
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
Computers & Security (2011) Vol. 31, Iss. 1, pp. 83-95
Closed Access | Times Cited: 739
Princely Ifinedo
Computers & Security (2011) Vol. 31, Iss. 1, pp. 83-95
Closed Access | Times Cited: 739
Showing 1-25 of 739 citing articles:
Future directions for behavioral information security research
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 289
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 289
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 268
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 268
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250
Farmers' pro-environmental behavior under drought: Application of protection motivation theory
Marzieh Keshavarz, Ezatollah Karami
Journal of Arid Environments (2015) Vol. 127, pp. 128-136
Closed Access | Times Cited: 239
Marzieh Keshavarz, Ezatollah Karami
Journal of Arid Environments (2015) Vol. 127, pp. 128-136
Closed Access | Times Cited: 239
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Philip Menard, Gregory J. Bott, Robert E. Crossler
Journal of Management Information Systems (2017) Vol. 34, Iss. 4, pp. 1203-1230
Closed Access | Times Cited: 227
Philip Menard, Gregory J. Bott, Robert E. Crossler
Journal of Management Information Systems (2017) Vol. 34, Iss. 4, pp. 1203-1230
Closed Access | Times Cited: 227
Information security awareness and behavior: a theory-based literature review
Benedikt Lebek, Jörg Uffen, Markus Neumann, et al.
Management Research Review (2014) Vol. 37, Iss. 12, pp. 1049-1092
Open Access | Times Cited: 226
Benedikt Lebek, Jörg Uffen, Markus Neumann, et al.
Management Research Review (2014) Vol. 37, Iss. 12, pp. 1049-1092
Open Access | Times Cited: 226
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
Lijiao Cheng, Ying Li, Wenli Li, et al.
Computers & Security (2013) Vol. 39, pp. 447-459
Closed Access | Times Cited: 216
Lijiao Cheng, Ying Li, Wenli Li, et al.
Computers & Security (2013) Vol. 39, pp. 447-459
Closed Access | Times Cited: 216
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps
Shavneet Sharma, Gurmeet Singh, Rashmini Sharma, et al.
IEEE Transactions on Engineering Management (2020) Vol. 71, pp. 12272-12288
Open Access | Times Cited: 167
Shavneet Sharma, Gurmeet Singh, Rashmini Sharma, et al.
IEEE Transactions on Engineering Management (2020) Vol. 71, pp. 12272-12288
Open Access | Times Cited: 167
THEORETICAL INSIGHTS INTO SECURING REMOTE MONITORING SYSTEMS IN WATER DISTRIBUTION NETWORKS: LESSONS LEARNED FROM AFRICA-US PROJECTS
Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 995-1007
Open Access | Times Cited: 29
Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 995-1007
Open Access | Times Cited: 29
The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 16
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 16
Variables influencing information security policy compliance
Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, et al.
Information Management & Computer Security (2014) Vol. 22, Iss. 1, pp. 42-75
Closed Access | Times Cited: 177
Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, et al.
Information Management & Computer Security (2014) Vol. 22, Iss. 1, pp. 42-75
Closed Access | Times Cited: 177
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Taxonomy of compliant information security behavior
Keshnee Padayachee
Computers & Security (2012) Vol. 31, Iss. 5, pp. 673-680
Closed Access | Times Cited: 158
Keshnee Padayachee
Computers & Security (2012) Vol. 31, Iss. 5, pp. 673-680
Closed Access | Times Cited: 158
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt
Computers & Security (2014) Vol. 43, pp. 90-110
Open Access | Times Cited: 155
Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt
Computers & Security (2014) Vol. 43, pp. 90-110
Open Access | Times Cited: 155
Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Using protection motivation theory in the design of nudges to improve online security behavior
René van Bavel, Nuria Rodríguez-Priego, José Vila, et al.
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 29-39
Open Access | Times Cited: 150
René van Bavel, Nuria Rodríguez-Priego, José Vila, et al.
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 29-39
Open Access | Times Cited: 150
“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147