
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 1-25
Open Access | Times Cited: 19
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 1-25
Open Access | Times Cited: 19
Showing 19 citing articles:
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
Babajide Tolulope Familoni, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 4, pp. 850-877
Open Access | Times Cited: 37
Babajide Tolulope Familoni, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 4, pp. 850-877
Open Access | Times Cited: 37
Artificial intelligence in environmental conservation: evaluating cyber risks and opportunities for sustainable practices
Uwaga Monica Adanma, Emmanuel Olurotimi Ogunbiyi
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 5, pp. 1178-1209
Open Access | Times Cited: 18
Uwaga Monica Adanma, Emmanuel Olurotimi Ogunbiyi
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 5, pp. 1178-1209
Open Access | Times Cited: 18
Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies
Lucky Bamidele Benjamin, Ayodeji Enoch Adegbola, Prisca Amajuoyi, et al.
Global Journal of Engineering and Technology Advances (2024) Vol. 19, Iss. 2, pp. 134-153
Open Access | Times Cited: 11
Lucky Bamidele Benjamin, Ayodeji Enoch Adegbola, Prisca Amajuoyi, et al.
Global Journal of Engineering and Technology Advances (2024) Vol. 19, Iss. 2, pp. 134-153
Open Access | Times Cited: 11
Digital transformation as a catalyst for business model innovation: A critical review of impact and implementation strategies
Nsisong Louis Eyo-Udo
Open Access Research Journal of Engineering and Technology (2024) Vol. 6, Iss. 2, pp. 001-022
Open Access | Times Cited: 3
Nsisong Louis Eyo-Udo
Open Access Research Journal of Engineering and Technology (2024) Vol. 6, Iss. 2, pp. 001-022
Open Access | Times Cited: 3
The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data
Oluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, et al.
International Medical Science Research Journal (2024) Vol. 4, Iss. 6, pp. 668-693
Open Access | Times Cited: 3
Oluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, et al.
International Medical Science Research Journal (2024) Vol. 4, Iss. 6, pp. 668-693
Open Access | Times Cited: 3
RFSA: A Ransomware Feature Selection Algorithm for Multivariate Analysis of Malware Behavior in Cryptocurrency
Mike Nkongolo
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 901-935
Open Access | Times Cited: 2
Mike Nkongolo
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 901-935
Open Access | Times Cited: 2
Time for Change
Mary Viterouli, Dimitrios Belias, Αθανάσιος Κουστέλιος, et al.
Advances in human resources management and organizational development book series (2024), pp. 267-307
Closed Access | Times Cited: 2
Mary Viterouli, Dimitrios Belias, Αθανάσιος Κουστέλιος, et al.
Advances in human resources management and organizational development book series (2024), pp. 267-307
Closed Access | Times Cited: 2
Entropy-Extreme Model for Predicting the Development of Cyber Epidemics at Early Stages
Viacheslav Kovtun, Krzysztof Grochla, Mohammed Al‐Maitah, et al.
Computational and Structural Biotechnology Journal (2024) Vol. 24, pp. 593-602
Open Access | Times Cited: 2
Viacheslav Kovtun, Krzysztof Grochla, Mohammed Al‐Maitah, et al.
Computational and Structural Biotechnology Journal (2024) Vol. 24, pp. 593-602
Open Access | Times Cited: 2
FinSafeNet: securing digital transactions using optimized deep learning and multi-kernel PCA(MKPCA) with Nyström approximation
Ahmad Raza Khan, Shaik Shakeel Ahamad, Shailendra Mishra, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Ahmad Raza Khan, Shaik Shakeel Ahamad, Shailendra Mishra, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Cyber Guardian : Intelligent Threat Surveillance
H. R. Aditi., Anusha Bhaskar D, H Priyanka
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 644-655
Open Access
H. R. Aditi., Anusha Bhaskar D, H Priyanka
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 644-655
Open Access
Measuring the contingency of organisational failure to upskill low-skilled jobs with training to preclude technological development job losses: A human resource development contemporary crisis
Zimkhitha Final Juqu, Hlalele Matebese, Normah Fadzai Mutongerwa
International Journal of Research in Human Resource Management (2024) Vol. 6, Iss. 1, pp. 225-233
Open Access
Zimkhitha Final Juqu, Hlalele Matebese, Normah Fadzai Mutongerwa
International Journal of Research in Human Resource Management (2024) Vol. 6, Iss. 1, pp. 225-233
Open Access
Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria
Oyetunde Christian Oyedeji., Mubarak A Moronkunbi, Adebayo Adeyinka Victor, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 52-58
Open Access
Oyetunde Christian Oyedeji., Mubarak A Moronkunbi, Adebayo Adeyinka Victor, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 52-58
Open Access
БЕЗПЕКОВІ АСПЕКТИ ЦИФРОВОЇ ВЗАЄМОДІЇ У СИСТЕМІ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ В УКРАЇНІ
О. П. Попов
Investytsiyi praktyka ta dosvid (2024), Iss. 16, pp. 309-314
Open Access
О. П. Попов
Investytsiyi praktyka ta dosvid (2024), Iss. 16, pp. 309-314
Open Access
FinSafeNet: Securing Digital Transactions using optimized Deep learning and Multi-kernal PCA(MKPCA) with Nyström Approximation
Amad Raza Khan, Shaik Sakel Ahmed, Shailendra Mishra, et al.
Research Square (Research Square) (2024)
Closed Access
Amad Raza Khan, Shaik Sakel Ahmed, Shailendra Mishra, et al.
Research Square (Research Square) (2024)
Closed Access
Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals
Mozamel M. Saeed
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access
Mozamel M. Saeed
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access
Engineering Safety and Ethical Challenges in 2045 Artificial Intelligence Singularity
Jing Suo, Mingcan Li, Jinhao Guo, et al.
Sustainability (2024) Vol. 16, Iss. 23, pp. 10337-10337
Open Access
Jing Suo, Mingcan Li, Jinhao Guo, et al.
Sustainability (2024) Vol. 16, Iss. 23, pp. 10337-10337
Open Access
Cybersecurity in the Digital Era: A Comprehensive Framework for Safeguarding Data Integrity, Privacy and Critical Infrastructures Against Evolving Threats
Harsh C Vachheta, Ishita Pawar, Ketan Girish Hukare, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 471-486
Open Access
Harsh C Vachheta, Ishita Pawar, Ketan Girish Hukare, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 471-486
Open Access
A systematic review on information security policies in the USA banking system and global banking: Risks, rewards, and future trends
Md Wali Ullah, M. Afshar Alam, Tanzina Sultana, et al.
Edelweiss Applied Science and Technology (2024) Vol. 8, Iss. 6, pp. 8437-8453
Open Access
Md Wali Ullah, M. Afshar Alam, Tanzina Sultana, et al.
Edelweiss Applied Science and Technology (2024) Vol. 8, Iss. 6, pp. 8437-8453
Open Access
Navigating the digital frontier: A comprehensive analysis of cybersecurity and information security in the modern era
Thamarasseri Ismail, P. Gayathri
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 2, pp. 1-1
Closed Access
Thamarasseri Ismail, P. Gayathri
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 2, pp. 1-1
Closed Access