OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective
Asier Moneva, Rutger Leukfeldt, Steve van de Weijer, et al.
Computers in Human Behavior (2021) Vol. 126, pp. 106984-106984
Open Access | Times Cited: 18

Showing 18 citing articles:

A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
May Almousa, Mohd Anwar
IEEE Access (2023) Vol. 11, pp. 10654-10663
Open Access | Times Cited: 10

Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database
Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence and Cybercrime (2023) Vol. 6, Iss. 1, pp. 5-28
Open Access | Times Cited: 10

In their own words: deception detection by victims and near victims of fraud
Marianne Junger, Luka Koning, Pieter Hartel, et al.
Frontiers in Psychology (2023) Vol. 14
Open Access | Times Cited: 9

Criminal expertise and hacking efficiency
Asier Moneva, Stijn Ruiter, Daniël Meinsma
Computers in Human Behavior (2024) Vol. 155, pp. 108180-108180
Open Access | Times Cited: 2

Website Defacement Detection and Monitoring Methods: A Review
Mariam Albalawi, Rasha Aloufi, Norah Alamrani, et al.
Electronics (2022) Vol. 11, Iss. 21, pp. 3573-3573
Open Access | Times Cited: 12

Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set
Elrasheed Ismail Mohommoud Zayid, Ibrahim Isah, Nadir Farah, et al.
International Journal of Computers and Informatics (2024) Vol. 3, Iss. 3, pp. 9-41
Open Access | Times Cited: 1

Offending Concentration on the Internet: An Exploratory Analysis of Bitcoin-related Cybercrime
David Buil‐Gil, Patricia Saldaña-Taboada
Deviant Behavior (2021) Vol. 43, Iss. 12, pp. 1453-1470
Closed Access | Times Cited: 10

Digital Trends of Criminology and Criminal Justice of the 21st Century
Mehrdad Rayejian Asli
Journal of Digital Technologies and Law (2023) Vol. 1, Iss. 1, pp. 235-250
Open Access | Times Cited: 3

Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database
Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence and Cybercrime (2023)
Open Access | Times Cited: 2

Fieldwork Experiences Researching Cybercriminals
Asier Moneva, Rutger Leukfeldt, Marco Romagna
Springer eBooks (2023), pp. 511-533
Closed Access | Times Cited: 2

Criminal Expertise and Hacking Efficiency
Asier Moneva, Stijn Ruiter, Daniël Meinsma
(2023)
Open Access | Times Cited: 1

Convergence of Traditional and Online Property Crime Victimization in a City with Little Offline Crime
Riccardo Milani, Lorena Molnar, Stefano Caneppele, et al.
Victims & Offenders (2022) Vol. 17, Iss. 6, pp. 813-830
Open Access | Times Cited: 2

Mobile Applications for Cybercrime Prevention: A Comprehensive Systematic Review
Irma Huamanñahui Chipa, Javier Gamboa-Cruzado, Jimmy Ramirez
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 10
Open Access | Times Cited: 2

Fieldwork Experiences Researching Cybercriminals
Asier Moneva, Rutger Leukfeldt, Marco Romagna
(2023)
Open Access

Prediction of Victimization Based on Emotional Intelligent with Mediating Role of Loneliness and Empathy: A Structural Equation Modeling Approach
Afzal Akbari Balootbangan, Azadeh Mahvelaty, Zakiyeh Zamani, et al.
Iranian Journal of Psychiatry and Behavioral Sciences (2023) Vol. 17, Iss. 2
Open Access

Algorithms, Users
Betsy Van der Veer Martens
Synthesis lectures on information concepts, retrieval, and services (2023), pp. 141-154
Closed Access

What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices?
Magdalene Ng, Maria Bada, Kovila Coopamootoo
(2023), pp. 659-672
Closed Access

Page 1

Scroll to top