OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Improving Phishing Reporting Using Security Gamification
Matthew L. Jensen, Ryan Wright, Alexandra Durcikova, et al.
Journal of Management Information Systems (2022) Vol. 39, Iss. 3, pp. 793-823
Closed Access | Times Cited: 22

Showing 22 citing articles:

The Influence of Human Factors on the Intention to Report Phishing Emails
Ioana Andreea Marin, Pavlo Burda, Nicola Zannone, et al.
(2023), pp. 1-18
Open Access | Times Cited: 15

Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment
Jun Zhang, Qiqi Jiang, Wenping Zhang, et al.
Journal of Management Information Systems (2023) Vol. 40, Iss. 2, pp. 401-439
Open Access | Times Cited: 11

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4

Nothing Like the Real Thing! A Randomized Field Experiment of Quasi-Mixed Reality Gamified Phishing Training
Jong Seok Lee, William J. Kettinger, Chen Zhang
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2025) Vol. 56, Iss. 1, pp. 61-78
Closed Access

The Damocles Sword of Cyber Attacks
Frederik Hering, Oliver Hinz, Jella Pfeiffer, et al.
Business & Information Systems Engineering (2025)
Open Access

Judging Phishing Under Uncertainty: How Do Users Handle Inaccurate Automated Advice?
Tarini Saka, Kalliopi Vakali, Adam D G Jenkins, et al.
(2025), pp. 1-18
Closed Access

Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games
Yue Huang, Marthie Grobler, Lauren S. Ferro, et al.
(2025), pp. 1-27
Closed Access

Unveiling the process of phishing precautions taking: The moderating role of optimism bias
Wenjing Lei, Siqi Hu, Carol Hsu
Computers & Security (2023) Vol. 129, pp. 103249-103249
Closed Access | Times Cited: 8

How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7

Learning from safety science: A way forward for studying cybersecurity incidents in organizations
Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, et al.
Computers & Security (2023) Vol. 134, pp. 103435-103435
Open Access | Times Cited: 7

Gamification as a panacea to workplace cyberloafing: an application of self-determination and social bonding theories
K.S. Nivedhitha, Gayathri Giri, Palvi Pasricha
Internet Research (2024)
Closed Access | Times Cited: 1

Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning
Steven Ullman, Sagar Samtani, Hongyi Zhu, et al.
Journal of Management Information Systems (2024) Vol. 41, Iss. 3, pp. 708-743
Closed Access | Times Cited: 1

'Protect and Fight Back': A Case Study on User Motivations to Report Phishing Emails
Pavlo Burda, Luca Allodi, Alexander Serebrenik, et al.
(2024), pp. 30-43
Closed Access | Times Cited: 1

Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment
Jun Zhang, Qiqi Jiang, Wenping Zhang, et al.
SSRN Electronic Journal (2023)
Open Access | Times Cited: 3

A Framework for the Gamification of GUI Testing
Riccardo Coppola, Luca Ardito, Tommaso Fulcini, et al.
(2023), pp. 215-242
Closed Access | Times Cited: 2

The influence of affective processing on phishing susceptibility
Chuan Tian, Matthew L. Jensen, Gregory J. Bott, et al.
European Journal of Information Systems (2024), pp. 1-15
Closed Access

Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment
Dennik Baltuttis, Timm Teubner
Computers & Security (2024) Vol. 144, pp. 103940-103940
Open Access

Information Security Research in the Information Systems Discipline: A Thematic Review and Future Research Directions
Stephanie Totty, He Li, Chen Zhang, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2024) Vol. 55, Iss. 3, pp. 135-169
Closed Access

Means of gamification of learning during martial law
Наталія Маланюк, Daria Hubarieva, Tetiana Sviatenko, et al.
Revista Amazonia Investiga (2023) Vol. 12, Iss. 61, pp. 236-247
Open Access | Times Cited: 1

Employees are not the weakest link: an occupational safety view of information security
Alan R. Dennis
Organizational Cybersecurity Journal Practice Process and People (2024) Vol. 4, Iss. 1, pp. 19-31
Open Access

Phish and Tips:
Stella Kazamia, Chris Culnane, Daniel Gardham, et al.
IFIP advances in information and communication technology (2024), pp. 200-214
Closed Access

Page 1

Scroll to top