
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1146
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1146
Showing 1-25 of 1146 citing articles:
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu, Hasan Cavusoglu, Benbasat
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 523-523
Closed Access | Times Cited: 1704
Bulgurcu, Hasan Cavusoglu, Benbasat
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 523-523
Closed Access | Times Cited: 1704
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
Computers & Security (2011) Vol. 31, Iss. 1, pp. 83-95
Closed Access | Times Cited: 739
Princely Ifinedo
Computers & Security (2011) Vol. 31, Iss. 1, pp. 83-95
Closed Access | Times Cited: 739
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Catherine Anderson, Agarwal
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 613-613
Closed Access | Times Cited: 654
Catherine Anderson, Agarwal
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 613-613
Closed Access | Times Cited: 654
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Anthony Vance, Mikko Siponen, Seppo Pahnila
Information & Management (2012) Vol. 49, Iss. 3-4, pp. 190-198
Closed Access | Times Cited: 644
Anthony Vance, Mikko Siponen, Seppo Pahnila
Information & Management (2012) Vol. 49, Iss. 3-4, pp. 190-198
Closed Access | Times Cited: 644
Future directions for behavioral information security research
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, et al.
Computers & Security (2012) Vol. 32, pp. 90-101
Closed Access | Times Cited: 597
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
Qing Hu, Tamara Dinev, Paul Hart, et al.
Decision Sciences (2012) Vol. 43, Iss. 4, pp. 615-660
Closed Access | Times Cited: 466
Qing Hu, Tamara Dinev, Paul Hart, et al.
Decision Sciences (2012) Vol. 43, Iss. 4, pp. 615-660
Closed Access | Times Cited: 466
Employees’ adherence to information security policies: An exploratory field study
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Information & Management (2013) Vol. 51, Iss. 2, pp. 217-224
Closed Access | Times Cited: 446
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Information & Management (2013) Vol. 51, Iss. 2, pp. 217-224
Closed Access | Times Cited: 446
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Robert Willison, Merrill Warkentin
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 1-20
Closed Access | Times Cited: 446
Robert Willison, Merrill Warkentin
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 1-20
Closed Access | Times Cited: 446
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Ken H. Guo, Yufei Yuan, Norm Archer, et al.
Journal of Management Information Systems (2011) Vol. 28, Iss. 2, pp. 203-236
Closed Access | Times Cited: 383
Ken H. Guo, Yufei Yuan, Norm Archer, et al.
Journal of Management Information Systems (2011) Vol. 28, Iss. 2, pp. 203-236
Closed Access | Times Cited: 383
Toward a Unified Model of Information Security Policy Compliance
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Security of smart manufacturing systems
Nilufer Tuptuk, Stephen Hailes
Journal of Manufacturing Systems (2018) Vol. 47, pp. 93-106
Open Access | Times Cited: 369
Nilufer Tuptuk, Stephen Hailes
Journal of Manufacturing Systems (2018) Vol. 47, pp. 93-106
Open Access | Times Cited: 369
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
Princely Ifinedo
Information & Management (2013) Vol. 51, Iss. 1, pp. 69-79
Closed Access | Times Cited: 359
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
John D’Arcy, Tejaswini Herath
European Journal of Information Systems (2011) Vol. 20, Iss. 6, pp. 643-658
Closed Access | Times Cited: 341
John D’Arcy, Tejaswini Herath
European Journal of Information Systems (2011) Vol. 20, Iss. 6, pp. 643-658
Closed Access | Times Cited: 341
Factors affecting perceived effectiveness of COVID-19 prevention measures among Filipinos during Enhanced Community Quarantine in Luzon, Philippines: Integrating Protection Motivation Theory and extended Theory of Planned Behavior
Yogi Tri Prasetyo, Allysa Mae Castillo, Louie John Salonga, et al.
International Journal of Infectious Diseases (2020) Vol. 99, pp. 312-323
Open Access | Times Cited: 328
Yogi Tri Prasetyo, Allysa Mae Castillo, Louie John Salonga, et al.
International Journal of Infectious Diseases (2020) Vol. 99, pp. 312-323
Open Access | Times Cited: 328
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
Moti Zwilling, Galit Klien, Dušan Lesjak, et al.
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 82-97
Closed Access | Times Cited: 292
Moti Zwilling, Galit Klien, Dušan Lesjak, et al.
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 82-97
Closed Access | Times Cited: 292
Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 287
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 287
How gamification marketing activities motivate desirable consumer behaviors: Focusing on the role of brand love
Chia‐Lin Hsu, Mu‐Chen Chen
Computers in Human Behavior (2018) Vol. 88, pp. 121-133
Closed Access | Times Cited: 280
Chia‐Lin Hsu, Mu‐Chen Chen
Computers in Human Behavior (2018) Vol. 88, pp. 121-133
Closed Access | Times Cited: 280
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 275
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 275
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 269
Gender difference and employees' cybersecurity behaviors
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 265
Mohd Anwar, Wu He, Ivan K. Ash, et al.
Computers in Human Behavior (2016) Vol. 69, pp. 437-443
Open Access | Times Cited: 265
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250
Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma
Computers & Security (2015) Vol. 49, pp. 177-191
Closed Access | Times Cited: 250