OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
Maria Bada, Angela Sasse, Jason R. C. Nurse
arXiv (Cornell University) (2019)
Open Access | Times Cited: 119

Showing 1-25 of 119 citing articles:

Challenges and Opportunities in Securing the Industrial Internet of Things
Martin Serror, Sacha Hack, Martin Henze, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 5, pp. 2985-2996
Open Access | Times Cited: 228

Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80

Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model
L. M. J. Bekkers, M.S. van ’t Hoff-de Goede, Ellen Misana-ter Huurne, et al.
Computers & Security (2023) Vol. 127, pp. 103099-103099
Open Access | Times Cited: 31

The Relationship between Cyber Security Knowledge, Awareness and Behavioural Choice Protection among Mobile Banking Users in Thailand
Pongsakorn Limna, Tanpat Kraiwanit, Sutithep Siripipattanakul
International Journal of Computing Sciences Research (2023) Vol. 7, pp. 1133-1151
Open Access | Times Cited: 27

A systematic review of current cybersecurity training methods
Julia Prümmer, Tommy van Steen, Bibi van den Berg
Computers & Security (2023) Vol. 136, pp. 103585-103585
Open Access | Times Cited: 27

A Decision Support Model for Assessing and Prioritization of Industry 5.0 Cybersecurity Challenges
Ifaz Ahmed, Niamat Ullah Ibne Hossain, Steven A. Fazio, et al.
Sustainable Manufacturing and Service Economics (2024), pp. 100018-100018
Open Access | Times Cited: 8

Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence
Abdulmajeed Abdullah Alahmari, Bob Duncan
(2020), pp. 1-5
Closed Access | Times Cited: 64

Building cyber security awareness in a developing country: Lessons from Myanmar
Lennon Y. C. Chang, Nicholas Coppel
Computers & Security (2020) Vol. 97, pp. 101959-101959
Closed Access | Times Cited: 58

Modeling effective cybersecurity training frameworks: A delphi method-based study
Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos
Computers & Security (2021) Vol. 113, pp. 102551-102551
Open Access | Times Cited: 44

A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, et al.
Journal of Systems and Software (2023) Vol. 208, pp. 111899-111899
Open Access | Times Cited: 18

Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector
Stephanie Nessa, Tushar Khinvasara
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 2, pp. 107-117
Open Access | Times Cited: 5

Development of Cyber Security Awareness and Education Framework
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access

Navigating cybersecurity training: A comprehensive review
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access

A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access

Psychological Triggers in Phishing Attacks
Jagruti Surajkumar Patni, Arun Dev Sharma, Naveen Singh
IGI Global eBooks (2025), pp. 341-358
Closed Access

Awareness, Adoption, and Misconceptions of Web Privacy Tools
Peter Story, Daniel Smullen, Yaxing Yao, et al.
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 3, pp. 308-333
Open Access | Times Cited: 32

Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
Hao Chen, Yan Zhang, Song Zhang, et al.
Education and Information Technologies (2023) Vol. 28, Iss. 12, pp. 15915-15948
Closed Access | Times Cited: 13

Food waste: environmental impact and possible solutions
Kirtika Kohli, Ravindra Prajapati, Raj Shah, et al.
Sustainable Food Technology (2023) Vol. 2, Iss. 1, pp. 70-80
Open Access | Times Cited: 12

How do Older Adults feel about engaging with Cyber‐Security?
Benjamin A. Morrison, Lynne Coventry, Pam Briggs
Human Behavior and Emerging Technologies (2021) Vol. 3, Iss. 5, pp. 1033-1049
Open Access | Times Cited: 30

Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy, et al.
IEEE Access (2021) Vol. 9, pp. 99339-99363
Open Access | Times Cited: 28

A Quantitative Study of Risk Scores and the Effectiveness of AI-Based Cybersecurity Awareness Training Programs
Meraj Farheen Ansari
International Journal of Smart Sensor and Adhoc Network (2022), pp. 1-8
Open Access | Times Cited: 20

Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies
Anna Cartwright, Edward Cartwright, Esther Solomon Edun
Computers & Security (2023) Vol. 131, pp. 103288-103288
Open Access | Times Cited: 11

Cyberfraud, usage intention, and cybersecurity awareness among e-banking users in India: an integrated model approach
Mohammed Afzal, Mohd Shamim Ansari, Naseem Ahmad, et al.
Journal of Financial Services Marketing (2024) Vol. 29, Iss. 4, pp. 1503-1523
Closed Access | Times Cited: 3

Empowering Professionals: A Generative AI Approach to Personalized Cybersecurity Learning
Christos Kallonas, Andriani Piki, Eliana Stavrou
2022 IEEE Global Engineering Education Conference (EDUCON) (2024), pp. 1-10
Closed Access | Times Cited: 3

Coronavirus Social Engineering Attacks: Issues and Recommendations
Ahmed Alzahrani
International Journal of Advanced Computer Science and Applications (2020) Vol. 11, Iss. 5
Open Access | Times Cited: 28

Page 1 - Next Page

Scroll to top