
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Unlocking the potential of cybersecurity behavior in the metaverse: Overview, opportunities, challenges, and future research agendas
Mostafa Al‐Emran, Muhammet Deveci
Technology in Society (2024) Vol. 77, pp. 102498-102498
Closed Access | Times Cited: 14
Mostafa Al‐Emran, Muhammet Deveci
Technology in Society (2024) Vol. 77, pp. 102498-102498
Closed Access | Times Cited: 14
Showing 14 citing articles:
Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 5
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 5
Modeling barriers to the adoption of metaverse in the construction industry: An application of fuzzy-DEMATEL approach
Muhammad Irfan, Abishek Rauniyar, Jin Hu, et al.
Applied Soft Computing (2024), pp. 112180-112180
Closed Access | Times Cited: 5
Muhammad Irfan, Abishek Rauniyar, Jin Hu, et al.
Applied Soft Computing (2024), pp. 112180-112180
Closed Access | Times Cited: 5
Geothermal Reservoir Engineering: Optimizing Heat Extraction Techniques
A.S. Vickram, S Manikandan, A. Saravanan, et al.
(2025)
Closed Access
A.S. Vickram, S Manikandan, A. Saravanan, et al.
(2025)
Closed Access
Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
Exploring the nexus of institutional factors and regulatory focus in driving platform-based servitization and circular economy adoption
Sayed Kifayat Shah, Jingbo Yuan, Kayhan Tajeddini, et al.
Technology in Society (2025), pp. 102854-102854
Closed Access
Sayed Kifayat Shah, Jingbo Yuan, Kayhan Tajeddini, et al.
Technology in Society (2025), pp. 102854-102854
Closed Access
Key Factors for the Implementation of the Metaverse in Spanish Ports: An Evaluation Based on a Prioritization Matrix
Nicoletta González–Cancelas, Javier Vaca-Cabrero, Alberto Camarero Orive
Sustainability (2025) Vol. 17, Iss. 5, pp. 2205-2205
Open Access
Nicoletta González–Cancelas, Javier Vaca-Cabrero, Alberto Camarero Orive
Sustainability (2025) Vol. 17, Iss. 5, pp. 2205-2205
Open Access
Drivers of metaverse adoption for enhancing marketing capabilities of retail SMEs
Anis ur Rehman, Rajat Kumar Behera, Md. Saiful Islam, et al.
Technology in Society (2024) Vol. 79, pp. 102704-102704
Closed Access | Times Cited: 4
Anis ur Rehman, Rajat Kumar Behera, Md. Saiful Islam, et al.
Technology in Society (2024) Vol. 79, pp. 102704-102704
Closed Access | Times Cited: 4
Metaverse Security Paradigms
Sreerakuvandana Sreerakuvandana, Princy Pappachan, Ritika Bansal
Advances in information security, privacy, and ethics book series (2024), pp. 228-252
Closed Access | Times Cited: 1
Sreerakuvandana Sreerakuvandana, Princy Pappachan, Ritika Bansal
Advances in information security, privacy, and ethics book series (2024), pp. 228-252
Closed Access | Times Cited: 1
Cybersecurity Threats and Mitigation Measures in Agriculture 4.0 and 5.0
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis, et al.
Smart Agricultural Technology (2024), pp. 100616-100616
Open Access | Times Cited: 1
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis, et al.
Smart Agricultural Technology (2024), pp. 100616-100616
Open Access | Times Cited: 1
Digitalisation and Cybersecurity: Towards an Operational Framework
Bilgin Metin, Fatma Gül Özhan, Martín Wynn
Electronics (2024) Vol. 13, Iss. 21, pp. 4226-4226
Open Access | Times Cited: 1
Bilgin Metin, Fatma Gül Özhan, Martín Wynn
Electronics (2024) Vol. 13, Iss. 21, pp. 4226-4226
Open Access | Times Cited: 1
Exploring the Impact of Perceived Usefulness and Enjoyment to Enhance Intention to Use and Satisfaction among Metaverse Travellers
Amron Amron, Ali Mursid, Entot Suhartono
Journal of Ecohumanism (2024) Vol. 3, Iss. 8
Closed Access | Times Cited: 1
Amron Amron, Ali Mursid, Entot Suhartono
Journal of Ecohumanism (2024) Vol. 3, Iss. 8
Closed Access | Times Cited: 1
Digital Twin-Based Alternate Ego Modeling and Simulation: Eva Herzigová as a 3D MetaHuman Avatar
George Lăzăroiu, Tom Gedeon, Danuta Szpilko, et al.
Engineering Management in Production and Services (2024) Vol. 16, Iss. 3, pp. 1-14
Open Access
George Lăzăroiu, Tom Gedeon, Danuta Szpilko, et al.
Engineering Management in Production and Services (2024) Vol. 16, Iss. 3, pp. 1-14
Open Access
Infrastructure and Network Security
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
Determinants of Users’ Cybersecurity Behavior in the Metaverse: A Deep Learning-Based Hybrid SEM-ANN Approach
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
International Journal of Human-Computer Interaction (2024), pp. 1-18
Closed Access
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
International Journal of Human-Computer Interaction (2024), pp. 1-18
Closed Access