
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Prashanth Rajivan, Cleotilde González
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 74
Prashanth Rajivan, Cleotilde González
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 74
Showing 1-25 of 74 citing articles:
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
Avisha Das, Shahryar Baki, Ayman El Aassal, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 671-708
Open Access | Times Cited: 121
Avisha Das, Shahryar Baki, Ayman El Aassal, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 671-708
Open Access | Times Cited: 121
Don’t click: towards an effective anti-phishing training. A comparative literature review
Daniel Jampen, Gürkan Gür, Thomas Sutter, et al.
Human-centric Computing and Information Sciences (2020) Vol. 10, Iss. 1
Open Access | Times Cited: 92
Daniel Jampen, Gürkan Gür, Thomas Sutter, et al.
Human-centric Computing and Information Sciences (2020) Vol. 10, Iss. 1
Open Access | Times Cited: 92
Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals
Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, et al.
Journal of Medical Internet Research (2020) Vol. 22, Iss. 1, pp. e16775-e16775
Open Access | Times Cited: 83
Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, et al.
Journal of Medical Internet Research (2020) Vol. 22, Iss. 1, pp. e16775-e16775
Open Access | Times Cited: 83
What.Hack
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, et al.
(2019), pp. 1-12
Closed Access | Times Cited: 82
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, et al.
(2019), pp. 1-12
Closed Access | Times Cited: 82
Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 97-117
Closed Access | Times Cited: 1
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 97-117
Closed Access | Times Cited: 1
Human Cognition Through the Lens of Social Engineering Cyberattacks
Rosana Montañez, Edward J. Golob, Shouhuai Xu
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 63
Rosana Montañez, Edward J. Golob, Shouhuai Xu
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 63
The Role of User Behaviour in Improving Cyber Security Management
Ahmed A. Moustafa, Abubakar Bello, Alana Maurushat
Frontiers in Psychology (2021) Vol. 12
Open Access | Times Cited: 54
Ahmed A. Moustafa, Abubakar Bello, Alana Maurushat
Frontiers in Psychology (2021) Vol. 12
Open Access | Times Cited: 54
Phishing simulation exercise in a large hospital: A case study
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 33
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 33
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Phishing attempts among the dark triad: Patterns of attack and vulnerability
Shelby R. Curtis, Prashanth Rajivan, Daniel N. Jones, et al.
Computers in Human Behavior (2018) Vol. 87, pp. 174-182
Open Access | Times Cited: 59
Shelby R. Curtis, Prashanth Rajivan, Daniel N. Jones, et al.
Computers in Human Behavior (2018) Vol. 87, pp. 174-182
Open Access | Times Cited: 59
Phishing Attacks and Preventions in Blockchain Based Projects
A.A. Andryukhin
(2019), pp. 15-19
Closed Access | Times Cited: 47
A.A. Andryukhin
(2019), pp. 15-19
Closed Access | Times Cited: 47
Subversion, cyber operations, and reverse structural power in world politics
Lennart Maschmeyer
European Journal of International Relations (2022) Vol. 29, Iss. 1, pp. 79-103
Open Access | Times Cited: 28
Lennart Maschmeyer
European Journal of International Relations (2022) Vol. 29, Iss. 1, pp. 79-103
Open Access | Times Cited: 28
Evaluating user susceptibility to phishing attacks
Sanchari Das, Christena Nippert‐Eng, L. Jean Camp
Information and Computer Security (2022) Vol. 30, Iss. 1, pp. 1-18
Closed Access | Times Cited: 24
Sanchari Das, Christena Nippert‐Eng, L. Jean Camp
Information and Computer Security (2022) Vol. 30, Iss. 1, pp. 1-18
Closed Access | Times Cited: 24
The Spot the Troll Quiz game increases accuracy in discerning between real and inauthentic social media accounts
Jeffrey Martin Lees, John A. Banas, Darren L. Linvill, et al.
PNAS Nexus (2023) Vol. 2, Iss. 4
Open Access | Times Cited: 16
Jeffrey Martin Lees, John A. Banas, Darren L. Linvill, et al.
PNAS Nexus (2023) Vol. 2, Iss. 4
Open Access | Times Cited: 16
Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
Tianhao Xu, Kuldeep Singh, Prashanth Rajivan
Applied Ergonomics (2022) Vol. 108, pp. 103908-103908
Closed Access | Times Cited: 20
Tianhao Xu, Kuldeep Singh, Prashanth Rajivan
Applied Ergonomics (2022) Vol. 108, pp. 103908-103908
Closed Access | Times Cited: 20
Stop the Clock - Counteracting Bias Exploited by Attackers through an Interactive Augmented Reality Phishing Training
Lorin Schöni, Martin Strohmeier, Ivo Sluganovic, et al.
(2025), pp. 1-23
Closed Access
Lorin Schöni, Martin Strohmeier, Ivo Sluganovic, et al.
(2025), pp. 1-23
Closed Access
The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection
Ziad M Hakim, Natalie C. Ebner, Daniela S Oliveira, et al.
Behavior Research Methods (2020) Vol. 53, Iss. 3, pp. 1342-1352
Open Access | Times Cited: 32
Ziad M Hakim, Natalie C. Ebner, Daniela S Oliveira, et al.
Behavior Research Methods (2020) Vol. 53, Iss. 3, pp. 1342-1352
Open Access | Times Cited: 32
SpearBot: Leveraging large language models in a generative-critique framework for spear-phishing email generation
Qinglin Qi, Yun Luo, Yijia Xu, et al.
Information Fusion (2025), pp. 103176-103176
Closed Access
Qinglin Qi, Yun Luo, Yijia Xu, et al.
Information Fusion (2025), pp. 103176-103176
Closed Access
Training to Detect Phishing Emails: Effects of the Frequency of Experienced Phishing Emails
Kuldeep Singh, Palvi Aggarwal, Prashanth Rajivan, et al.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2019) Vol. 63, Iss. 1, pp. 453-457
Open Access | Times Cited: 27
Kuldeep Singh, Palvi Aggarwal, Prashanth Rajivan, et al.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2019) Vol. 63, Iss. 1, pp. 453-457
Open Access | Times Cited: 27
Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users
Kristin Weber, Andreas E. Schütz, Tobias Fertig, et al.
Lecture notes in computer science (2020), pp. 650-668
Closed Access | Times Cited: 27
Kristin Weber, Andreas E. Schütz, Tobias Fertig, et al.
Lecture notes in computer science (2020), pp. 650-668
Closed Access | Times Cited: 27
Avoiding the Hook: Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception
Thomas Sutter, Ahmet Selman Bozkır, Benjamin Gehring, et al.
IEEE Access (2022) Vol. 10, pp. 100540-100565
Open Access | Times Cited: 15
Thomas Sutter, Ahmet Selman Bozkır, Benjamin Gehring, et al.
IEEE Access (2022) Vol. 10, pp. 100540-100565
Open Access | Times Cited: 15
Cognitive elements of learning and discriminability in anti-phishing training
Kuldeep Singh, Palvi Aggarwal, Prashanth Rajivan, et al.
Computers & Security (2023) Vol. 127, pp. 103105-103105
Open Access | Times Cited: 9
Kuldeep Singh, Palvi Aggarwal, Prashanth Rajivan, et al.
Computers & Security (2023) Vol. 127, pp. 103105-103105
Open Access | Times Cited: 9
Design of Dynamic and Personalized Deception: A Research Framework and New Insights
Cleotilde González, Palvi Aggarwal, Christian Lebière, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2020)
Open Access | Times Cited: 21
Cleotilde González, Palvi Aggarwal, Christian Lebière, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2020)
Open Access | Times Cited: 21
Learning and Dynamic Decision Making
Cleotilde González
Topics in Cognitive Science (2021) Vol. 14, Iss. 1, pp. 14-30
Open Access | Times Cited: 19
Cleotilde González
Topics in Cognitive Science (2021) Vol. 14, Iss. 1, pp. 14-30
Open Access | Times Cited: 19