uwimana, Clemence Niyigena, Gedeon Nshutiyimana, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2025) Vol. 14, Iss. 2, pp. 165-183
Closed Access

Transparency and Privacy on Social Media: Privacy Policies for Enhancing Users’ Control on Social Media
Yineng Xiao
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access

Holistic Cyber Security Framework for Deep Web using Federated Learning in Healthcare and Distributed Computing
Subrata Paul, Anirban Mitra, Shreya Shambhavi, et al.
Procedia Computer Science (2025) Vol. 258, pp. 2405-2414
Open Access

Agile privacy in practice: Integrating CCPA and GDPR within agile frameworks in the U.S. tech scene
Excel G Chukwurah
International Journal of Scientific Research Updates (2024) Vol. 7, Iss. 2, pp. 024-036
Open Access | Times Cited: 3

Learn, Unlearn and Relearn: Adaptive Cybersecurity Culture Model
Tapiwa Gundu
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 95-102
Open Access | Times Cited: 2

Understanding Chinese Internet Users' Perceptions of, and Online Platforms' Compliance with, the Personal Information Protection Law (PIPL)
Morgana Mo Zhou, Zhiyan Qu, Jinhan Wan, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-26
Open Access | Times Cited: 2

An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy Preferences
Sarah Radway, Katherine Quintanilla, Cordelia Ludden, et al.
(2024), pp. 1-35
Open Access | Times Cited: 2

SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2

Languaging Ethics in Technology Practice
Colin M. Gray, Shruthi Sai Chivukula, Janna Johns, et al.
ACM Journal on Responsible Computing (2024) Vol. 1, Iss. 2, pp. 1-15
Open Access | Times Cited: 1

Legal Trouble?: UX Practitioners' Engagement with Law and Regulation
Colin M. Gray, Ritika Gairola, Nayah Boucaud, et al.
Designing Interactive Systems Conference (2024), pp. 106-110
Open Access | Times Cited: 1

Navigating Data Privacy in Industry 5.0: Advanced Strategies for Sustainability
J. Vijay Arputharaj, J Sandeep, D. Grace Prasad, et al.
(2024), pp. 117-143
Closed Access | Times Cited: 1

Investigating Methods to Enhance Data Privacy in Business, Especially in sectors like Analytics and Finance
Tanvir Rahman Akash, Dennis J. Lessard, Nayem Rahman Reza, et al.
Journal of Computer Science and Technology Studies (2024) Vol. 6, Iss. 5, pp. 143-151
Open Access | Times Cited: 1

The Impact of Deep Fakes in Markets and Economies
Iris-Panagiota Efthymiou, Theocharis Efthymiou Egleton
Advances in business information systems and analytics book series (2024), pp. 19-50
Closed Access | Times Cited: 1

ULDP: A User-Centric Local Differential Privacy Optimization Method
Wenjun Yang, Eyhab Al‐Masri
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 0316-0322
Closed Access

IoT Cyber Attacks Detection - Survey
Alaa Abdul Al Muhsen Hussain Al Zubaidi
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access

The Impact of Federated Learning on Urban Computing
José R. F. Souza, Shéridan Z. L. N. Oliveira, Helder Oliveira
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 380-409
Open Access

Page 1 - Next Page

Scroll to top