
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Impact of Human Vulnerabilities on Cybersecurity
Maher Alsharif, Shailendra Mishra, Mohammed Alshehri
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 3, pp. 1153-1166
Open Access | Times Cited: 36
Maher Alsharif, Shailendra Mishra, Mohammed Alshehri
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 3, pp. 1153-1166
Open Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
When the Internet Gets Under Our Skin: Reassessing Consumer Law and Policy in a Society of Cyborgs
Benjamin Clubbs Coldron, Guido Noto La Diega, Christian Twigg‐Flesner, et al.
Journal of Consumer Policy (2025)
Open Access
Benjamin Clubbs Coldron, Guido Noto La Diega, Christian Twigg‐Flesner, et al.
Journal of Consumer Policy (2025)
Open Access
A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access
Addressing Cybersecurity Challenges in Robotics: A Comprehensive Overview
Jibrilla Tanimu, Wafia Abada
Cyber Security and Applications (2024), pp. 100074-100074
Open Access | Times Cited: 3
Jibrilla Tanimu, Wafia Abada
Cyber Security and Applications (2024), pp. 100074-100074
Open Access | Times Cited: 3
Development of Cyber Security Awareness and Education Framework
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access
Cybersecurity education gaps in Spain university business degrees
Alex Vallejo
Journal of Education for Business (2025), pp. 1-10
Closed Access
Alex Vallejo
Journal of Education for Business (2025), pp. 1-10
Closed Access
Ethical Dilemmas and Human Factors in the Application of AI in Cybersecurity
Yanya Viskovich, Vibha Mohan
Integrated science (2025), pp. 71-91
Closed Access
Yanya Viskovich, Vibha Mohan
Integrated science (2025), pp. 71-91
Closed Access
A Hypertuned Lightweight and Scalable LSTM Model for Hybrid Network Intrusion Detection
Aysha Bibi, Gabriel Avelino Sampedro, Ahmad Almadhor, et al.
Technologies (2023) Vol. 11, Iss. 5, pp. 121-121
Open Access | Times Cited: 8
Aysha Bibi, Gabriel Avelino Sampedro, Ahmad Almadhor, et al.
Technologies (2023) Vol. 11, Iss. 5, pp. 121-121
Open Access | Times Cited: 8
Machine Learning in Cybersecurity
Prasanna Kumar G, Darshini Y. Gowda, Ashwini M. Prakash
Advances in healthcare information systems and administration book series (2023), pp. 175-197
Closed Access | Times Cited: 8
Prasanna Kumar G, Darshini Y. Gowda, Ashwini M. Prakash
Advances in healthcare information systems and administration book series (2023), pp. 175-197
Closed Access | Times Cited: 8
Human Susceptibility to Social Engineering Attacks: an innovative approach to social change
Apoorva Vikrant Kulkarni, Srijana Nath
(2024), pp. 1-6
Closed Access | Times Cited: 2
Apoorva Vikrant Kulkarni, Srijana Nath
(2024), pp. 1-6
Closed Access | Times Cited: 2
Human Factors in Cybersecurity
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Assessing Critical Entities: Risk Management for IoT Devices in Ports
Ioannis Argyriou, Theocharis Tsoutsos
Journal of Marine Science and Engineering (2024) Vol. 12, Iss. 9, pp. 1593-1593
Open Access | Times Cited: 2
Ioannis Argyriou, Theocharis Tsoutsos
Journal of Marine Science and Engineering (2024) Vol. 12, Iss. 9, pp. 1593-1593
Open Access | Times Cited: 2
Modelling and analysis of social engineering threats using the attack tree and the Markov model
Mohammad Aijaz, Mohammed Nazir
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1231-1238
Closed Access | Times Cited: 4
Mohammad Aijaz, Mohammed Nazir
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1231-1238
Closed Access | Times Cited: 4
Securing industry 5.0 using 6σ CYBERNETIC framework
Lubna Luxmi Dhirani, Thomas Newe
Mehran University Research Journal of Engineering and Technology (2024) Vol. 43, Iss. 2, pp. 220-220
Open Access | Times Cited: 1
Lubna Luxmi Dhirani, Thomas Newe
Mehran University Research Journal of Engineering and Technology (2024) Vol. 43, Iss. 2, pp. 220-220
Open Access | Times Cited: 1
Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
Srinivas Akkepalli, K. Sagar
(2024) Vol. 11, pp. 1-6
Closed Access | Times Cited: 1
Srinivas Akkepalli, K. Sagar
(2024) Vol. 11, pp. 1-6
Closed Access | Times Cited: 1
Examining cybersecurity culture in Leon city organizations: Insights from 2022
Francisco Javier García Arellano, ítalo Donoso Barraza, Angélica Flores Bustos, et al.
Ingeniare. Revista chilena de ingeniería (2024) Vol. 32
Open Access | Times Cited: 1
Francisco Javier García Arellano, ítalo Donoso Barraza, Angélica Flores Bustos, et al.
Ingeniare. Revista chilena de ingeniería (2024) Vol. 32
Open Access | Times Cited: 1
A Review: Human Factor and Cybersecurity
Ashraf Abzakh, Ahmad Althunibat
(2023), pp. 589-592
Closed Access | Times Cited: 3
Ashraf Abzakh, Ahmad Althunibat
(2023), pp. 589-592
Closed Access | Times Cited: 3
Cybersecurity and Strategic Management
Budi Gunawan, Barito Mulyo Ratmono, Ade Gafar Abdullah
Foresight-Russia (2023) Vol. 17, Iss. 3, pp. 88-97
Open Access | Times Cited: 2
Budi Gunawan, Barito Mulyo Ratmono, Ade Gafar Abdullah
Foresight-Russia (2023) Vol. 17, Iss. 3, pp. 88-97
Open Access | Times Cited: 2
Cybersecurity Policies Implementation
Manmeet Kour, Justin Pierce
Advances in business information systems and analytics book series (2024), pp. 149-179
Closed Access
Manmeet Kour, Justin Pierce
Advances in business information systems and analytics book series (2024), pp. 149-179
Closed Access
Flagged: Cybersecurity Training and Awareness System Through Virtual Reality
Haya Alhawas, Noura Althemali, Renad Alkhaldi, et al.
(2024), pp. 49-66
Open Access
Haya Alhawas, Noura Althemali, Renad Alkhaldi, et al.
(2024), pp. 49-66
Open Access
The Role of Human Factors in Cybersecurity Vulnerabilities
H. C. Verma, Saurabh Srivastava
Advances in human and social aspects of technology book series (2024), pp. 1-12
Closed Access
H. C. Verma, Saurabh Srivastava
Advances in human and social aspects of technology book series (2024), pp. 1-12
Closed Access
Improving the Cybersecurity Awareness of Young Adults through a Game-Based Informal Learning Strategy
Giorgia Tempestini, Sara Merà, Marco Pietro Palange, et al.
Information (2024) Vol. 15, Iss. 10, pp. 607-607
Open Access
Giorgia Tempestini, Sara Merà, Marco Pietro Palange, et al.
Information (2024) Vol. 15, Iss. 10, pp. 607-607
Open Access
Cybersecurity Breach Case Study
Jessica Parker
Advances in human and social aspects of technology book series (2023), pp. 89-102
Closed Access | Times Cited: 1
Jessica Parker
Advances in human and social aspects of technology book series (2023), pp. 89-102
Closed Access | Times Cited: 1
“It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations
Neeranjan Chitare, Lynne Coventry, James Nicholson
(2023), pp. 344-355
Open Access | Times Cited: 1
Neeranjan Chitare, Lynne Coventry, James Nicholson
(2023), pp. 344-355
Open Access | Times Cited: 1
An Examination of the Human Factors in Cybersecurity: Future Direction for Nigerian Banks
George Ajufo, Abubaker Qutieshat
Indonesian Journal of Information Systems (2023) Vol. 6, Iss. 1, pp. 1-16
Open Access | Times Cited: 1
George Ajufo, Abubaker Qutieshat
Indonesian Journal of Information Systems (2023) Vol. 6, Iss. 1, pp. 1-16
Open Access | Times Cited: 1