OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 265

Showing 1-25 of 265 citing articles:

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
Moti Zwilling, Galit Klien, Dušan Lesjak, et al.
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 82-97
Closed Access | Times Cited: 292

Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269

How social media usage affects employees’ job satisfaction and turnover intention: An empirical study in China
Xin Zhang, Liang Ma, Bo Xu, et al.
Information & Management (2018) Vol. 56, Iss. 6, pp. 103136-103136
Closed Access | Times Cited: 207

A systematic review of multi perspectives on human cybersecurity behavior
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
Technology in Society (2023) Vol. 73, pp. 102258-102258
Closed Access | Times Cited: 44

Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions
Shah Khalid Khan, Nirajan Shiwakoti, Peter Stasinopoulos, et al.
Accident Analysis & Prevention (2020) Vol. 148, pp. 105837-105837
Closed Access | Times Cited: 123

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?
Zheng Yan, Thomas Robertson, River Yan, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 375-382
Closed Access | Times Cited: 86

Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 85

Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84

Evaluating the cyber security readiness of organizations and its influence on performance
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 81

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69

Addressing Human Factors in Cybersecurity Leadership
William J. Triplett
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 573-586
Open Access | Times Cited: 47

Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 28

Accelerating SME growth in the African context: Harnessing FinTech, AI, and cybersecurity for economic prosperity
Chinwe Chinazo Okoye, Ekene Ezinwa Nwankwo, Favour Oluwadamilare Usman, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 2477-2486
Open Access | Times Cited: 11

Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1

An examination of the gender gap in smartphone adoption and use in Arab countries: A cross-national study
Nisreen Ameen, Robert Willis, Mahmood Shah
Computers in Human Behavior (2018) Vol. 89, pp. 148-162
Open Access | Times Cited: 74

Can Cyberloafing and Internet Addiction Affect Organizational Information Security?
Lee Hadlington, Kathryn Parsons
Cyberpsychology Behavior and Social Networking (2017) Vol. 20, Iss. 9, pp. 567-571
Open Access | Times Cited: 70

Cyber security education is as essential as “the three R's”
Isabella M. Venter, Rénette Blignaut, Karen Renaud, et al.
Heliyon (2019) Vol. 5, Iss. 12, pp. e02855-e02855
Open Access | Times Cited: 62

The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities
Faith B. Fatokun, Suraya Hamid, Azah Anir Norman, et al.
Journal of Physics Conference Series (2019) Vol. 1339, Iss. 1, pp. 012098-012098
Open Access | Times Cited: 60

Towards an Improved Understanding of Human Factors in Cybersecurity
Jongkil Jay Jeong, Joanne Mihelcic, Gillian Oliver, et al.
(2019), pp. 338-345
Closed Access | Times Cited: 59

Factors Related to Cyber Security Behavior
Ana Kovačević, Ненад Путник, Oliver Tošković
IEEE Access (2020) Vol. 8, pp. 125140-125148
Open Access | Times Cited: 57

Understanding Managers’ Reactions to Blockchain Technologies in the Supply Chain: The Reliable and Unbiased Software Agent
Ellie C. Falcone, Zachary R. Steelman, John Aloysius
Journal of Business Logistics (2020) Vol. 42, Iss. 1, pp. 25-45
Closed Access | Times Cited: 52

Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks
Therdpong Daengsi, Phisit Pornpongtechavanich, Pongpisit Wuttidittachotti
Education and Information Technologies (2021) Vol. 27, Iss. 4, pp. 4729-4752
Open Access | Times Cited: 49

Page 1 - Next Page

Scroll to top