
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 20
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 20
Showing 20 citing articles:
Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA
Ahmad AL-Hawamleh
Digital Policy Regulation and Governance (2024) Vol. 26, Iss. 3, pp. 317-336
Closed Access | Times Cited: 8
Ahmad AL-Hawamleh
Digital Policy Regulation and Governance (2024) Vol. 26, Iss. 3, pp. 317-336
Closed Access | Times Cited: 8
Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia
Saqib Saeed
Sustainability (2023) Vol. 15, Iss. 12, pp. 9426-9426
Open Access | Times Cited: 11
Saqib Saeed
Sustainability (2023) Vol. 15, Iss. 12, pp. 9426-9426
Open Access | Times Cited: 11
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Introduction
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Assessing the information security posture of online public services worldwide: Technical insights, trends, and policy implications
Diogo Ribeiro, Victor Fonte, Luis Felipe Ramos, et al.
Government Information Quarterly (2025) Vol. 42, Iss. 2, pp. 102031-102031
Open Access
Diogo Ribeiro, Victor Fonte, Luis Felipe Ramos, et al.
Government Information Quarterly (2025) Vol. 42, Iss. 2, pp. 102031-102031
Open Access
The effectiveness of applying the economic and technological dimensions of the kingdom of Saudi Arabia’s vision 2030 to achieve the competitive advantage of the Hail Region
Samer Hussein Imfadhi Alhamad, Sylvia Ismail Bani Hani, Abdesselem Dakhli, et al.
Frontiers in Energy Research (2024) Vol. 12
Open Access | Times Cited: 2
Samer Hussein Imfadhi Alhamad, Sylvia Ismail Bani Hani, Abdesselem Dakhli, et al.
Frontiers in Energy Research (2024) Vol. 12
Open Access | Times Cited: 2
A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field
Fahad Alotaibi, Arafat Al-Dhaqm, Wael M. S. Yafooz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9703-9703
Open Access | Times Cited: 4
Fahad Alotaibi, Arafat Al-Dhaqm, Wael M. S. Yafooz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9703-9703
Open Access | Times Cited: 4
Cracking the Code
Abdullah Almuqrin, Ibrahim Mutambik, Zuopeng Zhang, et al.
Journal of Organizational and End User Computing (2024) Vol. 36, Iss. 1, pp. 1-21
Open Access | Times Cited: 1
Abdullah Almuqrin, Ibrahim Mutambik, Zuopeng Zhang, et al.
Journal of Organizational and End User Computing (2024) Vol. 36, Iss. 1, pp. 1-21
Open Access | Times Cited: 1
Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi
Journal of Open Innovation Technology Market and Complexity (2024), pp. 100463-100463
Open Access | Times Cited: 1
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi
Journal of Open Innovation Technology Market and Complexity (2024), pp. 100463-100463
Open Access | Times Cited: 1
Employees’ BYOD Security Policy Compliance in the Public Sector
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 62-77
Closed Access | Times Cited: 3
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 62-77
Closed Access | Times Cited: 3
Security challenges in civil registration: safeguarding vital information in an evolving landscape
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard
Wael G. Alheadary
Journal of Information Security (2023) Vol. 14, Iss. 03, pp. 195-211
Open Access | Times Cited: 1
Wael G. Alheadary
Journal of Information Security (2023) Vol. 14, Iss. 03, pp. 195-211
Open Access | Times Cited: 1
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
Sami Alsemairi
Intelligent Information Management (2023) Vol. 15, Iss. 04, pp. 259-283
Open Access | Times Cited: 1
Sami Alsemairi
Intelligent Information Management (2023) Vol. 15, Iss. 04, pp. 259-283
Open Access | Times Cited: 1
Les dirigeants de collectivités territoriales françaises confrontés à la gestion opérationnelle des cybermenaces : une approche typologique
Rémy Février, Olivier Lasmoles, Marc Bidan
Gestion et management public (2023) Vol. Volume 11 / N° 4, Iss. 4, pp. 57-77
Closed Access | Times Cited: 1
Rémy Février, Olivier Lasmoles, Marc Bidan
Gestion et management public (2023) Vol. Volume 11 / N° 4, Iss. 4, pp. 57-77
Closed Access | Times Cited: 1
Innovative Technologies as a Factor of Information Security of the Republic of Kazakhstan
Kuralay Azanbay
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 2, pp. 523-532
Open Access
Kuralay Azanbay
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 2, pp. 523-532
Open Access
Investigating the Relationship Between Personality Traits and Information Security Awareness
January F. Naga, Mia Amor C. Tinam-isan, Melody Mae O. Maluya, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1233-1246
Open Access
January F. Naga, Mia Amor C. Tinam-isan, Melody Mae O. Maluya, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1233-1246
Open Access
Integrated Information Security Policy Model for Saudi Arabia Organizations
Wad Ghaban
Journal of Computer Science (2023) Vol. 19, Iss. 4, pp. 454-466
Open Access
Wad Ghaban
Journal of Computer Science (2023) Vol. 19, Iss. 4, pp. 454-466
Open Access
Les dirigeants de collectivités territoriales françaises confrontés à la gestion opérationnelle des cybermenaces : une approche typologique
Rémy Février, Olivier Lasmoles, Marc Bidan
Gestion et management public (2023) Vol. Pub. anticipées, pp. 1b-21
Closed Access
Rémy Février, Olivier Lasmoles, Marc Bidan
Gestion et management public (2023) Vol. Pub. anticipées, pp. 1b-21
Closed Access
EMPLOYEE CONTROL AND OCCUPATIONAL FRAUD IN REMOTE WORK
Paulina Śmiałek, Grzegorz Wojtkowiak
Humanities and Social Sciences quarterly (2023) Vol. 30, Iss. 4 - part I, pp. 269-277
Open Access
Paulina Śmiałek, Grzegorz Wojtkowiak
Humanities and Social Sciences quarterly (2023) Vol. 30, Iss. 4 - part I, pp. 269-277
Open Access