
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
Claire Seungeun Lee, Kyung-Shick Choi, Ryan Shandler, et al.
Journal of Contemporary Criminal Justice (2021) Vol. 37, Iss. 3, pp. 333-355
Closed Access | Times Cited: 20
Claire Seungeun Lee, Kyung-Shick Choi, Ryan Shandler, et al.
Journal of Contemporary Criminal Justice (2021) Vol. 37, Iss. 3, pp. 333-355
Closed Access | Times Cited: 20
Showing 20 citing articles:
Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb
Romil Rawat, Vinod Mahor, Mukesh Chouhan, et al.
Lecture notes in networks and systems (2022), pp. 181-205
Closed Access | Times Cited: 54
Romil Rawat, Vinod Mahor, Mukesh Chouhan, et al.
Lecture notes in networks and systems (2022), pp. 181-205
Closed Access | Times Cited: 54
Cyber Terrorism and Public Support for Retaliation – A Multi-Country Survey Experiment
Ryan Shandler, Michael L. Gross, Sophia Backhaus, et al.
British Journal of Political Science (2021) Vol. 52, Iss. 2, pp. 850-868
Open Access | Times Cited: 46
Ryan Shandler, Michael L. Gross, Sophia Backhaus, et al.
British Journal of Political Science (2021) Vol. 52, Iss. 2, pp. 850-868
Open Access | Times Cited: 46
Understanding the state of criminological scholarship on cybercrimes
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 24
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 24
Cyber terrorism cases and stock market valuation effects
Katherine Taken Smith, L. Murphy Smith, Marcus Burger, et al.
Information and Computer Security (2023) Vol. 31, Iss. 4, pp. 385-403
Closed Access | Times Cited: 15
Katherine Taken Smith, L. Murphy Smith, Marcus Burger, et al.
Information and Computer Security (2023) Vol. 31, Iss. 4, pp. 385-403
Closed Access | Times Cited: 15
Islamic moderation in education and the phenomenon of cyberterrorism: a systematic literature review
Syamsul Maarif, Hamidulloh Ibda, Farid Ahmadi, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 3, pp. 1523-1523
Open Access | Times Cited: 10
Syamsul Maarif, Hamidulloh Ibda, Farid Ahmadi, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 3, pp. 1523-1523
Open Access | Times Cited: 10
Assessing nation‐state‐sponsored cyberattacks using aspects of Situational Crime Prevention
Thomas J. Holt, Mae Griffith, Noah D. Turner, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 825-848
Open Access | Times Cited: 7
Thomas J. Holt, Mae Griffith, Noah D. Turner, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 825-848
Open Access | Times Cited: 7
An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom
Victoria Jangada Correia
SN Computer Science (2021) Vol. 3, Iss. 1
Open Access | Times Cited: 15
Victoria Jangada Correia
SN Computer Science (2021) Vol. 3, Iss. 1
Open Access | Times Cited: 15
The Political Psychology of Cyberterrorism
Ryan Shandler, Keren L. G. Snider, Daphna Canetti
Cambridge University Press eBooks (2022), pp. 565-581
Closed Access | Times Cited: 10
Ryan Shandler, Keren L. G. Snider, Daphna Canetti
Cambridge University Press eBooks (2022), pp. 565-581
Closed Access | Times Cited: 10
Introducing and Exploring the Extremist Cybercrime Database (ECCD)
Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, et al.
Crime & Delinquency (2022) Vol. 69, Iss. 12, pp. 2411-2436
Closed Access | Times Cited: 8
Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, et al.
Crime & Delinquency (2022) Vol. 69, Iss. 12, pp. 2411-2436
Closed Access | Times Cited: 8
A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context
Petrus Reinhard Golase
Journal of Ethnic and Cultural Studies (2022) Vol. 9, Iss. 4, pp. 106-119
Open Access | Times Cited: 8
Petrus Reinhard Golase
Journal of Ethnic and Cultural Studies (2022) Vol. 9, Iss. 4, pp. 106-119
Open Access | Times Cited: 8
An Assessment of the Harms Associated With Ideologically Motivated Cyberattacks
Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, et al.
Crime & Delinquency (2024)
Closed Access | Times Cited: 1
Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, et al.
Crime & Delinquency (2024)
Closed Access | Times Cited: 1
Terrorism as Socio-Economic and Cultural Barriers to Indonesian Firms’ Financial Performance
Petrus Reinhard Golose
Journal of Ethnic and Cultural Studies (2023) Vol. 10, Iss. 2, pp. 22-40
Open Access | Times Cited: 2
Petrus Reinhard Golose
Journal of Ethnic and Cultural Studies (2023) Vol. 10, Iss. 2, pp. 22-40
Open Access | Times Cited: 2
Threat Construction and Framing of Cyberterrorism in the U.S. News Media
Mehmet F. Bastug, Ismail Onat, Ahmet Güler
International Journal of Cybersecurity Intelligence and Cybercrime (2023)
Open Access | Times Cited: 2
Mehmet F. Bastug, Ismail Onat, Ahmet Güler
International Journal of Cybersecurity Intelligence and Cybercrime (2023)
Open Access | Times Cited: 2
Threat Construction and Framing of Cyberterrorism in the U.S. News Media
Mehmet F. Bastug, Ismail Onat, Ahmet Güler
International Journal of Cybersecurity Intelligence and Cybercrime (2023) Vol. 6, Iss. 1, pp. 29-44
Open Access | Times Cited: 2
Mehmet F. Bastug, Ismail Onat, Ahmet Güler
International Journal of Cybersecurity Intelligence and Cybercrime (2023) Vol. 6, Iss. 1, pp. 29-44
Open Access | Times Cited: 2
Introduction to the Minitrack on Cybercrime
Felix Kegel, Till Ole Diesterhöft, Marvin Braun, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2024)
Open Access
Felix Kegel, Till Ole Diesterhöft, Marvin Braun, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2024)
Open Access
Transnational Networks in Sub-Saharan Africa
Jonathan Matusitz, D.A. Wesley
(2024), pp. 61-89
Closed Access
Jonathan Matusitz, D.A. Wesley
(2024), pp. 61-89
Closed Access
Effects of trust in government, counterterrorism policies, and counterterrorism laws on fear of cyberterrorism and fear of terrorism
Mustafa Demir, Mehmet F. Bastug
Journal of Policing Intelligence and Counter Terrorism (2024), pp. 1-23
Closed Access
Mustafa Demir, Mehmet F. Bastug
Journal of Policing Intelligence and Counter Terrorism (2024), pp. 1-23
Closed Access
Assessing Cyberattacks in Response to Police Actions in Physical Space
Daniella J. Ferrante, Thomas J. Holt
Deviant Behavior (2024), pp. 1-14
Open Access
Daniella J. Ferrante, Thomas J. Holt
Deviant Behavior (2024), pp. 1-14
Open Access
Contemporary Challenges to Democracy
Danny Osborne, Chris G. Sibley
Cambridge University Press eBooks (2022), pp. 361-598
Closed Access
Danny Osborne, Chris G. Sibley
Cambridge University Press eBooks (2022), pp. 361-598
Closed Access