
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Value‐focused assessment of information system security in organizations
Gurpreet Dhillon, Gholamreza Torkzadeh
Information Systems Journal (2006) Vol. 16, Iss. 3, pp. 293-314
Closed Access | Times Cited: 349
Gurpreet Dhillon, Gholamreza Torkzadeh
Information Systems Journal (2006) Vol. 16, Iss. 3, pp. 293-314
Closed Access | Times Cited: 349
Showing 1-25 of 349 citing articles:
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1145
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1145
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath, H. Raghav Rao
Decision Support Systems (2009) Vol. 47, Iss. 2, pp. 154-165
Closed Access | Times Cited: 793
Tejaswini Herath, H. Raghav Rao
Decision Support Systems (2009) Vol. 47, Iss. 2, pp. 154-165
Closed Access | Times Cited: 793
Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry, Gregory D. Moody
Information Systems Journal (2014) Vol. 25, Iss. 5, pp. 433-463
Closed Access | Times Cited: 203
Paul Benjamin Lowry, Gregory D. Moody
Information Systems Journal (2014) Vol. 25, Iss. 5, pp. 433-463
Closed Access | Times Cited: 203
From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets
José Ramón Saura, Domingo Ribeiro Soriano, Daniel Palacios‐Marqués
International Journal of Information Management (2021) Vol. 60, pp. 102331-102331
Open Access | Times Cited: 184
José Ramón Saura, Domingo Ribeiro Soriano, Daniel Palacios‐Marqués
International Journal of Information Management (2021) Vol. 60, pp. 102331-102331
Open Access | Times Cited: 184
Blockchain Security: A Survey of Techniques and Research Directions
Jiewu Leng, Man Zhou, Jindong Zhao, et al.
IEEE Transactions on Services Computing (2020) Vol. 15, Iss. 4, pp. 2490-2510
Closed Access | Times Cited: 183
Jiewu Leng, Man Zhou, Jindong Zhao, et al.
IEEE Transactions on Services Computing (2020) Vol. 15, Iss. 4, pp. 2490-2510
Closed Access | Times Cited: 183
Defining organisational information security culture—Perspectives from academia and industry
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 151
Adéle da Veiga, Л. В. Астахова, Adèle Botha, et al.
Computers & Security (2020) Vol. 92, pp. 101713-101713
Open Access | Times Cited: 151
Assessing behavioral data science privacy issues in government artificial intelligence deployment
José Ramón Saura, Domingo Ribeiro Soriano, Daniel Palacios‐Marqués
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101679-101679
Open Access | Times Cited: 137
José Ramón Saura, Domingo Ribeiro Soriano, Daniel Palacios‐Marqués
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101679-101679
Open Access | Times Cited: 137
What makes bloggers share knowledge? An investigation on the role of trust
Sangmi Chai, Minkyun Kim
International Journal of Information Management (2010) Vol. 30, Iss. 5, pp. 408-415
Closed Access | Times Cited: 211
Sangmi Chai, Minkyun Kim
International Journal of Information Management (2010) Vol. 30, Iss. 5, pp. 408-415
Closed Access | Times Cited: 211
Digital divide across the European Union
Frederico Cruz‐Jesus, Tiago Oliveira, Fernando Bação
Information & Management (2012) Vol. 49, Iss. 6, pp. 278-291
Closed Access | Times Cited: 211
Frederico Cruz‐Jesus, Tiago Oliveira, Fernando Bação
Information & Management (2012) Vol. 49, Iss. 6, pp. 278-291
Closed Access | Times Cited: 211
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
MIS Quarterly (2013) Vol. 37, Iss. 4, pp. 1189-1210
Closed Access | Times Cited: 193
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
MIS Quarterly (2013) Vol. 37, Iss. 4, pp. 1189-1210
Closed Access | Times Cited: 193
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Value conflicts for information security management
Karin Hedström, Ella Kolkowska, Fredrik Karlsson, et al.
The Journal of Strategic Information Systems (2011) Vol. 20, Iss. 4, pp. 373-384
Closed Access | Times Cited: 144
Karin Hedström, Ella Kolkowska, Fredrik Karlsson, et al.
The Journal of Strategic Information Systems (2011) Vol. 20, Iss. 4, pp. 373-384
Closed Access | Times Cited: 144
Cyber-risk decision models: To insure IT or not?
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, et al.
Decision Support Systems (2013) Vol. 56, pp. 11-26
Closed Access | Times Cited: 132
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, et al.
Decision Support Systems (2013) Vol. 56, pp. 11-26
Closed Access | Times Cited: 132
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
Information & Management (2014) Vol. 51, Iss. 5, pp. 551-567
Closed Access | Times Cited: 128
Clay Posey, Tom Roberts, Paul Benjamin Lowry, et al.
Information & Management (2014) Vol. 51, Iss. 5, pp. 551-567
Closed Access | Times Cited: 128
Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance
Han Li, Rathindra Sarathy, Jie Zhang, et al.
Information Systems Journal (2014) Vol. 24, Iss. 6, pp. 479-502
Closed Access | Times Cited: 123
Han Li, Rathindra Sarathy, Jie Zhang, et al.
Information Systems Journal (2014) Vol. 24, Iss. 6, pp. 479-502
Closed Access | Times Cited: 123
Personal information privacy and emerging technologies
Sue Conger, Joanne H. Pratt, Karen D. Loch
Information Systems Journal (2012) Vol. 23, Iss. 5, pp. 401-417
Open Access | Times Cited: 119
Sue Conger, Joanne H. Pratt, Karen D. Loch
Information Systems Journal (2012) Vol. 23, Iss. 5, pp. 401-417
Open Access | Times Cited: 119
Protecting organizational knowledge: a structured literature review
Markus Manhart, Stefan Thalmann
Journal of Knowledge Management (2015) Vol. 19, Iss. 2, pp. 190-211
Closed Access | Times Cited: 115
Markus Manhart, Stefan Thalmann
Journal of Knowledge Management (2015) Vol. 19, Iss. 2, pp. 190-211
Closed Access | Times Cited: 115
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
Jingguo Wang, Manish Gupta, H. Raghav Rao
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 91-112
Closed Access | Times Cited: 107
Jingguo Wang, Manish Gupta, H. Raghav Rao
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 91-112
Closed Access | Times Cited: 107
A comprehensive model of information security factors for decision-makers
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 90
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 90
Knowledge management in improving business process: an interpretative framework for successful implementation of AI–CRM–KM system in organizations
Sheshadri Chatterjee, Soumya K. Ghosh, Ranjan Chaudhuri
Business Process Management Journal (2020) Vol. 26, Iss. 6, pp. 1261-1281
Closed Access | Times Cited: 88
Sheshadri Chatterjee, Soumya K. Ghosh, Ranjan Chaudhuri
Business Process Management Journal (2020) Vol. 26, Iss. 6, pp. 1261-1281
Closed Access | Times Cited: 88
Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management
Rishabh Rajan, Nripendra P. Rana, Nakul Parameswar, et al.
Technological Forecasting and Social Change (2021) Vol. 170, pp. 120872-120872
Open Access | Times Cited: 62
Rishabh Rajan, Nripendra P. Rana, Nakul Parameswar, et al.
Technological Forecasting and Social Change (2021) Vol. 170, pp. 120872-120872
Open Access | Times Cited: 62
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Paweł Weichbroth, Kacper Wereszko, Helena Anacka, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3155-3155
Open Access | Times Cited: 24
Paweł Weichbroth, Kacper Wereszko, Helena Anacka, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3155-3155
Open Access | Times Cited: 24
Information security policies in the UK healthcare sector: a critical evaluation
Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw
Information Systems Journal (2011) Vol. 22, Iss. 1, pp. 77-94
Closed Access | Times Cited: 104
Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw
Information Systems Journal (2011) Vol. 22, Iss. 1, pp. 77-94
Closed Access | Times Cited: 104
The information security policy unpacked: A critical study of the content of university policies
Neil Francis Doherty, Leonidas Anastasakis, Heather Fulford
International Journal of Information Management (2009) Vol. 29, Iss. 6, pp. 449-457
Open Access | Times Cited: 103
Neil Francis Doherty, Leonidas Anastasakis, Heather Fulford
International Journal of Information Management (2009) Vol. 29, Iss. 6, pp. 449-457
Open Access | Times Cited: 103
Project performance development framework: An approach for developing performance criteria & measures for information systems (IS) projects
Corlane Barclay, Kweku-Muata Osei-Bryson
International Journal of Production Economics (2009) Vol. 124, Iss. 1, pp. 272-292
Closed Access | Times Cited: 101
Corlane Barclay, Kweku-Muata Osei-Bryson
International Journal of Production Economics (2009) Vol. 124, Iss. 1, pp. 272-292
Closed Access | Times Cited: 101