OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Philip Menard, Gregory J. Bott, Robert E. Crossler
Journal of Management Information Systems (2017) Vol. 34, Iss. 4, pp. 1203-1230
Closed Access | Times Cited: 227

Showing 1-25 of 227 citing articles:

Afraid to travel after COVID-19? Self-protection, coping and resilience against pandemic ‘travel fear’
Danni Zheng, Qiuju Luo, Brent W. Ritchie
Tourism Management (2020) Vol. 83, pp. 104261-104261
Closed Access | Times Cited: 622

The Role of Trust in Mitigating Perceived Threat, Fear, and Travel Avoidance after a Pandemic Outbreak: A Multigroup Analysis
Danni Zheng, Qiuju Luo, Brent W. Ritchie
Journal of Travel Research (2021) Vol. 61, Iss. 3, pp. 581-596
Closed Access | Times Cited: 105

Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general
Marijn Martens, Ralf De Wolf, Lieven De Marez
Computers in Human Behavior (2018) Vol. 92, pp. 139-150
Closed Access | Times Cited: 87

Understanding farmers’ climate adaptation intention in Iran: A protection-motivation extended model
Mansour Ghanian, Omid M. Ghoochani, Mojtaba Dehghanpour, et al.
Land Use Policy (2020) Vol. 94, pp. 104553-104553
Open Access | Times Cited: 84

Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior
Dongming Wu
Computers in Human Behavior (2019) Vol. 105, pp. 106229-106229
Closed Access | Times Cited: 81

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69

Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications
Nirmalee I. Raddatz, Joshua G. Coyne, Philip Menard, et al.
European Journal of Information Systems (2021) Vol. 32, Iss. 2, pp. 287-314
Closed Access | Times Cited: 60

Blockchain adoption: A study of cognitive factors underpinning decision making
Davit Marikyan, Savvas Papagiannidis, Omer Rana, et al.
Computers in Human Behavior (2022) Vol. 131, pp. 107207-107207
Open Access | Times Cited: 58

Understanding consumer behavior toward adoption of e-wallet with the moderating role of pandemic risk: an integrative perspective
Samar Rahi, Mahmoud Alghizzawi, Abdul Hafaz Ngah
Kybernetes (2023) Vol. 53, Iss. 11, pp. 4818-4839
Closed Access | Times Cited: 37

Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model
L. M. J. Bekkers, M.S. van ’t Hoff-de Goede, Ellen Misana-ter Huurne, et al.
Computers & Security (2023) Vol. 127, pp. 103099-103099
Open Access | Times Cited: 32

Cybersecurity risks in online banking: A detailed review and preventive strategies applicatio
Adedoyin Tolulope Oyewole, Chinwe Chinazo Okoye, Onyeka Chrisanctus Ofodile, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 3, pp. 625-643
Open Access | Times Cited: 15

Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Towards an Improved Understanding of Human Factors in Cybersecurity
Jongkil Jay Jeong, Joanne Mihelcic, Gillian Oliver, et al.
(2019), pp. 338-345
Closed Access | Times Cited: 59

Understanding cybersecurity behavioral habits: Insights from situational support
Yuxiang Hong, Steven Furnell
Journal of Information Security and Applications (2021) Vol. 57, pp. 102710-102710
Open Access | Times Cited: 43

Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory
Aihui Chen, Yaobin Lu
International Journal of Information Management (2021) Vol. 61, pp. 102402-102402
Closed Access | Times Cited: 41

Towards a wearable education: Understanding the determinants affecting students’ adoption of wearable technologies using machine learning algorithms
Mostafa Al‐Emran, Maryam Nasser Al-Nuaimi, İbrahim Arpacı, et al.
Education and Information Technologies (2022) Vol. 28, Iss. 3, pp. 2727-2746
Closed Access | Times Cited: 36

Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe, et al.
Computers & Security (2022) Vol. 124, pp. 102954-102954
Open Access | Times Cited: 34

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34

Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, et al.
International Journal of Information Management (2022) Vol. 65, pp. 102498-102498
Open Access | Times Cited: 29

Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19

Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems
Yiyu Zhan, Sayed Fayaz Ahmad, Muhammad Irshad, et al.
Heliyon (2023) Vol. 10, Iss. 1, pp. e22947-e22947
Open Access | Times Cited: 18

Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 7

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 49

Page 1 - Next Page

Scroll to top