OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 46

Showing 1-25 of 46 citing articles:

The impact of new technologies on consumers beliefs: Reducing the perceived risks of electric vehicle adoption
Mauricio Featherman, Shizhen Jia, Christopher B. Califf, et al.
Technological Forecasting and Social Change (2021) Vol. 169, pp. 120847-120847
Open Access | Times Cited: 186

Mobile apps for SME business sustainability during COVID-19 and onwards
Sandip Rakshit, Nazrul Islam, Sandeep Mondal, et al.
Journal of Business Research (2021) Vol. 135, pp. 28-39
Open Access | Times Cited: 114

Go cashless! Determinants of continuance intention to use E-wallet apps: A hybrid approach using PLS-SEM and fsQCA
Ghazanfar Ali Abbasi, Thiviya Sandran, Yuvaraj Ganesan, et al.
Technology in Society (2022) Vol. 68, pp. 101937-101937
Closed Access | Times Cited: 93

Mental models and expectation violations in conversational AI interactions
G. Mark Grimes, Ryan M. Schuetzler, Justin Scott Giboney
Decision Support Systems (2021) Vol. 144, pp. 113515-113515
Closed Access | Times Cited: 83

Robot Acceptance and Service Quality in Food Delivery: An Expanded TAM-based Study
Muhittin Çavuşoğlu, Galen Collins, Frederick J. DeMicco, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-16
Closed Access | Times Cited: 1

Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems
Yiyu Zhan, Sayed Fayaz Ahmad, Muhammad Irshad, et al.
Heliyon (2023) Vol. 10, Iss. 1, pp. e22947-e22947
Open Access | Times Cited: 18

The mediating role of security anxiety in internet threat avoidance behavior
Xuan Wang, Yaojie Li, Hanieh Javadi Khasraghi, et al.
Computers & Security (2023) Vol. 134, pp. 103429-103429
Closed Access | Times Cited: 15

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment
Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage
Personal and Ubiquitous Computing (2021) Vol. 25, Iss. 5, pp. 911-925
Closed Access | Times Cited: 24

Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17

Catalyzing green entrepreneurial behavior: the role of intentions and selective factors
Manoj Kumar Mishra, Nidhi Sharma, Sunil Kumar, et al.
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 3

The Adoption of Web-Based Learning in the Teaching and Learning of Accounting in South African Secondary Schools
Tesfanesh Kassa Debusho, Patricia Namayammu Mokgosi, Margaret Kholiwe Ntsana
Journal of Education and Learning Technology (2025), pp. 69-86
Open Access

When employees meet digital-intelligence transformation: Unveiling the role of employee intentions
Tung‐Ju Wu, Ruo-Xi Zhang, Jiamin Li
International Journal of Information Management (2025) Vol. 84, pp. 102912-102912
Closed Access

Beyond adaptive security coping behaviors: Theory and empirical evidence
Yan Chen, Xin Luo, Li Han
Information & Management (2021) Vol. 59, Iss. 2, pp. 103575-103575
Closed Access | Times Cited: 23

System quality, technology acceptance model and theory of planned behaviour models: Agents for adopting blended learning tools
Ifeanyi Benedict Ohanu, Taiwo Olabanji Shodipe, Chinenye M. Ohanu, et al.
E-Learning and Digital Media (2022) Vol. 20, Iss. 3, pp. 255-281
Closed Access | Times Cited: 15

Understanding herder’s perception and adaptation to climate change: an integrated framework
Yu Cai, Minjuan Zhao, Aftab Ahmad Khan, et al.
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 3

E-waste information security protection motivation: the role of optimism bias
Hao Chen, Ofir Turel, Yufei Yuan
Information Technology and People (2021) Vol. 35, Iss. 2, pp. 600-620
Closed Access | Times Cited: 18

Unraveling juxtaposed effects of biometric characteristics on user security behaviors: A controversial information technology perspective
Jing Zhang, Zilong Liu, Xin Luo
Decision Support Systems (2024) Vol. 183, pp. 114267-114267
Open Access | Times Cited: 2

Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator
Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin
Journal of Systems and Information Technology (2023) Vol. 25, Iss. 2, pp. 133-159
Closed Access | Times Cited: 6

Medical Artificial Intelligence Information Disclosure on Healthcare Professional Involvement in Innovation: A Transactional Theory of Stress and Coping Model
Weiwei Huo, Wenhao Luo, Jiaqi Yan, et al.
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 22, pp. 7655-7667
Closed Access | Times Cited: 4

Examining the Factors That Influence User Information Security Behavior toward COVID-19 Scams
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4

The defining features of a robust information security climate
Kholekile L. Gwebu, Jing Wang
Computers & Security (2024) Vol. 142, pp. 103891-103891
Closed Access | Times Cited: 1

Exploring the effects of personal and situational factors on cyber aggression
Hemamali Tennakoon, Lucy R. Betts, Anil Chandrakumara, et al.
Cyberpsychology Journal of Psychosocial Research on Cyberspace (2024) Vol. 18, Iss. 3
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top