OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250

Showing 1-25 of 250 citing articles:

Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328

Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 289

Individual differences and Information Security Awareness
Agata McCormac, Tara Zwaans, Kathryn Parsons, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 151-156
Closed Access | Times Cited: 253

An information security knowledge sharing model in organizations
Nader Sohrabi Safa, Rossouw von Solms
Computers in Human Behavior (2016) Vol. 57, pp. 442-451
Closed Access | Times Cited: 227

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

The General Attitudes towards Artificial Intelligence Scale (GAAIS): Confirmatory Validation and Associations with Personality, Corporate Distrust, and General Trust
Astrid Schepman, Paul Rodway
International Journal of Human-Computer Interaction (2022) Vol. 39, Iss. 13, pp. 2724-2741
Open Access | Times Cited: 162

Information technology adoption: a review of the literature and classification
Maryam Salahshour Rad, Mehrbakhsh Nilashi, Halina Mohamed Dahlan
Universal Access in the Information Society (2017) Vol. 17, Iss. 2, pp. 361-390
Closed Access | Times Cited: 160

Dispositional and situational factors: influences on information security policy violations
Allen C. Johnston, Merrill Warkentin, Maranda McBride, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 3, pp. 231-251
Closed Access | Times Cited: 157

“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
Tabitha James, Paul Benjamin Lowry, Linda L. Wallace, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 2, pp. 560-596
Closed Access | Times Cited: 145

Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption
Shuyuan Mary Ho, Mónica Ocasio-Velázquez, Cheryl Booth
Computers & Security (2017) Vol. 70, pp. 581-595
Closed Access | Times Cited: 119

Continuance of protective security behavior: A longitudinal study
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111

Susceptibility to phishing on social network sites: A personality information processing model
Edwin Donald Frauenstein, Stephen Flowerday
Computers & Security (2020) Vol. 94, pp. 101862-101862
Open Access | Times Cited: 107

Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
Silas Formunyuy Verkijika
Computers & Security (2018) Vol. 77, pp. 860-870
Closed Access | Times Cited: 95

Deterrence and prevention-based model to mitigate information security insider threats in organisations
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, et al.
Future Generation Computer Systems (2019) Vol. 97, pp. 587-597
Open Access | Times Cited: 88

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?
Zheng Yan, Thomas Robertson, River Yan, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 375-382
Closed Access | Times Cited: 86

A typology of cybersecurity behavior among knowledge workers
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11

Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Determinants of early conformance with information security policies
France Bélanger, Stéphane Collignon, Kathryn Enget, et al.
Information & Management (2017) Vol. 54, Iss. 7, pp. 887-901
Closed Access | Times Cited: 85

Decision to adopt online collaborative learning tools in higher education: A case of top Malaysian universities
Elaheh Yadegaridehkordi, Liyana Shuib, Mehrbakhsh Nilashi, et al.
Education and Information Technologies (2018) Vol. 24, Iss. 1, pp. 79-102
Closed Access | Times Cited: 73

Human Factors in Information Security Culture: A Literature Review
Henry W. Glaspie, Waldemar Karwowski
Advances in intelligent systems and computing (2017), pp. 269-280
Closed Access | Times Cited: 72

Information security management and the human aspect in organizations
Harrison Stewart, Jan Jürjens
Information and Computer Security (2017) Vol. 25, Iss. 5, pp. 494-534
Closed Access | Times Cited: 64

Towards an Improved Understanding of Human Factors in Cybersecurity
Jongkil Jay Jeong, Joanne Mihelcic, Gillian Oliver, et al.
(2019), pp. 338-345
Closed Access | Times Cited: 60

Page 1 - Next Page

Scroll to top