OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Data Privacy: An End-User Perspective

International Journal of Computer Networks and Communications Security (2013) Vol. 1, Iss. 2013
Closed Access | Times Cited: 8

Showing 8 citing articles:

Intimate intrusions online: Studying the normalisation of abuse in dating apps
Rosalie Gillett
Women s Studies International Forum (2018) Vol. 69, pp. 212-219
Open Access | Times Cited: 69

Towards Privacy-Aware Data Federation Platforms: A User-Centric Design Approach
Dimitra Papatsaroucha, Konstantina Pityanou, Aris S. Lalos, et al.
Lecture notes in networks and systems (2025), pp. 329-339
Closed Access

Making public concerns tangible: An empirical study of German and UK citizens’ perception of data protection and data security
Lyn Ellen Pleger, Katharina Guirguis, Alexander Mertes
Computers in Human Behavior (2021) Vol. 122, pp. 106830-106830
Open Access | Times Cited: 24

The Scourge of Online Deception in Social Networks
Esma Aı̈meur, Hicham Hage, Sabrine Amri
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2018) Vol. abs 1707 7592, pp. 1266-1271
Closed Access | Times Cited: 11

Understanding the Landscape of Online Deception
Hicham Hage, Esma Aı̈meur, Amel Guedidi
Advances in media, entertainment and the arts (AMEA) book series (2020), pp. 290-317
Closed Access | Times Cited: 5

Personalisation and Privacy Issues in the Age of Exposure
Esma Aı̈meur
(2018), pp. 375-376
Closed Access | Times Cited: 4

Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model
Aymen Hamoud, Esma Aı̈meur
Frontiers in Computer Science (2020) Vol. 2
Open Access | Times Cited: 4

Understanding the Landscape of Online Deception
Hicham Hage, Esma Aı̈meur, Amel Guedidi
IGI Global eBooks (2020), pp. 39-66
Closed Access | Times Cited: 2

Page 1

Scroll to top