OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180

Showing 26-50 of 180 citing articles:

Driving Technological Innovation for a Resilient Cybersecurity Landscape
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4

The use of simulations in economic cybersecurity decision-making
Mazaher Kianpour, Ulrik Franke
Journal of Cybersecurity (2025) Vol. 11, Iss. 1
Open Access

Thriving post-cyberattacks: the power of control, disclosure, and IT maturity
Saeed Rabea Baatwah, Mohammed Asiri, Mohammed Bajaher, et al.
Electronic Commerce Research (2025)
Closed Access

A New AI-Based Semantic Cyber Intelligence Agent
Fahim Sufi
Future Internet (2023) Vol. 15, Iss. 7, pp. 231-231
Open Access | Times Cited: 12

A global cyber-threat intelligence system with artificial intelligence and convolutional neural network
Fahim Sufi
Decision Analytics Journal (2023) Vol. 9, pp. 100364-100364
Open Access | Times Cited: 11

A New Social Media-Driven Cyber Threat Intelligence
Fahim Sufi
Electronics (2023) Vol. 12, Iss. 5, pp. 1242-1242
Open Access | Times Cited: 10

Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives
Kouassi Raymond Agbodoh-Falschau, Bako Harinivo Ravaonorohanta
Technology in Society (2023) Vol. 74, pp. 102309-102309
Closed Access | Times Cited: 10

Bridging the cyber protection gap: An investigation into the efficacy of the German cyber insurance market
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
Risk Management and Insurance Review (2024) Vol. 27, Iss. 1, pp. 57-87
Open Access | Times Cited: 3

Insights into Cybercrime Detection and Response: A Review of Time Factor
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3

Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3

Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 3

The Need for Cybersecurity in Industrial Revolution and Smart Cities
Antonio Clim, Andrei Toma, Răzvan Daniel Zota, et al.
Sensors (2022) Vol. 23, Iss. 1, pp. 120-120
Open Access | Times Cited: 16

Modeling and management of cyber risk: a cross-disciplinary review
Rong He, Zhuo Jin, Johnny Siu-Hang Li
Annals of Actuarial Science (2024) Vol. 18, Iss. 2, pp. 270-309
Open Access | Times Cited: 3

Modelling and predicting enterprise-level cyber risks in the context of sparse data availability
Daniel Zängerle, Dirk Schiereck
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 48, Iss. 2, pp. 434-462
Open Access | Times Cited: 15

Cyber insurance-linked securities
Alexander Braun, Martin Eling, Christoph Jaenicke
Astin Bulletin (2023) Vol. 53, Iss. 3, pp. 684-705
Open Access | Times Cited: 8

Novel Application of Open-Source Cyber Intelligence
Fahim Sufi
Electronics (2023) Vol. 12, Iss. 17, pp. 3610-3610
Open Access | Times Cited: 8

Supply Chain Risk Management in Young and Mature SMEs
Samuel Foli, Susanne Durst, Lidia Davies, et al.
Journal of risk and financial management (2022) Vol. 15, Iss. 8, pp. 328-328
Open Access | Times Cited: 13

Towards Zero-Shot Flow-Based Cyber-Security Anomaly Detection Framework
Mikołaj Komisarek, Rafał Kozik, Marek Pawlicki, et al.
Applied Sciences (2022) Vol. 12, Iss. 19, pp. 9636-9636
Open Access | Times Cited: 12

A service lens on cybersecurity continuity and management for organizations’ subsistence and growth
Godwin Thomas, Mary‐Jane Sule
Organizational Cybersecurity Journal Practice Process and People (2022) Vol. 3, Iss. 1, pp. 18-40
Open Access | Times Cited: 12

Business Resilience in a Cyber World
Sharon L. Burton
Advances in medical technologies and clinical practice book series (2024), pp. 1-25
Closed Access | Times Cited: 2

Cybercrime in the context of the digital age: analysis of threats, legal challenges and strategies
T. S. Batrachenko, Iryna Lehan, Віталій Кучменко, et al.
Multidisciplinary Science Journal (2024) Vol. 6, pp. 2024ss0212-2024ss0212
Open Access | Times Cited: 2

Patient informed consent, ethical and legal considerations in the context of digital vulnerability with smart, cardiac implantable electronic devices
Leanne N. Torgersen, Stefan M. Schulz, Ricardo G. Lugo, et al.
PLOS Digital Health (2024) Vol. 3, Iss. 5, pp. e0000507-e0000507
Open Access | Times Cited: 2

Towards Sustainable Internet Service Provision: Analyzing Consumer Preferences through a Hybrid TOPSIS–SEM–Neural Network Framework
Charmine Sheena Saflor, Klint Allen Mariñas, Princess Alvarado, et al.
Sustainability (2024) Vol. 16, Iss. 11, pp. 4767-4767
Open Access | Times Cited: 2

Scroll to top