
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Showing 1-25 of 91 citing articles:
Cultural drivers behind employees neutralizing deviant information systems security behaviors
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 2
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 2
The impact of coronavirus pandemic (COVID-19) on education: The role of virtual and remote laboratories in education
Rabab Ali Abumalloh, Shahla Asadi, Mehrbakhsh Nilashi, et al.
Technology in Society (2021) Vol. 67, pp. 101728-101728
Open Access | Times Cited: 104
Rabab Ali Abumalloh, Shahla Asadi, Mehrbakhsh Nilashi, et al.
Technology in Society (2021) Vol. 67, pp. 101728-101728
Open Access | Times Cited: 104
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
Anthony Vance, Mikko Siponen, Detmar W. Straub
Information & Management (2019) Vol. 57, Iss. 4, pp. 103212-103212
Open Access | Times Cited: 71
Anthony Vance, Mikko Siponen, Detmar W. Straub
Information & Management (2019) Vol. 57, Iss. 4, pp. 103212-103212
Open Access | Times Cited: 71
Protection Motivation Theory: A Proposed Theoretical Extension and Moving beyond Rationality—The Case of Flooding
Matthew Oakley, Samuel Mohun Himmelweit, Paul Leinster, et al.
Water (2020) Vol. 12, Iss. 7, pp. 1848-1848
Open Access | Times Cited: 63
Matthew Oakley, Samuel Mohun Himmelweit, Paul Leinster, et al.
Water (2020) Vol. 12, Iss. 7, pp. 1848-1848
Open Access | Times Cited: 63
Analyzing farmers' drought risk management behavior: Evidence from Iran
Maryam Neisi, Masoud Bijani, Enayat Abbasi, et al.
Journal of Hydrology (2020) Vol. 590, pp. 125243-125243
Closed Access | Times Cited: 61
Maryam Neisi, Masoud Bijani, Enayat Abbasi, et al.
Journal of Hydrology (2020) Vol. 590, pp. 125243-125243
Closed Access | Times Cited: 61
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 53
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 53
The interplay of personal values, relational mobile usage and organizational citizenship behavior
Bilal Ahmad, Sajid Iqbal, Mahnoor Hai, et al.
Interactive Technology and Smart Education (2021) Vol. 19, Iss. 2, pp. 260-280
Closed Access | Times Cited: 47
Bilal Ahmad, Sajid Iqbal, Mahnoor Hai, et al.
Interactive Technology and Smart Education (2021) Vol. 19, Iss. 2, pp. 260-280
Closed Access | Times Cited: 47
IS professionals’ information security behaviors in Chinese IT organizations for information security protection
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Organizational and team culture as antecedents of protection motivation among IT employees
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
Empowering employee creativity in service organizations: unlocking the role of ownership, employee vitality and supportive leadership
Edem M. Azila-Gbettor, Francis Fonyee Nutsugah, Jewel Dela Novixoxo, et al.
Service Industries Journal (2024), pp. 1-36
Closed Access | Times Cited: 8
Edem M. Azila-Gbettor, Francis Fonyee Nutsugah, Jewel Dela Novixoxo, et al.
Service Industries Journal (2024), pp. 1-36
Closed Access | Times Cited: 8
“If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender
Silas Formunyuy Verkijika
Computers in Human Behavior (2019) Vol. 101, pp. 286-296
Closed Access | Times Cited: 52
Silas Formunyuy Verkijika
Computers in Human Behavior (2019) Vol. 101, pp. 286-296
Closed Access | Times Cited: 52
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
Dezhi Wu, Gregory D. Moody, Jun Zhang, et al.
Information & Management (2019) Vol. 57, Iss. 5, pp. 103235-103235
Closed Access | Times Cited: 48
Dezhi Wu, Gregory D. Moody, Jun Zhang, et al.
Information & Management (2019) Vol. 57, Iss. 5, pp. 103235-103235
Closed Access | Times Cited: 48
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain, et al.
Information (2022) Vol. 13, Iss. 9, pp. 413-413
Open Access | Times Cited: 27
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain, et al.
Information (2022) Vol. 13, Iss. 9, pp. 413-413
Open Access | Times Cited: 27
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2022) Vol. 34, Iss. 1, pp. 342-362
Open Access | Times Cited: 24
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2022) Vol. 34, Iss. 1, pp. 342-362
Open Access | Times Cited: 24
Do I really belong?: Impact of employment status on information security policy compliance
Shwadhin Sharma, Merrill Warkentin
Computers & Security (2018) Vol. 87, pp. 101397-101397
Closed Access | Times Cited: 45
Shwadhin Sharma, Merrill Warkentin
Computers & Security (2018) Vol. 87, pp. 101397-101397
Closed Access | Times Cited: 45
Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana
Robert E. Crossler, Francis Kofi Andoh‐Baidoo, Philip Menard
Information & Management (2018) Vol. 56, Iss. 5, pp. 754-766
Closed Access | Times Cited: 40
Robert E. Crossler, Francis Kofi Andoh‐Baidoo, Philip Menard
Information & Management (2018) Vol. 56, Iss. 5, pp. 754-766
Closed Access | Times Cited: 40
Privacy please: Power distance and people’s responses to data breaches across countries
Shilpa Madan, Krishna Savani, Constantine S. Katsikeas
Journal of International Business Studies (2022) Vol. 54, Iss. 4, pp. 731-754
Open Access | Times Cited: 19
Shilpa Madan, Krishna Savani, Constantine S. Katsikeas
Journal of International Business Studies (2022) Vol. 54, Iss. 4, pp. 731-754
Open Access | Times Cited: 19
The effects of knowledge mechanisms on employees' information security threat construal
Ashraf Mady, Saurabh Gupta, Merrill Warkentin
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 790-841
Closed Access | Times Cited: 12
Ashraf Mady, Saurabh Gupta, Merrill Warkentin
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 790-841
Closed Access | Times Cited: 12
Not just a game: Understanding eco-gamification in sustainable destination development
Jing Yu, Jingjing Hu, Guanrong Liu, et al.
Journal of Hospitality and Tourism Management (2024) Vol. 60, pp. 10-21
Closed Access | Times Cited: 4
Jing Yu, Jingjing Hu, Guanrong Liu, et al.
Journal of Hospitality and Tourism Management (2024) Vol. 60, pp. 10-21
Closed Access | Times Cited: 4
A Model for Information Security Vulnerability Awareness
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access