OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Algorithmic extremism? The securitization of artificial intelligence (AI) and its impact on radicalism, polarization and political violence
J. W. Burton
Technology in Society (2023) Vol. 75, pp. 102262-102262
Closed Access | Times Cited: 18

Showing 18 citing articles:

From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 25

The Evolution of Terrorism in the Digital Age: Investigating the Adaptation of Terrorist Groups to Cyber Technologies for Recruitment, Propaganda, and Cyberattacks
Chinasa Susan Adigwe, Nanyeneke Ravana Mayeke, Samuel Oladiipo Olabanji, et al.
Asian Journal of Economics Business and Accounting (2024) Vol. 24, Iss. 3, pp. 289-306
Open Access | Times Cited: 16

Advancements in Natural Language Processing: Implications, Challenges, and Future Directions
Supriyono Supriyono, Aji Prasetya Wibawa, Suyono, et al.
Telematics and Informatics Reports (2024) Vol. 16, pp. 100173-100173
Open Access | Times Cited: 12

Ethical Considerations in Drone Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 10

How Algorithms Promote Self-Radicalization: Audit of TikTok’s Algorithm Using a Reverse Engineering Method
Dong‐Hee Shin, Kulsawasd Jitkajornwanich
Social Science Computer Review (2024) Vol. 42, Iss. 4, pp. 1020-1040
Closed Access | Times Cited: 6

Social avoidance needs boost AI's nonsocial attribute valuation in secret consumption
Jian Li, J. Zhao, Jinsong Huang
Technology in Society (2025), pp. 102817-102817
Closed Access

Unpacking Confirmation Bias in the Digital Age
Patrizia A. Ecker
(2025), pp. 1-19
Closed Access

Bridging Findings and Future Directions: A Comprehensive Discussion
Patrizia A. Ecker
(2025), pp. 75-111
Closed Access

The Ethical and Privacy Implications of Datafication and Digitalization in Developing Country Contexts
Thembekile O. Mayayise
Development (2024)
Closed Access | Times Cited: 2

Mobilizing extremism: an examination of the travel patterns of right-wing extremists in the United States
Jack G. R. Wippell, Sherry Towers
Behavioral Sciences of Terrorism and Political Aggression (2024), pp. 1-18
Open Access

Decoding Algorithm Fatigue: The Role of Algorithmic Literacy, Information Cocoons, and Algorithmic opacity
Hui Yang, Dan Li, Peng Hu
Technology in Society (2024), pp. 102749-102749
Closed Access

Page 1

Scroll to top