
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
Information & Management (2014) Vol. 51, Iss. 5, pp. 551-567
Closed Access | Times Cited: 128
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
Information & Management (2014) Vol. 51, Iss. 5, pp. 551-567
Closed Access | Times Cited: 128
Showing 1-25 of 128 citing articles:
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
Anthony Vance, Paul Benjamin Lowry, Dennis L. Eggett
MIS Quarterly (2015) Vol. 39, Iss. 2, pp. 345-366
Closed Access | Times Cited: 246
Anthony Vance, Paul Benjamin Lowry, Dennis L. Eggett
MIS Quarterly (2015) Vol. 39, Iss. 2, pp. 345-366
Closed Access | Times Cited: 246
Siri, Alexa, and other digital assistants: a study of customer satisfaction with artificial intelligence applications
Thomas M. Brill, Laura Munoz, Richard J. Miller
Journal of Marketing Management (2019) Vol. 35, Iss. 15-16, pp. 1401-1436
Closed Access | Times Cited: 213
Thomas M. Brill, Laura Munoz, Richard J. Miller
Journal of Marketing Management (2019) Vol. 35, Iss. 15-16, pp. 1401-1436
Closed Access | Times Cited: 213
Mobile application security: Role of perceived privacy as the predictor of security perceptions
Ali Balapour, Hamid Reza Nikkhah, Rajiv Sabherwal
International Journal of Information Management (2020) Vol. 52, pp. 102063-102063
Closed Access | Times Cited: 190
Ali Balapour, Hamid Reza Nikkhah, Rajiv Sabherwal
International Journal of Information Management (2020) Vol. 52, pp. 102063-102063
Closed Access | Times Cited: 190
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
Jack Shih‐Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, et al.
Information Systems Research (2015) Vol. 26, Iss. 2, pp. 282-300
Closed Access | Times Cited: 170
Jack Shih‐Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, et al.
Information Systems Research (2015) Vol. 26, Iss. 2, pp. 282-300
Closed Access | Times Cited: 170
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset
Verena Zimmermann, Karen Renaud
International Journal of Human-Computer Studies (2019) Vol. 131, pp. 169-187
Open Access | Times Cited: 114
Verena Zimmermann, Karen Renaud
International Journal of Human-Computer Studies (2019) Vol. 131, pp. 169-187
Open Access | Times Cited: 114
Continuance of protective security behavior: A longitudinal study
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Stefan Bauer, Edward Bernroider, Katharina Chudzikowski
Computers & Security (2017) Vol. 68, pp. 145-159
Open Access | Times Cited: 109
Stefan Bauer, Edward Bernroider, Katharina Chudzikowski
Computers & Security (2017) Vol. 68, pp. 145-159
Open Access | Times Cited: 109
The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory
Nadine Guhr, Benedikt Lebek, Michael H. Breitner
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 340-362
Closed Access | Times Cited: 97
Nadine Guhr, Benedikt Lebek, Michael H. Breitner
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 340-362
Closed Access | Times Cited: 97
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Deterrence and prevention-based model to mitigate information security insider threats in organisations
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, et al.
Future Generation Computer Systems (2019) Vol. 97, pp. 587-597
Open Access | Times Cited: 88
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, et al.
Future Generation Computer Systems (2019) Vol. 97, pp. 587-597
Open Access | Times Cited: 88
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 82
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 82
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Organizational science and cybersecurity: abundant opportunities for research at the interface
Reeshad S. Dalal, David Howard, Rebecca J. Bennett, et al.
Journal of Business and Psychology (2021) Vol. 37, Iss. 1, pp. 1-29
Open Access | Times Cited: 60
Reeshad S. Dalal, David Howard, Rebecca J. Bennett, et al.
Journal of Business and Psychology (2021) Vol. 37, Iss. 1, pp. 1-29
Open Access | Times Cited: 60
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Identifying patterns in informal sources of security information
Emilee Rader, Rick Wash
Journal of Cybersecurity (2015), pp. tyv008-tyv008
Open Access | Times Cited: 78
Emilee Rader, Rick Wash
Journal of Cybersecurity (2015), pp. tyv008-tyv008
Open Access | Times Cited: 78
A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
Bongsik Shin, Paul Benjamin Lowry
Computers & Security (2020) Vol. 92, pp. 101761-101761
Closed Access | Times Cited: 62
Bongsik Shin, Paul Benjamin Lowry
Computers & Security (2020) Vol. 92, pp. 101761-101761
Closed Access | Times Cited: 62
An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
Abdullah Algarni, Yue Xu, Taizan Chan
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 661-687
Open Access | Times Cited: 60
Abdullah Algarni, Yue Xu, Taizan Chan
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 661-687
Open Access | Times Cited: 60
A model of the information security investment decision-making process
Daniel Dor, Yuval Elovici
Computers & Security (2016) Vol. 63, pp. 1-13
Closed Access | Times Cited: 52
Daniel Dor, Yuval Elovici
Computers & Security (2016) Vol. 63, pp. 1-13
Closed Access | Times Cited: 52
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 49
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 49
DATA BREACH MANAGEMENT: AN INTEGRATED RISK MODEL
Freeha Khan, Jung Hwan Kim, Lars Mathiassen, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103392-103392
Closed Access | Times Cited: 48
Freeha Khan, Jung Hwan Kim, Lars Mathiassen, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103392-103392
Closed Access | Times Cited: 48