
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Showing 1-25 of 69 citing articles:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation
Alex Koohang, Jeretta Horn Nord, Keng‐Boon Ooi, et al.
Journal of Computer Information Systems (2023) Vol. 63, Iss. 3, pp. 735-765
Open Access | Times Cited: 365
Alex Koohang, Jeretta Horn Nord, Keng‐Boon Ooi, et al.
Journal of Computer Information Systems (2023) Vol. 63, Iss. 3, pp. 735-765
Open Access | Times Cited: 365
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 75
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 75
How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances
Jacopo Ballerini, Dennis Herhausen, Alberto Ferraris
International Journal of Information Management (2023) Vol. 72, pp. 102649-102649
Open Access | Times Cited: 44
Jacopo Ballerini, Dennis Herhausen, Alberto Ferraris
International Journal of Information Management (2023) Vol. 72, pp. 102649-102649
Open Access | Times Cited: 44
CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 38
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 38
Cybersecurity Measures for Logistics Industry
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 6
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 6
A framework for cyber-risk insurance against ransomware: A mixed-method approach
Arunabha Mukhopadhyay, Swati Jain
International Journal of Information Management (2023) Vol. 74, pp. 102724-102724
Closed Access | Times Cited: 15
Arunabha Mukhopadhyay, Swati Jain
International Journal of Information Management (2023) Vol. 74, pp. 102724-102724
Closed Access | Times Cited: 15
Creatability, achievability, and immersibility: New game design elements that increase online game usage
Ching‐I Teng, Tzu-Ling Huang, Guanling Huang, et al.
International Journal of Information Management (2023) Vol. 75, pp. 102732-102732
Open Access | Times Cited: 15
Ching‐I Teng, Tzu-Ling Huang, Guanling Huang, et al.
International Journal of Information Management (2023) Vol. 75, pp. 102732-102732
Open Access | Times Cited: 15
Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains
Harpreet Kaur, Mahima Gupta, Surya Prakash Singh
International Journal of Production Economics (2024) Vol. 275, pp. 109338-109338
Closed Access | Times Cited: 5
Harpreet Kaur, Mahima Gupta, Surya Prakash Singh
International Journal of Production Economics (2024) Vol. 275, pp. 109338-109338
Closed Access | Times Cited: 5
Countermeasure Strategies to Address Cybersecurity Challenges Amidst Major Crises in the Higher Education and Research Sector: An Organisational Learning Perspective
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 4
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 4
Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4
Cyber resilience framework for online retail using explainable deep learning approaches and blockchain-based consensus protocol
Karim Zkik, Amine Belhadi, Sachin Kamble, et al.
Decision Support Systems (2024) Vol. 182, pp. 114253-114253
Closed Access | Times Cited: 4
Karim Zkik, Amine Belhadi, Sachin Kamble, et al.
Decision Support Systems (2024) Vol. 182, pp. 114253-114253
Closed Access | Times Cited: 4
Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
A Model for Information Security Vulnerability Awareness
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Unraveling the Role of Citizens' Concerns and Cognitive Appraisals in E‐Government Adoption: The Impact of Social Media and Trust
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises
Neeshe Khan, Steven Furnell, Maria Bada, et al.
Computers & Security (2025), pp. 104448-104448
Open Access
Neeshe Khan, Steven Furnell, Maria Bada, et al.
Computers & Security (2025), pp. 104448-104448
Open Access
Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work
Faruk Dursun
İşletme Bilimi Dergisi (2025) Vol. 13, Iss. 1, pp. 138-157
Open Access
Faruk Dursun
İşletme Bilimi Dergisi (2025) Vol. 13, Iss. 1, pp. 138-157
Open Access
Introduction
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Transforming threats into opportunities: The role of human factors in enhancing cybersecurity
Silvia Colabianchi, Francesco Costantino, Fabio Nonino, et al.
Journal of Innovation & Knowledge (2025) Vol. 10, Iss. 3, pp. 100695-100695
Closed Access
Silvia Colabianchi, Francesco Costantino, Fabio Nonino, et al.
Journal of Innovation & Knowledge (2025) Vol. 10, Iss. 3, pp. 100695-100695
Closed Access
AI-driven cybersecurity framework for software development based on the ANN-ISM paradigm
Habib Ullah Khan, Rafiq Ahmad Khan, Hathal Salamah Alwageed, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Habib Ullah Khan, Rafiq Ahmad Khan, Hathal Salamah Alwageed, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Adapt or die: a competitive digital supply chain quality management strategy
Ai‐Fen Lim, Keng‐Boon Ooi, Garry Wei–Han Tan, et al.
Journal of Enterprise Information Management (2022) Vol. 37, Iss. 2, pp. 698-720
Open Access | Times Cited: 17
Ai‐Fen Lim, Keng‐Boon Ooi, Garry Wei–Han Tan, et al.
Journal of Enterprise Information Management (2022) Vol. 37, Iss. 2, pp. 698-720
Open Access | Times Cited: 17