
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Phishing simulation exercise in a large hospital: A case study
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 29
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
Enhancing Cybersecurity Protocols in Modern Healthcare Systems
Muhammad Usman Tariq
Advances in healthcare information systems and administration book series (2024), pp. 223-241
Closed Access | Times Cited: 39
Muhammad Usman Tariq
Advances in healthcare information systems and administration book series (2024), pp. 223-241
Closed Access | Times Cited: 39
Cyber Security in Hospitals: A Network-Oriented Model for Behavioural Learning of Employees During Phishing Simulations
Debby Bouma, Charlotte Hoffmans, Niek Jan van den Hout, et al.
Lecture notes in networks and systems (2024), pp. 98-111
Closed Access | Times Cited: 8
Debby Bouma, Charlotte Hoffmans, Niek Jan van den Hout, et al.
Lecture notes in networks and systems (2024), pp. 98-111
Closed Access | Times Cited: 8
Navigating cybersecurity training: A comprehensive review
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model
Flavia Lepădatu, Teodora Mihăilescu, Suzanne Spaan, et al.
Communications in computer and information science (2025), pp. 270-282
Closed Access
Flavia Lepădatu, Teodora Mihăilescu, Suzanne Spaan, et al.
Communications in computer and information science (2025), pp. 270-282
Closed Access
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment
Xiaowei Chen, Margault Sacré, Gabriele Lenzini, et al.
(2024), pp. 1-21
Open Access | Times Cited: 3
Xiaowei Chen, Margault Sacré, Gabriele Lenzini, et al.
(2024), pp. 1-21
Open Access | Times Cited: 3
User perception of Context-Based Micro-Training – a method for cybersecurity training
Joakim Kävrestad, Steven Furnell, Marcus Nohlberg
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 2, pp. 121-137
Open Access | Times Cited: 7
Joakim Kävrestad, Steven Furnell, Marcus Nohlberg
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 2, pp. 121-137
Open Access | Times Cited: 7
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions
Anne Clara Tally, Jacob Abbott, Ashley M Bochner, et al.
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-27
Closed Access | Times Cited: 5
Anne Clara Tally, Jacob Abbott, Ashley M Bochner, et al.
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW1, pp. 1-27
Closed Access | Times Cited: 5
Cybersecurity in health sector: a systematic review of the literature
Catherine Vanessa Peve Herrera, J. Valcárcel, Mónica Díaz, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1099-1099
Open Access | Times Cited: 5
Catherine Vanessa Peve Herrera, J. Valcárcel, Mónica Díaz, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1099-1099
Open Access | Times Cited: 5
Survey on Cyber-Security for Healthcare System
Md Fahin Parvej, Md Mastarul Hoque, Dipak Kumar Kole
Lecture notes in networks and systems (2024), pp. 295-306
Closed Access | Times Cited: 1
Md Fahin Parvej, Md Mastarul Hoque, Dipak Kumar Kole
Lecture notes in networks and systems (2024), pp. 295-306
Closed Access | Times Cited: 1
Holding Your Hand on the Danger Button
Matt Dixon, James Nicholson, Dawn Branley-Bell, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. MHCI, pp. 1-22
Open Access | Times Cited: 7
Matt Dixon, James Nicholson, Dawn Branley-Bell, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. MHCI, pp. 1-22
Open Access | Times Cited: 7
Assessing the Relevance of Cybersecurity Training and Policies to Prevent and Mitigate the Impact of Phishing Attacks
Lu ́ıs Pinto
Journal of Internet Services and Information Security (2022) Vol. 12, Iss. 4, pp. 23-38
Open Access | Times Cited: 6
Lu ́ıs Pinto
Journal of Internet Services and Information Security (2022) Vol. 12, Iss. 4, pp. 23-38
Open Access | Times Cited: 6
Demand Analysis of the Cybersecurity Knowledge Areas and Skills for the Nurses: Preliminary Findings
Jyri Rajamäki, Paresh Rathod, Kitty Kioskli
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 711-716
Open Access | Times Cited: 2
Jyri Rajamäki, Paresh Rathod, Kitty Kioskli
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 711-716
Open Access | Times Cited: 2
Improving the Cybersecurity Awareness of Finnish Podiatry SMEs
Jyri Rajamäki, Niroj Chaulagain, Markus Kukkonen, et al.
WSEAS TRANSACTIONS ON COMPUTERS (2023) Vol. 22, pp. 198-205
Open Access | Times Cited: 2
Jyri Rajamäki, Niroj Chaulagain, Markus Kukkonen, et al.
WSEAS TRANSACTIONS ON COMPUTERS (2023) Vol. 22, pp. 198-205
Open Access | Times Cited: 2
Enhancing Phishing Awareness Strategy Through Embedded Learning Tools: A Simulation Approach
Bamanga Mahmud Ahmad, Shehu Mohammed Ahmed, Dikko Elisha Sylvanus
Archives of Advanced Engineering Science (2023)
Open Access | Times Cited: 2
Bamanga Mahmud Ahmad, Shehu Mohammed Ahmed, Dikko Elisha Sylvanus
Archives of Advanced Engineering Science (2023)
Open Access | Times Cited: 2
OSIRIS: Organization Simulation in Response to Intrusion Strategies
Jeongkeun Shin, Geoffrey B. Dobson, Kathleen M. Carley, et al.
Lecture notes in computer science (2022), pp. 134-143
Closed Access | Times Cited: 4
Jeongkeun Shin, Geoffrey B. Dobson, Kathleen M. Carley, et al.
Lecture notes in computer science (2022), pp. 134-143
Closed Access | Times Cited: 4
Training on Social Media Cybersecurity Skills in the Healthcare Context
Mario Fernández-Tárraga, Alejandro-David Cayuela-Tudela, Pantaleone Nespoli, et al.
Communications in computer and information science (2024), pp. 3-20
Closed Access
Mario Fernández-Tárraga, Alejandro-David Cayuela-Tudela, Pantaleone Nespoli, et al.
Communications in computer and information science (2024), pp. 3-20
Closed Access
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany
Jan Tolsdorf, Luigi Lo Iacono
Lecture notes in computer science (2024), pp. 98-117
Closed Access
Jan Tolsdorf, Luigi Lo Iacono
Lecture notes in computer science (2024), pp. 98-117
Closed Access
LOCKing Patient Safety: A Dynamic Cybersecurity Checklist for Healthcare Workers
Jyri Rajamäki, K Wood, Benjamin Espada
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 811-815
Open Access
Jyri Rajamäki, K Wood, Benjamin Espada
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 811-815
Open Access
The Current Landscape of Cybersecurity Training in CAHIIM Accredited Programs
Huanmei Wu, Mukeshi Kumar Patel, Chiu C. Tan
2022 IEEE 10th International Conference on Healthcare Informatics (ICHI) (2024), pp. 750-752
Closed Access
Huanmei Wu, Mukeshi Kumar Patel, Chiu C. Tan
2022 IEEE 10th International Conference on Healthcare Informatics (ICHI) (2024), pp. 750-752
Closed Access
Can the Cognitive Dissonance (CD) concept help to mitigate phishing susceptibility in healthcare? (Preprint)
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Arnstein Vestad, et al.
(2024)
Open Access
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Arnstein Vestad, et al.
(2024)
Open Access
Evaluating Phishing Awareness Strategies: A Comparative Study of Education-based approaches and Game-based learning
Esperance Ngo Mbedeg Le-Nye, Charles Yaacoub, Jalal Possik
Procedia Computer Science (2024) Vol. 251, pp. 666-671
Open Access
Esperance Ngo Mbedeg Le-Nye, Charles Yaacoub, Jalal Possik
Procedia Computer Science (2024) Vol. 251, pp. 666-671
Open Access
Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach
Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen
(2022), pp. 1-8
Closed Access | Times Cited: 3
Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen
(2022), pp. 1-8
Closed Access | Times Cited: 3
Benefits of Information Security Awareness Training Against Phishing Attacks
Arzu Tufan, Gürkan Tuna
Advances in information security, privacy, and ethics book series (2023), pp. 49-78
Closed Access | Times Cited: 1
Arzu Tufan, Gürkan Tuna
Advances in information security, privacy, and ethics book series (2023), pp. 49-78
Closed Access | Times Cited: 1
A Stage Model for Understanding Phishing Victimization Behavior in Embedded Training
Lina Zhou, Dongsong Zhang, Zhihui Liu
(2023), pp. 1-6
Closed Access | Times Cited: 1
Lina Zhou, Dongsong Zhang, Zhihui Liu
(2023), pp. 1-6
Closed Access | Times Cited: 1
An Examination of the Human Factors in Cybersecurity: Future Direction for Nigerian Banks
George Ajufo, Abubaker Qutieshat
Indonesian Journal of Information Systems (2023) Vol. 6, Iss. 1, pp. 1-16
Open Access | Times Cited: 1
George Ajufo, Abubaker Qutieshat
Indonesian Journal of Information Systems (2023) Vol. 6, Iss. 1, pp. 1-16
Open Access | Times Cited: 1