
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Information systems security research agenda: Exploring the gap between research and practice
Gurpreet Dhillon, Kane Smith, Indika Dissanayaka
The Journal of Strategic Information Systems (2021) Vol. 30, Iss. 4, pp. 101693-101693
Closed Access | Times Cited: 50
Gurpreet Dhillon, Kane Smith, Indika Dissanayaka
The Journal of Strategic Information Systems (2021) Vol. 30, Iss. 4, pp. 101693-101693
Closed Access | Times Cited: 50
Showing 1-25 of 50 citing articles:
Antecedents and consequences of data breaches: A systematic review
Frederic Schlackl, Nico Link, Hartmut Hoehle
Information & Management (2022) Vol. 59, Iss. 4, pp. 103638-103638
Closed Access | Times Cited: 82
Frederic Schlackl, Nico Link, Hartmut Hoehle
Information & Management (2022) Vol. 59, Iss. 4, pp. 103638-103638
Closed Access | Times Cited: 82
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers
Joseph K. Nwankpa, Pratim Datta
Computers & Security (2023) Vol. 130, pp. 103266-103266
Closed Access | Times Cited: 21
Joseph K. Nwankpa, Pratim Datta
Computers & Security (2023) Vol. 130, pp. 103266-103266
Closed Access | Times Cited: 21
A Novel Framework to Identify Cybersecurity Challenges and Opportunities for Organizational Digital Transformation in the Cloud
Xueping Liang, Yilin Xu
Computers & Security (2025), pp. 104339-104339
Closed Access
Xueping Liang, Yilin Xu
Computers & Security (2025), pp. 104339-104339
Closed Access
The Damocles Sword of Cyber Attacks
Frederik Hering, Oliver Hinz, Jella Pfeiffer, et al.
Business & Information Systems Engineering (2025)
Open Access
Frederik Hering, Oliver Hinz, Jella Pfeiffer, et al.
Business & Information Systems Engineering (2025)
Open Access
Digital Transformation Security Challenges
Harrison Stewart
Journal of Computer Information Systems (2022) Vol. 63, Iss. 4, pp. 919-936
Closed Access | Times Cited: 18
Harrison Stewart
Journal of Computer Information Systems (2022) Vol. 63, Iss. 4, pp. 919-936
Closed Access | Times Cited: 18
A Maturity Model for Assessing the Digitalization of Public Health Agencies
Eileen Doctor, Torsten Eymann, Daniel Fürstenau, et al.
Business & Information Systems Engineering (2023) Vol. 65, Iss. 5, pp. 539-554
Open Access | Times Cited: 10
Eileen Doctor, Torsten Eymann, Daniel Fürstenau, et al.
Business & Information Systems Engineering (2023) Vol. 65, Iss. 5, pp. 539-554
Open Access | Times Cited: 10
Strengthening authentication in online learning environments using public key infrastructure: A literature review
Mohammad Husam Alhumsi, Hamza Alhumsi
International Journal of ADVANCED AND APPLIED SCIENCES (2025) Vol. 12, Iss. 2, pp. 136-142
Open Access
Mohammad Husam Alhumsi, Hamza Alhumsi
International Journal of ADVANCED AND APPLIED SCIENCES (2025) Vol. 12, Iss. 2, pp. 136-142
Open Access
Introduction
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access
Uncharted Territory: Gen Z’s Unethical AI Use and Organizational Cybersecurity
Kane Smith, Joti Kaur, Simran Dhillon, et al.
Journal of Computer Information Systems (2025), pp. 1-18
Closed Access
Kane Smith, Joti Kaur, Simran Dhillon, et al.
Journal of Computer Information Systems (2025), pp. 1-18
Closed Access
Zero trust in cybersecurity: managing critical challenges for effective implementation
Angélica Pigola, Fernando de Souza Meirelles
Journal of Systems and Information Technology (2025)
Closed Access
Angélica Pigola, Fernando de Souza Meirelles
Journal of Systems and Information Technology (2025)
Closed Access
What changed in the cyber-security after COVID-19?
Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, et al.
Computers & Security (2022) Vol. 120, pp. 102821-102821
Open Access | Times Cited: 15
Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, et al.
Computers & Security (2022) Vol. 120, pp. 102821-102821
Open Access | Times Cited: 15
What Do We Need to Know about the Chief Information Security Officer? A Literature Review and Research Agenda
Zeynep Sahin, Anthony Vance
Computers & Security (2024) Vol. 148, pp. 104063-104063
Closed Access | Times Cited: 3
Zeynep Sahin, Anthony Vance
Computers & Security (2024) Vol. 148, pp. 104063-104063
Closed Access | Times Cited: 3
How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 2
Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 2
A field experiment on ISP training designs for enhancing employee information security compliance
Ilja Nastjuk, Florian Rampold, Simon Trang, et al.
European Journal of Information Systems (2024), pp. 1-24
Closed Access | Times Cited: 2
Ilja Nastjuk, Florian Rampold, Simon Trang, et al.
European Journal of Information Systems (2024), pp. 1-24
Closed Access | Times Cited: 2
The whole of cyber defense: Syncing practice and theory
Kristel M. de Nobrega, Anne-F. Rutkowski, Carol Saunders
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 4, pp. 101861-101861
Open Access | Times Cited: 2
Kristel M. de Nobrega, Anne-F. Rutkowski, Carol Saunders
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 4, pp. 101861-101861
Open Access | Times Cited: 2
Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering
Manas Tripathi, Arunabha Mukhopadhyay
Information & Management (2022) Vol. 59, Iss. 8, pp. 103707-103707
Closed Access | Times Cited: 9
Manas Tripathi, Arunabha Mukhopadhyay
Information & Management (2022) Vol. 59, Iss. 8, pp. 103707-103707
Closed Access | Times Cited: 9
Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective
Nan Liang, Rudy Hirschheim, Xin Luo, et al.
Journal of Information Technology (2023) Vol. 38, Iss. 4, pp. 382-415
Closed Access | Times Cited: 5
Nan Liang, Rudy Hirschheim, Xin Luo, et al.
Journal of Information Technology (2023) Vol. 38, Iss. 4, pp. 382-415
Closed Access | Times Cited: 5
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia, et al.
Information (2023) Vol. 14, Iss. 11, pp. 600-600
Open Access | Times Cited: 5
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia, et al.
Information (2023) Vol. 14, Iss. 11, pp. 600-600
Open Access | Times Cited: 5
An Empirical Study on Core Data Asset Identification in Data Governance
Yunpeng Chen, Ying Zhao, Wenxuan Xie, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 4, pp. 161-161
Open Access | Times Cited: 4
Yunpeng Chen, Ying Zhao, Wenxuan Xie, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 4, pp. 161-161
Open Access | Times Cited: 4
Challenges to Co-Creating Value in Nascent Platform Ecosystems: Gaps Between Theory and Practice
Florian Hawlitschek, Daniel Hodapp
International Journal of Electronic Commerce (2024) Vol. 28, Iss. 2, pp. 156-185
Open Access | Times Cited: 1
Florian Hawlitschek, Daniel Hodapp
International Journal of Electronic Commerce (2024) Vol. 28, Iss. 2, pp. 156-185
Open Access | Times Cited: 1
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Examining the effects of cognitive load on information systems security policy compliance
Derrick Ganye, Kane Smith
Internet Research (2024)
Closed Access | Times Cited: 1
Derrick Ganye, Kane Smith
Internet Research (2024)
Closed Access | Times Cited: 1
The Role of Secure Online Payments in Enabling the Development of E-Tailing
Abdallah Houcheimi, József Mezei
Journal of Organizational Computing and Electronic Commerce (2024) Vol. 34, Iss. 4, pp. 299-317
Open Access | Times Cited: 1
Abdallah Houcheimi, József Mezei
Journal of Organizational Computing and Electronic Commerce (2024) Vol. 34, Iss. 4, pp. 299-317
Open Access | Times Cited: 1