OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Dealing with digital traces: Understanding protective behaviors on mobile devices
France Bélanger, Robert E. Crossler
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 34-49
Closed Access | Times Cited: 66

Showing 1-25 of 66 citing articles:

Responsibly strategizing with the metaverse: Business implications and DEI opportunities and challenges
Marco Marabelli, Sue Newell
The Journal of Strategic Information Systems (2023) Vol. 32, Iss. 2, pp. 101774-101774
Closed Access | Times Cited: 42

Mobile users’ information privacy concerns and the role of app permission requests
Kenan Degirmenci
International Journal of Information Management (2019) Vol. 50, pp. 261-272
Open Access | Times Cited: 126

Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective
Weiyin Hong, Frank K. Y. Chan, James Y.L. Thong
Journal of Business Ethics (2019) Vol. 168, Iss. 3, pp. 539-564
Open Access | Times Cited: 87

<p>COVID-19 Contact-Tracing Technology: Acceptability and Ethical Issues of Use</p>
Sawsan Abuhammad, Omar F. Khabour, Karem H. Alzoubi
Patient Preference and Adherence (2020) Vol. Volume 14, pp. 1639-1647
Open Access | Times Cited: 84

Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app
Jiesen Lin, Lemuria Carter, Dapeng Liu
European Journal of Information Systems (2021), pp. 1-14
Closed Access | Times Cited: 74

Why would you use medical chatbots? interview and survey
I‐Chiu Chang, Yi-Syuan Shih, Kuang-Ming Kuo
International Journal of Medical Informatics (2022) Vol. 165, pp. 104827-104827
Closed Access | Times Cited: 49

IT’s a matter of trust: Literature reviews and analyses of human trust in information technology
Mary C. Lacity, Sebastian Schuetz, Le Kuai, et al.
Journal of Information Technology (2024)
Closed Access | Times Cited: 12

An integrated model of artificially intelligent (AI) facial recognition technology adoption based on perceived risk theory and extended TPB: a comparative analysis of US and South Korea
Jinsoo Hwang, Jungsun Kim, Kyuhyeon Joo, et al.
Journal of Hospitality Marketing & Management (2024) Vol. 33, Iss. 8, pp. 1071-1099
Closed Access | Times Cited: 12

Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps
Cong Duc Tran, Tin Trung Nguyen
Technology in Society (2021) Vol. 67, pp. 101755-101755
Open Access | Times Cited: 51

From panopticon to heautopticon: A new form of surveillance introduced by quantified‐self practices
Jean‐François De Moya, Jessie Pallud
Information Systems Journal (2020) Vol. 30, Iss. 6, pp. 940-976
Closed Access | Times Cited: 47

Unfolding the popularity of video conferencing apps – A privacy calculus perspective
Ramandeep Kaur Sandhu, João Vasconcelos-Gomes, Manoj A. Thomas, et al.
International Journal of Information Management (2022) Vol. 68, pp. 102569-102569
Open Access | Times Cited: 24

BYOD Policy Compliance: Risks and Strategies in Organizations
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 61-72
Closed Access | Times Cited: 39

Compliance with bring your own device security policies in organizations: A systematic literature review
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 34

Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms
Liangmin Wang, Hantao Mei, Victor S. Sheng
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 2, pp. 1079-1088
Closed Access | Times Cited: 33

The roles of privacy concerns and trust in voluntary use of governmental proximity tracing applications
Marina Trkman, Aleš Popovič, Peter Trkman
Government Information Quarterly (2022) Vol. 40, Iss. 1, pp. 101787-101787
Open Access | Times Cited: 21

Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 4

Disclosure decisions and the moderating effects of privacy feedback and choice
Bailing Liu, Caroline Lancelot Miltgen, Huimin Xia
Decision Support Systems (2022) Vol. 155, pp. 113717-113717
Open Access | Times Cited: 17

Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17

Do (Not!) Track Me: Relationship Between Willingness to Participate and Sample Composition in Online Information Behavior Tracking Research
Teresa Gil‐López, Clara Christner, Ernesto de León, et al.
Social Science Computer Review (2023) Vol. 41, Iss. 6, pp. 2274-2292
Closed Access | Times Cited: 10

How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control
Robin L. Wakefield, Lane Wakefield
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2024) Vol. 55, Iss. 1, pp. 136-155
Closed Access | Times Cited: 3

Theoretical Framework and Hypotheses Development
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 77-100
Closed Access

Bring Your Own Device
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 23-76
Closed Access

Watchers, Watched, and Watching in the Digital Age: Reconceptualization of Information Technology Monitoring as Complex Action Nets
Aljona Zorina, France Bélanger, Nanda Kumar, et al.
Organization Science (2021) Vol. 32, Iss. 6, pp. 1571-1596
Open Access | Times Cited: 21

The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15

Page 1 - Next Page

Scroll to top