OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evolutionary cyber-psychology: Applying an evolutionary framework to Internet behavior
Jared Piazza, Jesse M. Bering
Computers in Human Behavior (2009) Vol. 25, Iss. 6, pp. 1258-1269
Closed Access | Times Cited: 69

Showing 1-25 of 69 citing articles:

Cyberbullying in adolescents: Modalities and aggressors’ profile
Esther Calvete, Izaskun Orue, Ana Estévez, et al.
Computers in Human Behavior (2010) Vol. 26, Iss. 5, pp. 1128-1135
Closed Access | Times Cited: 655

Who does what on Facebook? Age, sex, and relationship status as predictors of Facebook use
Francis T. McAndrew, Hye Sun Jeong
Computers in Human Behavior (2012) Vol. 28, Iss. 6, pp. 2359-2365
Closed Access | Times Cited: 402

The Impact of Cyberbullying and Social Bullying on Optimism, Global and School-Related Happiness and Life Satisfaction Among 10-12-year-old Schoolchildren
Raúl Navarro, Roberto Ruiz-Oliva, Elisa Larrañaga Rubio, et al.
Applied Research in Quality of Life (2013) Vol. 10, Iss. 1, pp. 15-36
Closed Access | Times Cited: 134

Cyberbullying at work: The mediating role of optimism between cyberbullying and job outcomes
Robyn Snyman, Jennifer Loh
Computers in Human Behavior (2015) Vol. 53, pp. 161-168
Closed Access | Times Cited: 96

Revealing only the superficial me: Exploring categorical self-disclosure online
Alison Attrill, Rahul Jalil
Computers in Human Behavior (2011) Vol. 27, Iss. 5, pp. 1634-1642
Closed Access | Times Cited: 85

Beyond the Words
Honghao Wei, Fuzheng Zhang, Nicholas Jing Yuan, et al.
(2017)
Open Access | Times Cited: 83

Psychosocial Risk Factors for Involvement in Bullying Behaviors: Empirical Comparison Between Cyberbullying and Social Bullying Victims and Bullies
Raúl Navarro, Santiago Yubero Jiménez, Elisa Larrañaga Rubio
School Mental Health (2015) Vol. 7, Iss. 4, pp. 235-248
Closed Access | Times Cited: 76

Cyber and school bullying: Same or different phenomena?
Nafsika Antoniadou, Constantinos M. Kokkinos
Aggression and Violent Behavior (2015) Vol. 25, pp. 363-372
Closed Access | Times Cited: 74

Facebook use depending on age: The influence of social comparisons
Phillip Ozimek, Hans‐Werner Bierhoff
Computers in Human Behavior (2016) Vol. 61, pp. 271-279
Closed Access | Times Cited: 72

Gender Differences Between Student–Student Relationship and Cyberbullying Perpetration: An Evolutionary Perspective
Pengcheng Wang, Xingchao Wang, Li Lei
Journal of Interpersonal Violence (2019) Vol. 36, Iss. 19-20, pp. 9187-9207
Closed Access | Times Cited: 53

A Comparison of Conventional and Technology-Mediated Selection Interviews With Regard to Interviewees’ Performance, Perceptions, Strain, and Anxiety
Klaus G. Melchers, Amadeus Petrig, Johannes M. Basch, et al.
Frontiers in Psychology (2021) Vol. 11
Open Access | Times Cited: 33

The relation between use intensity of private and professional SNS, social comparison, self-esteem, and depressive tendencies in the light of self-regulation
Gabriel Brandenberg, Phillip Ozimek, Hans‐Werner Bierhoff, et al.
Behaviour and Information Technology (2018) Vol. 38, Iss. 6, pp. 578-591
Closed Access | Times Cited: 39

Social Media Ills and Evolutionary Mismatches: A Conceptual Framework
Amy J. Lim, Edison Tan
Evolutionary Psychological Science (2024) Vol. 10, Iss. 3, pp. 212-235
Open Access | Times Cited: 4

Social media and aggression
Rosanna E. Guadagno
Elsevier eBooks (2025), pp. 169-188
Closed Access

The influence of reputational concerns on purchase intention of fair-trade foods among young Japanese adults
Atsushi Kimura, Naoki Mukawa, Mana Yamamoto, et al.
Food Quality and Preference (2012) Vol. 26, Iss. 2, pp. 204-210
Closed Access | Times Cited: 39

Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying
V. Skye Wingate, Jessy A. Minney, Rosanna E. Guadagno
Social Influence (2012) Vol. 8, Iss. 2-3, pp. 87-106
Open Access | Times Cited: 39

The Human Alarm System for Sensational News, Online News Headlines, and Associated Generic Digital Footprints: A Uses and Gratifications Approach
Yu-Leung Ng, Xinshu Zhao
Communication Research (2018) Vol. 47, Iss. 2, pp. 251-275
Closed Access | Times Cited: 30

I wanted you to know: Breast cancer survivors’ control of workplace communication about cancer.
Lynne Robinson, Lucie Kocum, Catherine Loughlin, et al.
Journal of Occupational Health Psychology (2015) Vol. 20, Iss. 4, pp. 446-456
Closed Access | Times Cited: 29

Swiping right: face perception in the age of Tinder
Antonio Olivera‐La Rosa, Olber Eduardo Arango Tobón, Gordon P. D. Ingram
Heliyon (2019) Vol. 5, Iss. 12, pp. e02949-e02949
Open Access | Times Cited: 24

BullyBlocker: toward an interdisciplinary approach to identify cyberbullying
Yasin N. Silva, Deborah L. Hall, Christopher Rich
Social Network Analysis and Mining (2018) Vol. 8, Iss. 1
Closed Access | Times Cited: 21

Understanding digital dating abuse from an evolutionary perspective: Further evidence for the role of mate value discrepancy
Manpal Singh Bhogal, Courtney Rhead, Courtney Tudor
Personality and Individual Differences (2019) Vol. 151, pp. 109552-109552
Open Access | Times Cited: 20

Hunters and Gatherers of Pictures: Why Photography Has Become a Human Universal
Leopold Kislinger, Kurt Kotrschal
Frontiers in Psychology (2021) Vol. 12
Open Access | Times Cited: 17

Explaining and critiquing the postnormal: A warning against ideologies in the field of futures and foresight
Alessandro Fergnani
Futures & Foresight Science (2023) Vol. 5, Iss. 3-4
Open Access | Times Cited: 6

BullyBlocker: Towards the identification of cyberbullying in social networking sites
Yasin N. Silva, Christopher Rich, Deborah L. Hall
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2016), pp. 1377-1379
Closed Access | Times Cited: 19

Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space
Frank J. Stech, Kristin E. Heckman, Phil Hilliard, et al.
Psychnology (2011) Vol. 9, pp. 79-122
Closed Access | Times Cited: 16

Page 1 - Next Page

Scroll to top