OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
Iman Almomani, Mohanned Ahmed, Λέανδρος Μαγλαράς
PeerJ Computer Science (2021) Vol. 7, pp. e703-e703
Open Access | Times Cited: 23

Showing 23 citing articles:

Higher education and digital Economy: Analysis of their coupling coordination with the Yangtze River economic Belt in China as the example
Yuqing Geng, Lingyan Chen, Jianyi Li, et al.
Ecological Indicators (2023) Vol. 154, pp. 110510-110510
Open Access | Times Cited: 50

Agile Audit Proposal for ISO IEC 27001 Standard Implementation in Higher Education Faculties
David Ruete, Pilar López Lira, Alejandro Caroca Navarro, et al.
Communications in computer and information science (2025), pp. 421-437
Closed Access

A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia
Ahmad Alshammari
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11445-11450
Open Access | Times Cited: 12

Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Alenka Brezavšček, Аленка Баггиа
Systems (2025) Vol. 13, Iss. 1, pp. 52-52
Open Access

Cybersecurity maturity model: Systematic literature review and a proposed model
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access

Cybersecurity maturity assessment using an incomplete hesitant fuzzy AHP method and Bonferroni means operator
Merve Güler, Gülçin Büyüközkan
Expert Systems with Applications (2025), pp. 127268-127268
Closed Access

Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Mohamed Noordin Yusuff Marican, Shukor Abd Razak, Ali Selamat, et al.
IEEE Access (2022) Vol. 11, pp. 5442-5452
Open Access | Times Cited: 16

An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning
Muhammad Ali Babar, Sarah Kaleem, Adnan Sohail, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-7
Open Access | Times Cited: 5

Unveiling The Arsenal of User Data Protection Tools and Practices
Syed Moiz, Abdul Ahad Abro, Mansoor Ebrahim, et al.
(2024) Vol. 63, pp. 1-7
Closed Access | Times Cited: 1

Balancing talent and technology: Navigating cybersecurity and privacy in SMEs
Yang Hoong, Davar Rezania
Telematics and Informatics Reports (2024) Vol. 15, pp. 100151-100151
Open Access | Times Cited: 1

Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Afnan Alfaadhel, Iman Almomani, Mohanned Ahmed
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6145-6145
Open Access | Times Cited: 4

An assessment of cybersecurity performance in the Saudi universities: A Total Quality Management approach
Tahani Abdullah Abdurhman Alhumud, Abdulfattah Omar, Waheed M. A. Altohami
Cogent Education (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 3

Compliance with Saudi NCA-ECC based on ISO/IEC 27001
Tahani Alsahafi, Waleed Halboob, Jalal Al‐Muhtadi
Tehnicki vjesnik - Technical Gazette (2022) Vol. 29, Iss. 6
Open Access | Times Cited: 4

The Importance of CIA Holders in Internal Control Department and Their Effect on GRC in the Egyptian Public Sector
Tamer Khamis
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 3051-3062
Open Access

Bridging the Gap
Atish Kumar Dash, Shashank Shivananda, Raghvendra Singh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 49-66
Closed Access

Training Needs of Information Specialists at Saudi Universities Libraries to Achieve Cybersecurity Requirements
Alia M. Alhaif
International Journal of Education and Information Technologies (2023) Vol. 17, pp. 38-50
Open Access | Times Cited: 1

The Cybersecurity Practice in Saudi Universities to Protect the Intellectual Rights of Faculty Members’ Publications
Wedad Abdullah Nasser Sharabi
International Journal of Instruction (2023) Vol. 16, Iss. 4, pp. 173-188
Open Access | Times Cited: 1

Aeronautic maturity cybersecurity: a framework
Guillermo Brito Acuña
DYNA (2023) Vol. 90, Iss. 227, pp. 24-34
Open Access | Times Cited: 1

Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST
Ethan Arenas, Juan Carlos Palomino, Juan-Pablo Mansilla
(2023)
Closed Access | Times Cited: 1

Information Security at Higher Education Institutions: A Systematic Literature Review
Daisy Imbaquingo-Esparza, Javier Díaz, Mario Ron, et al.
Communications in computer and information science (2022), pp. 294-309
Closed Access | Times Cited: 2

Saudi Arabia National Cyber Security System: Specificity and Development Risks
Leonid Cukanov
Bulletin of Kemerovo State University Series Political Sociological and Economic sciences (2022) Vol. 2021, Iss. 4, pp. 435-443
Open Access

Page 1

Scroll to top