OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 739 citing articles:

Future directions for behavioral information security research
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359

Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328

Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303

Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 289

Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269

Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 268

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250

Farmers' pro-environmental behavior under drought: Application of protection motivation theory
Marzieh Keshavarz, Ezatollah Karami
Journal of Arid Environments (2015) Vol. 127, pp. 128-136
Closed Access | Times Cited: 239

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Philip Menard, Gregory J. Bott, Robert E. Crossler
Journal of Management Information Systems (2017) Vol. 34, Iss. 4, pp. 1203-1230
Closed Access | Times Cited: 227

Information security awareness and behavior: a theory-based literature review
Benedikt Lebek, Jörg Uffen, Markus Neumann, et al.
Management Research Review (2014) Vol. 37, Iss. 12, pp. 1049-1092
Open Access | Times Cited: 226

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
Lijiao Cheng, Ying Li, Wenli Li, et al.
Computers & Security (2013) Vol. 39, pp. 447-459
Closed Access | Times Cited: 216

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps
Shavneet Sharma, Gurmeet Singh, Rashmini Sharma, et al.
IEEE Transactions on Engineering Management (2020) Vol. 71, pp. 12272-12288
Open Access | Times Cited: 167

THEORETICAL INSIGHTS INTO SECURING REMOTE MONITORING SYSTEMS IN WATER DISTRIBUTION NETWORKS: LESSONS LEARNED FROM AFRICA-US PROJECTS
Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 995-1007
Open Access | Times Cited: 29

Variables influencing information security policy compliance
Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, et al.
Information Management & Computer Security (2014) Vol. 22, Iss. 1, pp. 42-75
Closed Access | Times Cited: 177

Taxonomy of compliant information security behavior
Keshnee Padayachee
Computers & Security (2012) Vol. 31, Iss. 5, pp. 673-680
Closed Access | Times Cited: 158

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt
Computers & Security (2014) Vol. 43, pp. 90-110
Open Access | Times Cited: 155

Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154

Using protection motivation theory in the design of nudges to improve online security behavior
René van Bavel, Nuria Rodríguez-Priego, José Vila, et al.
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 29-39
Open Access | Times Cited: 150

“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147

Page 1 - Next Page

Scroll to top