OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
Abdullah Algarni, Yue Xu, Taizan Chan
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 661-687
Open Access | Times Cited: 60

Showing 1-25 of 60 citing articles:

A multi-level influence model of COVID-19 themed cybercrime
Rennie Naidoo
European Journal of Information Systems (2020) Vol. 29, Iss. 3, pp. 306-321
Open Access | Times Cited: 153

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151

Susceptibility to phishing on social network sites: A personality information processing model
Edwin Donald Frauenstein, Stephen Flowerday
Computers & Security (2020) Vol. 94, pp. 101862-101862
Open Access | Times Cited: 103

Social Engineering Attacks During the COVID-19 Pandemic
Sushruth Venkatesha, KR Reddy, B. R. Chandavarkar
SN Computer Science (2021) Vol. 2, Iss. 2
Open Access | Times Cited: 75

Social Engineering Attacks Prevention: A Systematic Literature Review
Wenni Syafitri, Zarina Shukur, Umi Asma’ Mokhtar, et al.
IEEE Access (2022) Vol. 10, pp. 39325-39343
Open Access | Times Cited: 67

DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble
Fidelis Obukohwo Aghware, Rume Elizabeth Yoro, Patrick Ogholuwarami Ejeh, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 23

Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection
Fidelis Obukohwo Aghware, Arnold Adimabua Ojugo, Wilfred Adigwe, et al.
Journal of Computing Theories and Applications (2024) Vol. 1, Iss. 4, pp. 407-420
Open Access | Times Cited: 12

Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 97-117
Closed Access | Times Cited: 1

User characteristics that influence judgment of social engineering attacks in social networks
Samar Muslah Albladi, George R. S. Weir
Human-centric Computing and Information Sciences (2018) Vol. 8, Iss. 1
Open Access | Times Cited: 74

Eyes wide open: The role of situational information security awareness for security‐related behaviour
Lennart Jaeger, Andreas Eckhardt
Information Systems Journal (2020) Vol. 31, Iss. 3, pp. 429-472
Closed Access | Times Cited: 65

Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
Arnold Adimabua Ojugo, Maureen Ifeanyi Akazue, Patrick Ogholuwarami Ejeh, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 50-60
Open Access | Times Cited: 17

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

Predicting individuals’ vulnerability to social engineering in social networks
Samar Muslah Albladi, George R. S. Weir
Cybersecurity (2020) Vol. 3, Iss. 1
Open Access | Times Cited: 44

InstaTrust or InstaTrap: How Relationships and Developmental Tasks Affect Young Adults’ Phishing Susceptibility on Instagram
Jennifer Klütsch, Luise Haehn, Annika Kreuder, et al.
International Journal of Human-Computer Studies (2025), pp. 103456-103456
Open Access

Research trends in cybercrime victimization during 2010–2020: a bibliometric analysis
Huong Thi Ngoc Ho, Hai Thanh Luong
SN Social Sciences (2022) Vol. 2, Iss. 1
Open Access | Times Cited: 21

Cognition in Social Engineering Empirical Research: A Systematic Literature Review
Pavlo Burda, Luca Allodi, Nicola Zannone
ACM Transactions on Computer-Human Interaction (2023) Vol. 31, Iss. 2, pp. 1-55
Open Access | Times Cited: 9

The Use of AI to Analyze Social Media Attacks for Predictive Analytics
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Journal of Computing Theories and Applications (2024) Vol. 1, Iss. 4, pp. 386-395
Open Access | Times Cited: 3

The Dark Side of Using Online Social Networks
Layla Boroon, Babak Abedin, Eila Erfani
Journal of Global Information Management (2021) Vol. 29, Iss. 6, pp. 1-21
Open Access | Times Cited: 20

The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15

How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7

Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 2

Phishing: message appraisal and the exploration of fear and self-confidence
Deanna House, M. K. Raja
Behaviour and Information Technology (2019) Vol. 39, Iss. 11, pp. 1204-1224
Closed Access | Times Cited: 20

Does Awareness of Social Engineering Make Employees More Secure?
Hussain Aldawood, Tawfiq Alashoor, Geoff Skinner
International Journal of Computer Applications (2020) Vol. 177, Iss. 38, pp. 45-49
Open Access | Times Cited: 18

Social engineering in metaverse environment
Miaolei Deng, Haonan Zhai, Kai Yang
(2023), pp. 150-154
Closed Access | Times Cited: 5

An Approach to Estimating of Criticality of Social Engineering Attacks Traces
Anastasiia Khlobystova, Maxim V. Abramov, Alexander Lvovich Tulupyev
Studies in systems, decision and control (2019), pp. 446-456
Closed Access | Times Cited: 15

Page 1 - Next Page

Scroll to top