OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity Practices for Social Media Users: A Systematic Literature Review
Thilini B. G. Herath, Prashant Khanna, Monjur Ahmed
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 1, pp. 1-18
Open Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

A systematic review of multi perspectives on human cybersecurity behavior
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
Technology in Society (2023) Vol. 73, pp. 102258-102258
Closed Access | Times Cited: 44

Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 28

Global Digital Convergence: Impact of Cybersecurity, Business Transparency, Economic Transformation, and AML Efficiency
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 32

GDCTSA: A Grouped Data Collection Scheme for Trustworthy Systems Assessment
Z Si, Ziyi Wang, Yichen Li
Communications in computer and information science (2025), pp. 125-139
Closed Access

Investigating students’ awareness of online privacy and cybersecurity: an empirical study with effective cybersecurity training framework
Rahat Uddin Azad, Sabiha Tasmim, Md. Atikuzzaman
Global Knowledge Memory and Communication (2025)
Closed Access

Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database
Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence and Cybercrime (2023) Vol. 6, Iss. 1, pp. 5-28
Open Access | Times Cited: 10

An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
Shah Khalid Khan, Nirajan Shiwakoti, Ao Wang, et al.
Future Transportation (2025) Vol. 5, Iss. 1, pp. 5-5
Open Access

Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Education and Information Technologies (2025)
Closed Access

A systematic literature review of money mule: its roles, recruitment and awareness
Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri, Salwa Zolkaflil
Journal of Financial Crime (2023) Vol. 31, Iss. 2, pp. 347-361
Closed Access | Times Cited: 9

Linked by age: a study on social media privacy concerns among younger and older adults
David Goyeneche, Stephen Singaraju, Luis Arango
Industrial Management & Data Systems (2023) Vol. 124, Iss. 2, pp. 640-665
Closed Access | Times Cited: 9

Building a thematic framework of cybersecurity: a systematic literature review approach
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 3

Social Engineering Attack concepts, frameworks, and Awareness: A Systematic Literature Review
Ruwa F. Abu Hweidi, Derar Eleyan
International Journal of Computing and Digital Systems (2023) Vol. 13, Iss. 1, pp. 691-700
Open Access | Times Cited: 7

DSpamOnto: An Ontology Modelling for Domain-Specific Social Spammers in Microblogging
Malak Al-Hassan, Bilal Abu-Salih, Ahmad Al Hwaitat
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 109-109
Open Access | Times Cited: 7

Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis
Mohammed Alqahtani
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 12

An Intelligence-Based Cybersecurity Approach: A Review
Yakubu Bala Mohammed, Mahmood Saidu Badara, Hussaini Dan’azumi
Journal of Intelligent Communication (2024) Vol. 4, Iss. 1, pp. 32-43
Open Access | Times Cited: 2

Cyber Hygiene Practices from The Lens of Professional Youth in Malaysia
Amily Fikry, Muhammad Iskandar Hamzah, Zuhal Hussein, et al.
Environment-Behaviour Proceedings Journal (2023) Vol. 8, Iss. 25, pp. 187-193
Open Access | Times Cited: 4

Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach
Tarek Kanan, Samar Hendawi, Shadi AlZu’bi, et al.
(2023), pp. 220-225
Closed Access | Times Cited: 4

A Comprehensive Review on Digital Security and Privacy on Social Networks: The Role of Users’ Awareness
Heba Al-Hyasat, Mahmoud Maqableh
Studies in computational intelligence (2024), pp. 269-286
Closed Access | Times Cited: 1

CYBERATTACKS ON THE ACCOUNTING PROFESSION :A LITERATUR REVIEW
Dhimas Surya, Doddy Setiawan, Y. Anni Aryani, et al.
Media Riset Akuntansi Auditing & Informasi (2024) Vol. 24, Iss. 2, pp. 255-272
Open Access | Times Cited: 1

Social media and privacy concerns: exploring university student’s privacy concerns in TikTok platform in Vietnam
Hoai Lan Duong, Minh Tung Tran, Thi Kim Oanh Vo, et al.
Journal of Information Communication and Ethics in Society (2024)
Closed Access | Times Cited: 1

An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work
Fai Ben Salamah, Marco A. Palomino, Matthew J. Craven, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9595-9595
Open Access | Times Cited: 3

Perspectives on Cybersecurity and Plastic Surgery: A Survey of Plastic Surgeons and Scoping Review of the Literature
Eric Hines, Shivang Trivedi, Cindy Hoang-Tran, et al.
Aesthetic Surgery Journal (2023) Vol. 43, Iss. 11, pp. 1376-1383
Closed Access | Times Cited: 2

Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database
Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence and Cybercrime (2023)
Open Access | Times Cited: 2

Cybersecurity Crafting Intervention Model Based on Behaviors Change Wheel
Ren Zheng, G. O. Cowan, Rong Ren, et al.
Advanced sciences and technologies for security applications (2024), pp. 281-307
Closed Access

Page 1 - Next Page

Scroll to top