OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Socio-technical systems cybersecurity framework
Masike Malatji, Suné von Solms, Annlizé L. Marnewick
Information and Computer Security (2019) Vol. 27, Iss. 2, pp. 233-272
Closed Access | Times Cited: 71

Showing 1-25 of 71 citing articles:

Leveraging human factors in cybersecurity: an integrated methodological approach
Alessandro Pollini, Tiziana C. Callari, Alessandra Tedeschi, et al.
Cognition Technology & Work (2021) Vol. 24, Iss. 2, pp. 371-390
Open Access | Times Cited: 106

From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 25

AI Adoption and Educational Sustainability in Higher Education in the UAE
Fanar Shwedeh, Said A. Salloum, Ahmad Aburayya, et al.
Studies in big data (2024), pp. 201-229
Closed Access | Times Cited: 16

Charting the Sociotechnical Gap in Explainable AI: A Framework to Address the Gap in XAI
Upol Ehsan, Koustuv Saha, Munmun De Choudhury, et al.
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-32
Open Access | Times Cited: 34

Determining the source of human-system errors in manual order picking with respect to human factors
Azin Setayesh, Eric H. Grosse, C. H. Glock, et al.
International Journal of Production Research (2021) Vol. 60, Iss. 20, pp. 6350-6372
Closed Access | Times Cited: 34

FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study
Salah AlBenJasim, Tooska Dargahi, Haifa Takruri, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 6, pp. 835-851
Open Access | Times Cited: 14

Cybersecurity in Local Governments: A Systematic Review and Framework of Key Challenges
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Urban Governance (2025)
Open Access

Research on computer security maintenance based on web server
Jun Ma
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access

Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature
Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray
JMIR mhealth and uhealth (2020) Vol. 8, Iss. 6, pp. e18175-e18175
Open Access | Times Cited: 38

Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy, et al.
IEEE Access (2021) Vol. 9, pp. 99339-99363
Open Access | Times Cited: 29

Using Tabletop Exercises to Raise Cybersecurity Awareness of Decision-Makers
Joakim Kävrestad, Sonny L. Johansson, Erik Bergström
Lecture notes in computer science (2025), pp. 231-248
Closed Access

Transforming threats into opportunities: The role of human factors in enhancing cybersecurity
Silvia Colabianchi, Francesco Costantino, Fabio Nonino, et al.
Journal of Innovation & Knowledge (2025) Vol. 10, Iss. 3, pp. 100695-100695
Closed Access

Validation of a socio-technical management process for optimising cybersecurity practices
Masike Malatji, Annlizé L. Marnewick, Suné von Solms
Computers & Security (2020) Vol. 95, pp. 101846-101846
Closed Access | Times Cited: 31

An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Tejaswini Herath, Hemantha S. B. Herath, David Cullum
Information Systems Frontiers (2022)
Closed Access | Times Cited: 16

CYBER SECURITY FRAMEWORK SELECTION: COMPARISION OF NIST AND ISO27001
Marwan Alshar’e
Applied computing Journal (2023), pp. 245-255
Open Access | Times Cited: 10

Information systems security resilience as a dynamic capability
Lakshmi Goel, Dawn Russell, Steven Williamson, et al.
Journal of Enterprise Information Management (2023) Vol. 36, Iss. 4, pp. 906-924
Closed Access | Times Cited: 9

Human factors and cyber-security risks on the railway – the critical role played by signalling operations
Eylem Thron, Shamal Faily, Hüseyin Doğan, et al.
Information and Computer Security (2024) Vol. 32, Iss. 2, pp. 236-263
Open Access | Times Cited: 3

Responding cyber-attacks and managing cyber security crises in critical infrastructures: A sociotechnical perspective
Salih Bıçakcı, Ayhan Gücüyener Evren
Elsevier eBooks (2024), pp. 125-151
Closed Access | Times Cited: 3

An inductive analysis of collaborative cybersecurity management capabilities, relational antecedents and supply chain cybersecurity parameters
Derek Friday, Steven A. Melnyk, Morris Altman, et al.
International Journal of Physical Distribution & Logistics Management (2024) Vol. 54, Iss. 5, pp. 476-500
Closed Access | Times Cited: 3

Challenges of upgrading craft workforce into Construction 4.0: framework and agreements
Diego Calvetti, P. Mêda, Sujesh Francis Sujan, et al.
Proceedings of the Institution of Civil Engineers - Management Procurement and Law (2020) Vol. 173, Iss. 4, pp. 158-165
Closed Access | Times Cited: 26

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics
Max van Haastrecht, Bilge Yiğit Özkan, Matthieu Brinkhuis, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 6909-6909
Open Access | Times Cited: 22

Managing the Inevitable – A Maturity Model to Establish Incident Response Management Capabilities
Michael Bitzer, Björn Häckel, Daniel Leuthe, et al.
Computers & Security (2022) Vol. 125, pp. 103050-103050
Closed Access | Times Cited: 15

A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)
Miloslava Plachkinova, Ace Vо
Communications of the Association for Information Systems (2023) Vol. 52, Iss. 1, pp. 26-50
Open Access | Times Cited: 6

Page 1 - Next Page

Scroll to top