OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention
Bowen Guan, Carol Hsu
Internet Research (2020) Vol. 30, Iss. 5, pp. 1383-1405
Closed Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

Abusive supervision and cyberloafing: A moderated moderation model of moral disengagement and negative reciprocity beliefs
Kian Yeik Koay, Vivien K. G. Lim, Patrick Chin-Hooi Soh, et al.
Information & Management (2022) Vol. 59, Iss. 2, pp. 103600-103600
Closed Access | Times Cited: 44

Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10

Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 19

Exploring the association between the Proteus effect and intention to play massive multiplayer online role-playing games (MMORPGs)
Seungjong Sun, Jang Hyun Kim, Kwan Min Lee, et al.
Internet Research (2023) Vol. 34, Iss. 1, pp. 58-78
Closed Access | Times Cited: 15

Exploring the Factors Influencing Information Security Policy Compliance and Violations: A Systematic Literature Review
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 4

Predicting COVID-19 vaccination intentions: the roles of threat appraisal, coping appraisal, subjective norms, and negative affect
Zou Xia, Qiang Chen, Yangyi Zhang, et al.
BMC Public Health (2023) Vol. 23, Iss. 1
Open Access | Times Cited: 10

An Integrated Model of Ambivalence and Deterrence of Bystander Inaction in Delegitimizing Doxing
Yang‐Jun Li, Zehao He, Christy M.K. Cheung, et al.
Information & Management (2025), pp. 104118-104118
Open Access

Understanding physicians' noncompliance use of AI-aided diagnosis—A mixed-methods approach
Jiaoyang Li, Xixi Li, Cheng Zhang
Decision Support Systems (2025) Vol. 191, pp. 114420-114420
Closed Access

Dual identities at work: how security role and functional role shape cybersecurity behaviours
Obi Ogbanufe, Huigang Liang
Behaviour and Information Technology (2025), pp. 1-25
Closed Access

Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review
Mohammed Mubarkoot, Jörn Altmann, Morteza Rasti‐Barzoki, et al.
Computers & Security (2022) Vol. 124, pp. 102985-102985
Open Access | Times Cited: 14

Is it fair? How and when exploitative leadership impacts employees' knowledge sharing
Changyu Wang, Yimeng Zhang, Jiaojiao Feng
Management Decision (2023) Vol. 61, Iss. 11, pp. 3295-3315
Closed Access | Times Cited: 8

Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender
Chenhui Liu, Huigang Liang, Nengmin Wang, et al.
Information Technology and People (2021) Vol. 35, Iss. 2, pp. 802-834
Closed Access | Times Cited: 18

The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation
Feng Xu, Carol Hsu, Tawei Wang, et al.
Information Systems Journal (2023) Vol. 34, Iss. 4, pp. 1144-1174
Open Access | Times Cited: 7

Factors Influencing Employees’ Information Security Awareness in the Telework Environment
Jie Zhen, Kunxiang Dong, Zongxiao Xie, et al.
Electronics (2022) Vol. 11, Iss. 21, pp. 3458-3458
Open Access | Times Cited: 11

The effect of abusive supervision on turnover intentions: on-the-job embeddedness versus traditional attitudinal constructs
Emmanuel Twumasi Ampofo, Osman M. Karatepe
Journal of Management & Organization (2022), pp. 1-18
Open Access | Times Cited: 9

The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
Lin Chen, Zongxiao Xie, Jie Zhen, et al.
Psychology Research and Behavior Management (2022) Vol. Volume 15, pp. 1177-1191
Open Access | Times Cited: 9

Predictors of Success in Information Security Policy Compliance
Jeretta Horn Nord, Carol Springer Sargent, Alex Koohang, et al.
Journal of Computer Information Systems (2022) Vol. 62, Iss. 4, pp. 863-873
Closed Access | Times Cited: 7

Impact of abusive leader behavior on employee job insecurity: A mediating roles of emotional exhaustion and abusive peer behavior
Li Miao, Ammar Ahmed, Obed Rashdi Syed, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 7

Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment
Joshua M. Davis, Deepti Agrawal, Rebekah Austin
Computers & Security (2024) Vol. 142, pp. 103896-103896
Open Access | Times Cited: 1

The good, the bad and the evil: A unified conceptualization of negative leadership behaviour
Robert Modliba, Theresa Treffers
International Journal of Management Reviews (2024)
Closed Access | Times Cited: 1

Workplace mistreatments by the management toward employees and its behavioral consequences
Qurat-ul-Ain Burhan
South Asian Journal of Business Studies (2024)
Closed Access | Times Cited: 1

Why do Chinese Youth Seek Cancer Risk Information Online? Evidence from Four Cities
Zou Xia, Qiang Chen, Richard Evans
Health Communication (2023) Vol. 39, Iss. 2, pp. 258-269
Closed Access | Times Cited: 2

How does social presence influence public crisis information sharing intention? Situational pressure perspective
Xiaoan Guo, Hengjiang Jin, Tianzhe Qi
Frontiers in Public Health (2023) Vol. 11
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top