
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance
Chul Woo Yoo, G. Lawrence Sanders, Robert P. Cerveny
Decision Support Systems (2018) Vol. 108, pp. 107-118
Closed Access | Times Cited: 119
Chul Woo Yoo, G. Lawrence Sanders, Robert P. Cerveny
Decision Support Systems (2018) Vol. 108, pp. 107-118
Closed Access | Times Cited: 119
Showing 1-25 of 119 citing articles:
Gamification and online consumer decisions: Is the game over?
Sandra Tobón, J. Ruiz-Alba, Jesús García de Madariaga
Decision Support Systems (2019) Vol. 128, pp. 113167-113167
Open Access | Times Cited: 180
Sandra Tobón, J. Ruiz-Alba, Jesús García de Madariaga
Decision Support Systems (2019) Vol. 128, pp. 113167-113167
Open Access | Times Cited: 180
The impact of voice assistants’ intelligent attributes on consumer well-being: Findings from PLS-SEM and fsQCA
Weiyao Kang, Bingjia Shao
Journal of Retailing and Consumer Services (2022) Vol. 70, pp. 103130-103130
Closed Access | Times Cited: 87
Weiyao Kang, Bingjia Shao
Journal of Retailing and Consumer Services (2022) Vol. 70, pp. 103130-103130
Closed Access | Times Cited: 87
Look to the future: Enhancing online gamer loyalty from the perspective of the theory of consumption values
Ching‐I Teng
Decision Support Systems (2018) Vol. 114, pp. 49-60
Closed Access | Times Cited: 107
Ching‐I Teng
Decision Support Systems (2018) Vol. 114, pp. 49-60
Closed Access | Times Cited: 107
The influence of flow experience in the augmented reality context on psychological ownership
Chunlin Yuan, Shuman Wang, Xiaolei Yu, et al.
International Journal of Advertising (2021) Vol. 40, Iss. 6, pp. 922-944
Closed Access | Times Cited: 71
Chunlin Yuan, Shuman Wang, Xiaolei Yu, et al.
International Journal of Advertising (2021) Vol. 40, Iss. 6, pp. 922-944
Closed Access | Times Cited: 71
Understanding smart education continuance intention in a delayed benefit context: An integration of sensory stimuli, UTAUT, and flow theory
Biao Gao
Acta Psychologica (2023) Vol. 234, pp. 103856-103856
Open Access | Times Cited: 31
Biao Gao
Acta Psychologica (2023) Vol. 234, pp. 103856-103856
Open Access | Times Cited: 31
A Regressional Study on the Impact of Organizational Security Culture and Transformational Leadership on Social Engineering Awareness among Bank Employees: The Interplay of Security Education and Behavioral Change
Oluwaseun Oladeji Olaniyi, Christopher Uzoma Asonze, Samson Abidemi Ajayi, et al.
Asian Journal of Economics Business and Accounting (2023) Vol. 23, Iss. 23, pp. 128-143
Open Access | Times Cited: 29
Oluwaseun Oladeji Olaniyi, Christopher Uzoma Asonze, Samson Abidemi Ajayi, et al.
Asian Journal of Economics Business and Accounting (2023) Vol. 23, Iss. 23, pp. 128-143
Open Access | Times Cited: 29
Tap here to power up! Mobile augmented reality for consumer empowerment
Eugene Cheng-Xi Aw, Garry Wei‐Han Tan, Keng‐Boon Ooi, et al.
Internet Research (2023) Vol. 34, Iss. 3, pp. 960-993
Closed Access | Times Cited: 24
Eugene Cheng-Xi Aw, Garry Wei‐Han Tan, Keng‐Boon Ooi, et al.
Internet Research (2023) Vol. 34, Iss. 3, pp. 960-993
Closed Access | Times Cited: 24
Driving behaviour change with cybersecurity awareness
Sunil Chaudhary
Computers & Security (2024) Vol. 142, pp. 103858-103858
Open Access | Times Cited: 13
Sunil Chaudhary
Computers & Security (2024) Vol. 142, pp. 103858-103858
Open Access | Times Cited: 13
Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling
Ersin Dincelli, InduShobha Chengalur‐Smith
European Journal of Information Systems (2020) Vol. 29, Iss. 6, pp. 669-687
Open Access | Times Cited: 66
Ersin Dincelli, InduShobha Chengalur‐Smith
European Journal of Information Systems (2020) Vol. 29, Iss. 6, pp. 669-687
Open Access | Times Cited: 66
How online gamers’ participation fosters their team commitment: Perspective of social identity theory
Gen‐Yih Liao, Thi Tuan Linh Pham, T.C.E. Cheng, et al.
International Journal of Information Management (2020) Vol. 52, pp. 102095-102095
Closed Access | Times Cited: 62
Gen‐Yih Liao, Thi Tuan Linh Pham, T.C.E. Cheng, et al.
International Journal of Information Management (2020) Vol. 52, pp. 102095-102095
Closed Access | Times Cited: 62
Exploring the effects of psychological ownership, gaming motivations, and primary/secondary control on online game addiction
Xunyi Wang, Mohamed Abdelhamid, G. Lawrence Sanders
Decision Support Systems (2021) Vol. 144, pp. 113512-113512
Closed Access | Times Cited: 55
Xunyi Wang, Mohamed Abdelhamid, G. Lawrence Sanders
Decision Support Systems (2021) Vol. 144, pp. 113512-113512
Closed Access | Times Cited: 55
Understanding cybersecurity behavioral habits: Insights from situational support
Yuxiang Hong, Steven Furnell
Journal of Information Security and Applications (2021) Vol. 57, pp. 102710-102710
Open Access | Times Cited: 43
Yuxiang Hong, Steven Furnell
Journal of Information Security and Applications (2021) Vol. 57, pp. 102710-102710
Open Access | Times Cited: 43
Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective
Gurvirender Tejay, Zareef A. Mohammed
Information & Management (2022) Vol. 60, Iss. 3, pp. 103751-103751
Closed Access | Times Cited: 38
Gurvirender Tejay, Zareef A. Mohammed
Information & Management (2022) Vol. 60, Iss. 3, pp. 103751-103751
Closed Access | Times Cited: 38
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises
Sunil Chaudhary, Vasileios Gkioulos, Sokratis Katsikas
Computer Science Review (2023) Vol. 50, pp. 100592-100592
Open Access | Times Cited: 20
Sunil Chaudhary, Vasileios Gkioulos, Sokratis Katsikas
Computer Science Review (2023) Vol. 50, pp. 100592-100592
Open Access | Times Cited: 20
Empowering employee creativity in service organizations: unlocking the role of ownership, employee vitality and supportive leadership
Edem M. Azila-Gbettor, Francis Fonyee Nutsugah, Jewel Dela Novixoxo, et al.
Service Industries Journal (2024), pp. 1-36
Closed Access | Times Cited: 8
Edem M. Azila-Gbettor, Francis Fonyee Nutsugah, Jewel Dela Novixoxo, et al.
Service Industries Journal (2024), pp. 1-36
Closed Access | Times Cited: 8
What makes metaverse users immersed in the flow state in an emerging market? An application of affordance theory and ISSM
Taewoo Roh, Shufeng Xiao, Byung Il Park
Journal of Retailing and Consumer Services (2024) Vol. 81, pp. 104012-104012
Closed Access | Times Cited: 7
Taewoo Roh, Shufeng Xiao, Byung Il Park
Journal of Retailing and Consumer Services (2024) Vol. 81, pp. 104012-104012
Closed Access | Times Cited: 7
Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 46
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 46
Security Education, Training, and Awareness Programs: Literature Review
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
“My place is your place” ‐ Understanding how psychological ownership influences peer‐to‐peer service experiences
Giovanni Pino, Marta Nieto‐García, Carol Xiaoyue Zhang
Psychology and Marketing (2021) Vol. 39, Iss. 2, pp. 390-401
Open Access | Times Cited: 34
Giovanni Pino, Marta Nieto‐García, Carol Xiaoyue Zhang
Psychology and Marketing (2021) Vol. 39, Iss. 2, pp. 390-401
Open Access | Times Cited: 34
Cybersecurity Issues and Challenges for E-Government During COVID-19
Imdad Ali Shah
Advances in electronic government, digital divide, and regional development book series (2022), pp. 187-222
Closed Access | Times Cited: 24
Imdad Ali Shah
Advances in electronic government, digital divide, and regional development book series (2022), pp. 187-222
Closed Access | Times Cited: 24
Flow experiences in personalised e-learning environments and the role of gender and academic performance
Inma Rodríguez‐Ardura, Antoni Meseguer‐Artola
Interactive Learning Environments (2019) Vol. 29, Iss. 1, pp. 59-82
Open Access | Times Cited: 40
Inma Rodríguez‐Ardura, Antoni Meseguer‐Artola
Interactive Learning Environments (2019) Vol. 29, Iss. 1, pp. 59-82
Open Access | Times Cited: 40
Solver engagement in online crowdsourcing communities: The roles of perceived interactivity, relationship quality and psychological ownership
Xiaoxiao Shi, Richard Evans, Wei Shan
Technological Forecasting and Social Change (2021) Vol. 175, pp. 121389-121389
Closed Access | Times Cited: 30
Xiaoxiao Shi, Richard Evans, Wei Shan
Technological Forecasting and Social Change (2021) Vol. 175, pp. 121389-121389
Closed Access | Times Cited: 30
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
Areej Alyami, David Sammon, Karen Neville, et al.
Information and Computer Security (2023) Vol. 32, Iss. 1, pp. 53-73
Open Access | Times Cited: 11
Areej Alyami, David Sammon, Karen Neville, et al.
Information and Computer Security (2023) Vol. 32, Iss. 1, pp. 53-73
Open Access | Times Cited: 11
Logistics Industry in the Context of the Blockchain Technology
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 4
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 4
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4