
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry, Gregory D. Moody
Information Systems Journal (2014) Vol. 25, Iss. 5, pp. 433-463
Closed Access | Times Cited: 203
Paul Benjamin Lowry, Gregory D. Moody
Information Systems Journal (2014) Vol. 25, Iss. 5, pp. 433-463
Closed Access | Times Cited: 203
Showing 26-50 of 203 citing articles:
A typology of cybersecurity behavior among knowledge workers
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11
Panel report: the dark side of the digitization of the individual
Ofir Turel, Christian Matt, Manuel Trenz, et al.
Internet Research (2019) Vol. 29, Iss. 2, pp. 274-288
Closed Access | Times Cited: 74
Ofir Turel, Christian Matt, Manuel Trenz, et al.
Internet Research (2019) Vol. 29, Iss. 2, pp. 274-288
Closed Access | Times Cited: 74
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
Anat Hovav, Frida Ferdani Putri
Pervasive and Mobile Computing (2016) Vol. 32, pp. 35-49
Closed Access | Times Cited: 69
Anat Hovav, Frida Ferdani Putri
Pervasive and Mobile Computing (2016) Vol. 32, pp. 35-49
Closed Access | Times Cited: 69
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1228-1247
Open Access | Times Cited: 67
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1228-1247
Open Access | Times Cited: 67
Security Awareness: The First Step in Information Security Compliance Behavior
Inho Hwang, Robin L. Wakefield, Sanghyun Kim, et al.
Journal of Computer Information Systems (2019) Vol. 61, Iss. 4, pp. 345-356
Closed Access | Times Cited: 62
Inho Hwang, Robin L. Wakefield, Sanghyun Kim, et al.
Journal of Computer Information Systems (2019) Vol. 61, Iss. 4, pp. 345-356
Closed Access | Times Cited: 62
Examining the intended and unintended consequences of organisational privacy safeguards
Rachida Parks, Heng Xu, Chao‐Hsien Chu, et al.
European Journal of Information Systems (2016) Vol. 26, Iss. 1, pp. 37-65
Open Access | Times Cited: 61
Rachida Parks, Heng Xu, Chao‐Hsien Chu, et al.
European Journal of Information Systems (2016) Vol. 26, Iss. 1, pp. 37-65
Open Access | Times Cited: 61
Understanding users’ negative responses to recommendation algorithms in short-video platforms: a perspective based on the Stressor-Strain-Outcome (SSO) framework
Xiumei Ma, Yongqiang Sun, Xitong Guo, et al.
Electronic Markets (2021) Vol. 32, Iss. 1, pp. 41-58
Closed Access | Times Cited: 55
Xiumei Ma, Yongqiang Sun, Xitong Guo, et al.
Electronic Markets (2021) Vol. 32, Iss. 1, pp. 41-58
Closed Access | Times Cited: 55
Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue
Andrew Reeves, Paul Delfabbro, Dragana Calic
SAGE Open (2021) Vol. 11, Iss. 1
Open Access | Times Cited: 47
Andrew Reeves, Paul Delfabbro, Dragana Calic
SAGE Open (2021) Vol. 11, Iss. 1
Open Access | Times Cited: 47
Cyberbullying in the workplace: a novel framework of routine activities and organizational control
Abdullah Oguz, Nikhil Mehta, Prashant Palvia
Internet Research (2023) Vol. 33, Iss. 6, pp. 2276-2307
Closed Access | Times Cited: 20
Abdullah Oguz, Nikhil Mehta, Prashant Palvia
Internet Research (2023) Vol. 33, Iss. 6, pp. 2276-2307
Closed Access | Times Cited: 20
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Basim AlGhanboosi, Saqib Ali, Ali Tarhini
Computers in Human Behavior (2023) Vol. 144, pp. 107702-107702
Closed Access | Times Cited: 20
Basim AlGhanboosi, Saqib Ali, Ali Tarhini
Computers in Human Behavior (2023) Vol. 144, pp. 107702-107702
Closed Access | Times Cited: 20
Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19
Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
Designing the digital workplace of the future – what scholars recommend to practitioners
Sebastian Köffer
International Conference on Information Systems (2015)
Closed Access | Times Cited: 54
Sebastian Köffer
International Conference on Information Systems (2015)
Closed Access | Times Cited: 54
Information security policy noncompliance: An integrative social influence model
Kholekile L. Gwebu, Jing Wang, Michael Y. Hu
Information Systems Journal (2019) Vol. 30, Iss. 2, pp. 220-269
Closed Access | Times Cited: 54
Kholekile L. Gwebu, Jing Wang, Michael Y. Hu
Information Systems Journal (2019) Vol. 30, Iss. 2, pp. 220-269
Closed Access | Times Cited: 54
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts
A. J. Burns, Tom Roberts, Clay Posey, et al.
Decision Sciences (2017) Vol. 49, Iss. 6, pp. 1187-1228
Closed Access | Times Cited: 52
A. J. Burns, Tom Roberts, Clay Posey, et al.
Decision Sciences (2017) Vol. 49, Iss. 6, pp. 1187-1228
Closed Access | Times Cited: 52
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness
Alex Koohang, Alojzy Z. Nowak, Joanna Paliszkiewicz, et al.
Journal of Computer Information Systems (2019) Vol. 60, Iss. 1, pp. 1-8
Closed Access | Times Cited: 52
Alex Koohang, Alojzy Z. Nowak, Joanna Paliszkiewicz, et al.
Journal of Computer Information Systems (2019) Vol. 60, Iss. 1, pp. 1-8
Closed Access | Times Cited: 52
When enough is enough: Investigating the antecedents and consequences of information security fatigue
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
Information Systems Journal (2020) Vol. 31, Iss. 4, pp. 521-549
Closed Access | Times Cited: 42
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
Information Systems Journal (2020) Vol. 31, Iss. 4, pp. 521-549
Closed Access | Times Cited: 42
Bibliometric Analysis of Trends in Theory-related Policy Publications
Abitassha Az Zahra, Achmad Nurmandi, Christine B. Tenario, et al.
Emerging Science Journal (2021) Vol. 5, Iss. 1, pp. 96-110
Open Access | Times Cited: 37
Abitassha Az Zahra, Achmad Nurmandi, Christine B. Tenario, et al.
Emerging Science Journal (2021) Vol. 5, Iss. 1, pp. 96-110
Open Access | Times Cited: 37
Understanding Information Security Policy Violation from a Situational Action Perspective
Han Li, Xin Luo, Yan Chen
Journal of the Association for Information Systems (2021) Vol. 22, Iss. 3, pp. 739-772
Closed Access | Times Cited: 33
Han Li, Xin Luo, Yan Chen
Journal of the Association for Information Systems (2021) Vol. 22, Iss. 3, pp. 739-772
Closed Access | Times Cited: 33
Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective
Ka Chung Ng, Xiaojun Zhang, James Y.L. Thong, et al.
Journal of Management Information Systems (2021) Vol. 38, Iss. 3, pp. 732-764
Open Access | Times Cited: 33
Ka Chung Ng, Xiaojun Zhang, James Y.L. Thong, et al.
Journal of Management Information Systems (2021) Vol. 38, Iss. 3, pp. 732-764
Open Access | Times Cited: 33
Reducing fraud in organizations through information security policy compliance: An information security controls perspective
Dennis Brown, Gunjan Batra, Humayun Zafar, et al.
Computers & Security (2024) Vol. 144, pp. 103958-103958
Closed Access | Times Cited: 5
Dennis Brown, Gunjan Batra, Humayun Zafar, et al.
Computers & Security (2024) Vol. 144, pp. 103958-103958
Closed Access | Times Cited: 5
Review of IS Security Policy Compliance
Puzant Balozian, Dorothy E. Leidner
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2017) Vol. 48, Iss. 3, pp. 11-43
Closed Access | Times Cited: 46
Puzant Balozian, Dorothy E. Leidner
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2017) Vol. 48, Iss. 3, pp. 11-43
Closed Access | Times Cited: 46
Strategic value alignment for information security management: a critical success factor analysis
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, et al.
Information and Computer Security (2018) Vol. 26, Iss. 2, pp. 150-170
Closed Access | Times Cited: 40
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, et al.
Information and Computer Security (2018) Vol. 26, Iss. 2, pp. 150-170
Closed Access | Times Cited: 40
Factors influencing the information security behaviour of IT employees
Val Hooper, Chris Blunt
Behaviour and Information Technology (2019) Vol. 39, Iss. 8, pp. 862-874
Closed Access | Times Cited: 38
Val Hooper, Chris Blunt
Behaviour and Information Technology (2019) Vol. 39, Iss. 8, pp. 862-874
Closed Access | Times Cited: 38
Toward a stage theory of the development of employees’ information security behavior
Mari Karjalainen, Mikko Siponen, Suprateek Sarker
Computers & Security (2020) Vol. 93, pp. 101782-101782
Open Access | Times Cited: 34
Mari Karjalainen, Mikko Siponen, Suprateek Sarker
Computers & Security (2020) Vol. 93, pp. 101782-101782
Open Access | Times Cited: 34