OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Trust violation and repair: The information privacy perspective
Gaurav Bansal, Fatemeh Zahedi
Decision Support Systems (2015) Vol. 71, pp. 62-77
Closed Access | Times Cited: 114

Showing 1-25 of 114 citing articles:

Do context and personality matter? Trust and privacy concerns in disclosing private information online
Gaurav Bansal, Fatemeh Zahedi, David Gefen
Information & Management (2015) Vol. 53, Iss. 1, pp. 1-21
Closed Access | Times Cited: 360

Perceived algorithmic fairness: An empirical study of transparency and anthropomorphism in algorithmic recruiting
Jessica Ochmann, Leonard Michels, Verena Tiefenbeck, et al.
Information Systems Journal (2024) Vol. 34, Iss. 2, pp. 384-414
Open Access | Times Cited: 20

The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management
Kholekile L. Gwebu, Jing Wang, Li Wang
Journal of Management Information Systems (2018) Vol. 35, Iss. 2, pp. 683-714
Closed Access | Times Cited: 147

Effect of penitence on social media trust and privacy concerns: The case of Facebook
Emmanuel Ayaburi, Daniel N. Treku
International Journal of Information Management (2019) Vol. 50, pp. 171-181
Closed Access | Times Cited: 138

Consumer trust repair: A critical literature review
Branko Božić
European Management Journal (2017) Vol. 35, Iss. 4, pp. 538-547
Closed Access | Times Cited: 91

Cyber risk management: History and future research directions
Martin Eling, Michael K. McShane, Trung Nguyen
Risk Management and Insurance Review (2021) Vol. 24, Iss. 1, pp. 93-125
Closed Access | Times Cited: 69

Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing
Xusen Cheng, Tingting Hou, Jian Mou
Information & Management (2021) Vol. 58, Iss. 6, pp. 103450-103450
Closed Access | Times Cited: 57

How Can It Be Made Right Again? A Review of Trust Repair Research
Kinshuk Sharma, F. David Schoorman, Gary A. Ballinger
Journal of Management (2022) Vol. 49, Iss. 1, pp. 363-399
Closed Access | Times Cited: 52

Transformative privacy calculus: Conceptualizing the personalization‐privacy paradox on social media
Julien Cloarec, Lars Meyer‐Waarden, Andréas Munzel
Psychology and Marketing (2024) Vol. 41, Iss. 7, pp. 1574-1596
Open Access | Times Cited: 13

Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior
Ben C. F. Choi, Sung S. Kim, Zhenhui Jiang
Journal of Management Information Systems (2016) Vol. 33, Iss. 3, pp. 904-933
Closed Access | Times Cited: 69

Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory
Aihui Chen, Yaobin Lu
International Journal of Information Management (2021) Vol. 61, pp. 102402-102402
Closed Access | Times Cited: 41

Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, et al.
International Journal of Information Management (2022) Vol. 65, pp. 102498-102498
Open Access | Times Cited: 29

“Sorry, it was my fault”: Repairing trust in human-robot interactions
Xinyi Zhang, Sun Kyong Lee, Whani Kim, et al.
International Journal of Human-Computer Studies (2023) Vol. 175, pp. 103031-103031
Open Access | Times Cited: 19

Trust, but Verify: Informed Consent, AI Technologies, and Public Health Emergencies
Brian Pickering
Future Internet (2021) Vol. 13, Iss. 5, pp. 132-132
Open Access | Times Cited: 33

A grounded theory study of factors and conditions associated with customer trust recovery in a retailer
Branko Božić, Sabina Siebert, Graeme Martin
Journal of Business Research (2019) Vol. 109, pp. 440-448
Open Access | Times Cited: 38

An investigation of a dynamic model of privacy trade-off in use of mobile social network applications: A longitudinal perspective
Mehrdad Koohikamali, Aaron M. French, Dan J. Kim
Decision Support Systems (2019) Vol. 119, pp. 46-59
Closed Access | Times Cited: 36

Evolutionary Game Theory and the Simulation of Green Building Development Based on Dynamic Government Subsidies
Ye Gao, Renfu Jia, Yi Yao, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7294-7294
Open Access | Times Cited: 20

Privacy please: Power distance and people’s responses to data breaches across countries
Shilpa Madan, Krishna Savani, Constantine S. Katsikeas
Journal of International Business Studies (2022) Vol. 54, Iss. 4, pp. 731-754
Open Access | Times Cited: 19

Social trust evolution analysis: Group decision making by utilizing stochastic Petri nets and strategic manipulation
Shuya Sun, Zaiwu Gong, Guo Wei, et al.
Computers & Industrial Engineering (2025), pp. 110884-110884
Closed Access

Parent–child attachment and sibling relationship quality in rural China: Moderating roles of favoritism and gender
Pengyang Li, Qinian Chen, Yiqing Wang, et al.
Family Relations (2025)
Closed Access

The dynamics of trust development in the life cycle of information systems’ use: a case of online dating services
Yahui Sun, Qi Chen, Zhengchuan Xu, et al.
Behaviour and Information Technology (2025), pp. 1-19
Closed Access

Customers’ tolerance for validation in omnichannel retail stores
Hartmut Hoehle, John Aloysius, Frank K. Y. Chan, et al.
The International Journal of Logistics Management (2018) Vol. 29, Iss. 2, pp. 704-722
Open Access | Times Cited: 36

Customer trust recovery: An alternative explanation
Branko Božić, Volker G. Kuppelwieser
Journal of Retailing and Consumer Services (2019) Vol. 49, pp. 208-218
Open Access | Times Cited: 35

The perceived surveillance of conversations through smart devices
Nicholas Frick, Konstantin Wilms, Florian Brachten, et al.
Electronic Commerce Research and Applications (2021) Vol. 47, pp. 101046-101046
Open Access | Times Cited: 26

Investigation on users’ resistance intention to facial recognition payment: a perspective of privacy
Xusen Cheng, Liyang Qiao, Bo Yang, et al.
Electronic Commerce Research (2022) Vol. 24, Iss. 1, pp. 275-301
Open Access | Times Cited: 18

Page 1 - Next Page

Scroll to top