
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
Maria Bada, Angela Sasse, Jason R. C. Nurse
arXiv (Cornell University) (2019)
Open Access | Times Cited: 119
Maria Bada, Angela Sasse, Jason R. C. Nurse
arXiv (Cornell University) (2019)
Open Access | Times Cited: 119
Showing 1-25 of 119 citing articles:
Challenges and Opportunities in Securing the Industrial Internet of Things
Martin Serror, Sacha Hack, Martin Henze, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 5, pp. 2985-2996
Open Access | Times Cited: 228
Martin Serror, Sacha Hack, Martin Henze, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 5, pp. 2985-2996
Open Access | Times Cited: 228
Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80
Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model
L. M. J. Bekkers, M.S. van ’t Hoff-de Goede, Ellen Misana-ter Huurne, et al.
Computers & Security (2023) Vol. 127, pp. 103099-103099
Open Access | Times Cited: 31
L. M. J. Bekkers, M.S. van ’t Hoff-de Goede, Ellen Misana-ter Huurne, et al.
Computers & Security (2023) Vol. 127, pp. 103099-103099
Open Access | Times Cited: 31
The Relationship between Cyber Security Knowledge, Awareness and Behavioural Choice Protection among Mobile Banking Users in Thailand
Pongsakorn Limna, Tanpat Kraiwanit, Sutithep Siripipattanakul
International Journal of Computing Sciences Research (2023) Vol. 7, pp. 1133-1151
Open Access | Times Cited: 27
Pongsakorn Limna, Tanpat Kraiwanit, Sutithep Siripipattanakul
International Journal of Computing Sciences Research (2023) Vol. 7, pp. 1133-1151
Open Access | Times Cited: 27
A systematic review of current cybersecurity training methods
Julia Prümmer, Tommy van Steen, Bibi van den Berg
Computers & Security (2023) Vol. 136, pp. 103585-103585
Open Access | Times Cited: 27
Julia Prümmer, Tommy van Steen, Bibi van den Berg
Computers & Security (2023) Vol. 136, pp. 103585-103585
Open Access | Times Cited: 27
A Decision Support Model for Assessing and Prioritization of Industry 5.0 Cybersecurity Challenges
Ifaz Ahmed, Niamat Ullah Ibne Hossain, Steven A. Fazio, et al.
Sustainable Manufacturing and Service Economics (2024), pp. 100018-100018
Open Access | Times Cited: 8
Ifaz Ahmed, Niamat Ullah Ibne Hossain, Steven A. Fazio, et al.
Sustainable Manufacturing and Service Economics (2024), pp. 100018-100018
Open Access | Times Cited: 8
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence
Abdulmajeed Abdullah Alahmari, Bob Duncan
(2020), pp. 1-5
Closed Access | Times Cited: 64
Abdulmajeed Abdullah Alahmari, Bob Duncan
(2020), pp. 1-5
Closed Access | Times Cited: 64
Building cyber security awareness in a developing country: Lessons from Myanmar
Lennon Y. C. Chang, Nicholas Coppel
Computers & Security (2020) Vol. 97, pp. 101959-101959
Closed Access | Times Cited: 58
Lennon Y. C. Chang, Nicholas Coppel
Computers & Security (2020) Vol. 97, pp. 101959-101959
Closed Access | Times Cited: 58
Modeling effective cybersecurity training frameworks: A delphi method-based study
Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos
Computers & Security (2021) Vol. 113, pp. 102551-102551
Open Access | Times Cited: 44
Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos
Computers & Security (2021) Vol. 113, pp. 102551-102551
Open Access | Times Cited: 44
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, et al.
Journal of Systems and Software (2023) Vol. 208, pp. 111899-111899
Open Access | Times Cited: 18
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, et al.
Journal of Systems and Software (2023) Vol. 208, pp. 111899-111899
Open Access | Times Cited: 18
Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector
Stephanie Nessa, Tushar Khinvasara
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 2, pp. 107-117
Open Access | Times Cited: 5
Stephanie Nessa, Tushar Khinvasara
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 2, pp. 107-117
Open Access | Times Cited: 5
Development of Cyber Security Awareness and Education Framework
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access
Navigating cybersecurity training: A comprehensive review
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Psychological Triggers in Phishing Attacks
Jagruti Surajkumar Patni, Arun Dev Sharma, Naveen Singh
IGI Global eBooks (2025), pp. 341-358
Closed Access
Jagruti Surajkumar Patni, Arun Dev Sharma, Naveen Singh
IGI Global eBooks (2025), pp. 341-358
Closed Access
Awareness, Adoption, and Misconceptions of Web Privacy Tools
Peter Story, Daniel Smullen, Yaxing Yao, et al.
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 3, pp. 308-333
Open Access | Times Cited: 32
Peter Story, Daniel Smullen, Yaxing Yao, et al.
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 3, pp. 308-333
Open Access | Times Cited: 32
Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
Hao Chen, Yan Zhang, Song Zhang, et al.
Education and Information Technologies (2023) Vol. 28, Iss. 12, pp. 15915-15948
Closed Access | Times Cited: 13
Hao Chen, Yan Zhang, Song Zhang, et al.
Education and Information Technologies (2023) Vol. 28, Iss. 12, pp. 15915-15948
Closed Access | Times Cited: 13
Food waste: environmental impact and possible solutions
Kirtika Kohli, Ravindra Prajapati, Raj Shah, et al.
Sustainable Food Technology (2023) Vol. 2, Iss. 1, pp. 70-80
Open Access | Times Cited: 12
Kirtika Kohli, Ravindra Prajapati, Raj Shah, et al.
Sustainable Food Technology (2023) Vol. 2, Iss. 1, pp. 70-80
Open Access | Times Cited: 12
How do Older Adults feel about engaging with Cyber‐Security?
Benjamin A. Morrison, Lynne Coventry, Pam Briggs
Human Behavior and Emerging Technologies (2021) Vol. 3, Iss. 5, pp. 1033-1049
Open Access | Times Cited: 30
Benjamin A. Morrison, Lynne Coventry, Pam Briggs
Human Behavior and Emerging Technologies (2021) Vol. 3, Iss. 5, pp. 1033-1049
Open Access | Times Cited: 30
Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy, et al.
IEEE Access (2021) Vol. 9, pp. 99339-99363
Open Access | Times Cited: 28
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy, et al.
IEEE Access (2021) Vol. 9, pp. 99339-99363
Open Access | Times Cited: 28
A Quantitative Study of Risk Scores and the Effectiveness of AI-Based Cybersecurity Awareness Training Programs
Meraj Farheen Ansari
International Journal of Smart Sensor and Adhoc Network (2022), pp. 1-8
Open Access | Times Cited: 20
Meraj Farheen Ansari
International Journal of Smart Sensor and Adhoc Network (2022), pp. 1-8
Open Access | Times Cited: 20
Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies
Anna Cartwright, Edward Cartwright, Esther Solomon Edun
Computers & Security (2023) Vol. 131, pp. 103288-103288
Open Access | Times Cited: 11
Anna Cartwright, Edward Cartwright, Esther Solomon Edun
Computers & Security (2023) Vol. 131, pp. 103288-103288
Open Access | Times Cited: 11
Cyberfraud, usage intention, and cybersecurity awareness among e-banking users in India: an integrated model approach
Mohammed Afzal, Mohd Shamim Ansari, Naseem Ahmad, et al.
Journal of Financial Services Marketing (2024) Vol. 29, Iss. 4, pp. 1503-1523
Closed Access | Times Cited: 3
Mohammed Afzal, Mohd Shamim Ansari, Naseem Ahmad, et al.
Journal of Financial Services Marketing (2024) Vol. 29, Iss. 4, pp. 1503-1523
Closed Access | Times Cited: 3
Empowering Professionals: A Generative AI Approach to Personalized Cybersecurity Learning
Christos Kallonas, Andriani Piki, Eliana Stavrou
2022 IEEE Global Engineering Education Conference (EDUCON) (2024), pp. 1-10
Closed Access | Times Cited: 3
Christos Kallonas, Andriani Piki, Eliana Stavrou
2022 IEEE Global Engineering Education Conference (EDUCON) (2024), pp. 1-10
Closed Access | Times Cited: 3
Coronavirus Social Engineering Attacks: Issues and Recommendations
Ahmed Alzahrani
International Journal of Advanced Computer Science and Applications (2020) Vol. 11, Iss. 5
Open Access | Times Cited: 28
Ahmed Alzahrani
International Journal of Advanced Computer Science and Applications (2020) Vol. 11, Iss. 5
Open Access | Times Cited: 28