OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory
Cassandra Dodge, Nathan Fisk, George W. Burruss, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 849-868
Closed Access | Times Cited: 17

Showing 17 citing articles:

An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
Shah Khalid Khan, Nirajan Shiwakoti, Ao Wang, et al.
Future Transportation (2025) Vol. 5, Iss. 1, pp. 5-5
Open Access

Pandemic and predation: an analysis of economic stressors and online scam susceptibility during COVID-19
George W. Burruss, Courtney Weber, Nathan Fisk, et al.
Journal of Crime and Justice (2025), pp. 1-16
Closed Access

Does protection motivation predict self-protective online behaviour? Comparing self-reported and actual online behaviour using a population-based survey experiment.
M.S. van ’t Hoff-de Goede, Rutger Leukfeldt, Steve van de Weijer, et al.
Computers in Human Behavior Reports (2025), pp. 100649-100649
Open Access

Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Journal of Computer Information Systems (2024), pp. 1-21
Open Access | Times Cited: 2

Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2

Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 2

Artificial Intelligence and Robotics in the Nail Care Industry
Laura Ann Jones
Advances in medical technologies and clinical practice book series (2024), pp. 274-295
Closed Access | Times Cited: 1

Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1

Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Navigating Cybersecurity Implementation: Exploring the Influence of Environment on Standards Adoption and Board Involvement
Juan Carlos Fernández de Arróyabe, Ignacio Fernandez De Arroyabe, Marta F. Arroyabe, et al.
(2024)
Closed Access

Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access

Indoor Air Quality: Predicting and Comparing Protective Behaviors in Germany and Portugal
Inês Veiga, Mijail Naranjo-Zolotov, Ricardo Martins, et al.
Indoor Air (2024) Vol. 2024, Iss. 1
Open Access

Forecasting Cyber Threats and Pertinent Mitigation Technologies
Zaid Almahmoud, Paul D. Yoo, Ernesto Damiani, et al.
Technological Forecasting and Social Change (2024) Vol. 210, pp. 123836-123836
Open Access

Worry about online fraud and older adults: Avoidant and protective responses
Steven Kemp, Esther Sitgés Maciá, Nieves Erades-Pérez
Journal of Criminology (2024)
Closed Access

Thematic Exploration and Analysis of Cybersecurity Policies of Businesses: An NLP-Based Approach
Abhik Chaudhuri, Sobhan Sarkar, Pradip Kumar Bala
Journal of Organizational Computing and Electronic Commerce (2024), pp. 1-31
Closed Access

Page 1

Scroll to top