
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
Iman Almomani, Mohanned Ahmed, Λέανδρος Μαγλαράς
PeerJ Computer Science (2021) Vol. 7, pp. e703-e703
Open Access | Times Cited: 23
Iman Almomani, Mohanned Ahmed, Λέανδρος Μαγλαράς
PeerJ Computer Science (2021) Vol. 7, pp. e703-e703
Open Access | Times Cited: 23
Showing 23 citing articles:
Higher education and digital Economy: Analysis of their coupling coordination with the Yangtze River economic Belt in China as the example
Yuqing Geng, Lingyan Chen, Jianyi Li, et al.
Ecological Indicators (2023) Vol. 154, pp. 110510-110510
Open Access | Times Cited: 50
Yuqing Geng, Lingyan Chen, Jianyi Li, et al.
Ecological Indicators (2023) Vol. 154, pp. 110510-110510
Open Access | Times Cited: 50
Agile Audit Proposal for ISO IEC 27001 Standard Implementation in Higher Education Faculties
David Ruete, Pilar López Lira, Alejandro Caroca Navarro, et al.
Communications in computer and information science (2025), pp. 421-437
Closed Access
David Ruete, Pilar López Lira, Alejandro Caroca Navarro, et al.
Communications in computer and information science (2025), pp. 421-437
Closed Access
A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia
Ahmad Alshammari
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11445-11450
Open Access | Times Cited: 12
Ahmad Alshammari
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11445-11450
Open Access | Times Cited: 12
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Alenka Brezavšček, Аленка Баггиа
Systems (2025) Vol. 13, Iss. 1, pp. 52-52
Open Access
Alenka Brezavšček, Аленка Баггиа
Systems (2025) Vol. 13, Iss. 1, pp. 52-52
Open Access
Cybersecurity maturity model: Systematic literature review and a proposed model
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access
Cybersecurity maturity assessment using an incomplete hesitant fuzzy AHP method and Bonferroni means operator
Merve Güler, Gülçin Büyüközkan
Expert Systems with Applications (2025), pp. 127268-127268
Closed Access
Merve Güler, Gülçin Büyüközkan
Expert Systems with Applications (2025), pp. 127268-127268
Closed Access
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Mohamed Noordin Yusuff Marican, Shukor Abd Razak, Ali Selamat, et al.
IEEE Access (2022) Vol. 11, pp. 5442-5452
Open Access | Times Cited: 16
Mohamed Noordin Yusuff Marican, Shukor Abd Razak, Ali Selamat, et al.
IEEE Access (2022) Vol. 11, pp. 5442-5452
Open Access | Times Cited: 16
A Quadruple “E” Approach for Effective Cyber-Hygiene Behaviour and Attitude toward Online Learning among Higher-Education Students in Saudi Arabia amid COVID-19 Pandemic
Mostafa Aboulnour Salem, Abu Elnasr E. Sobaih
Electronics (2023) Vol. 12, Iss. 10, pp. 2268-2268
Open Access | Times Cited: 5
Mostafa Aboulnour Salem, Abu Elnasr E. Sobaih
Electronics (2023) Vol. 12, Iss. 10, pp. 2268-2268
Open Access | Times Cited: 5
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning
Muhammad Ali Babar, Sarah Kaleem, Adnan Sohail, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-7
Open Access | Times Cited: 5
Muhammad Ali Babar, Sarah Kaleem, Adnan Sohail, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-7
Open Access | Times Cited: 5
Unveiling The Arsenal of User Data Protection Tools and Practices
Syed Moiz, Abdul Ahad Abro, Mansoor Ebrahim, et al.
(2024) Vol. 63, pp. 1-7
Closed Access | Times Cited: 1
Syed Moiz, Abdul Ahad Abro, Mansoor Ebrahim, et al.
(2024) Vol. 63, pp. 1-7
Closed Access | Times Cited: 1
Balancing talent and technology: Navigating cybersecurity and privacy in SMEs
Yang Hoong, Davar Rezania
Telematics and Informatics Reports (2024) Vol. 15, pp. 100151-100151
Open Access | Times Cited: 1
Yang Hoong, Davar Rezania
Telematics and Informatics Reports (2024) Vol. 15, pp. 100151-100151
Open Access | Times Cited: 1
Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Afnan Alfaadhel, Iman Almomani, Mohanned Ahmed
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6145-6145
Open Access | Times Cited: 4
Afnan Alfaadhel, Iman Almomani, Mohanned Ahmed
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6145-6145
Open Access | Times Cited: 4
CYBERSECURITY AWARENESS IN HIGHER EDUCATION: A COMPARATIVE ANALYSIS OF FACULTY AND STAFF
Issues in Information Systems (2023)
Open Access | Times Cited: 3
Issues in Information Systems (2023)
Open Access | Times Cited: 3
An assessment of cybersecurity performance in the Saudi universities: A Total Quality Management approach
Tahani Abdullah Abdurhman Alhumud, Abdulfattah Omar, Waheed M. A. Altohami
Cogent Education (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 3
Tahani Abdullah Abdurhman Alhumud, Abdulfattah Omar, Waheed M. A. Altohami
Cogent Education (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 3
Compliance with Saudi NCA-ECC based on ISO/IEC 27001
Tahani Alsahafi, Waleed Halboob, Jalal Al‐Muhtadi
Tehnicki vjesnik - Technical Gazette (2022) Vol. 29, Iss. 6
Open Access | Times Cited: 4
Tahani Alsahafi, Waleed Halboob, Jalal Al‐Muhtadi
Tehnicki vjesnik - Technical Gazette (2022) Vol. 29, Iss. 6
Open Access | Times Cited: 4
The Importance of CIA Holders in Internal Control Department and Their Effect on GRC in the Egyptian Public Sector
Tamer Khamis
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 3051-3062
Open Access
Tamer Khamis
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 3051-3062
Open Access
Bridging the Gap
Atish Kumar Dash, Shashank Shivananda, Raghvendra Singh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 49-66
Closed Access
Atish Kumar Dash, Shashank Shivananda, Raghvendra Singh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 49-66
Closed Access
Training Needs of Information Specialists at Saudi Universities Libraries to Achieve Cybersecurity Requirements
Alia M. Alhaif
International Journal of Education and Information Technologies (2023) Vol. 17, pp. 38-50
Open Access | Times Cited: 1
Alia M. Alhaif
International Journal of Education and Information Technologies (2023) Vol. 17, pp. 38-50
Open Access | Times Cited: 1
The Cybersecurity Practice in Saudi Universities to Protect the Intellectual Rights of Faculty Members’ Publications
Wedad Abdullah Nasser Sharabi
International Journal of Instruction (2023) Vol. 16, Iss. 4, pp. 173-188
Open Access | Times Cited: 1
Wedad Abdullah Nasser Sharabi
International Journal of Instruction (2023) Vol. 16, Iss. 4, pp. 173-188
Open Access | Times Cited: 1
Aeronautic maturity cybersecurity: a framework
Guillermo Brito Acuña
DYNA (2023) Vol. 90, Iss. 227, pp. 24-34
Open Access | Times Cited: 1
Guillermo Brito Acuña
DYNA (2023) Vol. 90, Iss. 227, pp. 24-34
Open Access | Times Cited: 1
Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST
Ethan Arenas, Juan Carlos Palomino, Juan-Pablo Mansilla
(2023)
Closed Access | Times Cited: 1
Ethan Arenas, Juan Carlos Palomino, Juan-Pablo Mansilla
(2023)
Closed Access | Times Cited: 1
Information Security at Higher Education Institutions: A Systematic Literature Review
Daisy Imbaquingo-Esparza, Javier Díaz, Mario Ron, et al.
Communications in computer and information science (2022), pp. 294-309
Closed Access | Times Cited: 2
Daisy Imbaquingo-Esparza, Javier Díaz, Mario Ron, et al.
Communications in computer and information science (2022), pp. 294-309
Closed Access | Times Cited: 2
Saudi Arabia National Cyber Security System: Specificity and Development Risks
Leonid Cukanov
Bulletin of Kemerovo State University Series Political Sociological and Economic sciences (2022) Vol. 2021, Iss. 4, pp. 435-443
Open Access
Leonid Cukanov
Bulletin of Kemerovo State University Series Political Sociological and Economic sciences (2022) Vol. 2021, Iss. 4, pp. 435-443
Open Access