
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Learning from cyber security incidents: A systematic review and future research agenda
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2023) Vol. 132, pp. 103309-103309
Open Access | Times Cited: 28
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2023) Vol. 132, pp. 103309-103309
Open Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
“I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2024) Vol. 139, pp. 103699-103699
Open Access | Times Cited: 7
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2024) Vol. 139, pp. 103699-103699
Open Access | Times Cited: 7
Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 201-201
Open Access | Times Cited: 7
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 201-201
Open Access | Times Cited: 7
Understanding Local Government Cybersecurity Policy: A Concept Map and Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Information (2024) Vol. 15, Iss. 6, pp. 342-342
Open Access | Times Cited: 4
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Information (2024) Vol. 15, Iss. 6, pp. 342-342
Open Access | Times Cited: 4
Cybersecurity Expert Perspectives on Data Thieves’ Actions in Digital Environments: Potential Refinements for Routine Activity Theory
Renushka Madarie, Marleen Weulen Kranenbarg, C.J. de Poot
Deviant Behavior (2025), pp. 1-19
Open Access
Renushka Madarie, Marleen Weulen Kranenbarg, C.J. de Poot
Deviant Behavior (2025), pp. 1-19
Open Access
The Efficiency of ICT Suppliers' Product Security Incident Response Teams in Reducing the Risk of Exploitation of Vulnerabilities in the Wild
Vladimir Radunović, Mladen Veinović, Aleksandar Jevremović
Computers & Security (2025), pp. 104388-104388
Closed Access
Vladimir Radunović, Mladen Veinović, Aleksandar Jevremović
Computers & Security (2025), pp. 104388-104388
Closed Access
Analyzing sustainability risks associated with blockchain technology implementation in the sustainable supply chain of construction industry: a fuzzy-based MCDM approach
Zhenjing Gu, Muhammad Irfan, Atul Kumar Singh, et al.
Annals of Operations Research (2025)
Closed Access
Zhenjing Gu, Muhammad Irfan, Atul Kumar Singh, et al.
Annals of Operations Research (2025)
Closed Access
Countermeasure Strategies to Address Cybersecurity Challenges Amidst Major Crises in the Higher Education and Research Sector: An Organisational Learning Perspective
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 3
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 3
A Quantum Image Encryption and Watermarking Algorithm Based on QDCT and Baker map
Nanrun Zhou, Jiawen Wu, Mingxuan Chen, et al.
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 4
Closed Access | Times Cited: 3
Nanrun Zhou, Jiawen Wu, Mingxuan Chen, et al.
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 4
Closed Access | Times Cited: 3
Learning from safety science: A way forward for studying cybersecurity incidents in organizations
Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, et al.
Computers & Security (2023) Vol. 134, pp. 103435-103435
Open Access | Times Cited: 7
Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, et al.
Computers & Security (2023) Vol. 134, pp. 103435-103435
Open Access | Times Cited: 7
A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies
Mohamed Zaoui, Yousra Belfaik, Yassine Sadqi, et al.
IEEE Access (2024) Vol. 12, pp. 72224-72241
Open Access | Times Cited: 2
Mohamed Zaoui, Yousra Belfaik, Yassine Sadqi, et al.
IEEE Access (2024) Vol. 12, pp. 72224-72241
Open Access | Times Cited: 2
Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 2
Shahrukh Mushtaq, Mahmood Shah
Information (2024) Vol. 15, Iss. 10, pp. 619-619
Open Access | Times Cited: 2
Local Government Cybersecurity Analysis: From Policy Review to Policy Framework Formulation
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2024)
Open Access | Times Cited: 1
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2024)
Open Access | Times Cited: 1
Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review
Rodney Adriko, Jason R. C. Nurse
Information and Computer Security (2024) Vol. 32, Iss. 5, pp. 691-710
Open Access | Times Cited: 1
Rodney Adriko, Jason R. C. Nurse
Information and Computer Security (2024) Vol. 32, Iss. 5, pp. 691-710
Open Access | Times Cited: 1
Conducting An Analysis of Maritime Cybersecurity Incidents
Emre Düzenli, Gizem Kayisoglu, Tayfun Acarer, et al.
Turkish Journal of Maritime and Marine Sciences (2024)
Open Access | Times Cited: 1
Emre Düzenli, Gizem Kayisoglu, Tayfun Acarer, et al.
Turkish Journal of Maritime and Marine Sciences (2024)
Open Access | Times Cited: 1
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
Technology Innovation in Tourism Supply Chains: Opportunities and Barriers to Adoption in the Post-COVID World
Sonia Valeria Avilés‐Sacoto, Julie Harrison, José Luis Valencia-Vallejo
Journal of Quality Assurance in Hospitality & Tourism (2023), pp. 1-29
Closed Access | Times Cited: 3
Sonia Valeria Avilés‐Sacoto, Julie Harrison, José Luis Valencia-Vallejo
Journal of Quality Assurance in Hospitality & Tourism (2023), pp. 1-29
Closed Access | Times Cited: 3
A COMPARATIVE ANALYSIS OF INFORMATION SECURITY INCIDENTS IN PUBLIC ADMINISTRATION IN SELECTED EUROPEAN UNION COUNTRIES
Dominika Lisiak-Felicka
Zeszyty Naukowe Uniwersytetu Przyrodniczo-Humanistycznego w Siedlcach Seria Administracja i Zarządzanie (2024) Vol. 61, Iss. 134
Open Access
Dominika Lisiak-Felicka
Zeszyty Naukowe Uniwersytetu Przyrodniczo-Humanistycznego w Siedlcach Seria Administracja i Zarządzanie (2024) Vol. 61, Iss. 134
Open Access
Recommendation on Cybersecurity and Safety in the Hydrogen Economy
Rami Alfasfos, Mehar Ullah, Jani Sillman, et al.
(2024), pp. 1837-1842
Closed Access
Rami Alfasfos, Mehar Ullah, Jani Sillman, et al.
(2024), pp. 1837-1842
Closed Access
Middle Management as a Cyber Risk – a Qualitative Study on Large Cybersecurity Program Internal Communications
Brian Scavotto
(2024)
Closed Access
Brian Scavotto
(2024)
Closed Access
Examining the factors that impact the severity of cyberattacks on critical infrastructures
Yaman Roumani, Mais Alraee
Computers & Security (2024) Vol. 148, pp. 104074-104074
Closed Access
Yaman Roumani, Mais Alraee
Computers & Security (2024) Vol. 148, pp. 104074-104074
Closed Access
Klasifikasi Shellcode Dengan Machine Learning Berbasis Klasifikasi Biner
Jaka Naufal Semendawai, Deris Stiawan, Iwan Pahendra
Jurnal Pendidikan Indonesia (2024) Vol. 5, Iss. 11, pp. 1514-1526
Open Access
Jaka Naufal Semendawai, Deris Stiawan, Iwan Pahendra
Jurnal Pendidikan Indonesia (2024) Vol. 5, Iss. 11, pp. 1514-1526
Open Access
Data management in Polish SMEs in the era of AI – threats and benefits of AI-based tools
Grzegorz Chmielarz
Procedia Computer Science (2024) Vol. 246, pp. 5439-5447
Open Access
Grzegorz Chmielarz
Procedia Computer Science (2024) Vol. 246, pp. 5439-5447
Open Access
Análise bibliométrica sobre a gestão do conhecimento no contexto da segurança cibernética
André Lozano Ferreira, Gilberto Perez
Perspectivas em Gestão & Conhecimento (2024) Vol. 14, Iss. 1, pp. 177-195
Open Access
André Lozano Ferreira, Gilberto Perez
Perspectivas em Gestão & Conhecimento (2024) Vol. 14, Iss. 1, pp. 177-195
Open Access
Data Protection Strategies and Technologies for Ensuring National Financial Security
K. Savchuk, Світлана Рзаєва, Tetiana Savchenko, et al.
Studies in systems, decision and control (2024), pp. 431-440
Closed Access
K. Savchuk, Світлана Рзаєва, Tetiana Savchenko, et al.
Studies in systems, decision and control (2024), pp. 431-440
Closed Access
RedSpear: Re-engineered Discharge (RED) Team Toolkit for Empowerment of Cyber Security
Nidhi Nigam, Mohit Singh Panwar, Vandana Kate, et al.
(2024), pp. 1-8
Closed Access
Nidhi Nigam, Mohit Singh Panwar, Vandana Kate, et al.
(2024), pp. 1-8
Closed Access