OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyberattacks, cyber threats, and attitudes toward cybersecurity policies
Keren L. G. Snider, Ryan Shandler, Shay Zandani, et al.
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 46

Showing 1-25 of 46 citing articles:

The hidden threat of cyber-attacks – undermining public confidence in government
Ryan Shandler, Miguel Alberto Gomez
Journal of Information Technology & Politics (2022) Vol. 20, Iss. 4, pp. 359-374
Open Access | Times Cited: 54

Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis
Ryan Shandler, Michael L. Gross, Daphna Canetti
Journal of Global Security Studies (2022) Vol. 8, Iss. 1
Open Access | Times Cited: 47

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences
Eric Jardine, Nathaniel D. Porter, Ryan Shandler
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 103-118
Open Access | Times Cited: 13

The need for cybersecurity self-evaluation in healthcare
Wendy Burke, Andrew Stranieri, Taiwo Oseni, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 9

If it bleeps it leads? Media coverage on cyber conflict and misperception
Christos Makridis, Lennart Maschmeyer, Max Smeets
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 72-86
Open Access | Times Cited: 8

More than malware: unmasking the hidden risk of cybersecurity regulations
Mazaher Kianpour, Shahid Raza
International Cybersecurity Law Review (2024) Vol. 5, Iss. 1, pp. 169-212
Open Access | Times Cited: 8

Factors Affecting Reputational Damage to Organisations Due to Cyberattacks
Srinath Perera, Xiaohua Jin, Alana Maurushat, et al.
Informatics (2022) Vol. 9, Iss. 1, pp. 28-28
Open Access | Times Cited: 33

Trust at Risk: The Effect of Proximity to Cyberattacks
Miguel Alberto Gomez, Ryan Shandler
Journal of Global Security Studies (2024) Vol. 9, Iss. 2
Open Access | Times Cited: 6

Unpacking Smart Campus Assessment: Developing a Framework via Narrative Literature Review
Ken Polin, Tan Yiğitcanlar, Tracy L. Washington, et al.
Sustainability (2024) Vol. 16, Iss. 6, pp. 2494-2494
Open Access | Times Cited: 5

Cybercrime through the public lens: a longitudinal analysis
Krishnashree Achuthan, Sugandh Khobragade, Robin M. Kowalski
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access

Human–AI Enhancement of Cyber Threat Intelligence
Daniel Cohen, Dov Te’eni, Inbal Yahav, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access

Cyber Conflict & Domestic Audience Costs
Ryan Shandler
International Interactions (2025), pp. 1-25
Closed Access

Public Opinion and Cyberterrorism
Ryan Shandler, Nadiya Kostyuk, Harry Oppenheimer
Public Opinion Quarterly (2023) Vol. 87, Iss. 1, pp. 92-119
Open Access | Times Cited: 11

Responding to Uncertainty: The Importance of Covertness in Support for Retaliation to Cyber and Kinetic Attacks
Kathryn Hedgecock, Lauren Sukin
Journal of Conflict Resolution (2023) Vol. 67, Iss. 10, pp. 1873-1903
Open Access | Times Cited: 10

Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives
Kouassi Raymond Agbodoh-Falschau, Bako Harinivo Ravaonorohanta
Technology in Society (2023) Vol. 74, pp. 102309-102309
Closed Access | Times Cited: 10

Cyber scares and prophylactic policies: Crossnational evidence on the effect of cyberattacks on public support for surveillance
Amelia C. Arsenault, Sarah Kreps, Keren L. G. Snider, et al.
Journal of Peace Research (2024) Vol. 61, Iss. 3, pp. 413-428
Closed Access | Times Cited: 3

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs
Mohammad Ryiad Al-Eiadeh, Mustafa Abdallah
Computers & Security (2024) Vol. 144, pp. 103927-103927
Closed Access | Times Cited: 3

Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators
Aws Jaber, Lothar Fritsch
Lecture notes in networks and systems (2022), pp. 249-257
Closed Access | Times Cited: 14

Cyber and contentious politics: Evidence from the US radical environmental movement
Thomas Zeitzoff, Grace Gold
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 134-149
Closed Access | Times Cited: 2

Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention
Junwei Xie
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 2

The Future of Cybersecurity and Its Potential Threats
R. Ramakrishnan
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 7, pp. 269-274
Open Access | Times Cited: 6

The Political Psychology of Cyberterrorism
Ryan Shandler, Keren L. G. Snider, Daphna Canetti
Cambridge University Press eBooks (2022), pp. 565-581
Closed Access | Times Cited: 10

Emerging Cybersecurity Attacks in the Era of Digital Transformation
Sweta Mishra, Saikat Gochhait
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 1442-1447
Closed Access | Times Cited: 4

The limits of cyberattacks in eroding political trust: A tripartite survey experiment
Sharon Matzkin, Ryan Shandler, Daphna Canetti
The British Journal of Politics and International Relations (2023) Vol. 26, Iss. 4, pp. 1033-1054
Open Access | Times Cited: 3

Virtual Reality-Based Joy Induction: The Role of Interactivity and Prior Mood
Maor Bluman, Keren L. G. Snider, Guy Baratz, et al.
Cyberpsychology Behavior and Social Networking (2023) Vol. 26, Iss. 4, pp. 229-237
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top