
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Showing 1-25 of 90 citing articles:
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
IS professionals’ information security behaviors in Chinese IT organizations for information security protection
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory
Aihui Chen, Yaobin Lu
International Journal of Information Management (2021) Vol. 61, pp. 102402-102402
Closed Access | Times Cited: 41
Aihui Chen, Yaobin Lu
International Journal of Information Management (2021) Vol. 61, pp. 102402-102402
Closed Access | Times Cited: 41
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Basim AlGhanboosi, Saqib Ali, Ali Tarhini
Computers in Human Behavior (2023) Vol. 144, pp. 107702-107702
Closed Access | Times Cited: 20
Basim AlGhanboosi, Saqib Ali, Ali Tarhini
Computers in Human Behavior (2023) Vol. 144, pp. 107702-107702
Closed Access | Times Cited: 20
Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19
A systematic literature review of how cybersecurity-related behavior has been assessed
Kristian Kannelønning, Sokratis Katsikas
Information and Computer Security (2023) Vol. 31, Iss. 4, pp. 463-477
Open Access | Times Cited: 17
Kristian Kannelønning, Sokratis Katsikas
Information and Computer Security (2023) Vol. 31, Iss. 4, pp. 463-477
Open Access | Times Cited: 17
Understanding users' protective behavior and its suppressor effect on the perceived risk in M-wallet/banking use: An Indian urban-rural comparison
Vikas Chauhan
Technological Forecasting and Social Change (2024) Vol. 201, pp. 123255-123255
Closed Access | Times Cited: 8
Vikas Chauhan
Technological Forecasting and Social Change (2024) Vol. 201, pp. 123255-123255
Closed Access | Times Cited: 8
Cybersecurity Issues and Challenges for E-Government During COVID-19
Imdad Ali Shah
Advances in electronic government, digital divide, and regional development book series (2022), pp. 187-222
Closed Access | Times Cited: 24
Imdad Ali Shah
Advances in electronic government, digital divide, and regional development book series (2022), pp. 187-222
Closed Access | Times Cited: 24
Institutional pressures and proactive environmental strategy: The mediating effect of top managerial environment attitude and the moderating effect of new media pressure
Xiaocui Li, Nengmin Wang, Bin Jiang, et al.
Business Strategy and the Environment (2023) Vol. 32, Iss. 8, pp. 6106-6123
Open Access | Times Cited: 13
Xiaocui Li, Nengmin Wang, Bin Jiang, et al.
Business Strategy and the Environment (2023) Vol. 32, Iss. 8, pp. 6106-6123
Open Access | Times Cited: 13
Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 30
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 30
The effects of antecedents and mediating factors on cybersecurity protection behavior
Ling Li, Li Da Xu, Wu He
Computers in Human Behavior Reports (2021) Vol. 5, pp. 100165-100165
Open Access | Times Cited: 29
Ling Li, Li Da Xu, Wu He
Computers in Human Behavior Reports (2021) Vol. 5, pp. 100165-100165
Open Access | Times Cited: 29
Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 20
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 20
A Review of Supervisor–Subordinate Guanxi: Current Trends and Future Research
Zejun Ma, Hira Salah ud din Khan, Muhammad Salman Chughtai, et al.
Sustainability (2023) Vol. 15, Iss. 1, pp. 795-795
Open Access | Times Cited: 12
Zejun Ma, Hira Salah ud din Khan, Muhammad Salman Chughtai, et al.
Sustainability (2023) Vol. 15, Iss. 1, pp. 795-795
Open Access | Times Cited: 12
Logistics Industry in the Context of the Blockchain Technology
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 4
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 4
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4
The moderating effects of perceived social worth and organizational virtuousness on the relationship between emotional labor, precarious work, and organizational commitment among ASHA workers in India
A Nashivochnikova N, Rajasekhar David, A.K. Subramani, et al.
Acta Psychologica (2024) Vol. 248, pp. 104384-104384
Open Access | Times Cited: 4
A Nashivochnikova N, Rajasekhar David, A.K. Subramani, et al.
Acta Psychologica (2024) Vol. 248, pp. 104384-104384
Open Access | Times Cited: 4
Exploring the Factors Influencing Information Security Policy Compliance and Violations: A Systematic Literature Review
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 4
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 4
Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Understanding physicians' noncompliance use of AI-aided diagnosis—A mixed-methods approach
Jiaoyang Li, Xixi Li, Cheng Zhang
Decision Support Systems (2025) Vol. 191, pp. 114420-114420
Closed Access
Jiaoyang Li, Xixi Li, Cheng Zhang
Decision Support Systems (2025) Vol. 191, pp. 114420-114420
Closed Access
End-User Compliance with Information Security Policy Framework for Government Departments in South Africa
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Boosting employee information security compliance: the contingent roles of task–technology and person–organization fits
Inho Hwang, Ribin Seo, Sungho Hu
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Inho Hwang, Ribin Seo, Sungho Hu
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection
Obi Ogbanufe, Robert Pavur
International Journal of Information Management (2021) Vol. 62, pp. 102432-102432
Closed Access | Times Cited: 24
Obi Ogbanufe, Robert Pavur
International Journal of Information Management (2021) Vol. 62, pp. 102432-102432
Closed Access | Times Cited: 24
Consumer Usage of Mobile Visual Search in China
Meng Meng, Chenhui Liu, Zheng Huang, et al.
Journal of Global Information Management (2024) Vol. 32, Iss. 1, pp. 1-29
Open Access | Times Cited: 3
Meng Meng, Chenhui Liu, Zheng Huang, et al.
Journal of Global Information Management (2024) Vol. 32, Iss. 1, pp. 1-29
Open Access | Times Cited: 3