
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review
Maria Lamond, Karen Renaud, Lara A. Wood, et al.
(2022), pp. 14-27
Open Access | Times Cited: 11
Maria Lamond, Karen Renaud, Lara A. Wood, et al.
(2022), pp. 14-27
Open Access | Times Cited: 11
Showing 11 citing articles:
The good practices for implementation of cyber security education for school children
Dana Ondrušková, Richard Pospíšil
Contemporary Educational Technology (2023) Vol. 15, Iss. 3, pp. ep435-ep435
Open Access | Times Cited: 11
Dana Ondrušková, Richard Pospíšil
Contemporary Educational Technology (2023) Vol. 15, Iss. 3, pp. ep435-ep435
Open Access | Times Cited: 11
Towards integrated paediatric rehabilitation through a shared health portal for children with disabilities: A qualitative study on professionals’ perspectives (Preprint)
Marietta Kersalé, Thomas Richard, Quan Nha Hong, et al.
(2025)
Closed Access
Marietta Kersalé, Thomas Richard, Quan Nha Hong, et al.
(2025)
Closed Access
Cyber Threat Awareness, Protective Measures and Communication Preferences in Germany: Implications from Three Representative Surveys (2021-2024)
Marc‐André Kaufhold, Julian Bäumler, Marius Bajorski, et al.
(2025), pp. 1-20
Closed Access
Marc‐André Kaufhold, Julian Bäumler, Marius Bajorski, et al.
(2025), pp. 1-20
Closed Access
Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
Suzanne Prior, Karen Renaud
Lecture notes in computer science (2024), pp. 77-96
Closed Access | Times Cited: 2
Suzanne Prior, Karen Renaud
Lecture notes in computer science (2024), pp. 77-96
Closed Access | Times Cited: 2
Inclusive and Accessible Cybersecurity: Challenges and Future Directions
Bilal Naqvi, Joakim Kävrestad, A.K.M. Najmul Islam
Computer (2024) Vol. 57, Iss. 6, pp. 73-81
Open Access | Times Cited: 1
Bilal Naqvi, Joakim Kävrestad, A.K.M. Najmul Islam
Computer (2024) Vol. 57, Iss. 6, pp. 73-81
Open Access | Times Cited: 1
“We’re Not That Gullible!” Revealing Dark Pattern Mental Models of 11-12-Year-Old Scottish Children
Karen Renaud, Cigdem Sengul, Kovila Coopamootoo, et al.
ACM Transactions on Computer-Human Interaction (2024) Vol. 31, Iss. 3, pp. 1-41
Open Access | Times Cited: 1
Karen Renaud, Cigdem Sengul, Kovila Coopamootoo, et al.
ACM Transactions on Computer-Human Interaction (2024) Vol. 31, Iss. 3, pp. 1-41
Open Access | Times Cited: 1
Evaluating the Use of Hypothetical 'Would You Rather' Scenarios to Discuss Privacy and Security Concepts with Children
Elana B. Blinder, Marshini Chetty, Jessica Vitak, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-32
Open Access | Times Cited: 1
Elana B. Blinder, Marshini Chetty, Jessica Vitak, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. CSCW1, pp. 1-32
Open Access | Times Cited: 1
Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children
Suzanne Prior, Jacques Ophoff
IFIP advances in information and communication technology (2024), pp. 36-49
Closed Access | Times Cited: 1
Suzanne Prior, Jacques Ophoff
IFIP advances in information and communication technology (2024), pp. 36-49
Closed Access | Times Cited: 1
Cognitively Available Cybersecurity: A Systematic Literature Review
Joakim Kävrestad, Bilal Naqvi
Lecture notes in computer science (2024), pp. 160-170
Closed Access
Joakim Kävrestad, Bilal Naqvi
Lecture notes in computer science (2024), pp. 160-170
Closed Access
A Cyber Peers Framework for Primary Schools
Jacques Ophoff, Suzanne Prior
Lecture notes in networks and systems (2024), pp. 137-152
Closed Access
Jacques Ophoff, Suzanne Prior
Lecture notes in networks and systems (2024), pp. 137-152
Closed Access
Towards Improving Online Security Awareness Skills with Phishing and Spoofing Labs
Alexander Ross Kerr, Timo Hynninen
(2023), pp. 1225-1229
Closed Access
Alexander Ross Kerr, Timo Hynninen
(2023), pp. 1225-1229
Closed Access