
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes
Rutger Leukfeldt, Raoul Notté, Marijke Malsch
Victims & Offenders (2019) Vol. 15, Iss. 1, pp. 60-77
Closed Access | Times Cited: 33
Rutger Leukfeldt, Raoul Notté, Marijke Malsch
Victims & Offenders (2019) Vol. 15, Iss. 1, pp. 60-77
Closed Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Understanding cybercrime in ‘real world’ policing and law enforcement
Joanna Curtis, Gavin Oxburgh
The Police Journal Theory Practice and Principles (2022) Vol. 96, Iss. 4, pp. 573-592
Open Access | Times Cited: 43
Joanna Curtis, Gavin Oxburgh
The Police Journal Theory Practice and Principles (2022) Vol. 96, Iss. 4, pp. 573-592
Open Access | Times Cited: 43
Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types
Suleman Lazarus, Mark Button, Richard Kapend
The Howard Journal of Crime and Justice (2022) Vol. 61, Iss. 3, pp. 381-398
Open Access | Times Cited: 31
Suleman Lazarus, Mark Button, Richard Kapend
The Howard Journal of Crime and Justice (2022) Vol. 61, Iss. 3, pp. 381-398
Open Access | Times Cited: 31
Understanding the state of criminological scholarship on cybercrimes
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 24
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 24
Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”)
Suleman Lazarus, Mark Button, Afe Adogame
Heliyon (2022) Vol. 8, Iss. 11, pp. e11142-e11142
Open Access | Times Cited: 24
Suleman Lazarus, Mark Button, Afe Adogame
Heliyon (2022) Vol. 8, Iss. 11, pp. e11142-e11142
Open Access | Times Cited: 24
Reporting cybercrime victimization: determinants, motives, and previous experiences
Steve van de Weijer, Rutger Leukfeldt, Sophie van der Zee
Policing An International Journal (2020) Vol. 43, Iss. 1, pp. 17-34
Open Access | Times Cited: 35
Steve van de Weijer, Rutger Leukfeldt, Sophie van der Zee
Policing An International Journal (2020) Vol. 43, Iss. 1, pp. 17-34
Open Access | Times Cited: 35
Unlocking the Human Element in Cybercrime: Exploring the Realities of Victims
Shahla Eltayeb
Studies in computational intelligence (2025), pp. 25-40
Closed Access
Shahla Eltayeb
Studies in computational intelligence (2025), pp. 25-40
Closed Access
Enhancing relationships between criminology and cybersecurity
Benoît Dupont, Chad Whelan
Journal of Criminology (2021) Vol. 54, Iss. 1, pp. 76-92
Open Access | Times Cited: 24
Benoît Dupont, Chad Whelan
Journal of Criminology (2021) Vol. 54, Iss. 1, pp. 76-92
Open Access | Times Cited: 24
Assessing the seriousness of cybercrime: The case of computer misuse crime in the United Kingdom and the victims’ perspective
Mark Button, David Shepherd, Dean Blackbourn, et al.
Criminology & Criminal Justice (2022), pp. 174889582211281-174889582211281
Closed Access | Times Cited: 16
Mark Button, David Shepherd, Dean Blackbourn, et al.
Criminology & Criminal Justice (2022), pp. 174889582211281-174889582211281
Closed Access | Times Cited: 16
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems
Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Dimitrios Kavallieros, et al.
Internet of Things (2023) Vol. 24, pp. 100968-100968
Closed Access | Times Cited: 10
Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Dimitrios Kavallieros, et al.
Internet of Things (2023) Vol. 24, pp. 100968-100968
Closed Access | Times Cited: 10
Reconceptualizing online offenses: A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context
G. Sarkar, Sandeep K. Shukla
Journal of Economic Criminology (2024) Vol. 4, pp. 100063-100063
Open Access | Times Cited: 3
G. Sarkar, Sandeep K. Shukla
Journal of Economic Criminology (2024) Vol. 4, pp. 100063-100063
Open Access | Times Cited: 3
From feeling like rape to a minor inconvenience: Victims’ accounts of the impact of computer misuse crime in the United Kingdom
Mark Button, Dean Blackbourn, Lisa Sugiura, et al.
Telematics and Informatics (2021) Vol. 64, pp. 101675-101675
Open Access | Times Cited: 19
Mark Button, Dean Blackbourn, Lisa Sugiura, et al.
Telematics and Informatics (2021) Vol. 64, pp. 101675-101675
Open Access | Times Cited: 19
Double, triple or quadruple hits? Exploring the impact of cybercrime on victims in the Netherlands
Raoul Notté, Rutger Leukfeldt, Marijke Malsch
International Review of Victimology (2021) Vol. 27, Iss. 3, pp. 272-294
Closed Access | Times Cited: 18
Raoul Notté, Rutger Leukfeldt, Marijke Malsch
International Review of Victimology (2021) Vol. 27, Iss. 3, pp. 272-294
Closed Access | Times Cited: 18
Exploring the impact of sextortion on adult males: A narrative approach
Raoul Notté
Technology in Society (2024) Vol. 78, pp. 102617-102617
Open Access | Times Cited: 2
Raoul Notté
Technology in Society (2024) Vol. 78, pp. 102617-102617
Open Access | Times Cited: 2
The impact of COVID-19 lockdown on fraud in the UK
Shuai Chen, F. Ding, David Buil‐Gil, et al.
Humanities and Social Sciences Communications (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 2
Shuai Chen, F. Ding, David Buil‐Gil, et al.
Humanities and Social Sciences Communications (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 2
Hello, You’ve been hacked: a study of victim notification preferences
Caitlyn N. Muniz, Taylor Fisher, Katelyn Smith, et al.
Journal of Crime and Justice (2024), pp. 1-17
Closed Access | Times Cited: 1
Caitlyn N. Muniz, Taylor Fisher, Katelyn Smith, et al.
Journal of Crime and Justice (2024), pp. 1-17
Closed Access | Times Cited: 1
Reconceptualizing Policing for Cybercrime: Perspectives from Singapore
Azfer A. Khan
Laws (2024) Vol. 13, Iss. 4, pp. 44-44
Open Access | Times Cited: 1
Azfer A. Khan
Laws (2024) Vol. 13, Iss. 4, pp. 44-44
Open Access | Times Cited: 1
Cybercrime Reporting Behaviors Among Small- and Medium-Sized Enterprises in the Netherlands
Steve van de Weijer, Rutger Leukfeldt, Sophie van der Zee
Crime and justice in digital society (2021), pp. 303-325
Closed Access | Times Cited: 9
Steve van de Weijer, Rutger Leukfeldt, Sophie van der Zee
Crime and justice in digital society (2021), pp. 303-325
Closed Access | Times Cited: 9
Combating Cybercrime and Cyberterrorism in Indonesia
Cynthia Shafira Hartati, Ali Muhammad
Jurnal Hubungan Internasional (2023) Vol. 11, Iss. 2, pp. 45-56
Open Access | Times Cited: 3
Cynthia Shafira Hartati, Ali Muhammad
Jurnal Hubungan Internasional (2023) Vol. 11, Iss. 2, pp. 45-56
Open Access | Times Cited: 3
The Online Behaviour and Victimization Study: The Development of an Experimental Research Instrument for Measuring and Explaining Online Behaviour and Cybercrime Victimization
M. Susanne van ’t Hoff-de Goede, Rutger Leukfeldt, Rick van der Kleij, et al.
Crime and justice in digital society (2021), pp. 21-41
Closed Access | Times Cited: 8
M. Susanne van ’t Hoff-de Goede, Rutger Leukfeldt, Rick van der Kleij, et al.
Crime and justice in digital society (2021), pp. 21-41
Closed Access | Times Cited: 8
The crime-as-communication approach: Challenging the idea of online routine activities by taking communication seriously
Kristjan Kikerpill
Journal of Economic Criminology (2023) Vol. 2, pp. 100035-100035
Open Access | Times Cited: 2
Kristjan Kikerpill
Journal of Economic Criminology (2023) Vol. 2, pp. 100035-100035
Open Access | Times Cited: 2
Advancing research on the Human Factor in Cybercrime
Benoît Dupont, Thomas J. Holt
Computers in Human Behavior (2022) Vol. 138, pp. 107410-107410
Closed Access | Times Cited: 3
Benoît Dupont, Thomas J. Holt
Computers in Human Behavior (2022) Vol. 138, pp. 107410-107410
Closed Access | Times Cited: 3
“Screaming into the Void”: Canadians’ Experiences Reporting Identity Theft
Dylan Reynolds
Canadian Journal of Criminology and Criminal Justice/La Revue canadienne de criminologie et de justice pénale (2024) Vol. 66, Iss. 1, pp. 87-106
Closed Access
Dylan Reynolds
Canadian Journal of Criminology and Criminal Justice/La Revue canadienne de criminologie et de justice pénale (2024) Vol. 66, Iss. 1, pp. 87-106
Closed Access
Investigating what promotes and deters Scottish cybercrime reporting
Juraj Šikra, Karen Renaud, Daniel R. Thomas
Journal of Economic Criminology (2024) Vol. 6, pp. 100103-100103
Open Access
Juraj Šikra, Karen Renaud, Daniel R. Thomas
Journal of Economic Criminology (2024) Vol. 6, pp. 100103-100103
Open Access
Victimological aspects of countering internet crime: State and local government practices
Mamatzhan Arstanbekov, Nurman Seidakmatov, Marat Tatenov, et al.
Social & Legal Studios (2024) Vol. 7, Iss. 1, pp. 221-234
Open Access
Mamatzhan Arstanbekov, Nurman Seidakmatov, Marat Tatenov, et al.
Social & Legal Studios (2024) Vol. 7, Iss. 1, pp. 221-234
Open Access
Exploring police attitudes on victims’ delayed reporting and victim blame in technology-facilitated IPV
Stavros Chatzisymeonidis, Afroditi Pina
Crime Science (2024) Vol. 13, Iss. 1
Open Access
Stavros Chatzisymeonidis, Afroditi Pina
Crime Science (2024) Vol. 13, Iss. 1
Open Access