
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
Thea Riebe, Marc–André Kaufhold, Christian Reuter
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-30
Closed Access | Times Cited: 13
Thea Riebe, Marc–André Kaufhold, Christian Reuter
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-30
Closed Access | Times Cited: 13
Showing 13 citing articles:
Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence
Markus Bayer, Tobias Frey, Christian Reuter
Computers & Security (2023) Vol. 134, pp. 103430-103430
Open Access | Times Cited: 16
Markus Bayer, Tobias Frey, Christian Reuter
Computers & Security (2023) Vol. 134, pp. 103430-103430
Open Access | Times Cited: 16
‘We Do Not Have the Capacity to Monitor All Media’: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
Marc–André Kaufhold, Thea Riebe, Markus Bayer, et al.
(2024), pp. 1-16
Open Access | Times Cited: 6
Marc–André Kaufhold, Thea Riebe, Markus Bayer, et al.
(2024), pp. 1-16
Open Access | Times Cited: 6
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Cyber hate awareness: information types and technologies relevant to the law enforcement and reporting center domain
Julian Bäumler, Georg Voronin, Marc‐André Kaufhold
i-com (2025)
Open Access
Julian Bäumler, Georg Voronin, Marc‐André Kaufhold
i-com (2025)
Open Access
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
Thea Riebe, Tom Biselli, Marc‐André Kaufhold, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 477-493
Open Access | Times Cited: 6
Thea Riebe, Tom Biselli, Marc‐André Kaufhold, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 477-493
Open Access | Times Cited: 6
"I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19
Mannat Kaur, Simon Parkin, Marijn Janssen, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. CSCW2, pp. 1-30
Open Access | Times Cited: 7
Mannat Kaur, Simon Parkin, Marijn Janssen, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. CSCW2, pp. 1-30
Open Access | Times Cited: 7
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief
Digital Threats Research and Practice (2023) Vol. 4, Iss. 3, pp. 1-24
Open Access | Times Cited: 3
Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief
Digital Threats Research and Practice (2023) Vol. 4, Iss. 3, pp. 1-24
Open Access | Times Cited: 3
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach
Xiao-Qing Wang, Yuanjing Tian, Keman Huang, et al.
Computers & Security (2024) Vol. 148, pp. 104113-104113
Open Access
Xiao-Qing Wang, Yuanjing Tian, Keman Huang, et al.
Computers & Security (2024) Vol. 148, pp. 104113-104113
Open Access
Big Data and Multi-platform Social Media Services in Disaster Management
Marc–André Kaufhold, Christian Reuter, Thomas Ludwig
International Handbook of Disaster Research (2023), pp. 573-593
Closed Access | Times Cited: 1
Marc–André Kaufhold, Christian Reuter, Thomas Ludwig
International Handbook of Disaster Research (2023), pp. 573-593
Closed Access | Times Cited: 1
CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication
Marc–André Kaufhold, Jennifer Fromm, Thea Riebe, et al.
(2021)
Closed Access | Times Cited: 3
Marc–André Kaufhold, Jennifer Fromm, Thea Riebe, et al.
(2021)
Closed Access | Times Cited: 3
Big Data and Multi-platform Social Media Services in Disaster Management
Marc–André Kaufhold, Christian Reuter, Thomas Ludwig
International Handbook of Disaster Research (2022), pp. 1-21
Closed Access | Times Cited: 1
Marc–André Kaufhold, Christian Reuter, Thomas Ludwig
International Handbook of Disaster Research (2022), pp. 1-21
Closed Access | Times Cited: 1
International Symposium on Technikpsychologie (TecPsy) 2023
Alexandra von Preuschen, Verena Zimmermann, Monika C. Schuhmacher, et al.
Sciendo eBooks (2023)
Open Access
Alexandra von Preuschen, Verena Zimmermann, Monika C. Schuhmacher, et al.
Sciendo eBooks (2023)
Open Access