
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IS professionals’ information security behaviors in Chinese IT organizations for information security protection
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
Organizational Commitment, Competence on Job Satisfaction and Lecturer Performance: Social Learning Theory Approach
Muh. Sirojuddin Amin
Golden Ratio of Human Resource Management (2022) Vol. 2, Iss. 1, pp. 40-56
Open Access | Times Cited: 52
Muh. Sirojuddin Amin
Golden Ratio of Human Resource Management (2022) Vol. 2, Iss. 1, pp. 40-56
Open Access | Times Cited: 52
Artificial Intelligence Enhanced Identity And Access Management Preventing Unauthorized Access In Modern Enterprises
Md Takbir Hossen Sarker, Md Sanaur Rahman
SSRN Electronic Journal (2025)
Closed Access | Times Cited: 1
Md Takbir Hossen Sarker, Md Sanaur Rahman
SSRN Electronic Journal (2025)
Closed Access | Times Cited: 1
Alternative Work Arrangements, Work Environment, and Job Stress on Job Satisfaction and Turnover Intention
Moh. Cholid Mawardi
Golden Ratio of Human Resource Management (2022) Vol. 2, Iss. 1, pp. 27-39
Open Access | Times Cited: 37
Moh. Cholid Mawardi
Golden Ratio of Human Resource Management (2022) Vol. 2, Iss. 1, pp. 27-39
Open Access | Times Cited: 37
Effect of architecture and efficiency of mobile banking application on the intention to continue using Islamic bank: does data security matter?
Hafiez Sofyani, Emile Satia Darma
Journal of Islamic marketing (2024) Vol. 15, Iss. 6, pp. 1479-1497
Closed Access | Times Cited: 6
Hafiez Sofyani, Emile Satia Darma
Journal of Islamic marketing (2024) Vol. 15, Iss. 6, pp. 1479-1497
Closed Access | Times Cited: 6
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
Samanta Mikuletič, Simon Vrhovec, Brigita Skela‐Savič, et al.
Computers & Security (2023) Vol. 136, pp. 103489-103489
Open Access | Times Cited: 14
Samanta Mikuletič, Simon Vrhovec, Brigita Skela‐Savič, et al.
Computers & Security (2023) Vol. 136, pp. 103489-103489
Open Access | Times Cited: 14
Examining User Understanding and Perceptions of E-Commerce Data Privacy, Security, and Protection
Jeganathan Gomathi Sankar, Arokiaraj David, Peter Valan
Advances in marketing, customer relationship management, and e-services book series (2023), pp. 159-185
Closed Access | Times Cited: 13
Jeganathan Gomathi Sankar, Arokiaraj David, Peter Valan
Advances in marketing, customer relationship management, and e-services book series (2023), pp. 159-185
Closed Access | Times Cited: 13
Will coolness factors predict user satisfaction and loyalty? Evidence from an artificial neural network–structural equation model approach
Dongyan Nan, Edward Shin, George A. Barnett, et al.
Information Processing & Management (2022) Vol. 59, Iss. 6, pp. 103108-103108
Closed Access | Times Cited: 22
Dongyan Nan, Edward Shin, George A. Barnett, et al.
Information Processing & Management (2022) Vol. 59, Iss. 6, pp. 103108-103108
Closed Access | Times Cited: 22
Beyond Avatar Coolness: Exploring the Effects of Avatar Attributes on Continuance Intention to Play Massively Multiplayer Online Role-Playing Games
Dongyan Nan, Seungjong Sun, Bernard J. Jansen, et al.
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 23, pp. 8219-8228
Closed Access | Times Cited: 13
Dongyan Nan, Seungjong Sun, Bernard J. Jansen, et al.
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 23, pp. 8219-8228
Closed Access | Times Cited: 13
The effects of the expectation confirmation model (ECM) and the technology acceptance model (TAM) on learning management systems (LMS) in sub-saharan Africa
Yaser Hasan Al‐Mamary, Aliyu Abubakar, Mohammed Abdulrab
Interactive Learning Environments (2023), pp. 1-17
Closed Access | Times Cited: 11
Yaser Hasan Al‐Mamary, Aliyu Abubakar, Mohammed Abdulrab
Interactive Learning Environments (2023), pp. 1-17
Closed Access | Times Cited: 11
Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 4
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Why cyberloafing can be socially learned in the workplace: the role of employees' perceived certainty of formal and informal sanctions
Jinnan Wu, Mengmeng Song, Pablo Zoghbi‐Manrique‐de‐Lara, et al.
Information Technology and People (2022) Vol. 36, Iss. 4, pp. 1603-1625
Open Access | Times Cited: 17
Jinnan Wu, Mengmeng Song, Pablo Zoghbi‐Manrique‐de‐Lara, et al.
Information Technology and People (2022) Vol. 36, Iss. 4, pp. 1603-1625
Open Access | Times Cited: 17
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
An Integrated SEM-ANN Approach to Evaluating Cybersecurity Behaviors in the Metaverse
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Bring Your Own Device
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 23-76
Closed Access
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 23-76
Closed Access
Fear appeals and coping appeals for health product promotion: Impulsive purchasing or psychological distancing?
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103383-103383
Closed Access | Times Cited: 8
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103383-103383
Closed Access | Times Cited: 8
Improving Financial Efficiency through Integrated Human Resource Management and the Mediating Role of Leadership and Organizational Culture in Organizational Performance
Asmini, Aditya Halim Perdana Kusuma Putra Putra, Andi Adawiah
ATESTASI Jurnal Ilmiah Akuntansi (2023) Vol. 6, Iss. 2, pp. 546-569
Open Access | Times Cited: 8
Asmini, Aditya Halim Perdana Kusuma Putra Putra, Andi Adawiah
ATESTASI Jurnal Ilmiah Akuntansi (2023) Vol. 6, Iss. 2, pp. 546-569
Open Access | Times Cited: 8
Unraveling influential factors shaping employee cybersecurity behaviors: an empirical investigation of public servants in Vietnam
Dien Van Tran, Phuong V. Nguyen, Demetris Vrontis, et al.
Journal of Asia Business Studies (2024)
Closed Access | Times Cited: 2
Dien Van Tran, Phuong V. Nguyen, Demetris Vrontis, et al.
Journal of Asia Business Studies (2024)
Closed Access | Times Cited: 2
Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator
Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin
Journal of Systems and Information Technology (2023) Vol. 25, Iss. 2, pp. 133-159
Closed Access | Times Cited: 6
Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin
Journal of Systems and Information Technology (2023) Vol. 25, Iss. 2, pp. 133-159
Closed Access | Times Cited: 6
Risk management model for information security
Jhon Arista Alarcon
Deleted Journal (2023) Vol. 3, pp. 1-6
Open Access | Times Cited: 6
Jhon Arista Alarcon
Deleted Journal (2023) Vol. 3, pp. 1-6
Open Access | Times Cited: 6
Exploring the influence of government social media on cybersecurity compliance: employee attitudes, motivation and behaviors
Dien Van Tran, Phuong V. Nguyen, Anh Thi Chau Nguyen, et al.
Journal of Asia Business Studies (2023) Vol. 18, Iss. 1, pp. 204-223
Closed Access | Times Cited: 4
Dien Van Tran, Phuong V. Nguyen, Anh Thi Chau Nguyen, et al.
Journal of Asia Business Studies (2023) Vol. 18, Iss. 1, pp. 204-223
Closed Access | Times Cited: 4
Examining the Factors That Influence User Information Security Behavior toward COVID-19 Scams
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4
What Influences Users’ Continuous Intention to Use Function-Oriented Systems: A Different Impact Mechanism for Patent Information Platforms
Jingzhu Wei, Tongrui Zhang, Xiang Lu
International Journal of Human-Computer Interaction (2024), pp. 1-23
Closed Access | Times Cited: 1
Jingzhu Wei, Tongrui Zhang, Xiang Lu
International Journal of Human-Computer Interaction (2024), pp. 1-23
Closed Access | Times Cited: 1
Dual Routes of Training on Information Security Policy Compliance
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1