OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users
David Jones, Shiva Ghasemi, Denis Gračanin, et al.
Lecture notes in computer science (2023), pp. 511-528
Closed Access | Times Cited: 15

Supporting the Digital Safety of At-Risk Users: Lessons Learned from 9+ Years of Research & Training
Tara Matthews, Elie Bursztein, Patrick Gage Kelley, et al.
ACM Transactions on Computer-Human Interaction (2025)
Closed Access

Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups
Franziska Herbert, Steffen Becker, Annalina Buckmann, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 697-716
Closed Access | Times Cited: 3

From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs
Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, et al.
(2022), pp. 60-74
Open Access | Times Cited: 6

Would US citizens accept cybersecurity deresponsibilization? Perhaps not
Karen Renaud, Karl van der Schyff, Stuart Macdonald
Computers & Security (2023) Vol. 131, pp. 103301-103301
Open Access | Times Cited: 2

Cybersecurity Insights Gleaned from World Religions
Karen Renaud, Marc Dupuis
Computers & Security (2023) Vol. 132, pp. 103326-103326
Open Access | Times Cited: 2

Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study
Diana Portela, Diogo Nogueira-Leite, Rafael Almeida, et al.
JMIR Formative Research (2023) Vol. 7, pp. e41738-e41738
Open Access | Times Cited: 2

‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach
Partha Das Chowdhury, Karen Renaud
New Security Paradigms Workshop (2023), pp. 76-91
Open Access | Times Cited: 2

Inclusive Internet of Things Privacy Labels
Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 32-39
Closed Access

Inclusive Involvement of At-Risk Users in Cybersecurity Research
Filipo Sharevski
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 13-22
Closed Access

Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability Metrics
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access

Password Managers Use Among Individuals Who Are Visually Impaired: Awareness, Adoption, and Rejection
Nancy Alajarmeh, Richard E. Ladner
International Journal of Human-Computer Interaction (2024), pp. 1-17
Closed Access

Assessing the Cybersecurity Needs and Experiences of Disabled Users
Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, et al.
IFIP advances in information and communication technology (2024), pp. 355-369
Closed Access

Vision Paper: Are Identity Verification Systems Adequately Tailored for Neurodivergent Individuals?
Emanuela Marasco, Nora McDonald, Vivian Genaro Motti
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 1580-1584
Closed Access

Design Challenges for Scam Prevention Tools to Protect Neurodiverse and Older Adult Populations
Pragathi Tummala, Hyeonsoo Choi, Anuridhi Gupta, et al.
(2024), pp. 437-441
Closed Access

Perceived Online Tax Compliance Measures on Tax Compliance among Online Traders in Kenya
Eric Kiprono, Edwin Kimitei, Collins Kapkiyai
American Journal of Economics and Business Innovation (2023) Vol. 2, Iss. 3, pp. 114-122
Open Access

Towards Human-Centric Endpoint Security
Jenny Blessing, Partha Das Chowdhury, Maria Sameen, et al.
Lecture notes in computer science (2023), pp. 211-219
Closed Access

DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm
Sri Harsha Mekala, Zubair Baig, Adnan Anwar, et al.
(2023), pp. 32-39
Closed Access

A Network Security Test Evaluation Model of Automobile Digital Key
Baizheng Wang, Qiang Zhang, Shao Wen, et al.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2023), pp. 193-199
Closed Access

Page 1 - Next Page

Scroll to top