OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection
Obi Ogbanufe, Robert Pavur
International Journal of Information Management (2021) Vol. 62, pp. 102432-102432
Closed Access | Times Cited: 24

Showing 24 citing articles:

The double side of flow in regret and product returns: Maximizers versus satisficers
Sergio Barta, Raquel Gurrea, Carlos Flavián
International Journal of Information Management (2023) Vol. 71, pp. 102648-102648
Open Access | Times Cited: 19

Information vulnerability in facial recognition payment: An explanation of technology threat avoidance and information boundary theory
Wei Gao, Qingqing Guo, Ning Jiang
Electronic Commerce Research and Applications (2023) Vol. 61, pp. 101298-101298
Closed Access | Times Cited: 13

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

Introduction
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access

Bring Your Own Device
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 23-76
Closed Access

A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations
Obi Ogbanufe, Ling Ge
Computers & Security (2023) Vol. 128, pp. 103136-103136
Closed Access | Times Cited: 9

Fear appeals and coping appeals for health product promotion: Impulsive purchasing or psychological distancing?
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103383-103383
Closed Access | Times Cited: 8

Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis
Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran, et al.
Journal of Management Information Systems (2023) Vol. 40, Iss. 4, pp. 1099-1138
Open Access | Times Cited: 7

The valued coexistence of protection motivation and stewardship in information security behaviors
Obi Ogbanufe, Robert E. Crossler, David Biros
Computers & Security (2022) Vol. 124, pp. 102960-102960
Closed Access | Times Cited: 12

Adoption of identity theft protection services in social media: A PMT investigation
Kazi Rubaiyat Shahriar Rahman, Mohammad Omar Faruq, Md Rahman, et al.
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 87-102
Open Access | Times Cited: 2

Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
Obi Ogbanufe, Corey Baham
Information Systems Frontiers (2022)
Closed Access | Times Cited: 9

Confrontation-coping: A psychological approach to developing market exporting firms' intentions to adopt emerging technologies
Huda Khan, Zaheer Khan, Richard Lee, et al.
Technological Forecasting and Social Change (2023) Vol. 194, pp. 122697-122697
Open Access | Times Cited: 5

Hello, You’ve been hacked: a study of victim notification preferences
Caitlyn N. Muniz, Taylor Fisher, Katelyn Smith, et al.
Journal of Crime and Justice (2024), pp. 1-17
Closed Access | Times Cited: 1

GAI Identity Threat: When and Why Do Individuals Feel Threatened?
Jing Zhou, Yaobin Lu, Qian Chen
Information & Management (2024), pp. 104093-104093
Closed Access | Times Cited: 1

Cybersecurity Regrets: I’ve had a few.... Je Ne Regrette
Karen Renaud, Rosalind Searle, Marc Dupuis
(2022), pp. 1-20
Open Access | Times Cited: 4

Combining gain-loss frame and background color to increase the effectiveness of online oral health messages: Differences among decision stages
Tingting Jiang, Qian Guo, Xi Wu, et al.
International Journal of Medical Informatics (2022) Vol. 168, pp. 104902-104902
Closed Access | Times Cited: 3

Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access

“The Connected User Are You Safe?” - An Exploratory Study About Users Fear of Identity Theft
Shagun Sarraf, Arpan Kumar Kar
Lecture notes in computer science (2024), pp. 296-303
Closed Access

Learning First Aid Knowledge Not Only for the Self But Also for Others: Toward a Collective Protection Motivation Theory
Xiumei Ma, Yongqiang Sun, Xitong Guo, et al.
Health Communication (2024), pp. 1-14
Closed Access

When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection
Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira
Computers & Security (2023) Vol. 134, pp. 103470-103470
Open Access | Times Cited: 1

How does recency influence the timing of purchasing smartphones? The moderating role of context
Yuying Zheng, Chien‐Wei Chen
Cogent Social Sciences (2023) Vol. 9, Iss. 2
Open Access | Times Cited: 1

Mobile Identity Protection: The Moderation Role of Self-Efficacy
Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliviera
AJIS. Australasian journal of information systems/AJIS. Australian journal of information systems/Australian journal of information systems (2024) Vol. 28
Open Access

Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety
Hsiu-Hua Cheng
2022 17th Iberian Conference on Information Systems and Technologies (CISTI) (2023) Vol. 20, pp. 1-5
Closed Access

Page 1

Scroll to top