OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1146

Showing 1-25 of 1146 citing articles:

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu, Hasan Cavusoglu, Benbasat
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 523-523
Closed Access | Times Cited: 1704

Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Catherine Anderson, Agarwal
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 613-613
Closed Access | Times Cited: 654

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Anthony Vance, Mikko Siponen, Seppo Pahnila
Information & Management (2012) Vol. 49, Iss. 3-4, pp. 190-198
Closed Access | Times Cited: 644

Future directions for behavioral information security research
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520

Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
Qing Hu, Tamara Dinev, Paul Hart, et al.
Decision Sciences (2012) Vol. 43, Iss. 4, pp. 615-660
Closed Access | Times Cited: 466

Employees’ adherence to information security policies: An exploratory field study
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Information & Management (2013) Vol. 51, Iss. 2, pp. 217-224
Closed Access | Times Cited: 446

Beyond Deterrence: An Expanded View of Employee Computer Abuse
Robert Willison, Merrill Warkentin
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 1-20
Closed Access | Times Cited: 446

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Ken H. Guo, Yufei Yuan, Norm Archer, et al.
Journal of Management Information Systems (2011) Vol. 28, Iss. 2, pp. 203-236
Closed Access | Times Cited: 383

Toward a Unified Model of Information Security Policy Compliance
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371

Security of smart manufacturing systems
Nilufer Tuptuk, Stephen Hailes
Journal of Manufacturing Systems (2018) Vol. 47, pp. 93-106
Open Access | Times Cited: 369

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
John D’Arcy, Tejaswini Herath
European Journal of Information Systems (2011) Vol. 20, Iss. 6, pp. 643-658
Closed Access | Times Cited: 341

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
Moti Zwilling, Galit Klien, Dušan Lesjak, et al.
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 82-97
Closed Access | Times Cited: 292

Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 287

How gamification marketing activities motivate desirable consumer behaviors: Focusing on the role of brand love
Chia‐Lin Hsu, Mu‐Chen Chen
Computers in Human Behavior (2018) Vol. 88, pp. 121-133
Closed Access | Times Cited: 280

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 275

Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269

Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 265

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250

Page 1 - Next Page

Scroll to top