OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The effects of antecedents and mediating factors on cybersecurity protection behavior
Ling Li, Li Da Xu, Wu He
Computers in Human Behavior Reports (2021) Vol. 5, pp. 100165-100165
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Navigating cybersecurity training: A comprehensive review
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access | Times Cited: 1

Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 7

Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4

Place attachment, spirituality and residential water conservation behaviour in Australia’s Northern Territory: application of an extended protection motivation theory
Charles Baah, Muhammad Abid Saleem, Emmanuel Senior Tenakwah, et al.
Australasian Journal of Environmental Management (2024), pp. 1-28
Open Access | Times Cited: 4

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

Unraveling the Role of Citizens' Concerns and Cognitive Appraisals in E‐Government Adoption: The Impact of Social Media and Trust
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access

Cybersecurity threats in tourism and hospitality: perspectives from tourists engaging with sharing economy services
Zahed Ghaderi, Luc Béal, L’Hocine Houanti
Current Issues in Tourism (2024), pp. 1-16
Closed Access | Times Cited: 3

Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access

An Integrated SEM-ANN Approach to Evaluating Cybersecurity Behaviors in the Metaverse
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access

Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2

Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 2

Unraveling influential factors shaping employee cybersecurity behaviors: an empirical investigation of public servants in Vietnam
Dien Van Tran, Phuong V. Nguyen, Demetris Vrontis, et al.
Journal of Asia Business Studies (2024)
Closed Access | Times Cited: 2

Modelling the conundrums to cyber-risks management in logistics firms for supply chain social sustainability
Ifeyinwa Juliet Orji, Chukwuebuka Martinjoe U-Dominic
Journal of Enterprise Information Management (2024)
Closed Access | Times Cited: 2

Development of a new ‘human cyber-resilience scale’
Adam Joinson, Matt Dixon, Lynne Coventry, et al.
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 6

Citizen-centric cybersecurity model for promoting good cybersecurity behaviour
Gilbert Mahlangu, Colleta Chipfumbu Kangara, Farai Masunda
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 3, pp. 154-180
Closed Access | Times Cited: 4

Evaluating Individuals’ Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness
Hana Yousuf, Mostafa Al‐Emran, Khaled Shaalan
Lecture notes in computer science (2023), pp. 542-554
Closed Access | Times Cited: 4

Do IT users behave responsibly in terms of cybercrime protection?
Hanna Yarovenko, Serhiy Lyeonov, Krzysztof A. Wojcieszek, et al.
Human Technology (2023) Vol. 19, Iss. 2, pp. 178-206
Open Access | Times Cited: 4

sExplanatory and Predictive Modeling of Cybersecurity Behaviors using Protection Motivation Theory
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1

Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia
Ali Vafaei-Zadeh, Davoud Nikbin, Kit Yik Teoh, et al.
International Journal of Bank Marketing (2024)
Closed Access | Times Cited: 1

Do the theories of planned behaviour and protection motivation provide probabilistic sufficient and necessary conditions for residential water conservation? Combined use of PLS-SEM and NCA
Charles Baah, Muhammad Abid Saleem, Steven J. Greenland, et al.
Journal of Environmental Management (2024) Vol. 372, pp. 123354-123354
Open Access | Times Cited: 1

Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees
I Al-Shanfari, Warusia Yassin, Nasser Tabook, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 7

The Use of Digital Media and Security Precautions in Adulthood
Isabelle M. S. Haunschild, Bernhard Leipold
Human Behavior and Emerging Technologies (2023) Vol. 2023, pp. 1-9
Open Access | Times Cited: 3

Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access

From awareness to behaviour: understanding cybersecurity compliance in Vietnam
Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le, et al.
International journal of organizational analysis (2024)
Closed Access

Page 1 - Next Page

Scroll to top