OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber security threats: A never-ending challenge for e-commerce
Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 68

Showing 1-25 of 68 citing articles:

An empirical evaluation of technology acceptance model for Artificial Intelligence in E-commerce
Chenxing Wang, Sayed Fayaz Ahmad, Ahmad Y. A. Bani Ahmad, et al.
Heliyon (2023) Vol. 9, Iss. 8, pp. e18349-e18349
Open Access | Times Cited: 104

Role of perceived ease of use, usefulness, and financial strength on the adoption of health information systems: the moderating role of hospital size
Luo Ji, Sayed Fayaz Ahmad, Asma Alyaemeni, et al.
Humanities and Social Sciences Communications (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 37

The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities
Lázaro Florido-Benítez
Smart Cities (2024) Vol. 7, Iss. 1, pp. 475-495
Open Access | Times Cited: 17

Mindfulness of Digital Detoxification
Mohammad Badruddoza Talukder, Sanjeev Kumar, Iva Rani Das
Advances in logistics, operations, and management science book series (2024), pp. 56-71
Closed Access | Times Cited: 10

Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems
Yiyu Zhan, Sayed Fayaz Ahmad, Muhammad Irshad, et al.
Heliyon (2023) Vol. 10, Iss. 1, pp. e22947-e22947
Open Access | Times Cited: 17

Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review
Natile Nonhlanhla Cele, Sheila Kwenda
Journal of Financial Crime (2024)
Open Access | Times Cited: 5

Devsecops for Continuous Security in Trading Software Application Development: a Systematic Literature Review
S. D. L. V. Dasanayake, Janaka Senanayake, W.M.J.I. Wijayanayake
˜The œjournal of desk research review and analysis. (2025) Vol. 2, Iss. 2, pp. 215-232
Closed Access

The Nexus Between ICT Diffusion, Financial Development, Industrialization and Economic Growth: Evidence from Sub-Saharan African Countries
Charles Shaaba Saba, Nicholas Ngepah, Nicholas M. Odhiambo
Journal of African Business (2025), pp. 1-25
Open Access

AI Chatbots for Sustainability in Education: The Case of the Lebanese Higher Education Sector
Nahil Kazoun, Angelika Kokkinaki, Charbel Chedrawi
Lecture notes in business information processing (2025), pp. 19-32
Closed Access

Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation
Sunday Eric Adewumi, Uchenna Ani
Information Security Journal A Global Perspective (2025), pp. 1-38
Open Access

Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
Mishall Al-Zubaidie, Ghanima Sabr Shyaa
Future Internet (2023) Vol. 15, Iss. 8, pp. 262-262
Open Access | Times Cited: 12

A Sustainable Collaborative Talent Management Through Collaborative Intelligence Mindset Theory: A Systematic Review
Yew-Chee Chew, Siti Rohaida Mohamed Zainal
SAGE Open (2024) Vol. 14, Iss. 2
Open Access | Times Cited: 4

Evolution of E-Commerce in Business: A Review
Salmin Mostafa, Philip D. Palmer, Quynh Nguyen
(2025), pp. 341-355
Closed Access

What drives new knowledge in human cybersecurity behavior? Insights from bibliometrics and thematic review
Dragoș M. Obreja, Răzvan Rughiniş, Dinu Țurcanu
Computers in Human Behavior Reports (2025), pp. 100650-100650
Open Access

Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography
Ghanima Sabr Shyaa, Mishall Al-Zubaidie
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7085-7085
Open Access | Times Cited: 11

A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers
Vinaytosh Mishra, Kishu Gupta, Deepika Saxena, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4379-4387
Open Access | Times Cited: 3

Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2

A Machine Learning-Based Framework with Enhanced Feature Selection and Resampling for Improved Intrusion Detection
Fazila‐Tun‐Nesa Malik, Qazi Waqas Khan, Atif Rizwan, et al.
Mathematics (2024) Vol. 12, Iss. 12, pp. 1799-1799
Open Access | Times Cited: 2

We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers
Simon Vrhovec, Blaž Markelj
PLoS ONE (2024) Vol. 19, Iss. 10, pp. e0312266-e0312266
Open Access | Times Cited: 2

Actual and future digital threats and their impact on civil and military cybersecurity management
Oriana Negulescu, Elena Doval, Roxana Ștefănescu
Przegląd Nauk o Obronności (2023), Iss. 15, pp. 60-84
Open Access | Times Cited: 6

Role of Artificial Intelligence on Leadership Decision Making: A Perspective of Business Sector Organization
Jaweria, Saqib Ghias, Jan Muhammad
Annals of Human and Social Sciences (2023) Vol. 4, Iss. III
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top