OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Risk Homeostasis in Information Security
Karen Renaud, Merrill Warkentin
(2017) Vol. 49, pp. 57-69
Open Access | Times Cited: 13

Showing 13 citing articles:

The Role of Collectivism, Power Distance, and Neutralization Techniques on Deviant Information Security Behavior
Yimer Mohammed, Merrill Warkentin, Chinju Paul, et al.
Technology in Society (2025), pp. 102857-102857
Closed Access

Risk as affect: The affect heuristic in cybersecurity
Paul van Schaik, Karen Renaud, Chris Wilson, et al.
Computers & Security (2019) Vol. 90, pp. 101651-101651
Open Access | Times Cited: 31

“This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords?
Karen Renaud, Robert F. Otondo, Merrill Warkentin
Computers & Security (2019) Vol. 82, pp. 241-260
Open Access | Times Cited: 29

Can financial incentives help with the struggle for security policy compliance?
Sanjay Goel, Kevin J. Williams, Jingyi Huang, et al.
Information & Management (2021) Vol. 58, Iss. 4, pp. 103447-103447
Open Access | Times Cited: 23

The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity
Eric Jardine
Risk Analysis (2020) Vol. 40, Iss. 8, pp. 1571-1588
Closed Access | Times Cited: 15

Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects
Roozmehr Safi, Glenn J. Browne
Information Systems Frontiers (2022) Vol. 25, Iss. 3, pp. 1277-1292
Closed Access | Times Cited: 6

Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon
Matthias Fassl, Alexander Ponticello, Adrian Dabrowski, et al.
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW2, pp. 1-26
Open Access | Times Cited: 2

Cybersecurity Regrets: I’ve had a few.... Je Ne Regrette
Karen Renaud, Rosalind Searle, Marc Dupuis
(2022), pp. 1-20
Open Access | Times Cited: 4

Malicious User Experience Design Research for Cybersecurity
Adam Trowbridge, Filipo Sharevski, Jessica Westbrook
(2018) Vol. 4, pp. 123-130
Open Access | Times Cited: 2

Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation
Joachim Meyer, Omer Dembinsky, Tal Raviv
Computers & Security (2020) Vol. 97, pp. 101944-101944
Closed Access | Times Cited: 2

So You Think You are Safe: Implications of Quality Uncertainty in Security Software
Hajime Shimao, Warut Khern-am-nuai, Sung Joo Kim, et al.
SSRN Electronic Journal (2015)
Closed Access

Risk homeostasis and security fatigue: a case study of data specialists
Anusha Bhana, Jacques Ophoff
Information and Computer Security (2023) Vol. 31, Iss. 3, pp. 267-280
Open Access

Safety Managements with Perceived Risk Homeostasis in Biofunctions
Tohru Kiryu, Caijilahu Bao
2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech) (2021), pp. 480-483
Closed Access

Page 1

Scroll to top