
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Examining the Relationship Between Routine Activities and Malware Infection Indicators
Thomas J. Holt, Adam M. Bossler
Journal of Contemporary Criminal Justice (2013) Vol. 29, Iss. 4, pp. 420-436
Closed Access | Times Cited: 111
Thomas J. Holt, Adam M. Bossler
Journal of Contemporary Criminal Justice (2013) Vol. 29, Iss. 4, pp. 420-436
Closed Access | Times Cited: 111
Showing 1-25 of 111 citing articles:
Exposure to Online Hate in Four Nations: A Cross-National Consideration
James E.Hawdon, Atte Oksanen, Pekka Räsänen
Deviant Behavior (2016) Vol. 38, Iss. 3, pp. 254-266
Closed Access | Times Cited: 193
James E.Hawdon, Atte Oksanen, Pekka Räsänen
Deviant Behavior (2016) Vol. 38, Iss. 3, pp. 254-266
Closed Access | Times Cited: 193
Cyber-Dependent Crimes: An Interdisciplinary Review
David Maimon, Eric R. Louderback
Annual Review of Criminology (2018) Vol. 2, Iss. 1, pp. 191-216
Closed Access | Times Cited: 121
David Maimon, Eric R. Louderback
Annual Review of Criminology (2018) Vol. 2, Iss. 1, pp. 191-216
Closed Access | Times Cited: 121
Cybercrime in America amid COVID-19: the Initial Results from a Natural Experiment
James E.Hawdon, Katalin Parti, Thomas E. Dearden
American Journal of Criminal Justice (2020) Vol. 45, Iss. 4, pp. 546-562
Open Access | Times Cited: 110
James E.Hawdon, Katalin Parti, Thomas E. Dearden
American Journal of Criminal Justice (2020) Vol. 45, Iss. 4, pp. 546-562
Open Access | Times Cited: 110
The Thief With a Thousand Faces and the Victim With None
Bradford W. Reyns, Billy Henson
International Journal of Offender Therapy and Comparative Criminology (2015) Vol. 60, Iss. 10, pp. 1119-1139
Closed Access | Times Cited: 109
Bradford W. Reyns, Billy Henson
International Journal of Offender Therapy and Comparative Criminology (2015) Vol. 60, Iss. 10, pp. 1119-1139
Closed Access | Times Cited: 109
Victims of cybercrime in Europe: a review of victim surveys
Carin M. M. Reep-van den Bergh, Marianne Junger
Crime Science (2018) Vol. 7, Iss. 1
Open Access | Times Cited: 87
Carin M. M. Reep-van den Bergh, Marianne Junger
Crime Science (2018) Vol. 7, Iss. 1
Open Access | Times Cited: 87
Targets of Online Hate: Examining Determinants of Victimization Among Young Finnish Facebook Users
Pekka Räsänen, James E.Hawdon, Emma Holkeri, et al.
Violence and Victims (2016) Vol. 31, Iss. 4, pp. 708-725
Closed Access | Times Cited: 86
Pekka Räsänen, James E.Hawdon, Emma Holkeri, et al.
Violence and Victims (2016) Vol. 31, Iss. 4, pp. 708-725
Closed Access | Times Cited: 86
Understanding cybercrime in ‘real world’ policing and law enforcement
Joanna Curtis, Gavin Oxburgh
The Police Journal Theory Practice and Principles (2022) Vol. 96, Iss. 4, pp. 573-592
Open Access | Times Cited: 43
Joanna Curtis, Gavin Oxburgh
The Police Journal Theory Practice and Principles (2022) Vol. 96, Iss. 4, pp. 573-592
Open Access | Times Cited: 43
Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems
Mazen Gazzan, Frederick T. Sheldon
Future Internet (2023) Vol. 15, Iss. 4, pp. 144-144
Open Access | Times Cited: 25
Mazen Gazzan, Frederick T. Sheldon
Future Internet (2023) Vol. 15, Iss. 4, pp. 144-144
Open Access | Times Cited: 25
A routine activity perspective on online victimisation
Bradford W. Reyns
Journal of Financial Crime (2015) Vol. 22, Iss. 4, pp. 396-411
Closed Access | Times Cited: 85
Bradford W. Reyns
Journal of Financial Crime (2015) Vol. 22, Iss. 4, pp. 396-411
Closed Access | Times Cited: 85
A Forensically Sound Adversary Model for Mobile Devices
Quang Do, Ben Martini, Kim‐Kwang Raymond Choo
PLoS ONE (2015) Vol. 10, Iss. 9, pp. e0138449-e0138449
Open Access | Times Cited: 71
Quang Do, Ben Martini, Kim‐Kwang Raymond Choo
PLoS ONE (2015) Vol. 10, Iss. 9, pp. e0138449-e0138449
Open Access | Times Cited: 71
Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?
Bradford W. Reyns, Bonnie S. Fisher, Adam M. Bossler, et al.
American Journal of Criminal Justice (2018) Vol. 44, Iss. 1, pp. 63-82
Closed Access | Times Cited: 66
Bradford W. Reyns, Bonnie S. Fisher, Adam M. Bossler, et al.
American Journal of Criminal Justice (2018) Vol. 44, Iss. 1, pp. 63-82
Closed Access | Times Cited: 66
Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach
Naci Akdemir, Christopher Lawless
Internet Research (2020) Vol. 30, Iss. 6, pp. 1665-1687
Open Access | Times Cited: 55
Naci Akdemir, Christopher Lawless
Internet Research (2020) Vol. 30, Iss. 6, pp. 1665-1687
Open Access | Times Cited: 55
Cyberbullying in the workplace: a novel framework of routine activities and organizational control
Abdullah Oguz, Nikhil Mehta, Prashant Palvia
Internet Research (2023) Vol. 33, Iss. 6, pp. 2276-2307
Closed Access | Times Cited: 20
Abdullah Oguz, Nikhil Mehta, Prashant Palvia
Internet Research (2023) Vol. 33, Iss. 6, pp. 2276-2307
Closed Access | Times Cited: 20
Confronting Online Extremism
Matthew Costello, James E.Hawdon, Thomas N. Ratliff
Social Science Computer Review (2016) Vol. 35, Iss. 5, pp. 587-605
Closed Access | Times Cited: 59
Matthew Costello, James E.Hawdon, Thomas N. Ratliff
Social Science Computer Review (2016) Vol. 35, Iss. 5, pp. 587-605
Closed Access | Times Cited: 59
Guardians of the Cyber Galaxy
Bradford W. Reyns, Billy Henson, Bonnie S. Fisher
Journal of Contemporary Criminal Justice (2015) Vol. 32, Iss. 2, pp. 148-168
Closed Access | Times Cited: 57
Bradford W. Reyns, Billy Henson, Bonnie S. Fisher
Journal of Contemporary Criminal Justice (2015) Vol. 32, Iss. 2, pp. 148-168
Closed Access | Times Cited: 57
Understanding the state of criminological scholarship on cybercrimes
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 27
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 27
Exploring the determinants of victimization and fear of online identity theft: an empirical study
Inês Guedes, Margarida Liz Martins, Carla Cardoso
Security Journal (2022) Vol. 36, Iss. 3, pp. 472-497
Open Access | Times Cited: 23
Inês Guedes, Margarida Liz Martins, Carla Cardoso
Security Journal (2022) Vol. 36, Iss. 3, pp. 472-497
Open Access | Times Cited: 23
Are college students really at a higher risk for stalking?: Exploring the generalizability of student samples in victimization research
Patrick Q. Brady, Matt R. Nobles, Leana A. Bouffard
Journal of Criminal Justice (2017) Vol. 52, pp. 12-21
Closed Access | Times Cited: 47
Patrick Q. Brady, Matt R. Nobles, Leana A. Bouffard
Journal of Criminal Justice (2017) Vol. 52, pp. 12-21
Closed Access | Times Cited: 47
Low Self-Control, Information Disclosure, and the Risk of Online Fraud
Gustavo S. Mesch, Matías Dodel
American Behavioral Scientist (2018) Vol. 62, Iss. 10, pp. 1356-1371
Closed Access | Times Cited: 46
Gustavo S. Mesch, Matías Dodel
American Behavioral Scientist (2018) Vol. 62, Iss. 10, pp. 1356-1371
Closed Access | Times Cited: 46
Cyber-Routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism
James E.Hawdon, Colin Bernatzky, Matthew Costello
Social Forces (2018) Vol. 98, Iss. 1, pp. 329-354
Closed Access | Times Cited: 43
James E.Hawdon, Colin Bernatzky, Matthew Costello
Social Forces (2018) Vol. 98, Iss. 1, pp. 329-354
Closed Access | Times Cited: 43
Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization
Thomas J. Holt, Johan van Wilsem, Steve van de Weijer, et al.
Social Science Computer Review (2018) Vol. 38, Iss. 2, pp. 187-206
Closed Access | Times Cited: 41
Thomas J. Holt, Johan van Wilsem, Steve van de Weijer, et al.
Social Science Computer Review (2018) Vol. 38, Iss. 2, pp. 187-206
Closed Access | Times Cited: 41
An Examination of Motivation and Routine Activity Theory to Account for Cyberattacks Against Dutch Web Sites
Thomas J. Holt, Rutger Leukfeldt, Steve van de Weijer
Criminal Justice and Behavior (2020) Vol. 47, Iss. 4, pp. 487-505
Closed Access | Times Cited: 39
Thomas J. Holt, Rutger Leukfeldt, Steve van de Weijer
Criminal Justice and Behavior (2020) Vol. 47, Iss. 4, pp. 487-505
Closed Access | Times Cited: 39
Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?
Fawn T. Ngo, Alex R. Piquero, Jennifer LaPrade, et al.
Criminal Justice Review (2020) Vol. 45, Iss. 4, pp. 430-451
Closed Access | Times Cited: 37
Fawn T. Ngo, Alex R. Piquero, Jennifer LaPrade, et al.
Criminal Justice Review (2020) Vol. 45, Iss. 4, pp. 430-451
Closed Access | Times Cited: 37
Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness Training Against Phishing Attacks
Sinchul Back, Rob T. Guerette
Journal of Contemporary Criminal Justice (2021) Vol. 37, Iss. 3, pp. 427-451
Closed Access | Times Cited: 29
Sinchul Back, Rob T. Guerette
Journal of Contemporary Criminal Justice (2021) Vol. 37, Iss. 3, pp. 427-451
Closed Access | Times Cited: 29
Unveiling the Human Factor in Cybercrime and Cybersecurity: Motivations, Behaviors, Vulnerabilities, Mitigation Strategies, and Research Methods
Slim Masmoudi
Studies in computational intelligence (2025), pp. 41-91
Closed Access
Slim Masmoudi
Studies in computational intelligence (2025), pp. 41-91
Closed Access