
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 28
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Chatbot Adoption: A Multiperspective Systematic Review and Future Research Agenda
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10232-10244
Closed Access | Times Cited: 26
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10232-10244
Closed Access | Times Cited: 26
Understanding users' protective behavior and its suppressor effect on the perceived risk in M-wallet/banking use: An Indian urban-rural comparison
Vikas Chauhan
Technological Forecasting and Social Change (2024) Vol. 201, pp. 123255-123255
Closed Access | Times Cited: 8
Vikas Chauhan
Technological Forecasting and Social Change (2024) Vol. 201, pp. 123255-123255
Closed Access | Times Cited: 8
Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 7
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 7
Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 4
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 4
Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
An Integrated SEM-ANN Approach to Evaluating Cybersecurity Behaviors in the Metaverse
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Research on the Mechanism for Enhancing Undergraduate Students' Information Security Behavior in the Context of Generative Artificial Intelligence
Yuhua Cao
(2025), pp. 69-74
Closed Access
Yuhua Cao
(2025), pp. 69-74
Closed Access
Cybercrime Risk Found in Employee Behavior Big Data Using Semi-Supervised Machine Learning with Personality Theories
Kenneth David Strang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 37-37
Open Access | Times Cited: 3
Kenneth David Strang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 37-37
Open Access | Times Cited: 3
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2
Mitigating the Impact of Work Overload on Cybersecurity Behavior: The Moderating Influence of Corporate Ethics—A Mediated Moderation Analysis
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1
Identifying Key Issues to Enhance the Cybersecurity Awareness Strategy within Organizations
Anawin Kaewsa-ard, Nattavee Utakrit
Lecture notes in networks and systems (2024), pp. 1-11
Closed Access | Times Cited: 1
Anawin Kaewsa-ard, Nattavee Utakrit
Lecture notes in networks and systems (2024), pp. 1-11
Closed Access | Times Cited: 1
Behavior Types from Cybersecurity Perspective: An Overview
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1
Motivation and guidance of college students’ low-carbon behavior: evidence from Chinese colleges and universities
Gaofei Ren, Changjin Liu, Yaoyao Chen
Frontiers in Psychology (2024) Vol. 15
Open Access | Times Cited: 1
Gaofei Ren, Changjin Liu, Yaoyao Chen
Frontiers in Psychology (2024) Vol. 15
Open Access | Times Cited: 1
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia
Ali Vafaei-Zadeh, Davoud Nikbin, Kit Yik Teoh, et al.
International Journal of Bank Marketing (2024)
Closed Access | Times Cited: 1
Ali Vafaei-Zadeh, Davoud Nikbin, Kit Yik Teoh, et al.
International Journal of Bank Marketing (2024)
Closed Access | Times Cited: 1
Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia
Gabriel Tuhafeni Nhinda, Fungai Bhunu Shava
(2023), pp. 1-7
Closed Access | Times Cited: 2
Gabriel Tuhafeni Nhinda, Fungai Bhunu Shava
(2023), pp. 1-7
Closed Access | Times Cited: 2
Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security
Miranda Stanfield
Scientific Bulletin (2024) Vol. 29, Iss. 1, pp. 151-162
Open Access
Miranda Stanfield
Scientific Bulletin (2024) Vol. 29, Iss. 1, pp. 151-162
Open Access
A big data approach to risk management and control: Cybersecurity in accounting
Petar Halachev
Periodicals of Engineering and Natural Sciences (PEN) (2024) Vol. 12, Iss. 2, pp. 331-331
Open Access
Petar Halachev
Periodicals of Engineering and Natural Sciences (PEN) (2024) Vol. 12, Iss. 2, pp. 331-331
Open Access
Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics
Yong-Joon Lee, Jaeil Lee, Dojin Ryu, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3689-3689
Open Access
Yong-Joon Lee, Jaeil Lee, Dojin Ryu, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3689-3689
Open Access
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Eugene Levner, Dmitry Tsadikovich
Algorithms (2024) Vol. 17, Iss. 11, pp. 504-504
Open Access
Eugene Levner, Dmitry Tsadikovich
Algorithms (2024) Vol. 17, Iss. 11, pp. 504-504
Open Access
ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access