OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

Chatbot Adoption: A Multiperspective Systematic Review and Future Research Agenda
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10232-10244
Closed Access | Times Cited: 26

Understanding users' protective behavior and its suppressor effect on the perceived risk in M-wallet/banking use: An Indian urban-rural comparison
Vikas Chauhan
Technological Forecasting and Social Change (2024) Vol. 201, pp. 123255-123255
Closed Access | Times Cited: 8

Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 7

Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4

Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access

An Integrated SEM-ANN Approach to Evaluating Cybersecurity Behaviors in the Metaverse
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access

Cybercrime Risk Found in Employee Behavior Big Data Using Semi-Supervised Machine Learning with Personality Theories
Kenneth David Strang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 37-37
Open Access | Times Cited: 3

Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2

Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2

Mitigating the Impact of Work Overload on Cybersecurity Behavior: The Moderating Influence of Corporate Ethics—A Mediated Moderation Analysis
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4

Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1

Identifying Key Issues to Enhance the Cybersecurity Awareness Strategy within Organizations
Anawin Kaewsa-ard, Nattavee Utakrit
Lecture notes in networks and systems (2024), pp. 1-11
Closed Access | Times Cited: 1

Behavior Types from Cybersecurity Perspective: An Overview
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1

Motivation and guidance of college students’ low-carbon behavior: evidence from Chinese colleges and universities
Gaofei Ren, Changjin Liu, Yaoyao Chen
Frontiers in Psychology (2024) Vol. 15
Open Access | Times Cited: 1

Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1

Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia
Ali Vafaei-Zadeh, Davoud Nikbin, Kit Yik Teoh, et al.
International Journal of Bank Marketing (2024)
Closed Access | Times Cited: 1

Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia
Gabriel Tuhafeni Nhinda, Fungai Bhunu Shava
(2023), pp. 1-7
Closed Access | Times Cited: 2

Cybersecurity
Tshilidzi Marwala
Elsevier eBooks (2024), pp. 53-63
Closed Access

A big data approach to risk management and control: Cybersecurity in accounting
Petar Halachev
Periodicals of Engineering and Natural Sciences (PEN) (2024) Vol. 12, Iss. 2, pp. 331-331
Open Access

Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics
Yong-Joon Lee, Jaeil Lee, Dojin Ryu, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3689-3689
Open Access

Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Eugene Levner, Dmitry Tsadikovich
Algorithms (2024) Vol. 17, Iss. 11, pp. 504-504
Open Access

ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access

Page 1 - Next Page

Scroll to top