
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Employees’ adherence to information security policies: An exploratory field study
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Information & Management (2013) Vol. 51, Iss. 2, pp. 217-224
Closed Access | Times Cited: 446
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Information & Management (2013) Vol. 51, Iss. 2, pp. 217-224
Closed Access | Times Cited: 446
Showing 1-25 of 446 citing articles:
Information security management needs more holistic approach: A literature review
Zahoor Ahmed Soomro, Mahmood Shah, Javed Ahmed
International Journal of Information Management (2015) Vol. 36, Iss. 2, pp. 215-225
Closed Access | Times Cited: 405
Zahoor Ahmed Soomro, Mahmood Shah, Javed Ahmed
International Journal of Information Management (2015) Vol. 36, Iss. 2, pp. 215-225
Closed Access | Times Cited: 405
Toward a Unified Model of Information Security Policy Compliance
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
An information security knowledge sharing model in organizations
Nader Sohrabi Safa, Rossouw von Solms
Computers in Human Behavior (2016) Vol. 57, pp. 442-451
Closed Access | Times Cited: 227
Nader Sohrabi Safa, Rossouw von Solms
Computers in Human Behavior (2016) Vol. 57, pp. 442-451
Closed Access | Times Cited: 227
Green human resource practices and organizational citizenship behavior for the environment: the roles of collective green crafting and environmentally specific servant leadership
Trong Tuan Luu
Journal of Sustainable Tourism (2019) Vol. 27, Iss. 8, pp. 1167-1196
Closed Access | Times Cited: 214
Trong Tuan Luu
Journal of Sustainable Tourism (2019) Vol. 27, Iss. 8, pp. 1167-1196
Closed Access | Times Cited: 214
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Building employees’ organizational citizenship behavior for the environment
Lưu Trọng Tuấn
International Journal of Contemporary Hospitality Management (2018) Vol. 31, Iss. 1, pp. 406-426
Closed Access | Times Cited: 172
Lưu Trọng Tuấn
International Journal of Contemporary Hospitality Management (2018) Vol. 31, Iss. 1, pp. 406-426
Closed Access | Times Cited: 172
Using protection motivation theory in the design of nudges to improve online security behavior
René van Bavel, Nuria Rodríguez-Priego, José Vila, et al.
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 29-39
Open Access | Times Cited: 150
René van Bavel, Nuria Rodríguez-Priego, José Vila, et al.
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 29-39
Open Access | Times Cited: 150
“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147
Online safety begins with you and me: Convincing Internet users to protect themselves
Ruth Shillair, Shelia R. Cotten, Hsin-yi Sandy Tsai, et al.
Computers in Human Behavior (2015) Vol. 48, pp. 199-207
Closed Access | Times Cited: 146
Ruth Shillair, Shelia R. Cotten, Hsin-yi Sandy Tsai, et al.
Computers in Human Behavior (2015) Vol. 48, pp. 199-207
Closed Access | Times Cited: 146
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review
Hussain Aldawood, Geoff Skinner
(2018), pp. 62-68
Closed Access | Times Cited: 130
Hussain Aldawood, Geoff Skinner
(2018), pp. 62-68
Closed Access | Times Cited: 130
Integrating green strategy and green human resource practices to trigger individual and organizational green performance: the role of environmentally-specific servant leadership
Trong Tuan Luu
Journal of Sustainable Tourism (2020) Vol. 28, Iss. 8, pp. 1193-1222
Closed Access | Times Cited: 129
Trong Tuan Luu
Journal of Sustainable Tourism (2020) Vol. 28, Iss. 8, pp. 1193-1222
Closed Access | Times Cited: 129
Analysis of the essential factors affecting of intention to use of mobile learning applications: A comparison between universities adopters and non-adopters
Mohammed Amin Almaiah, Ahmed Al Mulhem
Education and Information Technologies (2018) Vol. 24, Iss. 2, pp. 1433-1468
Closed Access | Times Cited: 123
Mohammed Amin Almaiah, Ahmed Al Mulhem
Education and Information Technologies (2018) Vol. 24, Iss. 2, pp. 1433-1468
Closed Access | Times Cited: 123
Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset
Verena Zimmermann, Karen Renaud
International Journal of Human-Computer Studies (2019) Vol. 131, pp. 169-187
Open Access | Times Cited: 114
Verena Zimmermann, Karen Renaud
International Journal of Human-Computer Studies (2019) Vol. 131, pp. 169-187
Open Access | Times Cited: 114
The dark side of ubiquitous connectivity in smartphone-based SNS: An integrated model from information perspective
Wei Gao, Zhaopeng Liu, Qingqing Guo, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 185-193
Closed Access | Times Cited: 113
Wei Gao, Zhaopeng Liu, Qingqing Guo, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 185-193
Closed Access | Times Cited: 113
Continuance of protective security behavior: A longitudinal study
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Stefan Bauer, Edward Bernroider, Katharina Chudzikowski
Computers & Security (2017) Vol. 68, pp. 145-159
Open Access | Times Cited: 109
Stefan Bauer, Edward Bernroider, Katharina Chudzikowski
Computers & Security (2017) Vol. 68, pp. 145-159
Open Access | Times Cited: 109
The impact of information security threat awareness on privacy-protective behaviors
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 107
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 107
Effects of environmentally-specific servant leadership on green performance via green climate and green crafting
Lưu Trọng Tuấn
Asia Pacific Journal of Management (2019) Vol. 38, Iss. 3, pp. 925-953
Closed Access | Times Cited: 106
Lưu Trọng Tuấn
Asia Pacific Journal of Management (2019) Vol. 38, Iss. 3, pp. 925-953
Closed Access | Times Cited: 106
Managing cyber and information risks in supply chains: insights from an exploratory analysis
Claudia Colicchia, Alessandro Creazza, David Menachof
Supply Chain Management An International Journal (2018) Vol. 24, Iss. 2, pp. 215-240
Open Access | Times Cited: 104
Claudia Colicchia, Alessandro Creazza, David Menachof
Supply Chain Management An International Journal (2018) Vol. 24, Iss. 2, pp. 215-240
Open Access | Times Cited: 104
Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
Silas Formunyuy Verkijika
Computers & Security (2018) Vol. 77, pp. 860-870
Closed Access | Times Cited: 95
Silas Formunyuy Verkijika
Computers & Security (2018) Vol. 77, pp. 860-870
Closed Access | Times Cited: 95
Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 91
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 91