
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The impacts of organizational culture on information security culture: a case study
Mincong Tang, Meng’gang Li, Tao Zhang
Information Technology and Management (2015) Vol. 17, Iss. 2, pp. 179-186
Closed Access | Times Cited: 79
Mincong Tang, Meng’gang Li, Tao Zhang
Information Technology and Management (2015) Vol. 17, Iss. 2, pp. 179-186
Closed Access | Times Cited: 79
Showing 1-25 of 79 citing articles:
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Defining organisational information security culture—Perspectives from academia and industry
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 156
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 156
Developing a cyber security culture: Current practices and future needs
Betsy Uchendu, Jason R. C. Nurse, Maria Bada, et al.
Computers & Security (2021) Vol. 109, pp. 102387-102387
Open Access | Times Cited: 110
Betsy Uchendu, Jason R. C. Nurse, Maria Bada, et al.
Computers & Security (2021) Vol. 109, pp. 102387-102387
Open Access | Times Cited: 110
Toward the role of organizational culture in data-driven digital transformation
Arman Ghafoori, Manjul Gupta, Mohammad I. Merhi, et al.
International Journal of Production Economics (2024) Vol. 271, pp. 109205-109205
Closed Access | Times Cited: 19
Arman Ghafoori, Manjul Gupta, Mohammad I. Merhi, et al.
International Journal of Production Economics (2024) Vol. 271, pp. 109205-109205
Closed Access | Times Cited: 19
Evaluating the cyber security readiness of organizations and its influence on performance
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 82
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 82
Cybercrime threat intelligence: A systematic multi-vocal literature review
Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel
Computers & Security (2021) Vol. 105, pp. 102258-102258
Open Access | Times Cited: 75
Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel
Computers & Security (2021) Vol. 105, pp. 102258-102258
Open Access | Times Cited: 75
Cyber Insurance Adoption and Digitalisation in Small and Medium-Sized Enterprises
Nazım Taşkın, Asli Yildirim, Handan Derya Ercan, et al.
Information (2025) Vol. 16, Iss. 1, pp. 66-66
Open Access | Times Cited: 1
Nazım Taşkın, Asli Yildirim, Handan Derya Ercan, et al.
Information (2025) Vol. 16, Iss. 1, pp. 66-66
Open Access | Times Cited: 1
Human Factors in Information Security Culture: A Literature Review
Henry W. Glaspie, Waldemar Karwowski
Advances in intelligent systems and computing (2017), pp. 269-280
Closed Access | Times Cited: 72
Henry W. Glaspie, Waldemar Karwowski
Advances in intelligent systems and computing (2017), pp. 269-280
Closed Access | Times Cited: 72
Enterprise risk management and information technology security in the financial sector
Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh
Information and Computer Security (2022) Vol. 30, Iss. 3, pp. 422-451
Closed Access | Times Cited: 33
Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh
Information and Computer Security (2022) Vol. 30, Iss. 3, pp. 422-451
Closed Access | Times Cited: 33
Organizational and team culture as antecedents of protection motivation among IT employees
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
The influence of organisational culture and information security culture on employee compliance behaviour
Grant Solomon, Irwin Brown
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 4, pp. 1203-1228
Closed Access | Times Cited: 35
Grant Solomon, Irwin Brown
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 4, pp. 1203-1228
Closed Access | Times Cited: 35
Exploring information security education on social media use
Shoufeng Ma, Shixin Zhang, Geng Li, et al.
Aslib Journal of Information Management (2019) Vol. 71, Iss. 5, pp. 618-636
Closed Access | Times Cited: 32
Shoufeng Ma, Shixin Zhang, Geng Li, et al.
Aslib Journal of Information Management (2019) Vol. 71, Iss. 5, pp. 618-636
Closed Access | Times Cited: 32
Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior
Lara Khansa, Reza Barkhi, Soumya Ray, et al.
Information Technology and Management (2017) Vol. 19, Iss. 4, pp. 197-215
Closed Access | Times Cited: 33
Lara Khansa, Reza Barkhi, Soumya Ray, et al.
Information Technology and Management (2017) Vol. 19, Iss. 4, pp. 197-215
Closed Access | Times Cited: 33
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid
Information Security Journal A Global Perspective (2019) Vol. 28, Iss. 3, pp. 55-80
Closed Access | Times Cited: 26
Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid
Information Security Journal A Global Perspective (2019) Vol. 28, Iss. 3, pp. 55-80
Closed Access | Times Cited: 26
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study
Kiara Jordan Butler, Irwin Brown
Information and Computer Security (2023) Vol. 31, Iss. 2, pp. 221-243
Closed Access | Times Cited: 8
Kiara Jordan Butler, Irwin Brown
Information and Computer Security (2023) Vol. 31, Iss. 2, pp. 221-243
Closed Access | Times Cited: 8
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments
Anna Zanke, Thorsten Weber, Peter Dornheim, et al.
Computers & Security (2024) Vol. 144, pp. 103938-103938
Open Access | Times Cited: 3
Anna Zanke, Thorsten Weber, Peter Dornheim, et al.
Computers & Security (2024) Vol. 144, pp. 103938-103938
Open Access | Times Cited: 3
Cyber-Security Culture: Psychological and Legal Aspects
Ildar Begishev
Psychology and Law (2021) Vol. 11, Iss. 4, pp. 207-220
Open Access | Times Cited: 19
Ildar Begishev
Psychology and Law (2021) Vol. 11, Iss. 4, pp. 207-220
Open Access | Times Cited: 19
The effect of perceived organizational culture on employees’ information security compliance
Martin Karlsson, Fredrik Karlsson, Joachim Åström, et al.
Information and Computer Security (2021) Vol. 30, Iss. 3, pp. 382-401
Open Access | Times Cited: 18
Martin Karlsson, Fredrik Karlsson, Joachim Åström, et al.
Information and Computer Security (2021) Vol. 30, Iss. 3, pp. 382-401
Open Access | Times Cited: 18
Management Culture as Part of Organizational Culture in the Context of Corporate Social Responsibility Implementation
Jolita Vveinhardt, Regina Andriukaitienė
Economics & Sociology (2017) Vol. 10, Iss. 3, pp. 294-320
Open Access | Times Cited: 23
Jolita Vveinhardt, Regina Andriukaitienė
Economics & Sociology (2017) Vol. 10, Iss. 3, pp. 294-320
Open Access | Times Cited: 23
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness
Berlilana Berlilana, Tim Noparumpa, Athapol Ruangkanjanases, et al.
Sustainability (2021) Vol. 13, Iss. 24, pp. 13761-13761
Open Access | Times Cited: 15
Berlilana Berlilana, Tim Noparumpa, Athapol Ruangkanjanases, et al.
Sustainability (2021) Vol. 13, Iss. 24, pp. 13761-13761
Open Access | Times Cited: 15
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
Eric Amankwa, Marianne Loock, Elmarie Kritzinger
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 583-614
Closed Access | Times Cited: 11
Eric Amankwa, Marianne Loock, Elmarie Kritzinger
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 583-614
Closed Access | Times Cited: 11
Interplay between cyber supply chain risk management practices and cyber security performance
Anisha Banu Dawood Gani, Yudi Fernando, Shulin Lan, et al.
Industrial Management & Data Systems (2022) Vol. 123, Iss. 3, pp. 843-861
Open Access | Times Cited: 10
Anisha Banu Dawood Gani, Yudi Fernando, Shulin Lan, et al.
Industrial Management & Data Systems (2022) Vol. 123, Iss. 3, pp. 843-861
Open Access | Times Cited: 10
Achieving a Security Culture
Adéle da Veiga
Advances in information security, privacy, and ethics book series (2019), pp. 72-100
Closed Access | Times Cited: 16
Adéle da Veiga
Advances in information security, privacy, and ethics book series (2019), pp. 72-100
Closed Access | Times Cited: 16
Defining the Strategic Role of the Chief Information Security Officer
Sean B. Maynard, Mazino Onibere, Atif Ahmad
Pacific Asia journal of the Association for Information Systems (2018), pp. 61-86
Closed Access | Times Cited: 14
Sean B. Maynard, Mazino Onibere, Atif Ahmad
Pacific Asia journal of the Association for Information Systems (2018), pp. 61-86
Closed Access | Times Cited: 14