OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Value conflicts for information security management
Karin Hedström, Ella Kolkowska, Fredrik Karlsson, et al.
The Journal of Strategic Information Systems (2011) Vol. 20, Iss. 4, pp. 373-384
Closed Access | Times Cited: 144

Showing 1-25 of 144 citing articles:

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

Security-related behavior in using information systems in the workplace: A review and synthesis
Ken H. Guo
Computers & Security (2012) Vol. 32, pp. 242-251
Closed Access | Times Cited: 133

Protecting organizational knowledge: a structured literature review
Markus Manhart, Stefan Thalmann
Journal of Knowledge Management (2015) Vol. 19, Iss. 2, pp. 190-211
Closed Access | Times Cited: 115

A comprehensive model of information security factors for decision-makers
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 90

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59

Defining value-based objectives for ERP systems planning
Jeffrey L. May, Gurpreet Dhillon, Mário Caldeira
Decision Support Systems (2013) Vol. 55, Iss. 1, pp. 98-109
Closed Access | Times Cited: 86

Measuring user satisfaction with information security practices
Gustavo Percio Zimmermann Montesdioca, Antônio Carlos Gastaud Maçada
Computers & Security (2014) Vol. 48, pp. 267-280
Closed Access | Times Cited: 84

The impacts of organizational culture on information security culture: a case study
Mincong Tang, Meng’gang Li, Tao Zhang
Information Technology and Management (2015) Vol. 17, Iss. 2, pp. 179-186
Closed Access | Times Cited: 79

Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
Ella Kolkowska, Fredrik Karlsson, Karin Hedström
The Journal of Strategic Information Systems (2016) Vol. 26, Iss. 1, pp. 39-57
Open Access | Times Cited: 76

State of the art in information security policy development
Hanna Paananen, Michael Lapke, Mikko Siponen
Computers & Security (2019) Vol. 88, pp. 101608-101608
Open Access | Times Cited: 73

Information systems security policy implementation in practice: from best practices to situated practices
Elina Niemimaa, Marko Niemimaa
European Journal of Information Systems (2017) Vol. 26, Iss. 1, pp. 1-20
Closed Access | Times Cited: 58

Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of U.S. federal government
Min‐Seok Pang, Hüseyi̇n Tanriverdi̇
The Journal of Strategic Information Systems (2022) Vol. 31, Iss. 1, pp. 101707-101707
Closed Access | Times Cited: 23

Can the establishment of a personal data protection system promote corporate innovation?
Wanyi Chen, Yi-Ying Wang, Dongjing Wu, et al.
Research Policy (2024) Vol. 53, Iss. 9, pp. 105080-105080
Closed Access | Times Cited: 5

Stakeholder perceptions of information security policy: Analyzing personal constructs
Spyridon Samonas, Gurpreet Dhillon, Ahlam Almusharraf
International Journal of Information Management (2019) Vol. 50, pp. 144-154
Closed Access | Times Cited: 42

Toward a stage theory of the development of employees’ information security behavior
Mari Karjalainen, Mikko Siponen, Suprateek Sarker
Computers & Security (2020) Vol. 93, pp. 101782-101782
Open Access | Times Cited: 34

Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures
Obi Ogbanufe, Dan J. Kim, Mary C. Jones
Information & Management (2021) Vol. 58, Iss. 7, pp. 103507-103507
Closed Access | Times Cited: 31

Managing compliance with privacy regulations through translation guardrails: A health information exchange case study
Chad Anderson, Richard Baskerville, Mala Kaul
Information and Organization (2023) Vol. 33, Iss. 1, pp. 100455-100455
Closed Access | Times Cited: 12

IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation That Engenders a Security Culture
Bilgin Metin, Sefa Duran, Eda Telli, et al.
Information (2024) Vol. 15, Iss. 1, pp. 55-55
Open Access | Times Cited: 4

Value-Based Compliance Theory
Fredrik Karlsson, Karin Hedström
(2025), pp. 2716-2720
Closed Access

Guest editorial: New frontiers in information security management
Fredrik Karlsson, Shang Gao
Information and Computer Security (2025) Vol. 33, Iss. 1, pp. 1-4
Closed Access

Situation Critical: Intensive Cybersecurity Care Needed
Lynne Coventry, Elizabeth Sillence, Richard D. Brown, et al.
Lecture notes in computer science (2025), pp. 93-112
Closed Access

Cloud computing data security management strategy based on incremental update of data value
Zhiying Wang, Nianxin Wang, Shilun Ge
Journal of Enterprise Information Management (2025)
Closed Access

Understanding commitment and apathy in is security extra-role behavior from a person-organization fit perspective
Hao Chen, Wenli Li
Behaviour and Information Technology (2018) Vol. 38, Iss. 5, pp. 454-468
Closed Access | Times Cited: 36

How senior management and workplace norms influence information security attitudes and self-efficacy
Suresh Cuganesan, Cara Steele, Alison Hart
Behaviour and Information Technology (2017) Vol. 37, Iss. 1, pp. 50-65
Closed Access | Times Cited: 34

Page 1 - Next Page

Scroll to top