OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Association between stress and information security policy non-compliance behavior: A meta-analysis
Akshay Aggarwal, Ram Kumar Dhurkari
Computers & Security (2022) Vol. 124, pp. 102991-102991
Closed Access | Times Cited: 15

Showing 15 citing articles:

Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4

Mitigating Security Stress: Exploring the Contingent Role of Collaborative Communication in Enhancing Information Security Compliance
Inho Hwang, Ribin Seo
Computers & Security (2025) Vol. 151, pp. 104326-104326
Closed Access

Exploring the Technostress Issue Among Indonesian Young Entrepreneurs
Maulana Amirul Adha, Nova Syafira Ariyanti, Roni Faslah, et al.
Smart innovation, systems and technologies (2025), pp. 163-173
Closed Access

Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research
Tripti Singh, Allen C. Johnston, John D’Arcy, et al.
Organizational Cybersecurity Journal Practice Process and People (2023) Vol. 3, Iss. 2, pp. 100-126
Open Access | Times Cited: 7

Employee behavior: the psychological gateway for cyberattacks
Rahel Aschwanden, Claude Messner, Bettina Höchli, et al.
Organizational Cybersecurity Journal Practice Process and People (2024) Vol. 4, Iss. 1, pp. 32-50
Open Access | Times Cited: 2

Try to esCAPE from Cybersecurity Incidents! A Technology-Enhanced Educational Approach
Rūta Pirta-Dreimane, Agnė Brilingaitė, Evita Roponena, et al.
Technology Knowledge and Learning (2024)
Open Access | Times Cited: 2

Applying computational methods to analyze trends and themes in Library and Information Science Education
Mengping Cen
Education and Information Technologies (2024)
Closed Access | Times Cited: 1

Cybersecurity Considerations for the Design of an AI-Driven Distributed Optimization of Container Carbon Emissions Reduction for Freight Operations
Carlos D. Paternina-Arboleda, Alexander Nestler, Nicholas Kascak, et al.
Lecture notes in computer science (2023), pp. 56-84
Closed Access | Times Cited: 3

Organizational Determinants and Compliance Behavior to Shape Information Security Plan
Maurizio Cavallari
Academic Journal of Interdisciplinary Studies (2023) Vol. 12, Iss. 6, pp. 1-1
Open Access | Times Cited: 3

Cybersecurity Policies Implementation
Manmeet Kour, Justin Pierce
Advances in business information systems and analytics book series (2024), pp. 149-179
Closed Access

Navigating Data Secrecy Challenges: A Study on Cyberespionage Intentions in the WFH Era
Irza Hanie Abu Samah, Azlineer Sarip, Ma Kalthum Ishak, et al.
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 4, pp. 941-957
Closed Access

Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
Akshay Aggarwal, Shashi Srivastava
Journal of Organizational Computing and Electronic Commerce (2024) Vol. 34, Iss. 4, pp. 338-369
Closed Access

Overcoming Policy Fatigue and Non-compliance
Magen Burkitt, Daniel Patricko Hutabarat
Lecture notes in electrical engineering (2024), pp. 525-537
Closed Access

To Comply or Not to Comply – What Should We Measure?
Byron Marshall, Forough Nasirpouri Shadbad, Michael L. Curry, et al.
(2023)
Closed Access

Page 1

Scroll to top