
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Hospitals’ Cybersecurity Culture during the COVID-19 Crisis
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Fotios Gioulekas, et al.
Healthcare (2021) Vol. 9, Iss. 10, pp. 1335-1335
Open Access | Times Cited: 14
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Fotios Gioulekas, et al.
Healthcare (2021) Vol. 9, Iss. 10, pp. 1335-1335
Open Access | Times Cited: 14
Showing 14 citing articles:
Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür, et al.
Journal of Applied Biomedicine (2022) Vol. 43, Iss. 1, pp. 30-41
Closed Access | Times Cited: 78
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür, et al.
Journal of Applied Biomedicine (2022) Vol. 43, Iss. 1, pp. 30-41
Closed Access | Times Cited: 78
Phishing simulation exercise in a large hospital: A case study
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 29
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, et al.
Digital Health (2022) Vol. 8, pp. 205520762210817-205520762210817
Open Access | Times Cited: 29
A security awareness and competency evaluation in the energy sector
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Computers & Security (2023) Vol. 129, pp. 103199-103199
Closed Access | Times Cited: 13
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Computers & Security (2023) Vol. 129, pp. 103199-103199
Closed Access | Times Cited: 13
Cybersecurity in health sector: a systematic review of the literature
Catherine Vanessa Peve Herrera, J. Valcárcel, Mónica Díaz, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1099-1099
Open Access | Times Cited: 5
Catherine Vanessa Peve Herrera, J. Valcárcel, Mónica Díaz, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1099-1099
Open Access | Times Cited: 5
Survey on Cyber-Security for Healthcare System
Md Fahin Parvej, Md Mastarul Hoque, Dipak Kumar Kole
Lecture notes in networks and systems (2024), pp. 295-306
Closed Access | Times Cited: 1
Md Fahin Parvej, Md Mastarul Hoque, Dipak Kumar Kole
Lecture notes in networks and systems (2024), pp. 295-306
Closed Access | Times Cited: 1
Evaluating The Cyber-Security Culture of the EPES Sector
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Proceedings of the 17th International Conference on Availability, Reliability and Security (2022), pp. 1-10
Closed Access | Times Cited: 4
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Proceedings of the 17th International Conference on Availability, Reliability and Security (2022), pp. 1-10
Closed Access | Times Cited: 4
Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach
Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen
(2022), pp. 1-8
Closed Access | Times Cited: 3
Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen
(2022), pp. 1-8
Closed Access | Times Cited: 3
How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, et al.
Information (2024) Vol. 15, Iss. 2, pp. 80-80
Open Access
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, et al.
Information (2024) Vol. 15, Iss. 2, pp. 80-80
Open Access
SECANT: Cyberthreat Intelligence in IoMT Ecosystems
Arnolnt Spyros, Dimitrios Kavallieros, Theodora Tsikrika, et al.
Security informatics and law enforcement (2024), pp. 463-472
Open Access
Arnolnt Spyros, Dimitrios Kavallieros, Theodora Tsikrika, et al.
Security informatics and law enforcement (2024), pp. 463-472
Open Access
Can the Cognitive Dissonance (CD) concept help to mitigate phishing susceptibility in healthcare? (Preprint)
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Arnstein Vestad, et al.
(2024)
Open Access
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Arnstein Vestad, et al.
(2024)
Open Access
Assessing Employee Susceptibility to Cybersecurity Risks
Rafael Martínez-Peláez, Pablo Velarde-Alvarado, Vanessa G. Félix, et al.
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-25
Open Access
Rafael Martínez-Peláez, Pablo Velarde-Alvarado, Vanessa G. Félix, et al.
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-25
Open Access
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
Abeer Alharbi, Ali Alkhalifah
(2024)
Closed Access
Abeer Alharbi, Ali Alkhalifah
(2024)
Closed Access
Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups
Ziru Li, Simon Nam Thanh Vu, Nicola Dragoni, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 1
Ziru Li, Simon Nam Thanh Vu, Nicola Dragoni, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 1
An Analysis of Cybersecurity Policies and Practices in Public Administration
Aulia Ramdhani Arief
Journal of Public Representative and Society Provision (2022) Vol. 2, Iss. 2, pp. 56-62
Open Access
Aulia Ramdhani Arief
Journal of Public Representative and Society Provision (2022) Vol. 2, Iss. 2, pp. 56-62
Open Access