OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:


Steven M. Beitzel, Eric C. Jensen, Abdur Chowdhury, et al.
Journal of the American Society for Information Science and Technology (2006) Vol. 58, Iss. 2
Closed Access | Times Cited: 719

Showing 1-25 of 719 citing articles:


Edward Kai Fung Dang, Robert W. P. Luk, James Allan, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 12
Closed Access | Times Cited: 2203


Charles Cole, Yang Lin, John E. Leide, et al.
Journal of the American Society for Information Science and Technology (2007) Vol. 58, Iss. 13
Closed Access | Times Cited: 2108

Information Privacy Research: An Interdisciplinary Review
Smith, Dinev, Xu
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 989-989
Closed Access | Times Cited: 1760


Naoki Shibata, Yuya Kajikawa, Yoshiyuki Takeda, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 3
Closed Access | Times Cited: 1718

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D’Arcy, Anat Hovav, Dennis F. Galletta
Information Systems Research (2008) Vol. 20, Iss. 1, pp. 79-98
Closed Access | Times Cited: 1105

Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace
Catherine Dwyer, Starr Roxanne Hiltz, Katia Passerini
Americas Conference on Information Systems (2007)
Closed Access | Times Cited: 1046


Ahmad Kayed, Nael Hirzallah, Luai Al-Shalabi, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 11
Closed Access | Times Cited: 1023

Internet social network communities: Risk taking, trust, and privacy concerns
Joshua Fogel, Elham Nehmad
Computers in Human Behavior (2008) Vol. 25, Iss. 1, pp. 153-160
Closed Access | Times Cited: 962

Android permissions
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, et al.
(2012)
Closed Access | Times Cited: 947



Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 8
Closed Access | Times Cited: 926


Claudio Carpineto, Stefano Mizzaro, Giovanni Romano, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 5
Closed Access | Times Cited: 902


Mike Thelwall, Antje Klitkou, Arnold Verbeek, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 7
Closed Access | Times Cited: 728


Ramesh Srinivasan, Robin Boast, Katherine Becvar, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 4
Closed Access | Times Cited: 714


Hsinchun Chen, Wingyan Chung, Jialun Qin, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 8
Closed Access | Times Cited: 685


Ying Ding, Elin K. Jacob, Michael Fried, et al.
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 3
Closed Access | Times Cited: 667


Niall Rooney, David Patterson, Mykola Galushka, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 2
Closed Access | Times Cited: 666

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
Heng Xu, Tamara Dinev, Jeff Smith, et al.
Journal of the Association for Information Systems (2011) Vol. 12, Iss. 12, pp. 798-824
Closed Access | Times Cited: 643


Zhang Jin, Lu An, Tao Tang, et al.
Journal of the American Society for Information Science and Technology (2009) Vol. 60, Iss. 10
Closed Access | Times Cited: 630

The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption
Dong‐Hee Shin
Interacting with Computers (2010) Vol. 22, Iss. 5, pp. 428-438
Closed Access | Times Cited: 622

Predicting positive user responses to social media advertising: The roles of emotional appeal, informativeness, and creativity
Jieun Lee, Ilyoo Barry Hong
International Journal of Information Management (2016) Vol. 36, Iss. 3, pp. 360-373
Closed Access | Times Cited: 566



Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 9
Closed Access | Times Cited: 532

Security lapses and the omission of information security measures: A threat control model and empirical test
Michael Workman, William H. Bommer, Detmar W. Straub
Computers in Human Behavior (2008) Vol. 24, Iss. 6, pp. 2799-2816
Closed Access | Times Cited: 522


Barry L. Britt, Michael W. Berry, Murray Browne, et al.
Journal of the American Society for Information Science and Technology (2008) Vol. 59, Iss. 4
Closed Access | Times Cited: 489

Privacy, Trust, and Self-Disclosure Online
Adam Joinson, Ulf‐Dietrich Reips, Tom Buchanan, et al.
Human-Computer Interaction (2010) Vol. 25, Iss. 1, pp. 1-24
Open Access | Times Cited: 455

Page 1 - Next Page

Scroll to top