
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 8
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 8
Showing 8 citing articles:
Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Understanding determinants of GenAI usage and its effect on SCM performance using dynamic capability view
Hemlata Gangwar, Mohammad Shameem, Sarjita Tusharbhai Patel, et al.
Industrial Management & Data Systems (2025)
Closed Access
Hemlata Gangwar, Mohammad Shameem, Sarjita Tusharbhai Patel, et al.
Industrial Management & Data Systems (2025)
Closed Access
Insider threat mitigation: Systematic literature review
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 2
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 2
The insider threat ‘zoo’
Karen Renaud, Merrill Warkentin
Computer Fraud & Security (2024) Vol. 2024, Iss. 5
Closed Access
Karen Renaud, Merrill Warkentin
Computer Fraud & Security (2024) Vol. 2024, Iss. 5
Closed Access
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access
Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review
Ayshwarya Jaiswal, Pragya Dwivedi, Rupesh Kumar Dewang
Multimedia Tools and Applications (2024)
Closed Access
Ayshwarya Jaiswal, Pragya Dwivedi, Rupesh Kumar Dewang
Multimedia Tools and Applications (2024)
Closed Access
Insider Threat Detection Within Operational Technology Using Digital Twins
Andrei Petrovski, Igor Kotenko, Murshedul Arifeen, et al.
Lecture notes in networks and systems (2024), pp. 25-34
Closed Access
Andrei Petrovski, Igor Kotenko, Murshedul Arifeen, et al.
Lecture notes in networks and systems (2024), pp. 25-34
Closed Access
Application of machine learning methods to counter insider threat to information security
Vladislav Alexandrovich Strizhkov
Вопросы безопасности (2023), Iss. 4, pp. 152-165
Open Access | Times Cited: 1
Vladislav Alexandrovich Strizhkov
Вопросы безопасности (2023), Iss. 4, pp. 152-165
Open Access | Times Cited: 1