
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of U.S. federal government
Min‐Seok Pang, Hüseyi̇n Tanriverdi̇
The Journal of Strategic Information Systems (2022) Vol. 31, Iss. 1, pp. 101707-101707
Closed Access | Times Cited: 23
Min‐Seok Pang, Hüseyi̇n Tanriverdi̇
The Journal of Strategic Information Systems (2022) Vol. 31, Iss. 1, pp. 101707-101707
Closed Access | Times Cited: 23
Showing 23 citing articles:
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al.
Data (2024) Vol. 9, Iss. 2, pp. 27-27
Open Access | Times Cited: 13
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al.
Data (2024) Vol. 9, Iss. 2, pp. 27-27
Open Access | Times Cited: 13
Data security crisis in universities: identification of key factors affecting data breach incidents
Li Jin, Wei Xiao, Chong Zhang
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 18
Li Jin, Wei Xiao, Chong Zhang
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 18
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
He Li, William J. Kettinger, Sung-jin Yoo
Journal of Management Information Systems (2024) Vol. 41, Iss. 1, pp. 206-235
Closed Access | Times Cited: 5
He Li, William J. Kettinger, Sung-jin Yoo
Journal of Management Information Systems (2024) Vol. 41, Iss. 1, pp. 206-235
Closed Access | Times Cited: 5
Systematic Literature Review of Cloud Computing Research Between 2010 and 2023
Shailaja Jha, Devina Chaturvedi
Lecture notes in business information processing (2024), pp. 64-88
Closed Access | Times Cited: 4
Shailaja Jha, Devina Chaturvedi
Lecture notes in business information processing (2024), pp. 64-88
Closed Access | Times Cited: 4
Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives
Kouassi Raymond Agbodoh-Falschau, Bako Harinivo Ravaonorohanta
Technology in Society (2023) Vol. 74, pp. 102309-102309
Closed Access | Times Cited: 10
Kouassi Raymond Agbodoh-Falschau, Bako Harinivo Ravaonorohanta
Technology in Society (2023) Vol. 74, pp. 102309-102309
Closed Access | Times Cited: 10
CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Cybersecurity Threats and Mitigation Measures in Agriculture 4.0 and 5.0
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis, et al.
Smart Agricultural Technology (2024), pp. 100616-100616
Open Access | Times Cited: 2
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis, et al.
Smart Agricultural Technology (2024), pp. 100616-100616
Open Access | Times Cited: 2
Cloud-Based E-Government (CBEG): A Systematic Literature Review
Wissam H. S. Alkhilani, Rodziah Atan, Salfarina Abdullah, et al.
Iraqi Journal of Science (2024), pp. 2242-2263
Open Access | Times Cited: 1
Wissam H. S. Alkhilani, Rodziah Atan, Salfarina Abdullah, et al.
Iraqi Journal of Science (2024), pp. 2242-2263
Open Access | Times Cited: 1
Risk, reputation and responsibility: Cybersecurity and centralized data in United States civilian federal agencies
Erika Heeren-Moon
Telecommunications Policy (2023) Vol. 47, Iss. 2, pp. 102502-102502
Closed Access | Times Cited: 3
Erika Heeren-Moon
Telecommunications Policy (2023) Vol. 47, Iss. 2, pp. 102502-102502
Closed Access | Times Cited: 3
The Public Sector Cloud Service Procurement in Sweden
M. Sirajul Islam, Fredrik Karlsson
International Journal of Public Administration in the Digital Age (2022) Vol. 8, Iss. 1, pp. 1-22
Open Access | Times Cited: 3
M. Sirajul Islam, Fredrik Karlsson
International Journal of Public Administration in the Digital Age (2022) Vol. 8, Iss. 1, pp. 1-22
Open Access | Times Cited: 3
Information Security Research in the Information Systems Discipline: A Thematic Review and Future Research Directions
Stephanie Totty, He Li, Chen Zhang, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2024) Vol. 55, Iss. 3, pp. 135-169
Closed Access
Stephanie Totty, He Li, Chen Zhang, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2024) Vol. 55, Iss. 3, pp. 135-169
Closed Access
Investigating Systems Modernisation: Approaches, Challenges and Risks
Gareth Hogan, Patricija Shalkauskaite, Mengte Zhu, et al.
Communications in computer and information science (2024), pp. 147-162
Closed Access
Gareth Hogan, Patricija Shalkauskaite, Mengte Zhu, et al.
Communications in computer and information science (2024), pp. 147-162
Closed Access
Do CEOs matter? Divergent impact of CEO power on digital and non-digital innovation
Inmyung Choi, Min‐Seok Pang
The Journal of Strategic Information Systems (2024) Vol. 34, Iss. 1, pp. 101875-101875
Closed Access
Inmyung Choi, Min‐Seok Pang
The Journal of Strategic Information Systems (2024) Vol. 34, Iss. 1, pp. 101875-101875
Closed Access
Assessing Information Security Competencies of Firm Leaders towards Improving Procedural Information Security Countermeasure: Awareness and Cybersecurity Protective Behavior
Saif Hussein Abdallah Alghazo, Norshima Humaidi, Shereen Noranee
Information Management and Business Review (2023) Vol. 15, Iss. 1(I)SI, pp. 1-13
Open Access | Times Cited: 1
Saif Hussein Abdallah Alghazo, Norshima Humaidi, Shereen Noranee
Information Management and Business Review (2023) Vol. 15, Iss. 1(I)SI, pp. 1-13
Open Access | Times Cited: 1
Understanding the Developments in the Business Perspective of Cloud Computing
Harsh Parekh, Huai-Tzu Cheng, Andrew Schwarz
Journal of Organizational and End User Computing (2023) Vol. 35, Iss. 1, pp. 1-36
Open Access | Times Cited: 1
Harsh Parekh, Huai-Tzu Cheng, Andrew Schwarz
Journal of Organizational and End User Computing (2023) Vol. 35, Iss. 1, pp. 1-36
Open Access | Times Cited: 1
Strategic Planning For Information Systems Optimization Of Vocational Higher Education Facilities And Infrastructures At The Ministry Of Education, Culture, Research And Technology (E-Sarpras)
Fatimatuz Zahro, Malik Fikri, Muhammad Dumairy Priyanto, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1
Fatimatuz Zahro, Malik Fikri, Muhammad Dumairy Priyanto, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1
Evolving strategic IS themes
Benoit A. Aubert, Yolande E. Chan
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 1, pp. 101821-101821
Open Access
Benoit A. Aubert, Yolande E. Chan
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 1, pp. 101821-101821
Open Access
Investigating the use of protective technologies after data breach: the roles of psychological distance, technological service type and organizational justice
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo, Jaeung Lee, et al.
Computers & Security (2024) Vol. 143, pp. 103900-103900
Closed Access
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo, Jaeung Lee, et al.
Computers & Security (2024) Vol. 143, pp. 103900-103900
Closed Access
Container Scheduling Algorithms for Distributed Cloud Environments
H. Chen, Cong Shen, Xinyuan Qiu, et al.
Processes (2024) Vol. 12, Iss. 9, pp. 1804-1804
Open Access
H. Chen, Cong Shen, Xinyuan Qiu, et al.
Processes (2024) Vol. 12, Iss. 9, pp. 1804-1804
Open Access
Breached and Denied: The Cost of Data Breaches on Individuals as Mortgage Application Denials
Min‐Seok Pang, Anthony Vance
SSRN Electronic Journal (2023)
Closed Access
Min‐Seok Pang, Anthony Vance
SSRN Electronic Journal (2023)
Closed Access
Mechanisms and Paths for Constructing the Organic Interface between Digital Economy and Chinese-Style Modernization Based on Cognitive Mapping
Jiaqi Zhao
Applied Mathematics and Nonlinear Sciences (2023) Vol. 9, Iss. 1
Open Access
Jiaqi Zhao
Applied Mathematics and Nonlinear Sciences (2023) Vol. 9, Iss. 1
Open Access
Securing Business Intelligence during Mergers and Acquisition: Critical Cybersecurity Imperatives
Poulami Nandi, Anam Fatma, Pankaj Pathak, et al.
(2023), pp. 315-320
Closed Access
Poulami Nandi, Anam Fatma, Pankaj Pathak, et al.
(2023), pp. 315-320
Closed Access
Where is IT in Information Security? The Interrelationship between IT Investment, Security Awareness, and Data Breaches
Wilson Li, Alvin Chung Man Leung, Wei Thoo Yue
SSRN Electronic Journal (2020)
Closed Access
Wilson Li, Alvin Chung Man Leung, Wei Thoo Yue
SSRN Electronic Journal (2020)
Closed Access