OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana
Robert E. Crossler, Francis Kofi Andoh‐Baidoo, Philip Menard
Information & Management (2018) Vol. 56, Iss. 5, pp. 754-766
Closed Access | Times Cited: 40

Showing 1-25 of 40 citing articles:

Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps
Shavneet Sharma, Gurmeet Singh, Rashmini Sharma, et al.
IEEE Transactions on Engineering Management (2020) Vol. 71, pp. 12272-12288
Open Access | Times Cited: 167

Cultural drivers behind employees neutralizing deviant information systems security behaviors
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 2

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90

Impact of AIS success on decision-making effectiveness among SMEs in less developed countries
Hamood Mohammed Al‐Hattami
Information Technology for Development (2022) Vol. 30, Iss. 3, pp. 472-492
Closed Access | Times Cited: 44

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies
Yves Barlette, Annabelle Jaouen, Paméla Baillette
International Journal of Information Management (2020) Vol. 56, pp. 102212-102212
Open Access | Times Cited: 56

Organizational and team culture as antecedents of protection motivation among IT employees
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
Simon Vrhovec, Anže Mihelič
Computers & Security (2021) Vol. 106, pp. 102309-102309
Closed Access | Times Cited: 37

What drives low‐income older adults' intention to use mobility applications?
Diana Yian Lian Chan, Chun Yong Chong, Pei‐Lee Teh, et al.
Geriatrics and gerontology international/Geriatrics & gerontology international (2024) Vol. 24, Iss. S1, pp. 342-350
Open Access | Times Cited: 4

Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection
Obi Ogbanufe, Robert Pavur
International Journal of Information Management (2021) Vol. 62, pp. 102432-102432
Closed Access | Times Cited: 24

The Role of Collectivism, Power Distance, and Neutralization Techniques on Deviant Information Security Behavior
Yimer Mohammed, Merrill Warkentin, Chinju Paul, et al.
Technology in Society (2025), pp. 102857-102857
Closed Access

Espoused Cultural Values and Acceptance of Biometrics-Based Identity Authentication Systems: A Mixed Methods Study
Babita Gupta, Subhasish Dasgupta, Mini Purushothaman
Information Systems Management (2025), pp. 1-28
Closed Access

Uncharted Territory: Gen Z’s Unethical AI Use and Organizational Cybersecurity
Kane Smith, Joti Kaur, Simran Dhillon, et al.
Journal of Computer Information Systems (2025), pp. 1-18
Closed Access

Beyond adaptive security coping behaviors: Theory and empirical evidence
Yan Chen, Xin Luo, Li Han
Information & Management (2021) Vol. 59, Iss. 2, pp. 103575-103575
Closed Access | Times Cited: 23

Fear appeals and coping appeals for health product promotion: Impulsive purchasing or psychological distancing?
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103383-103383
Closed Access | Times Cited: 8

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services
Chengqi Guo, Merrill Warkentin, Xin Luo, et al.
Information & Management (2020) Vol. 57, Iss. 8, pp. 103261-103261
Closed Access | Times Cited: 19

The valued coexistence of protection motivation and stewardship in information security behaviors
Obi Ogbanufe, Robert E. Crossler, David Biros
Computers & Security (2022) Vol. 124, pp. 102960-102960
Closed Access | Times Cited: 12

Bringing Rational Choice Theory Back to Reality: Understanding Low-Income Older Adults’ Intention to Use Mobility Apps
Diana Yian Lian Chan, Shaun Wen Huey Lee, Pei‐Lee Teh
(2024), pp. 95-128
Closed Access | Times Cited: 2

Seeking social support on social media: a coping perspective
Adela Chen, K. Lemmer
Internet Research (2024)
Closed Access | Times Cited: 2

Securing online accounts and assets: An examination of personal investments and protection motivation
Obi Ogbanufe
International Journal of Information Management (2022) Vol. 68, pp. 102590-102590
Closed Access | Times Cited: 11

The Nexus between Uncertainty Avoidance Culture and Risk-taking Behaviour in Entrepreneurial Firms’ Decision Making
Adisu Fanta Bate
Journal of Intercultural Management (2022) Vol. 14, Iss. 1, pp. 104-132
Open Access | Times Cited: 10

Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator
Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin
Journal of Systems and Information Technology (2023) Vol. 25, Iss. 2, pp. 133-159
Closed Access | Times Cited: 6

Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
Obi Ogbanufe, Corey Baham
Information Systems Frontiers (2022)
Closed Access | Times Cited: 9

The role of the espoused tight culture in value assessment of social media use
Tao Hu, Hua Dai, Xin Luo, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 5, pp. 674-698
Closed Access | Times Cited: 5

Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures
Mari Karjalainen, Mikko Siponen, Petri Puhakainen, et al.
Journal of Global Information Technology Management (2019) Vol. 23, Iss. 1, pp. 5-24
Closed Access | Times Cited: 15

Page 1 - Next Page

Scroll to top