
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
“Taking out the Trash”: Why Security Behavior Change requires Intentional Forgetting
Jonas Hielscher, Annette Kluge, Uta Menges, et al.
New Security Paradigms Workshop (2021)
Open Access | Times Cited: 9
Jonas Hielscher, Annette Kluge, Uta Menges, et al.
New Security Paradigms Workshop (2021)
Open Access | Times Cited: 9
Showing 9 citing articles:
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
Karen Renaud, Lizzie Coles-Kemp
SN Computer Science (2022) Vol. 3, Iss. 5
Open Access | Times Cited: 27
Work in Progress – Brick by Brick: Using a Structured Building Blocks Method to Engage Participants and Collect IT Security Insights
Uta Menges, Jonas Hielscher, Annette Kluge, et al.
Lecture notes in computer science (2025), pp. 134-145
Closed Access
Uta Menges, Jonas Hielscher, Annette Kluge, et al.
Lecture notes in computer science (2025), pp. 134-145
Closed Access
Learn, Unlearn and Relearn: Adaptive Cybersecurity Culture Model
Tapiwa Gundu
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 95-102
Open Access | Times Cited: 1
Tapiwa Gundu
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 95-102
Open Access | Times Cited: 1
Rebooting IT Security Awareness – How Organisations Can Encourage and Sustain Secure Behaviours
M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, et al.
Lecture notes in computer science (2023), pp. 248-265
Closed Access | Times Cited: 2
M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, et al.
Lecture notes in computer science (2023), pp. 248-265
Closed Access | Times Cited: 2
Contrasting and Synergizing CISOs' and Employees' Attitudes, Needs, and Resources for Security Using Personas
Uta Menges, Annette Kluge
(2024), pp. 456-472
Closed Access
Uta Menges, Annette Kluge
(2024), pp. 456-472
Closed Access
Understanding Operational Technology Personnel's Mindsets and Their Effect on Cybersecurity Perceptions: A Qualitative Study With Operational Technology Cybersecurity Practitioners
Stefanos Evripidou, Jeremy Watson
(2024), pp. 137-154
Closed Access
Stefanos Evripidou, Jeremy Watson
(2024), pp. 137-154
Closed Access
"Everything We Encrypt Today Could Be Cracked" — Exploring (Post) Quantum Cryptography Misconceptions
Victoria Kunde, Jan Magnus Nold, Jonas Hielscher
(2024), pp. 125-136
Closed Access
Victoria Kunde, Jan Magnus Nold, Jonas Hielscher
(2024), pp. 125-136
Closed Access
You Know What? - Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills
Lorin Schöni, Victor Carles, Martin Strohmeier, et al.
(2024), pp. 1-14
Closed Access
Lorin Schöni, Victor Carles, Martin Strohmeier, et al.
(2024), pp. 1-14
Closed Access
The boundedly rational employee: Security economics for behaviour intervention support in organizations1
Albesë Demjaha, Simon Parkin, David Pym
Journal of Computer Security (2022) Vol. 30, Iss. 3, pp. 435-464
Open Access | Times Cited: 2
Albesë Demjaha, Simon Parkin, David Pym
Journal of Computer Security (2022) Vol. 30, Iss. 3, pp. 435-464
Open Access | Times Cited: 2