
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Contextual security awareness: A context-based approach for assessing the security awareness of users
Adir Solomon, Michael Michaelshvili, Ron Bitton, et al.
Knowledge-Based Systems (2022) Vol. 246, pp. 108709-108709
Closed Access | Times Cited: 25
Adir Solomon, Michael Michaelshvili, Ron Bitton, et al.
Knowledge-Based Systems (2022) Vol. 246, pp. 108709-108709
Closed Access | Times Cited: 25
Showing 25 citing articles:
Artificial Intelligence Trust, Risk and Security Management (AI TRiSM): Frameworks, applications, challenges and future research directions
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 135
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 135
The Threat of Offensive AI to Organizations
Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, et al.
Computers & Security (2022) Vol. 124, pp. 103006-103006
Open Access | Times Cited: 46
Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, et al.
Computers & Security (2022) Vol. 124, pp. 103006-103006
Open Access | Times Cited: 46
A systematic literature review of cybersecurity scales assessing information security awareness
Rohani Rohan, Debajyoti Pal, Jari Hautamäki, et al.
Heliyon (2023) Vol. 9, Iss. 3, pp. e14234-e14234
Open Access | Times Cited: 26
Rohani Rohan, Debajyoti Pal, Jari Hautamäki, et al.
Heliyon (2023) Vol. 9, Iss. 3, pp. e14234-e14234
Open Access | Times Cited: 26
Situation-Aware Malware Detection on Windows OS Based on Environmental Information
Wojtek Tomaszewski, Aneta Brzeźniak
(2024)
Open Access | Times Cited: 7
Wojtek Tomaszewski, Aneta Brzeźniak
(2024)
Open Access | Times Cited: 7
Situational Aware Access Control to Prevent Android Malware
Krzysiek Skalski, Katarzyna Dombrokova, Wojciech Szczawinski
(2024)
Open Access | Times Cited: 6
Krzysiek Skalski, Katarzyna Dombrokova, Wojciech Szczawinski
(2024)
Open Access | Times Cited: 6
Inferring travel time preferences through a contextual feature fusion approach
Adir Solomon, Johannes De Smedt, Monique Snoeck
Travel Behaviour and Society (2025) Vol. 40, pp. 101023-101023
Closed Access
Adir Solomon, Johannes De Smedt, Monique Snoeck
Travel Behaviour and Society (2025) Vol. 40, pp. 101023-101023
Closed Access
An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity
Gianluigi Folino, Carla Otranto Godano, Francesco Sergio Pisani
The Journal of Supercomputing (2023) Vol. 79, Iss. 11, pp. 11660-11683
Open Access | Times Cited: 13
Gianluigi Folino, Carla Otranto Godano, Francesco Sergio Pisani
The Journal of Supercomputing (2023) Vol. 79, Iss. 11, pp. 11660-11683
Open Access | Times Cited: 13
SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective
Faiza Tazi, Archana Nandakumar, Josiah Dykstra, et al.
ACM Transactions on Computing for Healthcare (2024) Vol. 5, Iss. 2, pp. 1-31
Open Access | Times Cited: 4
Faiza Tazi, Archana Nandakumar, Josiah Dykstra, et al.
ACM Transactions on Computing for Healthcare (2024) Vol. 5, Iss. 2, pp. 1-31
Open Access | Times Cited: 4
Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior
Bader Alkhazi, Moneer Alshaikh, Sulaiman Alkhezi, et al.
IEEE Access (2022) Vol. 10, pp. 132132-132143
Open Access | Times Cited: 14
Bader Alkhazi, Moneer Alshaikh, Sulaiman Alkhezi, et al.
IEEE Access (2022) Vol. 10, pp. 132132-132143
Open Access | Times Cited: 14
CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems
Ron Bitton, Nadav Maman, Inderjeet Singh, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-36
Open Access | Times Cited: 11
Ron Bitton, Nadav Maman, Inderjeet Singh, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-36
Open Access | Times Cited: 11
Towards a Framework for the Personalization of Cybersecurity Awareness
Saud S. Alotaibi, Steven Furnell, Ying He
IFIP advances in information and communication technology (2023), pp. 143-153
Closed Access | Times Cited: 6
Saud S. Alotaibi, Steven Furnell, Ying He
IFIP advances in information and communication technology (2023), pp. 143-153
Closed Access | Times Cited: 6
Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks
Keyong Wang, X. Mona Guo, Dequan Yang
Electronics (2022) Vol. 11, Iss. 10, pp. 1659-1659
Open Access | Times Cited: 4
Keyong Wang, X. Mona Guo, Dequan Yang
Electronics (2022) Vol. 11, Iss. 10, pp. 1659-1659
Open Access | Times Cited: 4
Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001:2013: A Case Study of XYZ Financial Institution
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 2
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 2
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Ofir Cohen, Ron Bitton, Asaf Shabtai, et al.
Lecture notes in computer science (2024), pp. 431-451
Closed Access
Ofir Cohen, Ron Bitton, Asaf Shabtai, et al.
Lecture notes in computer science (2024), pp. 431-451
Closed Access
Thoughts on the Place and Role of Cybersecurity Awareness
Imre Dobák, Sándor Magyar
Advanced sciences and technologies for security applications (2024), pp. 411-419
Closed Access
Imre Dobák, Sándor Magyar
Advanced sciences and technologies for security applications (2024), pp. 411-419
Closed Access
Information Security Awareness Literature Review: Focus Area for Measurement Instruments
Muhamad Rizal, Bambang Setiawan
Procedia Computer Science (2024) Vol. 234, pp. 1420-1427
Open Access
Muhamad Rizal, Bambang Setiawan
Procedia Computer Science (2024) Vol. 234, pp. 1420-1427
Open Access
Information Security Awareness in Sub-Saharan African Schools: The Role of Educational Leadership in Turbulent Times
Mboneza Kabanda
IntechOpen eBooks (2024)
Open Access
Mboneza Kabanda
IntechOpen eBooks (2024)
Open Access
Investigating the Relationship Between Personality Traits and Information Security Awareness
January F. Naga, Mia Amor C. Tinam-isan, Melody Mae O. Maluya, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1233-1246
Open Access
January F. Naga, Mia Amor C. Tinam-isan, Melody Mae O. Maluya, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1233-1246
Open Access
Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment
Dennik Baltuttis, Timm Teubner
Computers & Security (2024) Vol. 144, pp. 103940-103940
Open Access
Dennik Baltuttis, Timm Teubner
Computers & Security (2024) Vol. 144, pp. 103940-103940
Open Access
A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg
Information and Computer Security (2024)
Closed Access
Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg
Information and Computer Security (2024)
Closed Access
Data-Driven Insights for Strengthening Information Security Awareness in Higher Education Institutions
January Febro Naga, Ma. Rowena Raguin Caguiat
Lecture notes in electrical engineering (2024), pp. 251-270
Closed Access
January Febro Naga, Ma. Rowena Raguin Caguiat
Lecture notes in electrical engineering (2024), pp. 251-270
Closed Access
A Scalable Cybersecurity Framework for Anomaly Detection in User Behaviour
Gianluigi Folino, Carla Otranto Godano, Francesco Sergio Pisani
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Gianluigi Folino, Carla Otranto Godano, Francesco Sergio Pisani
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Systematic Literature Review: Information security behaviour on smartphone users
Ferdinand Jilan Dawie, Mohamad Noorman Masrek, Safawi Abdul Rahman
Environment-Behaviour Proceedings Journal (2022) Vol. 7, Iss. SI10, pp. 275-281
Open Access | Times Cited: 1
Ferdinand Jilan Dawie, Mohamad Noorman Masrek, Safawi Abdul Rahman
Environment-Behaviour Proceedings Journal (2022) Vol. 7, Iss. SI10, pp. 275-281
Open Access | Times Cited: 1
A systematic literature review of mitigating cyber security risk
Syafila Kamarudin, Lian Tang, Jusang Bolong, et al.
Quality & Quantity (2023) Vol. 58, Iss. 4, pp. 3251-3273
Closed Access
Syafila Kamarudin, Lian Tang, Jusang Bolong, et al.
Quality & Quantity (2023) Vol. 58, Iss. 4, pp. 3251-3273
Closed Access