
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security Education, Training, and Awareness Programs: Literature Review
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 19
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 19
A review of the literature on the metaverse: definition, technologies, and user behaviors
Zhongyun Zhou, Z. Chen, Xiaoling Jin
Internet Research (2023) Vol. 34, Iss. 1, pp. 129-148
Closed Access | Times Cited: 34
Zhongyun Zhou, Z. Chen, Xiaoling Jin
Internet Research (2023) Vol. 34, Iss. 1, pp. 129-148
Closed Access | Times Cited: 34
Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 201-201
Open Access | Times Cited: 9
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 201-201
Open Access | Times Cited: 9
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, et al.
Journal of Systems and Software (2023) Vol. 208, pp. 111899-111899
Open Access | Times Cited: 19
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, et al.
Journal of Systems and Software (2023) Vol. 208, pp. 111899-111899
Open Access | Times Cited: 19
The tensions of cyber-resilience: From sensemaking to practice
Benoît Dupont, Clifford Shearing, Marilyne Bernier, et al.
Computers & Security (2023) Vol. 132, pp. 103372-103372
Open Access | Times Cited: 17
Benoît Dupont, Clifford Shearing, Marilyne Bernier, et al.
Computers & Security (2023) Vol. 132, pp. 103372-103372
Open Access | Times Cited: 17
Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior
Jimoh G. Fatoki, Zixing Shen, Carlo A. Mora‐Monge
Computers & Security (2024) Vol. 141, pp. 103812-103812
Closed Access | Times Cited: 8
Jimoh G. Fatoki, Zixing Shen, Carlo A. Mora‐Monge
Computers & Security (2024) Vol. 141, pp. 103812-103812
Closed Access | Times Cited: 8
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
Faheem Ahmed Shaikh, Mikko Siponen
Information Systems Frontiers (2023) Vol. 26, Iss. 3, pp. 1109-1120
Open Access | Times Cited: 16
Faheem Ahmed Shaikh, Mikko Siponen
Information Systems Frontiers (2023) Vol. 26, Iss. 3, pp. 1109-1120
Open Access | Times Cited: 16
Investigating students’ awareness of online privacy and cybersecurity: an empirical study with effective cybersecurity training framework
Rahat Uddin Azad, Sabiha Tasmim, Md. Atikuzzaman
Global Knowledge Memory and Communication (2025)
Closed Access
Rahat Uddin Azad, Sabiha Tasmim, Md. Atikuzzaman
Global Knowledge Memory and Communication (2025)
Closed Access
Training for improved information security culture: a longitudinal randomized controlled trial
Martin Grill, Teodor Sommestad, Henrik Karlzén, et al.
Information and Computer Security (2025)
Closed Access
Martin Grill, Teodor Sommestad, Henrik Karlzén, et al.
Information and Computer Security (2025)
Closed Access
Does Cyber-Security Training Translate to Effective Prevention of Online Harms?
Johannes Klemm, Anne V. D. M. Kayem
Lecture notes on data engineering and communications technologies (2025), pp. 73-83
Closed Access
Johannes Klemm, Anne V. D. M. Kayem
Lecture notes on data engineering and communications technologies (2025), pp. 73-83
Closed Access
Analyzing Reporting on Ransomware Incidents: A Case Study
André Greubel, Daniela Andres, Martin Hennecke
Social Sciences (2023) Vol. 12, Iss. 5, pp. 265-265
Open Access | Times Cited: 8
André Greubel, Daniela Andres, Martin Hennecke
Social Sciences (2023) Vol. 12, Iss. 5, pp. 265-265
Open Access | Times Cited: 8
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training
Hwee‐Joo Kam, Dustin Ormond, Philip Menard, et al.
Information Systems Journal (2021) Vol. 32, Iss. 4, pp. 888-926
Closed Access | Times Cited: 19
Hwee‐Joo Kam, Dustin Ormond, Philip Menard, et al.
Information Systems Journal (2021) Vol. 32, Iss. 4, pp. 888-926
Closed Access | Times Cited: 19
“Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue
Andrew Reeves, Dragana Calic, Paul Delfabbro
Computers & Security (2023) Vol. 128, pp. 103137-103137
Closed Access | Times Cited: 7
Andrew Reeves, Dragana Calic, Paul Delfabbro
Computers & Security (2023) Vol. 128, pp. 103137-103137
Closed Access | Times Cited: 7
Gamifying a Learning Management System: Narrative and Team Leaderboard in the Context of Effective Information Security Education
Martin Haenel, Thiemo Wambsganß, Matthias Söllner
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2024)
Open Access | Times Cited: 2
Martin Haenel, Thiemo Wambsganß, Matthias Söllner
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2024)
Open Access | Times Cited: 2
A field experiment on ISP training designs for enhancing employee information security compliance
Ilja Nastjuk, Florian Rampold, Simon Trang, et al.
European Journal of Information Systems (2024), pp. 1-24
Closed Access | Times Cited: 2
Ilja Nastjuk, Florian Rampold, Simon Trang, et al.
European Journal of Information Systems (2024), pp. 1-24
Closed Access | Times Cited: 2
Design principles for cognitively accessible cybersecurity training
Joakim Kävrestad, Jana Rambusch, Marcus Nohlberg
Computers & Security (2023) Vol. 137, pp. 103630-103630
Open Access | Times Cited: 6
Joakim Kävrestad, Jana Rambusch, Marcus Nohlberg
Computers & Security (2023) Vol. 137, pp. 103630-103630
Open Access | Times Cited: 6
Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective
Nan Liang, Rudy Hirschheim, Xin Luo, et al.
Journal of Information Technology (2023) Vol. 38, Iss. 4, pp. 382-415
Closed Access | Times Cited: 5
Nan Liang, Rudy Hirschheim, Xin Luo, et al.
Journal of Information Technology (2023) Vol. 38, Iss. 4, pp. 382-415
Closed Access | Times Cited: 5
Exploring the evidence for email phishing training: A scoping review
Nina Marshall, Daniel Sturman, Jaime C. Auton
Computers & Security (2023) Vol. 139, pp. 103695-103695
Open Access | Times Cited: 5
Nina Marshall, Daniel Sturman, Jaime C. Auton
Computers & Security (2023) Vol. 139, pp. 103695-103695
Open Access | Times Cited: 5
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Dual Routes of Training on Information Security Policy Compliance
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1
A Taxonomy of SETA Methods and Linkage to Delivery Preferences
Joakim Kävrestad, Marcus Nohlberg, Steven Furnell
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2023) Vol. 54, Iss. 4, pp. 107-133
Open Access | Times Cited: 3
Joakim Kävrestad, Marcus Nohlberg, Steven Furnell
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2023) Vol. 54, Iss. 4, pp. 107-133
Open Access | Times Cited: 3
Fortifying healthcare: An action research approach to developing an effective SETA program
Jason A. Williams, Humayun Zafar, Saurabh Gupta
Computers & Security (2023) Vol. 138, pp. 103655-103655
Closed Access | Times Cited: 3
Jason A. Williams, Humayun Zafar, Saurabh Gupta
Computers & Security (2023) Vol. 138, pp. 103655-103655
Closed Access | Times Cited: 3
Toward A Higher Resilience Against Cyberattacks
Martin Brehmer, Vanessa Maria Steinherr, Raphaela Stöckl
Datenschutz und Datensicherheit - DuD (2024) Vol. 48, Iss. 6, pp. 352-357
Open Access
Martin Brehmer, Vanessa Maria Steinherr, Raphaela Stöckl
Datenschutz und Datensicherheit - DuD (2024) Vol. 48, Iss. 6, pp. 352-357
Open Access
Expressing opinions about information security in an organization: the spiral of silence theory perspective
Gregor Petrič, Špela Orehek
Information and Computer Security (2024)
Closed Access
Gregor Petrič, Špela Orehek
Information and Computer Security (2024)
Closed Access