OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Organizational and team culture as antecedents of protection motivation among IT employees
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Artificial Intelligence Enhanced Identity And Access Management Preventing Unauthorized Access In Modern Enterprises
Md Takbir Hossen Sarker, Md Sanaur Rahman
SSRN Electronic Journal (2025)
Closed Access | Times Cited: 1

Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
Samanta Mikuletič, Simon Vrhovec, Brigita Skela‐Savič, et al.
Computers & Security (2023) Vol. 136, pp. 103489-103489
Open Access | Times Cited: 14

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4

The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations
Bader Zyoud, Syaheerah Lebai Lutfi
IEEE Access (2024) Vol. 12, pp. 72420-72444
Open Access | Times Cited: 4

Training for improved information security culture: a longitudinal randomized controlled trial
Martin Grill, Teodor Sommestad, Henrik Karlzén, et al.
Information and Computer Security (2025)
Closed Access

EXPLORING THE INFLUENCE OF ORGANISATIONAL CULTURE DIMENSIONS ON EMPLOYEE PERFORMANCE IN IT ORGANISATIONS
Mano Ashish Tripathi, Vijay Shelake, Reena Lenka, et al.
International Journal of Innovation Management (2025)
Closed Access

Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access

Explicit knowledge sharing and perceived organizational performance: evidence from Egypt and the USA
Abraham Stefanidis, Rosanna Yacoub, Moshe Banai
Global Knowledge Memory and Communication (2025)
Closed Access

Building a thematic framework of cybersecurity: a systematic literature review approach
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 3

The valued coexistence of protection motivation and stewardship in information security behaviors
Obi Ogbanufe, Robert E. Crossler, David Biros
Computers & Security (2022) Vol. 124, pp. 102960-102960
Closed Access | Times Cited: 12

Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 2

Towards a Cybersecurity Culture-Behaviour Framework: A Rapid Evidence Review
Anna Sutton, Lisa Tompson
Computers & Security (2024) Vol. 148, pp. 104110-104110
Open Access | Times Cited: 2

The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture
Michael Mncedisi Willie
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 4

Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1

sExplanatory and Predictive Modeling of Cybersecurity Behaviors using Protection Motivation Theory
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1

Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi
Journal of Open Innovation Technology Market and Complexity (2024), pp. 100463-100463
Open Access | Times Cited: 1

Parental mediation and preferences for regulation regarding children's digital media use: role of protection motivation and theory of planned behaviour
Shwadhin Sharma, Ching Yee Lee
Behaviour and Information Technology (2023) Vol. 43, Iss. 8, pp. 1499-1517
Closed Access | Times Cited: 3

Organizational Determinants and Compliance Behavior to Shape Information Security Plan
Maurizio Cavallari
Academic Journal of Interdisciplinary Studies (2023) Vol. 12, Iss. 6, pp. 1-1
Open Access | Times Cited: 3

THE ROLE OF SELF EFFICACY IN IMPROVING EMPLOYEE PERFORMANCE SUPPORTED BY ORGANIZATIONAL CULTURE AND CAREER DEVELOPMENT
Muhammad Rafi Khaery, Iqbal Maberur, Ade Solahudin
International Journal of Social Service and Research (2024) Vol. 4, Iss. 6
Open Access

Teleworking Employees’ Well-being and Innovativeness: A Bibliometric Analysis of Teleworking Literature
Yousif Elsamani, Yuya Kajikawa
2022 Portland International Conference on Management of Engineering and Technology (PICMET) (2023)
Closed Access | Times Cited: 1

Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey
Malyun Hilowle, William Yeoh, Marthie Grobler, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 6, pp. 820-834
Open Access | Times Cited: 1

Cybersecurity Breach Case Study
Jessica Parker
Advances in human and social aspects of technology book series (2023), pp. 89-102
Closed Access | Times Cited: 1

Factors that Motivate Defense Against Social Engineering Attacks Across Organizations
Lo’ai Tawalbeh, Fadi Muheidat
Procedia Computer Science (2023) Vol. 224, pp. 75-82
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top