
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Steven M. Beitzel, Eric C. Jensen, Abdur Chowdhury, et al.
Journal of the American Society for Information Science and Technology (2006) Vol. 58, Iss. 2
Closed Access | Times Cited: 719
Showing 1-25 of 719 citing articles:
Edward Kai Fung Dang, Robert W. P. Luk, James Allan, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 12
Closed Access | Times Cited: 2203
Charles Cole, Yang Lin, John E. Leide, et al.
Journal of the American Society for Information Science and Technology (2007) Vol. 58, Iss. 13
Closed Access | Times Cited: 2108
Information Privacy Research: An Interdisciplinary Review
Smith, Dinev, Xu
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 989-989
Closed Access | Times Cited: 1760
Smith, Dinev, Xu
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 989-989
Closed Access | Times Cited: 1760
Naoki Shibata, Yuya Kajikawa, Yoshiyuki Takeda, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 3
Closed Access | Times Cited: 1718
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D’Arcy, Anat Hovav, Dennis F. Galletta
Information Systems Research (2008) Vol. 20, Iss. 1, pp. 79-98
Closed Access | Times Cited: 1105
John D’Arcy, Anat Hovav, Dennis F. Galletta
Information Systems Research (2008) Vol. 20, Iss. 1, pp. 79-98
Closed Access | Times Cited: 1105
Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace
Catherine Dwyer, Starr Roxanne Hiltz, Katia Passerini
Americas Conference on Information Systems (2007)
Closed Access | Times Cited: 1046
Catherine Dwyer, Starr Roxanne Hiltz, Katia Passerini
Americas Conference on Information Systems (2007)
Closed Access | Times Cited: 1046
Ahmad Kayed, Nael Hirzallah, Luai Al-Shalabi, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 11
Closed Access | Times Cited: 1023
Internet social network communities: Risk taking, trust, and privacy concerns
Joshua Fogel, Elham Nehmad
Computers in Human Behavior (2008) Vol. 25, Iss. 1, pp. 153-160
Closed Access | Times Cited: 962
Joshua Fogel, Elham Nehmad
Computers in Human Behavior (2008) Vol. 25, Iss. 1, pp. 153-160
Closed Access | Times Cited: 962
Android permissions
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, et al.
(2012)
Closed Access | Times Cited: 947
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, et al.
(2012)
Closed Access | Times Cited: 947
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 8
Closed Access | Times Cited: 926
Claudio Carpineto, Stefano Mizzaro, Giovanni Romano, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 5
Closed Access | Times Cited: 902
Mike Thelwall, Antje Klitkou, Arnold Verbeek, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 7
Closed Access | Times Cited: 728
Ramesh Srinivasan, Robin Boast, Katherine Becvar, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 4
Closed Access | Times Cited: 714
Hsinchun Chen, Wingyan Chung, Jialun Qin, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 8
Closed Access | Times Cited: 685
Ying Ding, Elin K. Jacob, Michael Fried, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 3
Closed Access | Times Cited: 667
Niall Rooney, David Patterson, Mykola Galushka, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 2
Closed Access | Times Cited: 666
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
Heng Xu, Tamara Dinev, Jeff Smith, et al.
Journal of the Association for Information Systems (2011) Vol. 12, Iss. 12, pp. 798-824
Closed Access | Times Cited: 643
Heng Xu, Tamara Dinev, Jeff Smith, et al.
Journal of the Association for Information Systems (2011) Vol. 12, Iss. 12, pp. 798-824
Closed Access | Times Cited: 643
Zhang Jin, Lu An, Tao Tang, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 10
Closed Access | Times Cited: 630
The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption
Dong‐Hee Shin
Interacting with Computers (2010) Vol. 22, Iss. 5, pp. 428-438
Closed Access | Times Cited: 622
Dong‐Hee Shin
Interacting with Computers (2010) Vol. 22, Iss. 5, pp. 428-438
Closed Access | Times Cited: 622
Predicting positive user responses to social media advertising: The roles of emotional appeal, informativeness, and creativity
Jieun Lee, Ilyoo Barry Hong
International Journal of Information Management (2016) Vol. 36, Iss. 3, pp. 360-373
Closed Access | Times Cited: 566
Jieun Lee, Ilyoo Barry Hong
International Journal of Information Management (2016) Vol. 36, Iss. 3, pp. 360-373
Closed Access | Times Cited: 566
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 9
Closed Access | Times Cited: 532
Security lapses and the omission of information security measures: A threat control model and empirical test
Michael Workman, William H. Bommer, Detmar W. Straub
Computers in Human Behavior (2008) Vol. 24, Iss. 6, pp. 2799-2816
Closed Access | Times Cited: 522
Michael Workman, William H. Bommer, Detmar W. Straub
Computers in Human Behavior (2008) Vol. 24, Iss. 6, pp. 2799-2816
Closed Access | Times Cited: 522
The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure
Monika Taddicken
Journal of Computer-Mediated Communication (2013) Vol. 19, Iss. 2, pp. 248-273
Open Access | Times Cited: 505
Monika Taddicken
Journal of Computer-Mediated Communication (2013) Vol. 19, Iss. 2, pp. 248-273
Open Access | Times Cited: 505
Barry L. Britt, Michael W. Berry, Murray Browne, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 4
Closed Access | Times Cited: 489
Privacy, Trust, and Self-Disclosure Online
Adam Joinson, Ulf‐Dietrich Reips, Tom Buchanan, et al.
Human-Computer Interaction (2010) Vol. 25, Iss. 1, pp. 1-24
Open Access | Times Cited: 455
Adam Joinson, Ulf‐Dietrich Reips, Tom Buchanan, et al.
Human-Computer Interaction (2010) Vol. 25, Iss. 1, pp. 1-24
Open Access | Times Cited: 455