OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry, Gregory D. Moody
Information Systems Journal (2014) Vol. 25, Iss. 5, pp. 433-463
Closed Access | Times Cited: 203

Showing 1-25 of 203 citing articles:

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 962-986
Closed Access | Times Cited: 351

Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 287

Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
Anthony Vance, Paul Benjamin Lowry, Dennis L. Eggett
MIS Quarterly (2015) Vol. 39, Iss. 2, pp. 345-366
Closed Access | Times Cited: 246

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161

Algorithmic control and gig workers: a legitimacy perspective of Uber drivers
Martin Wiener, W. Alec Cram, Alexander Benlian
European Journal of Information Systems (2021) Vol. 32, Iss. 3, pp. 485-507
Open Access | Times Cited: 110

Examining the Impact of Algorithmic Control on Uber Drivers’ Technostress
W. Alec Cram, Martin Wiener, Monideepa Tarafdar, et al.
Journal of Management Information Systems (2022) Vol. 39, Iss. 2, pp. 426-453
Open Access | Times Cited: 92

A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
Jack Shih‐Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, et al.
Information Systems Research (2015) Vol. 26, Iss. 2, pp. 282-300
Closed Access | Times Cited: 170

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 133

Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance
Chul Woo Yoo, G. Lawrence Sanders, Robert P. Cerveny
Decision Support Systems (2018) Vol. 108, pp. 107-118
Closed Access | Times Cited: 119

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 564-584
Closed Access | Times Cited: 113

Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility
Paul Benjamin Lowry, Darrell M. Wilson
The Journal of Strategic Information Systems (2016) Vol. 25, Iss. 3, pp. 211-226
Closed Access | Times Cited: 113

The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory
Nadine Guhr, Benedikt Lebek, Michael H. Breitner
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 340-362
Closed Access | Times Cited: 97

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91

Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style
Ofir Turel, Peng Liu, Chris Bart
Information Systems Management (2017) Vol. 34, Iss. 2, pp. 117-136
Closed Access | Times Cited: 90

A comprehensive model of information security factors for decision-makers
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 90

Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83

Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 82

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59

What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33

Page 1 - Next Page

Scroll to top