
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Unravelling the three lines model in cybersecurity: a systematic literature review
Bert Valkenburg, Ivano Bongiovanni
Computers & Security (2024) Vol. 139, pp. 103708-103708
Open Access | Times Cited: 5
Bert Valkenburg, Ivano Bongiovanni
Computers & Security (2024) Vol. 139, pp. 103708-103708
Open Access | Times Cited: 5
Showing 5 citing articles:
Understanding the Chief Information Security Officer: Qualifications and Responsibilities for Cybersecurity Leadership
Christopher A. Ramezan
Computers & Security (2025), pp. 104363-104363
Closed Access
Christopher A. Ramezan
Computers & Security (2025), pp. 104363-104363
Closed Access
Ciberseguridad en la industria marítima: un análisis de las amenazas y desafíos emergentes
Alexander Palma-Chipana, Juan Villantoy-Echegaray, Javier Ccapcha-Cabrera, et al.
DYNA (2024) Vol. 91, Iss. 234, pp. 157-162
Open Access
Alexander Palma-Chipana, Juan Villantoy-Echegaray, Javier Ccapcha-Cabrera, et al.
DYNA (2024) Vol. 91, Iss. 234, pp. 157-162
Open Access
Opportunities and Challenges of Digital Audits and Compliance
Siriyama Kanthi Herath, Laksitha Maheshi Herath, Jae Koo Yoo
Advances in finance, accounting, and economics book series (2024), pp. 1-35
Closed Access
Siriyama Kanthi Herath, Laksitha Maheshi Herath, Jae Koo Yoo
Advances in finance, accounting, and economics book series (2024), pp. 1-35
Closed Access
Protecting the Play: An Integrative Review of Cybersecurity in and for Sports Events
Ivano Bongiovanni, David M. Herold, Simon J Wilde
Computers & Security (2024) Vol. 146, pp. 104064-104064
Open Access
Ivano Bongiovanni, David M. Herold, Simon J Wilde
Computers & Security (2024) Vol. 146, pp. 104064-104064
Open Access
Securing IoT Devices Using Generative AI Techniques
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Ali Abdulhabeb, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 219-264
Closed Access
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Ali Abdulhabeb, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 219-264
Closed Access