Adam Beautement

532 total citations
7 papers, 268 citations indexed

About

Adam Beautement is a scholar working on Information Systems, Computer Networks and Communications and Sociology and Political Science. According to data from OpenAlex, Adam Beautement has authored 7 papers receiving a total of 268 indexed citations (citations by other indexed papers that have themselves been cited), including 7 papers in Information Systems, 2 papers in Computer Networks and Communications and 1 paper in Sociology and Political Science. Recurrent topics in Adam Beautement's work include Information and Cyber Security (6 papers), User Authentication and Security Systems (4 papers) and Spam and Phishing Detection (2 papers). Adam Beautement is often cited by papers focused on Information and Cyber Security (6 papers), User Authentication and Security Systems (4 papers) and Spam and Phishing Detection (2 papers). Adam Beautement collaborates with scholars based in United Kingdom, United States and Australia. Adam Beautement's co-authors include M. Angela Sasse, Angela Sasse, David Pym, Simon Parkin, Philip Inglesant and Brian Monahan and has published in prestigious journals such as Computer Fraud & Security and UCL Discovery (University College London).

In The Last Decade

Adam Beautement

7 papers receiving 253 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Adam Beautement United Kingdom 6 236 112 62 54 27 7 268
Iacovos Kirlappos United Kingdom 4 182 0.8× 77 0.7× 48 0.8× 41 0.8× 11 0.4× 5 203
Saurabh Panjwani India 9 106 0.4× 71 0.6× 48 0.8× 50 0.9× 19 0.7× 15 211
Marcus Nohlberg Sweden 8 208 0.9× 82 0.7× 73 1.2× 45 0.8× 6 0.2× 30 242
Salvatore Aurigemma United States 8 161 0.7× 80 0.7× 17 0.3× 57 1.1× 7 0.3× 13 256
Hussain Aldawood Australia 10 267 1.1× 64 0.6× 98 1.6× 99 1.8× 3 0.1× 16 334
Mohammad Tahaei United Kingdom 10 162 0.7× 181 1.6× 56 0.9× 18 0.3× 38 1.4× 18 326
Christopher Hadnagy United States 6 210 0.9× 70 0.6× 83 1.3× 61 1.1× 3 0.1× 6 284
Anastasia Danilova Germany 7 180 0.8× 98 0.9× 82 1.3× 9 0.2× 16 0.6× 16 245
Hamza Harkous Switzerland 7 92 0.4× 142 1.3× 21 0.3× 61 1.1× 8 0.3× 14 246
Alena Naiakshina Germany 7 186 0.8× 103 0.9× 84 1.4× 9 0.2× 17 0.6× 13 243

Countries citing papers authored by Adam Beautement

Since Specialization
Citations

This map shows the geographic impact of Adam Beautement's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Adam Beautement with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Adam Beautement more than expected).

Fields of papers citing papers by Adam Beautement

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Adam Beautement. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Adam Beautement. The network helps show where Adam Beautement may publish in the future.

Co-authorship network of co-authors of Adam Beautement

This figure shows the co-authorship network connecting the top 25 collaborators of Adam Beautement. A scholar is included among the top collaborators of Adam Beautement based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Adam Beautement. Adam Beautement is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

7 of 7 papers shown
1.
Beautement, Adam, et al.. (2016). Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. UCL Discovery (University College London). 253–270. 20 indexed citations
2.
Beautement, Adam, et al.. (2015). Employee Rule Breakers, Excuse Makers and Security Champions:. 73–84. 25 indexed citations
3.
Beautement, Adam, et al.. (2011). Systematic Decision Making in Security Management Modelling Password Usage and Support. UCL Discovery (University College London). 5 indexed citations
4.
Beautement, Adam & David Pym. (2010). Structured systems economics for security management. UCL Discovery (University College London). 8 indexed citations
5.
Beautement, Adam & M. Angela Sasse. (2010). Gathering realistic authentication performance data through field trials. UCL Discovery (University College London). 3 indexed citations
6.
Beautement, Adam & Angela Sasse. (2009). The economics of user effort in information security. Computer Fraud & Security. 2009(10). 8–12. 22 indexed citations
7.
Beautement, Adam, et al.. (2008). The compliance budget. 47–58. 185 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026