
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Showing 11 citing articles:
Common vulnerability scoring system prediction based on open source intelligence information sources
Philipp Kühn, David N. Relke, Christian Reuter
Computers & Security (2023) Vol. 131, pp. 103286-103286
Open Access | Times Cited: 21
Philipp Kühn, David N. Relke, Christian Reuter
Computers & Security (2023) Vol. 131, pp. 103286-103286
Open Access | Times Cited: 21
Cyber hate awareness: information types and technologies relevant to the law enforcement and reporting center domain
Julian Bäumler, Georg Voronin, Marc‐André Kaufhold
i-com (2025)
Open Access
Julian Bäumler, Georg Voronin, Marc‐André Kaufhold
i-com (2025)
Open Access
Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
Thea Riebe, Tom Biselli, Marc‐André Kaufhold, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 477-493
Open Access | Times Cited: 6
Thea Riebe, Tom Biselli, Marc‐André Kaufhold, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 477-493
Open Access | Times Cited: 6
Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations
Derick Musundi Kesa
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 970-992
Open Access | Times Cited: 5
Derick Musundi Kesa
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 970-992
Open Access | Times Cited: 5
Values? Camera? Action! An ethnography of an AI camera system used by the Netherlands Police
Isabelle Donatz-Fest
Policing & Society (2024), pp. 1-18
Open Access
Isabelle Donatz-Fest
Policing & Society (2024), pp. 1-18
Open Access
Reshaping Cybersecurity for Supply Chain Sustainability in IR 4.0 and 5.0
Azeem Khan, N. Z. Jhanjhi, Dayang H. T. B. A. Haji Hamid, et al.
Advances in human and social aspects of technology book series (2024), pp. 161-210
Closed Access
Azeem Khan, N. Z. Jhanjhi, Dayang H. T. B. A. Haji Hamid, et al.
Advances in human and social aspects of technology book series (2024), pp. 161-210
Closed Access
Incident Management System Modeling Issues
Egor Yu. Soldatov, Alexandr Yu. Soldatov, Valentin Selifanov, et al.
Lecture notes in networks and systems (2024), pp. 293-299
Closed Access
Egor Yu. Soldatov, Alexandr Yu. Soldatov, Valentin Selifanov, et al.
Lecture notes in networks and systems (2024), pp. 293-299
Closed Access
Role of Open Source Intelligence Methods in Cybersecurity
Sabina Szymoniak, Kacper Foks
(2024), pp. 390-395
Closed Access
Sabina Szymoniak, Kacper Foks
(2024), pp. 390-395
Closed Access
Values? Camera? Action! An ethnography of an AI camera system used by the Netherlands Police
Isabelle Fest
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Isabelle Fest
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Exploring OSINT for Modern Day Reconnaissance
Ajay S Ram, Arya Thalakkat, Devika Udayan, et al.
(2023), pp. 1-6
Closed Access
Ajay S Ram, Arya Thalakkat, Devika Udayan, et al.
(2023), pp. 1-6
Closed Access
OSINT and AI: A Powerful Combination for Company Vulnerability Detection
Kenan Malween Bizouarn, Mohamed Abdulnabi, Tan Juan
(2023), pp. 246-250
Closed Access
Kenan Malween Bizouarn, Mohamed Abdulnabi, Tan Juan
(2023), pp. 246-250
Closed Access