
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity, Bureaucratic Vitalism and European Emergency
Stéphanie Simon, Marieke de Goede
Theory Culture & Society (2015) Vol. 32, Iss. 2, pp. 79-106
Open Access | Times Cited: 27
Stéphanie Simon, Marieke de Goede
Theory Culture & Society (2015) Vol. 32, Iss. 2, pp. 79-106
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
From conflict to resilience? Explaining recent changes in climate security discourse and practice
Ingrid Boas, Delf Rothe
Environmental Politics (2016) Vol. 25, Iss. 4, pp. 613-632
Open Access | Times Cited: 104
Ingrid Boas, Delf Rothe
Environmental Politics (2016) Vol. 25, Iss. 4, pp. 613-632
Open Access | Times Cited: 104
Introduction: Governing Emergencies: Beyond Exceptionality
Peter Adey, Ben Anderson, Stephen Graham
Theory Culture & Society (2015) Vol. 32, Iss. 2, pp. 3-17
Open Access | Times Cited: 92
Peter Adey, Ben Anderson, Stephen Graham
Theory Culture & Society (2015) Vol. 32, Iss. 2, pp. 3-17
Open Access | Times Cited: 92
Trust at Risk: The Effect of Proximity to Cyberattacks
Miguel Alberto Gomez, Ryan Shandler
Journal of Global Security Studies (2024) Vol. 9, Iss. 2
Open Access | Times Cited: 6
Miguel Alberto Gomez, Ryan Shandler
Journal of Global Security Studies (2024) Vol. 9, Iss. 2
Open Access | Times Cited: 6
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses
Nina Witjes, Alexander Wentland
Science Technology & Human Values (2021) Vol. 46, Iss. 6, pp. 1316-1339
Open Access | Times Cited: 39
Nina Witjes, Alexander Wentland
Science Technology & Human Values (2021) Vol. 46, Iss. 6, pp. 1316-1339
Open Access | Times Cited: 39
Vitalist temptations: Life, earth and the nature of war
Ian Klinke
Political Geography (2019) Vol. 72, pp. 1-9
Open Access | Times Cited: 39
Ian Klinke
Political Geography (2019) Vol. 72, pp. 1-9
Open Access | Times Cited: 39
The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces
Tobias Liebetrau, Kristoffer Kjærgaard Christensen
European Journal of International Security (2020) Vol. 6, Iss. 1, pp. 25-43
Closed Access | Times Cited: 32
Tobias Liebetrau, Kristoffer Kjærgaard Christensen
European Journal of International Security (2020) Vol. 6, Iss. 1, pp. 25-43
Closed Access | Times Cited: 32
Exercising emergencies: Resilience, affect and acting out security
Mareile Kaufmann
Security Dialogue (2015) Vol. 47, Iss. 2, pp. 99-116
Open Access | Times Cited: 33
Mareile Kaufmann
Security Dialogue (2015) Vol. 47, Iss. 2, pp. 99-116
Open Access | Times Cited: 33
When shutdown is no option: Identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Isabel Skierka
Government Information Quarterly (2022) Vol. 40, Iss. 1, pp. 101781-101781
Open Access | Times Cited: 15
Isabel Skierka
Government Information Quarterly (2022) Vol. 40, Iss. 1, pp. 101781-101781
Open Access | Times Cited: 15
A new role for ‘the public’? Exploring cyber security controversies in the case of WannaCry
Kristoffer Kjærgaard Christensen, Tobias Liebetrau
Intelligence & National Security (2019) Vol. 34, Iss. 3, pp. 395-408
Closed Access | Times Cited: 23
Kristoffer Kjærgaard Christensen, Tobias Liebetrau
Intelligence & National Security (2019) Vol. 34, Iss. 3, pp. 395-408
Closed Access | Times Cited: 23
People in a pandemic: Rethinking the role of ‘Community’ in community resilience practices
Nathaniel O’Grady, Duncan Shaw, Szymon Parzniewski
Geoforum (2022) Vol. 132, pp. 32-41
Open Access | Times Cited: 13
Nathaniel O’Grady, Duncan Shaw, Szymon Parzniewski
Geoforum (2022) Vol. 132, pp. 32-41
Open Access | Times Cited: 13
Supranational security states for national security problems: governing by rules & capacities in tech-driven security spaces
Ido Sivan‐Sevilla
Journal of European Public Policy (2023) Vol. 30, Iss. 7, pp. 1353-1378
Closed Access | Times Cited: 7
Ido Sivan‐Sevilla
Journal of European Public Policy (2023) Vol. 30, Iss. 7, pp. 1353-1378
Closed Access | Times Cited: 7
Governing the future through scenaristic and simulative modalities of imagination
Limor Samimian‐Darash
Anthropological Theory (2021) Vol. 22, Iss. 4, pp. 393-416
Open Access | Times Cited: 15
Limor Samimian‐Darash
Anthropological Theory (2021) Vol. 22, Iss. 4, pp. 393-416
Open Access | Times Cited: 15
An outlook on the institutional evolution of the European Union cyber security apparatus
Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen
Government Information Quarterly (2016) Vol. 33, Iss. 4, pp. 746-756
Closed Access | Times Cited: 17
Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen
Government Information Quarterly (2016) Vol. 33, Iss. 4, pp. 746-756
Closed Access | Times Cited: 17
Governing through cybersecurity: national policy strategies, globalized (in‑)security and sociotechnical visions of the digital society
Christian Haddad, Clemens Binder
Österreichische Zeitschrift für Soziologie (2019) Vol. 44, Iss. S1, pp. 115-134
Open Access | Times Cited: 16
Christian Haddad, Clemens Binder
Österreichische Zeitschrift für Soziologie (2019) Vol. 44, Iss. S1, pp. 115-134
Open Access | Times Cited: 16
Emergency: A Vernacular Contextual Approach
Bohdana Kurylo
International Studies Review (2022) Vol. 24, Iss. 3
Open Access | Times Cited: 8
Bohdana Kurylo
International Studies Review (2022) Vol. 24, Iss. 3
Open Access | Times Cited: 8
Objects at Work: Cybersecurity Certificates Making Topological Expertise
Anna Leander
Global Studies Quarterly (2024) Vol. 4, Iss. 3
Open Access | Times Cited: 1
Anna Leander
Global Studies Quarterly (2024) Vol. 4, Iss. 3
Open Access | Times Cited: 1
Between Public and Private: The Co-production of Infrastructural Security
Amina Nolte, Carola Westermeier
Politikon (2020) Vol. 47, Iss. 1, pp. 62-80
Open Access | Times Cited: 8
Amina Nolte, Carola Westermeier
Politikon (2020) Vol. 47, Iss. 1, pp. 62-80
Open Access | Times Cited: 8
On parabiopolitical reason
James D. Faubion
Anthropological Theory (2018) Vol. 19, Iss. 2, pp. 219-237
Closed Access | Times Cited: 8
James D. Faubion
Anthropological Theory (2018) Vol. 19, Iss. 2, pp. 219-237
Closed Access | Times Cited: 8
CYBERSECURITY. RISKS, THREATS, AND TRENDS OF MANIFESTATION IN ROMANIA
Ileana Surdu
(2018) Vol. 7, Iss. 1, pp. 365-372
Closed Access | Times Cited: 2
Ileana Surdu
(2018) Vol. 7, Iss. 1, pp. 365-372
Closed Access | Times Cited: 2
What Do We Talk About When We Talk About Cyberr?
James Shires, Max Smeets
SSRN Electronic Journal (2016)
Closed Access | Times Cited: 1
James Shires, Max Smeets
SSRN Electronic Journal (2016)
Closed Access | Times Cited: 1
Mobility, circulation, and homeomorphism
Nathaniel O’Grady
Manchester University Press eBooks (2017)
Open Access | Times Cited: 1
Nathaniel O’Grady
Manchester University Press eBooks (2017)
Open Access | Times Cited: 1
Cyber Security
Nathaniel O’Grady, Andrew C. Dwyer
Elsevier eBooks (2019), pp. 135-141
Closed Access | Times Cited: 1
Nathaniel O’Grady, Andrew C. Dwyer
Elsevier eBooks (2019), pp. 135-141
Closed Access | Times Cited: 1
Europäisches Cyberrecht zwischen Schwert und Norm: Reifizierte Gewalt und Herrschaft im Kontext der postnationalen Gouvernementalität
Ben Kamis
Springer eBooks (2017), pp. 181-209
Closed Access
Ben Kamis
Springer eBooks (2017), pp. 181-209
Closed Access