OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity Enhancement through Blockchain Training (CEBT) – A serious game approach
A.P. Mittal, Monika Gupta, Manmohan Chaturvedi, et al.
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 1, pp. 100001-100001
Open Access | Times Cited: 53

Showing 1-25 of 53 citing articles:

Applications of text mining in services management: A systematic literature review
Sunil Kumar, Arpan Kumar Kar, P. Vigneswara Ilavarasan
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 1, pp. 100008-100008
Open Access | Times Cited: 257

A review on machine learning techniques for secured cyber-physical systems in smart grid networks
Mohammad Kamrul Hasan, Rabiu Aliyu Abdulkadir, Shayla Islam, et al.
Energy Reports (2024) Vol. 11, pp. 1268-1290
Open Access | Times Cited: 23

How can we predict the impact of the social media messages on the value of cryptocurrency? Insights from big data analytics
Chahat Tandon, Sanjana Rajesh Revankar, Hemant Palivela, et al.
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100035-100035
Open Access | Times Cited: 92

How is Blockchain used in marketing: A review and research agenda
Deepa Jain, Manoj Kumar Dash, Anil Kumar, et al.
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100044-100044
Open Access | Times Cited: 58

Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application
Anokye Acheampong Amponsah, Adebayo Felix Adekoya, Benjamin Asubam Weyori
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 1, pp. 100081-100081
Open Access | Times Cited: 55

Blockchain technology for cybersecurity: A text mining literature analysis
Ravi Prakash, V.S. Anoop, S. Asharaf
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 2, pp. 100112-100112
Open Access | Times Cited: 52

Blockchain and Artificial Intelligence (AI) integration for revolutionizing security and transparency in finance
Nitin Liladhar Rane, Saurabh Choudhary, Jayesh Rane
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 25

LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)
Shekhar Pawar, Hemant Palivela
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 1, pp. 100080-100080
Open Access | Times Cited: 35

Monetisation of digital health data through a GDPR-compliant and blockchain enabled digital health data marketplace: A proposal to enhance patient's engagement with health data repositories
Mohamed A. Maher, Imtiaz Khan, Verma Prikshat
International Journal of Information Management Data Insights (2023) Vol. 3, Iss. 1, pp. 100159-100159
Open Access | Times Cited: 21

Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE)
Asif Ali Wagan, Abdullah Ayub Khan, Yen‐Lin Chen, et al.
Sustainability (2023) Vol. 15, Iss. 6, pp. 5362-5362
Open Access | Times Cited: 21

A blockchain-based data-driven trustworthy approval process system
Sanil S. Gandhi, Arvind W. Kiwelekar, Laxman D. Netak, et al.
International Journal of Information Management Data Insights (2023) Vol. 3, Iss. 1, pp. 100162-100162
Open Access | Times Cited: 20

Adoption and use of digital financial services: A meta analysis of barriers and facilitators
Catarina Neves, Tiago Oliveira, Fernando de Oliveira Santini, et al.
International Journal of Information Management Data Insights (2023) Vol. 3, Iss. 2, pp. 100201-100201
Open Access | Times Cited: 18

The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
Bruno Ramos-Cruz, Javier Andreu-Pérez, Luis Martı́nez
Neurocomputing (2024) Vol. 581, pp. 127427-127427
Open Access | Times Cited: 6

Utilizing a machine learning algorithm to choose a significant traffic identification system
Rajesh Natarajan, Christodoss Prasanna Ranjith, M. Syed Khaja Mohideen, et al.
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 1, pp. 100218-100218
Open Access | Times Cited: 5

An Overview of Blockchain for Industry 5.0: Towards Human-Centric, Sustainable and Resilient Applications
Paula Fraga‐Lamas, Tiago M. Fernández‐Caramés, António Miguel Rosado da Cruz, et al.
IEEE Access (2024) Vol. 12, pp. 116162-116201
Open Access | Times Cited: 5

Innovative Cryptocurrency Trade Websites’ Marketing Strategy Refinement, via Digital Behavior
Δαμιανός Π. Σακάς, Nikolaos T. Giannakopoulos, Νίκος Κανέλλος, et al.
IEEE Access (2022) Vol. 10, pp. 63163-63176
Open Access | Times Cited: 27

Data Trusts as a Service: Providing a platform for multi‐party data sharing
Richard K. Lomotey, Sandra Kumi, Ralph Deters
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 1, pp. 100075-100075
Open Access | Times Cited: 25

Blockchain-Powered Gaming: Bridging Entertainment with Serious Game Objectives
D. Stamatakis, Dimitrios G. Kogias, P. Papadopoulos, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 14-14
Open Access | Times Cited: 4

Promoting Cybersecurity Knowledge via Gamification: An Innovative Intervention Design
B. Fatokun Faith, Zalizah Awang Long, Suraya Hamid
(2024), pp. 1-8
Closed Access | Times Cited: 4

An overview of future cyber security applications using AI and blockchain technology
Ramiz Salama, Chadi Altrjman, Fadi Al‐Turjman
Elsevier eBooks (2024), pp. 1-11
Closed Access | Times Cited: 4

Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Amna Shahzadi, Kashif Ishaq, Naeem A. Nawaz, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2598-e2598
Open Access

Artificial intelligence in educational games and consent under general data protection regulation
Eirini Mougiakou, Spyros Papadimitriou, Konstantina Chrysafiadi, et al.
Intelligent Decision Technologies (2025)
Closed Access

TaxoDaCML: Taxonomy based Divide and Conquer using machine learning approach for DDoS attack classification
Onkar Thorat, Nirali Parekh, Ramchandra Mangrulkar
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100048-100048
Open Access | Times Cited: 29

An exploratory prioritization of factors affecting current state of information security in Pakistani university libraries
Arif Khan, Muhammad bin Ibrahim, Abid Hussain
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100015-100015
Open Access | Times Cited: 24

Harnessing the power of blockchain to strengthen cybersecurity measures: a review
Nidal Turab, Hamza Abu Owida, Jamal Al-Nabulsi
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 35, Iss. 1, pp. 593-593
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top