
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users
David Jones, Shiva Ghasemi, Denis Gračanin, et al.
Lecture notes in computer science (2023), pp. 511-528
Closed Access | Times Cited: 15
David Jones, Shiva Ghasemi, Denis Gračanin, et al.
Lecture notes in computer science (2023), pp. 511-528
Closed Access | Times Cited: 15
Supporting the Digital Safety of At-Risk Users: Lessons Learned from 9+ Years of Research & Training
Tara Matthews, Elie Bursztein, Patrick Gage Kelley, et al.
ACM Transactions on Computer-Human Interaction (2025)
Closed Access
Tara Matthews, Elie Bursztein, Patrick Gage Kelley, et al.
ACM Transactions on Computer-Human Interaction (2025)
Closed Access
Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups
Franziska Herbert, Steffen Becker, Annalina Buckmann, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 697-716
Closed Access | Times Cited: 3
Franziska Herbert, Steffen Becker, Annalina Buckmann, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 697-716
Closed Access | Times Cited: 3
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs
Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, et al.
(2022), pp. 60-74
Open Access | Times Cited: 6
Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, et al.
(2022), pp. 60-74
Open Access | Times Cited: 6
“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods
Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer, et al.
(2023), pp. 575-593
Open Access | Times Cited: 3
Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer, et al.
(2023), pp. 575-593
Open Access | Times Cited: 3
Would US citizens accept cybersecurity deresponsibilization? Perhaps not
Karen Renaud, Karl van der Schyff, Stuart Macdonald
Computers & Security (2023) Vol. 131, pp. 103301-103301
Open Access | Times Cited: 2
Karen Renaud, Karl van der Schyff, Stuart Macdonald
Computers & Security (2023) Vol. 131, pp. 103301-103301
Open Access | Times Cited: 2
Cybersecurity Insights Gleaned from World Religions
Karen Renaud, Marc Dupuis
Computers & Security (2023) Vol. 132, pp. 103326-103326
Open Access | Times Cited: 2
Karen Renaud, Marc Dupuis
Computers & Security (2023) Vol. 132, pp. 103326-103326
Open Access | Times Cited: 2
Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study
Diana Portela, Diogo Nogueira-Leite, Rafael Almeida, et al.
JMIR Formative Research (2023) Vol. 7, pp. e41738-e41738
Open Access | Times Cited: 2
Diana Portela, Diogo Nogueira-Leite, Rafael Almeida, et al.
JMIR Formative Research (2023) Vol. 7, pp. e41738-e41738
Open Access | Times Cited: 2
‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach
Partha Das Chowdhury, Karen Renaud
New Security Paradigms Workshop (2023), pp. 76-91
Open Access | Times Cited: 2
Partha Das Chowdhury, Karen Renaud
New Security Paradigms Workshop (2023), pp. 76-91
Open Access | Times Cited: 2
Inclusive Internet of Things Privacy Labels
Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 32-39
Closed Access
Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 32-39
Closed Access
Inclusive Involvement of At-Risk Users in Cybersecurity Research
Filipo Sharevski
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 13-22
Closed Access
Filipo Sharevski
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 13-22
Closed Access
Building Cyber Attack Trees with the Help of My LLM? A Mixed Method Study
Joshua Dwight
(2024), pp. 132-138
Closed Access
Joshua Dwight
(2024), pp. 132-138
Closed Access
Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability Metrics
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access
S. Mitra, Qi Zhang, Chen-Wei Chang, et al.
(2024), pp. 442-445
Closed Access
EDUKASI PENGGUNAAN INTERNET DALAM DIPLOMASI DAN UPAYA MENGATASI ANCAMAN KEAMANAN SIBER BAGI MAHASISWA HUBUNGAN INTERNASIONAL UNIVERSITAS TANJUNGPURA
Hardi Alunaza
Jurnal Abdi Insani (2024) Vol. 11, Iss. 2, pp. 1199-1206
Open Access
Hardi Alunaza
Jurnal Abdi Insani (2024) Vol. 11, Iss. 2, pp. 1199-1206
Open Access
Password Managers Use Among Individuals Who Are Visually Impaired: Awareness, Adoption, and Rejection
Nancy Alajarmeh, Richard E. Ladner
International Journal of Human-Computer Interaction (2024), pp. 1-17
Closed Access
Nancy Alajarmeh, Richard E. Ladner
International Journal of Human-Computer Interaction (2024), pp. 1-17
Closed Access
From cyber security to cyber resilience: safeguarding against evolving risks in the digital landscape
Alona Bahmanova, Nataļja Lāce
Deleted Journal (2024)
Closed Access
Alona Bahmanova, Nataļja Lāce
Deleted Journal (2024)
Closed Access
Assessing the Cybersecurity Needs and Experiences of Disabled Users
Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, et al.
IFIP advances in information and communication technology (2024), pp. 355-369
Closed Access
Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, et al.
IFIP advances in information and communication technology (2024), pp. 355-369
Closed Access
Vision Paper: Are Identity Verification Systems Adequately Tailored for Neurodivergent Individuals?
Emanuela Marasco, Nora McDonald, Vivian Genaro Motti
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 1580-1584
Closed Access
Emanuela Marasco, Nora McDonald, Vivian Genaro Motti
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 1580-1584
Closed Access
Design Challenges for Scam Prevention Tools to Protect Neurodiverse and Older Adult Populations
Pragathi Tummala, Hyeonsoo Choi, Anuridhi Gupta, et al.
(2024), pp. 437-441
Closed Access
Pragathi Tummala, Hyeonsoo Choi, Anuridhi Gupta, et al.
(2024), pp. 437-441
Closed Access
Applying Accessibility Metrics to Measure the Threat Landscape for Users with Disabilities
John Breton, AbdelRahman Abdou
(2023)
Open Access | Times Cited: 1
John Breton, AbdelRahman Abdou
(2023)
Open Access | Times Cited: 1
Perceived Online Tax Compliance Measures on Tax Compliance among Online Traders in Kenya
Eric Kiprono, Edwin Kimitei, Collins Kapkiyai
American Journal of Economics and Business Innovation (2023) Vol. 2, Iss. 3, pp. 114-122
Open Access
Eric Kiprono, Edwin Kimitei, Collins Kapkiyai
American Journal of Economics and Business Innovation (2023) Vol. 2, Iss. 3, pp. 114-122
Open Access
Towards Human-Centric Endpoint Security
Jenny Blessing, Partha Das Chowdhury, Maria Sameen, et al.
Lecture notes in computer science (2023), pp. 211-219
Closed Access
Jenny Blessing, Partha Das Chowdhury, Maria Sameen, et al.
Lecture notes in computer science (2023), pp. 211-219
Closed Access
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm
Sri Harsha Mekala, Zubair Baig, Adnan Anwar, et al.
(2023), pp. 32-39
Closed Access
Sri Harsha Mekala, Zubair Baig, Adnan Anwar, et al.
(2023), pp. 32-39
Closed Access
Universal Design for Website Authentication: Views and Experiences of Senior Citizens
Jacques Ophoff, Karen Renaud
(2023), pp. 46-53
Open Access
Jacques Ophoff, Karen Renaud
(2023), pp. 46-53
Open Access
A Network Security Test Evaluation Model of Automobile Digital Key
Baizheng Wang, Qiang Zhang, Shao Wen, et al.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2023), pp. 193-199
Closed Access
Baizheng Wang, Qiang Zhang, Shao Wen, et al.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2023), pp. 193-199
Closed Access