
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The effects of knowledge mechanisms on employees' information security threat construal
Ashraf Mady, Saurabh Gupta, Merrill Warkentin
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 790-841
Closed Access | Times Cited: 12
Ashraf Mady, Saurabh Gupta, Merrill Warkentin
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 790-841
Closed Access | Times Cited: 12
Showing 12 citing articles:
Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
The importance of theory at the Information Systems Journal
Antonio Díaz Andrade, Monideepa Tarafdar, Robert M. Davison, et al.
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 693-702
Open Access | Times Cited: 10
Antonio Díaz Andrade, Monideepa Tarafdar, Robert M. Davison, et al.
Information Systems Journal (2023) Vol. 33, Iss. 4, pp. 693-702
Open Access | Times Cited: 10
Cybersecurity Awareness Scale (CSAS) for Social Media Users: Development, Validity and Reliability Study
İbrahim Arpacı, Ömer Aslan, İbrahim Enes Öner
Information Development (2025)
Closed Access
İbrahim Arpacı, Ömer Aslan, İbrahim Enes Öner
Information Development (2025)
Closed Access
VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 9
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 9
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Dual Routes of Training on Information Security Policy Compliance
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1
Qiuyu Chen, Yuxiang Hong
Journal of Computer Information Systems (2024), pp. 1-17
Closed Access | Times Cited: 1
Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT
Yves Barlette, Jean-François Berthevas, Isabelle Sueur
Systèmes d information & management (2024) Vol. Volume 28, Iss. 4, pp. 71-107
Closed Access | Times Cited: 1
Yves Barlette, Jean-François Berthevas, Isabelle Sueur
Systèmes d information & management (2024) Vol. Volume 28, Iss. 4, pp. 71-107
Closed Access | Times Cited: 1
Organizational Determinants and Compliance Behavior to Shape Information Security Plan
Maurizio Cavallari
Academic Journal of Interdisciplinary Studies (2023) Vol. 12, Iss. 6, pp. 1-1
Open Access | Times Cited: 3
Maurizio Cavallari
Academic Journal of Interdisciplinary Studies (2023) Vol. 12, Iss. 6, pp. 1-1
Open Access | Times Cited: 3
Fortifying healthcare: An action research approach to developing an effective SETA program
Jason A. Williams, Humayun Zafar, Saurabh Gupta
Computers & Security (2023) Vol. 138, pp. 103655-103655
Closed Access | Times Cited: 3
Jason A. Williams, Humayun Zafar, Saurabh Gupta
Computers & Security (2023) Vol. 138, pp. 103655-103655
Closed Access | Times Cited: 3
ChatGPT and CLT: Investigating Differences in Multimodal Processing
Michael Cahalane, Samuel N. Kirshner
Journal of Economy and Technology (2024)
Open Access
Michael Cahalane, Samuel N. Kirshner
Journal of Economy and Technology (2024)
Open Access