
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber risk assessment in small and medium‐sized enterprises: A multilevel decision‐making approach for small e‐tailors
Arun Sukumar, Hannan Amoozad Mahdiraji, Vahid Jafari‐Sadeghi
Risk Analysis (2023) Vol. 43, Iss. 10, pp. 2082-2098
Open Access | Times Cited: 23
Arun Sukumar, Hannan Amoozad Mahdiraji, Vahid Jafari‐Sadeghi
Risk Analysis (2023) Vol. 43, Iss. 10, pp. 2082-2098
Open Access | Times Cited: 23
Showing 23 citing articles:
Cyber Security Integration with Smart New Age Sustainable Startup Business, Risk Management, Automation and Scaling System for Entrepreneurs: An Artificial Intelligence Approach
Shagun Singh Dasawat, Sachin Sharma
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 1357-1363
Closed Access | Times Cited: 27
Shagun Singh Dasawat, Sachin Sharma
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 1357-1363
Closed Access | Times Cited: 27
Transforming the remittance industry: harnessing the power of blockchain technology
Ioannis Christodoulou, Ioannis Rizomyliotis, Kleopatra Konstantoulaki, et al.
Journal of Enterprise Information Management (2024) Vol. 37, Iss. 5, pp. 1551-1577
Closed Access | Times Cited: 9
Ioannis Christodoulou, Ioannis Rizomyliotis, Kleopatra Konstantoulaki, et al.
Journal of Enterprise Information Management (2024) Vol. 37, Iss. 5, pp. 1551-1577
Closed Access | Times Cited: 9
Evaluation and selection of E-learning websites using intuitionistic fuzzy confidence level based Dombi aggregation operators with unknown weight information
Mijanur Rahaman Seikh, P. K. Chatterjee
Applied Soft Computing (2024) Vol. 163, pp. 111850-111850
Closed Access | Times Cited: 8
Mijanur Rahaman Seikh, P. K. Chatterjee
Applied Soft Computing (2024) Vol. 163, pp. 111850-111850
Closed Access | Times Cited: 8
Digital transformation and SME internationalisation: unravelling the moderated-mediation role of digital capabilities, digital resilience and digital maturity
Hashem Aghazadeh, Farzad Zandi, Hannan Amoozad Mahdiraji, et al.
Journal of Enterprise Information Management (2023) Vol. 37, Iss. 5, pp. 1499-1526
Closed Access | Times Cited: 19
Hashem Aghazadeh, Farzad Zandi, Hannan Amoozad Mahdiraji, et al.
Journal of Enterprise Information Management (2023) Vol. 37, Iss. 5, pp. 1499-1526
Closed Access | Times Cited: 19
An empirical analysis of the behavioral influences and information sources affecting the cyber insurance decisions of German SMEs
Alina Salzberger
The Journal of Risk Finance (2025)
Open Access
Alina Salzberger
The Journal of Risk Finance (2025)
Open Access
Applications of Multi Criteria Decision Making Methods in Cyber Security
Seema Gupta Bhol
Studies in big data (2025), pp. 233-258
Closed Access
Seema Gupta Bhol
Studies in big data (2025), pp. 233-258
Closed Access
Information security risk evaluation of smart cities in China: A PT-VIKOR approach
Yi‐Ting Wang, Pengcheng Xiang, Simai Yang
Cities (2025) Vol. 161, pp. 105883-105883
Closed Access
Yi‐Ting Wang, Pengcheng Xiang, Simai Yang
Cities (2025) Vol. 161, pp. 105883-105883
Closed Access
Evaluation of cyber security risk pillars for a digital, innovative, and sustainable model utilizing a novel fuzzy hybrid optimization
Mehmet Erdem, Akın Özdemir
Computers & Security (2025), pp. 104394-104394
Closed Access
Mehmet Erdem, Akın Özdemir
Computers & Security (2025), pp. 104394-104394
Closed Access
Tech innovation! Industry 4.0 enablers and management initiative on innovation performance: a moderation model
Shafique Ur Rehman, Beata Gavurová, Stefano Bresciani, et al.
International Entrepreneurship and Management Journal (2024) Vol. 20, Iss. 4, pp. 3223-3254
Closed Access | Times Cited: 3
Shafique Ur Rehman, Beata Gavurová, Stefano Bresciani, et al.
International Entrepreneurship and Management Journal (2024) Vol. 20, Iss. 4, pp. 3223-3254
Closed Access | Times Cited: 3
Strategic Approaches in Network Communication and Information Security Risk Assessment
Nadher Alsafwani, Yousef Fazea, Fuad Alnajjar
Information (2024) Vol. 15, Iss. 6, pp. 353-353
Open Access | Times Cited: 3
Nadher Alsafwani, Yousef Fazea, Fuad Alnajjar
Information (2024) Vol. 15, Iss. 6, pp. 353-353
Open Access | Times Cited: 3
Identifying and prioritizing the barriers to green innovation in SMEs and the strategies to counteract the barriers: An interval-valued intuitionistic fuzzy approach
Vahideh Shahin, Moslem Alimohammadlou, Abbas Abbasi
Technological Forecasting and Social Change (2024) Vol. 204, pp. 123408-123408
Closed Access | Times Cited: 2
Vahideh Shahin, Moslem Alimohammadlou, Abbas Abbasi
Technological Forecasting and Social Change (2024) Vol. 204, pp. 123408-123408
Closed Access | Times Cited: 2
Factors impacting cybersecurity transformation: An Industry 5.0 perspective
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2
Understanding the Relationship Between Trust and Faith in Micro-Enterprises to Cyber Hygiene
Sayak Konar, Gunjan Mukherjee, Gourab Dutta
Advances in business information systems and analytics book series (2024), pp. 125-148
Closed Access | Times Cited: 1
Sayak Konar, Gunjan Mukherjee, Gourab Dutta
Advances in business information systems and analytics book series (2024), pp. 125-148
Closed Access | Times Cited: 1
A data‐driven and cost‐oriented FMEA–MCDM approach to risk assessment and ranking in a fuzzy environment: A hydraulic pump factory case study
Hossein Shakibaei, Saba Seifi, Jun Zhuang
Risk Analysis (2024) Vol. 44, Iss. 11, pp. 2629-2648
Closed Access | Times Cited: 1
Hossein Shakibaei, Saba Seifi, Jun Zhuang
Risk Analysis (2024) Vol. 44, Iss. 11, pp. 2629-2648
Closed Access | Times Cited: 1
A resilience assessment model for dry bulk shipping supply chains: the case of the Ukraine grain corridor
Serkan Karakaş, Mehmet Kırmızı, H. Gencer, et al.
Maritime Economics & Logistics (2023) Vol. 26, Iss. 3, pp. 391-413
Closed Access | Times Cited: 4
Serkan Karakaş, Mehmet Kırmızı, H. Gencer, et al.
Maritime Economics & Logistics (2023) Vol. 26, Iss. 3, pp. 391-413
Closed Access | Times Cited: 4
Bibliometrics Study of Organizational Cybersecurity
Francisco Isaí Morales Sáenz, Jose-Melchor Medina-Quintero, Fernando Ortiz
Advances in logistics, operations, and management science book series (2023), pp. 115-139
Closed Access | Times Cited: 2
Francisco Isaí Morales Sáenz, Jose-Melchor Medina-Quintero, Fernando Ortiz
Advances in logistics, operations, and management science book series (2023), pp. 115-139
Closed Access | Times Cited: 2
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access
Security Risk Assessment for Patient Portals of Hospitals: A Case Study of Taiwan
Pei-Cheng Yeh, Kuen-Wei Yeh, Jiun-Lang Huang
Risk Management and Healthcare Policy (2024) Vol. Volume 17, pp. 1647-1656
Open Access
Pei-Cheng Yeh, Kuen-Wei Yeh, Jiun-Lang Huang
Risk Management and Healthcare Policy (2024) Vol. Volume 17, pp. 1647-1656
Open Access
Decision Support Method and Risk Analysis Based on Merged-Cyber Security Risk Management
Mohanarangan Veerappermal Devarajan, Mohammed Al-Farouni, Ramya Srikanteswara, et al.
(2024), pp. 1-4
Closed Access
Mohanarangan Veerappermal Devarajan, Mohammed Al-Farouni, Ramya Srikanteswara, et al.
(2024), pp. 1-4
Closed Access
Got milk? Got cybersecurity risks! Unraveling ransomware threats in the German dairy industry
Eduard Anton, Helena Aptyka, Frank Teuteberg
Organizational Cybersecurity Journal Practice Process and People (2024)
Open Access
Eduard Anton, Helena Aptyka, Frank Teuteberg
Organizational Cybersecurity Journal Practice Process and People (2024)
Open Access
At the Cybersecurity Frontier: Key Strategies and Persistent Challenges for Business Leaders
Marco Balzano, Giacomo Marzi
Strategic Change (2024)
Open Access
Marco Balzano, Giacomo Marzi
Strategic Change (2024)
Open Access
Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management
Alberto García Pérez, Antonio López Martínez, Manuel Gil Pérez
Journal of Network and Computer Applications (2023) Vol. 219, pp. 103728-103728
Open Access
Alberto García Pérez, Antonio López Martínez, Manuel Gil Pérez
Journal of Network and Computer Applications (2023) Vol. 219, pp. 103728-103728
Open Access
قياس أثر الإفصاح الإلكتروني عن المخاطر السيبرانية على قيمة المنشأة "دراســة تطبيقيــة"
أ.د عبدالحميد احمد شاهين, د محمد موسى شحاته, د مروه أحمد عبد الرحمن البسطويسى, et al.
المجلة العلمية للدراسات والبحوث المالية والإدارية (2023) Vol. 15, Iss. 4, pp. 1-66
Open Access
أ.د عبدالحميد احمد شاهين, د محمد موسى شحاته, د مروه أحمد عبد الرحمن البسطويسى, et al.
المجلة العلمية للدراسات والبحوث المالية والإدارية (2023) Vol. 15, Iss. 4, pp. 1-66
Open Access