OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A case analysis of securing organisations against information leakage through online social networking
Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang
International Journal of Information Management (2018) Vol. 43, pp. 351-356
Closed Access | Times Cited: 23

Showing 23 citing articles:

Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence
Angélica Pigola, Priscila Rezende da Costa
Information and Computer Security (2025)
Closed Access

Trade Secret Protection and the Integration of Information Within Firms
Ionela Andreicovici, Sara Bormann, Katharina Hombach
Management Science (2024)
Closed Access | Times Cited: 2

Knowledge leakage through social networks: a review of existing gaps, strategies for mitigating potential risk factors and future research direction
Adobi Jessica Timiyo, Samuel Foli
VINE Journal of Information and Knowledge Management Systems (2023)
Closed Access | Times Cited: 6

Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study
Emma Nicol, Jo Briggs, Wendy Moncur, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. CSCW2, pp. 1-25
Open Access | Times Cited: 8

Enhancing cybersecurity capability investments: Evidence from an experiment
Angélica Pigola, Priscila Rezende da Costa, Marcos Ferasso, et al.
Technology in Society (2023) Vol. 76, pp. 102449-102449
Closed Access | Times Cited: 3

Evaluating Advanced Persistent Threats Mitigation Effects:A Review
Oluwasegun Ishaya Adelaiye, Aminat A. Showole, Silas Ageebee Faki
International Journal of Information Security Science (2018) Vol. 7, Iss. 4, pp. 159-171
Closed Access | Times Cited: 8

Insight into hackers’ reaction toward information security breach
Siew H. Chan, Suparak Janjarasjit
International Journal of Information Management (2019) Vol. 49, pp. 388-396
Closed Access | Times Cited: 8

BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Organizational Computing and Electronic Commerce (2021) Vol. 31, Iss. 4, pp. 320-342
Closed Access | Times Cited: 7

Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison
Moneer Alshaikh, Shanton Chang, Atif Ahmad, et al.
Security Journal (2022) Vol. 36, Iss. 3, pp. 530-557
Closed Access | Times Cited: 4

A Deep Dive Into Cybersecurity Risk Assessment and Countermeasures in Online Social Networks
A. Zineddine, Yousra Belfaik, Yassine Sadqi
Advances in IT standards and standardization research (AISSR) book series/Advances in IT standards and standardization research series (2024), pp. 1-19
Closed Access

Study on Vulnerability in Online Social Networking
Sukrati Agrawal, Hare Ram Sah
(2024), pp. 27-46
Closed Access

Using Social Media in Projects: Information Management Challenges and Recommendations
Jiwat Ram
Journal of Computer Information Systems (2023) Vol. 64, Iss. 2, pp. 187-203
Closed Access | Times Cited: 1

A linear discriminant analysis-based algorithm for identifying anomalous traffic in large-scale networks
Qiubing Wu, Xiaofeng Zhao
Applied Mathematics and Nonlinear Sciences (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 1

Trade Secret Protection and Firms’ Internal Transparency
Ionela Andreicovici, Sara Bormann, Katharina Hombach
SSRN Electronic Journal (2021)
Closed Access | Times Cited: 2

Management Policies for the Prevention Technique of Social Engineering (SoE) Attacks in the Organization
Nik Zulkarnaen Khidzir, Abdullah-Al Musa, Tan Tse Guan
SSRN Electronic Journal (2019)
Closed Access | Times Cited: 1

Exploring Critical Challenges and Factors Influencing E-Learning Systems Security During COVID-19 Pandemic
Abdulaziz Aborujilah, Elham Yahya Al-Alawi, Dawood Al-Hidabi, et al.
(2022) Vol. 6, pp. 1-5
Closed Access | Times Cited: 1

Reaction of users as potential victims of information security breach
Suparak Janjarasjit, Siew H. Chan
Information and Computer Security (2021) Vol. 29, Iss. 1, pp. 187-206
Closed Access | Times Cited: 1

Social Media Technologies: An Important Factor of the Loss of Critical Thinking Ability
Lin Zi
Lecture Notes in Education Psychology and Public Media (2023) Vol. 2, Iss. 1, pp. 361-367
Open Access

A Trade Secrets Framework and Strategic Approaches
Oleksandra Ozcan, David Pickernell, Paul Trott
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10200-10216
Closed Access

INFORMATION SECURITY GOVERNANCE ISSUES IN MALAYSIAN GOVERNMENT SECTOR
Shuhaili Talib, Rufizah Abdul Munir, Nurul Nuha Abdul Molok, et al.
Deleted Journal (2023) Vol. 5, Iss. 2, pp. 1-18
Open Access

On the Alert for Share Price Manipulation and Inadvertent Disclosure in Social Media Channels
Darren P. Ingram
Advances in media, entertainment and the arts (AMEA) book series (2019), pp. 265-280
Closed Access

Common Programming Mistakes Leading to Information Disclosure: A Preliminary Study
Gowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, et al.
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (2022), pp. 743-747
Closed Access

Page 1

Scroll to top