
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
Showing 1-25 of 359 citing articles:
Effects of COVID-19 in E-learning on higher education institution students: the group comparison between male and female
Arfan Shahzad, Rohail Hassan, Abdulfatai Aremu, et al.
Quality & Quantity (2020) Vol. 55, Iss. 3, pp. 805-826
Open Access | Times Cited: 524
Arfan Shahzad, Rohail Hassan, Abdulfatai Aremu, et al.
Quality & Quantity (2020) Vol. 55, Iss. 3, pp. 805-826
Open Access | Times Cited: 524
Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell
Computers & Security (2015) Vol. 56, pp. 70-82
Closed Access | Times Cited: 328
Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, et al.
Computers & Security (2015) Vol. 53, pp. 65-78
Open Access | Times Cited: 303
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 268
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 268
An information security knowledge sharing model in organizations
Nader Sohrabi Safa, Rossouw von Solms
Computers in Human Behavior (2016) Vol. 57, pp. 442-451
Closed Access | Times Cited: 227
Nader Sohrabi Safa, Rossouw von Solms
Computers in Human Behavior (2016) Vol. 57, pp. 442-451
Closed Access | Times Cited: 227
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Defining organisational information security culture—Perspectives from academia and industry
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 156
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 156
Social influence research in consumer behavior: What we learned and what we need to learn? – A hybrid systematic literature review
Ramulu Bhukya, Justin Paul
Journal of Business Research (2023) Vol. 162, pp. 113870-113870
Closed Access | Times Cited: 73
Ramulu Bhukya, Justin Paul
Journal of Business Research (2023) Vol. 162, pp. 113870-113870
Closed Access | Times Cited: 73
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
Jack Shih‐Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, et al.
Information Systems Research (2015) Vol. 26, Iss. 2, pp. 282-300
Closed Access | Times Cited: 170
Jack Shih‐Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, et al.
Information Systems Research (2015) Vol. 26, Iss. 2, pp. 282-300
Closed Access | Times Cited: 170
“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147
Improving the information security culture through monitoring and implementation actions illustrated through a case study
Adéle da Veiga, Nico Martins
Computers & Security (2015) Vol. 49, pp. 162-176
Closed Access | Times Cited: 111
Adéle da Veiga, Nico Martins
Computers & Security (2015) Vol. 49, pp. 162-176
Closed Access | Times Cited: 111
Employees' information security policy compliance: A norm activation perspective
Adel Yazdanmehr, Jingguo Wang
Decision Support Systems (2016) Vol. 92, pp. 36-46
Open Access | Times Cited: 109
Adel Yazdanmehr, Jingguo Wang
Decision Support Systems (2016) Vol. 92, pp. 36-46
Open Access | Times Cited: 109
The impact of information security threat awareness on privacy-protective behaviors
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 107
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 107
Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 91
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 91
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Deterrence and prevention-based model to mitigate information security insider threats in organisations
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, et al.
Future Generation Computer Systems (2019) Vol. 97, pp. 587-597
Open Access | Times Cited: 88
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, et al.
Future Generation Computer Systems (2019) Vol. 97, pp. 587-597
Open Access | Times Cited: 88
Motivation and opportunity based model to reduce information security insider threats in organisations
Nader Sohrabi Safa, Carsten Maple, Tim Watson, et al.
Journal of Information Security and Applications (2018) Vol. 40, pp. 247-257
Open Access | Times Cited: 85
Nader Sohrabi Safa, Carsten Maple, Tim Watson, et al.
Journal of Information Security and Applications (2018) Vol. 40, pp. 247-257
Open Access | Times Cited: 85
Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 85
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 85
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Are External Auditors Concerned about Cyber Incidents? Evidence from Audit Fees
He Li, Won Gyun No, J. Efrim Boritz
Auditing A Journal of Practice & Theory (2019) Vol. 39, Iss. 1, pp. 151-171
Closed Access | Times Cited: 76
He Li, Won Gyun No, J. Efrim Boritz
Auditing A Journal of Practice & Theory (2019) Vol. 39, Iss. 1, pp. 151-171
Closed Access | Times Cited: 76
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
An empirical study of consumers' intention to use biometric facial recognition as a payment method
Emi Moriuchi
Psychology and Marketing (2021) Vol. 38, Iss. 10, pp. 1741-1765
Closed Access | Times Cited: 66
Emi Moriuchi
Psychology and Marketing (2021) Vol. 38, Iss. 10, pp. 1741-1765
Closed Access | Times Cited: 66