
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization
Jurjen Jansen, Rutger Leukfeldt
International journal of cyber criminology (2016) Vol. 10, Iss. 1, pp. 79
Closed Access | Times Cited: 48
Jurjen Jansen, Rutger Leukfeldt
International journal of cyber criminology (2016) Vol. 10, Iss. 1, pp. 79
Closed Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
Cybersecurity in industrial control systems: Issues, technologies, and challenges
Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally
Computer Networks (2019) Vol. 165, pp. 106946-106946
Closed Access | Times Cited: 112
Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally
Computer Networks (2019) Vol. 165, pp. 106946-106946
Closed Access | Times Cited: 112
Big Five Personality Traits of Cybercrime Victims
Steve van de Weijer, Rutger Leukfeldt
Cyberpsychology Behavior and Social Networking (2017) Vol. 20, Iss. 7, pp. 407-412
Closed Access | Times Cited: 73
Steve van de Weijer, Rutger Leukfeldt
Cyberpsychology Behavior and Social Networking (2017) Vol. 20, Iss. 7, pp. 407-412
Closed Access | Times Cited: 73
Human Cognition Through the Lens of Social Engineering Cyberattacks
Rosana Montañez, Edward J. Golob, Shouhuai Xu
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 63
Rosana Montañez, Edward J. Golob, Shouhuai Xu
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 63
Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach
Naci Akdemir, Christopher Lawless
Internet Research (2020) Vol. 30, Iss. 6, pp. 1665-1687
Open Access | Times Cited: 55
Naci Akdemir, Christopher Lawless
Internet Research (2020) Vol. 30, Iss. 6, pp. 1665-1687
Open Access | Times Cited: 55
Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types
Suleman Lazarus, Mark Button, Richard Kapend
The Howard Journal of Crime and Justice (2022) Vol. 61, Iss. 3, pp. 381-398
Open Access | Times Cited: 32
Suleman Lazarus, Mark Button, Richard Kapend
The Howard Journal of Crime and Justice (2022) Vol. 61, Iss. 3, pp. 381-398
Open Access | Times Cited: 32
Cyber resilience in industrial networks: A state of the art, challenges, and future directions
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi, Nouf A. S. Alsowaygh, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101781-101781
Open Access | Times Cited: 22
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi, Nouf A. S. Alsowaygh, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101781-101781
Open Access | Times Cited: 22
A multi-dimensional machine learning approach to predict advanced malware
Şerif Bahtıyar, Mehmet Barış Yaman, Can Yılmaz Altıniğne
Computer Networks (2019) Vol. 160, pp. 118-129
Closed Access | Times Cited: 54
Şerif Bahtıyar, Mehmet Barış Yaman, Can Yılmaz Altıniğne
Computer Networks (2019) Vol. 160, pp. 118-129
Closed Access | Times Cited: 54
Testing a model of precautionary online behaviour: The case of online banking
Jurjen Jansen, Paul van Schaik
Computers in Human Behavior (2018) Vol. 87, pp. 371-383
Open Access | Times Cited: 45
Jurjen Jansen, Paul van Schaik
Computers in Human Behavior (2018) Vol. 87, pp. 371-383
Open Access | Times Cited: 45
Market-oriented corporate digital responsibility to manage data vulnerability in online banking
Gajendra Liyanaarachchi, Sameer Deshpande, Scott Weaven
International Journal of Bank Marketing (2020) Vol. ahead-of-print, Iss. ahead-of-print
Closed Access | Times Cited: 36
Gajendra Liyanaarachchi, Sameer Deshpande, Scott Weaven
International Journal of Bank Marketing (2020) Vol. ahead-of-print, Iss. ahead-of-print
Closed Access | Times Cited: 36
Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 4
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 4
Determinants of cyber-incidents among small and medium US cities
Mattia Caldarulo, Eric W. Welch, Mary Feeney
Government Information Quarterly (2022) Vol. 39, Iss. 3, pp. 101703-101703
Closed Access | Times Cited: 17
Mattia Caldarulo, Eric W. Welch, Mary Feeney
Government Information Quarterly (2022) Vol. 39, Iss. 3, pp. 101703-101703
Closed Access | Times Cited: 17
Risk Profiles for Cybercrime Victimization: A Conjunctive Analysis of Case Configurations
M.S. van ’t Hoff-de Goede, Asier Moneva, Rutger Leukfeldt
Deviant Behavior (2025), pp. 1-19
Closed Access
M.S. van ’t Hoff-de Goede, Asier Moneva, Rutger Leukfeldt
Deviant Behavior (2025), pp. 1-19
Closed Access
The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory
Wytske van der Wagen, Wolter Pieters
European Journal of Criminology (2018) Vol. 17, Iss. 4, pp. 480-497
Open Access | Times Cited: 29
Wytske van der Wagen, Wolter Pieters
European Journal of Criminology (2018) Vol. 17, Iss. 4, pp. 480-497
Open Access | Times Cited: 29
Ethnic Bullying Victimization in Italy: The Role of Acculturation Orientation for Ethnic Minority Adolescents With Differing Citizenship Statuses
Benedetta Emanuela Palladino, Maria Rosaria Nappa, Valentina Zambuto, et al.
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 27
Benedetta Emanuela Palladino, Maria Rosaria Nappa, Valentina Zambuto, et al.
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 27
Workplace cyberbullying: A criminological and routine activity perspective
Sixuan Zhang, Dorothy E. Leidner, Cao Xin, et al.
Journal of Information Technology (2021) Vol. 37, Iss. 1, pp. 51-79
Closed Access | Times Cited: 22
Sixuan Zhang, Dorothy E. Leidner, Cao Xin, et al.
Journal of Information Technology (2021) Vol. 37, Iss. 1, pp. 51-79
Closed Access | Times Cited: 22
How Phishers Exploit the Coronavirus Pandemic: A Content Analysis of COVID-19 Themed Phishing Emails
Naci Akdemir, Serkan YENAL
SAGE Open (2021) Vol. 11, Iss. 3
Open Access | Times Cited: 22
Naci Akdemir, Serkan YENAL
SAGE Open (2021) Vol. 11, Iss. 3
Open Access | Times Cited: 22
Insider threat mitigation: Systematic literature review
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3
Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance
Aleksandra Pawlicka, Dagmara Jaroszewska-Choraś, Michał Choraś, et al.
IEEE Technology and Society Magazine (2020) Vol. 39, Iss. 4, pp. 60-70
Closed Access | Times Cited: 23
Aleksandra Pawlicka, Dagmara Jaroszewska-Choraś, Michał Choraś, et al.
IEEE Technology and Society Magazine (2020) Vol. 39, Iss. 4, pp. 60-70
Closed Access | Times Cited: 23
Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information
Yi Yong Lee, Chin Lay Gan, Tze Wei Liew
International Journal of Environmental Research and Public Health (2023) Vol. 20, Iss. 4, pp. 3514-3514
Open Access | Times Cited: 7
Yi Yong Lee, Chin Lay Gan, Tze Wei Liew
International Journal of Environmental Research and Public Health (2023) Vol. 20, Iss. 4, pp. 3514-3514
Open Access | Times Cited: 7
Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization?
M.S. van ’t Hoff-de Goede, Steve van de Weijer, Rutger Leukfeldt
Journal of Crime and Justice (2023) Vol. 47, Iss. 4, pp. 472-491
Closed Access | Times Cited: 7
M.S. van ’t Hoff-de Goede, Steve van de Weijer, Rutger Leukfeldt
Journal of Crime and Justice (2023) Vol. 47, Iss. 4, pp. 472-491
Closed Access | Times Cited: 7
To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emails
Suganthi Manoharan, Norliza Katuk, Syahida Hassan, et al.
Information and Computer Security (2021) Vol. 30, Iss. 1, pp. 37-62
Closed Access | Times Cited: 18
Suganthi Manoharan, Norliza Katuk, Syahida Hassan, et al.
Information and Computer Security (2021) Vol. 30, Iss. 1, pp. 37-62
Closed Access | Times Cited: 18
Exploring the Shift from Physical to Cybercrime at the Onset of the COVID-19 Pandemic
Miloslava Plachkinova
International Journal of Cyber Forensics and Advanced Threat Investigations (2021) Vol. 2, Iss. 1, pp. 50-62
Open Access | Times Cited: 13
Miloslava Plachkinova
International Journal of Cyber Forensics and Advanced Threat Investigations (2021) Vol. 2, Iss. 1, pp. 50-62
Open Access | Times Cited: 13
An Exploration of the Psychological Impact of Hacking Victimization
Alexa Palassis, Craig Speelman, Julie Ann Pooley
SAGE Open (2021) Vol. 11, Iss. 4, pp. 215824402110615-215824402110615
Open Access | Times Cited: 12
Alexa Palassis, Craig Speelman, Julie Ann Pooley
SAGE Open (2021) Vol. 11, Iss. 4, pp. 215824402110615-215824402110615
Open Access | Times Cited: 12
International comparison of bank fraud reimbursement: customer perceptions and contractual terms
Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, et al.
Journal of Cybersecurity (2017) Vol. 3, Iss. 2, pp. 109-125
Open Access | Times Cited: 11
Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, et al.
Journal of Cybersecurity (2017) Vol. 3, Iss. 2, pp. 109-125
Open Access | Times Cited: 11
An Empirical Investigation of the Effects of Individuality on Responses to Data Theft Crimes
John N. Angelis, Joseph C. Miller
IEEE Transactions on Engineering Management (2020) Vol. 68, Iss. 6, pp. 1663-1676
Closed Access | Times Cited: 10
John N. Angelis, Joseph C. Miller
IEEE Transactions on Engineering Management (2020) Vol. 68, Iss. 6, pp. 1663-1676
Closed Access | Times Cited: 10