
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Extended Privacy Calculus Model for E-Commerce Transactions
Tamara Dinev, Paul Hart
Information Systems Research (2006) Vol. 17, Iss. 1, pp. 61-80
Closed Access | Times Cited: 2147
Tamara Dinev, Paul Hart
Information Systems Research (2006) Vol. 17, Iss. 1, pp. 61-80
Closed Access | Times Cited: 2147
Showing 1-25 of 2147 citing articles:
Information Privacy Research: An Interdisciplinary Review
Smith, Dinev, Xu
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 989-989
Closed Access | Times Cited: 1762
Smith, Dinev, Xu
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 989-989
Closed Access | Times Cited: 1762
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
Bélanger, Robert E. Crossler
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 1017-1017
Open Access | Times Cited: 1156
Bélanger, Robert E. Crossler
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 1017-1017
Open Access | Times Cited: 1156
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
Spyros Kokolakis
Computers & Security (2015) Vol. 64, pp. 122-134
Closed Access | Times Cited: 990
Spyros Kokolakis
Computers & Security (2015) Vol. 64, pp. 122-134
Closed Access | Times Cited: 990
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
Angst, Agarwal
MIS Quarterly (2009) Vol. 33, Iss. 2, pp. 339-339
Closed Access | Times Cited: 983
Angst, Agarwal
MIS Quarterly (2009) Vol. 33, Iss. 2, pp. 339-339
Closed Access | Times Cited: 983
The Economics of Privacy
Alessandro Acquisti, Curtis R. Taylor, Liad Wagman
Journal of Economic Literature (2016) Vol. 54, Iss. 2, pp. 442-492
Open Access | Times Cited: 918
Alessandro Acquisti, Curtis R. Taylor, Liad Wagman
Journal of Economic Literature (2016) Vol. 54, Iss. 2, pp. 442-492
Open Access | Times Cited: 918
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
Gaurav Bansal, Fatemeh Zahedi, David Gefen
Decision Support Systems (2010) Vol. 49, Iss. 2, pp. 138-150
Closed Access | Times Cited: 849
Gaurav Bansal, Fatemeh Zahedi, David Gefen
Decision Support Systems (2010) Vol. 49, Iss. 2, pp. 138-150
Closed Access | Times Cited: 849
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Janice Tsai, Serge Egelman, Lorrie Faith Cranor, et al.
Information Systems Research (2010) Vol. 22, Iss. 2, pp. 254-268
Open Access | Times Cited: 797
Janice Tsai, Serge Egelman, Lorrie Faith Cranor, et al.
Information Systems Research (2010) Vol. 22, Iss. 2, pp. 254-268
Open Access | Times Cited: 797
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
Heng Xu, Hock‐Hai Teo, Barney Tan, et al.
Journal of Management Information Systems (2009) Vol. 26, Iss. 3, pp. 135-174
Closed Access | Times Cited: 718
Heng Xu, Hock‐Hai Teo, Barney Tan, et al.
Journal of Management Information Systems (2009) Vol. 26, Iss. 3, pp. 135-174
Closed Access | Times Cited: 718
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
Heng Xu, Tamara Dinev, Jeff Smith, et al.
Journal of the Association for Information Systems (2011) Vol. 12, Iss. 12, pp. 798-824
Closed Access | Times Cited: 643
Heng Xu, Tamara Dinev, Jeff Smith, et al.
Journal of the Association for Information Systems (2011) Vol. 12, Iss. 12, pp. 798-824
Closed Access | Times Cited: 643
Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents
Enrique Bonsón Ponte, Elena Carvajal-Trujillo, Tomás Escobar Rodríguez
Tourism Management (2014) Vol. 47, pp. 286-302
Closed Access | Times Cited: 635
Enrique Bonsón Ponte, Elena Carvajal-Trujillo, Tomás Escobar Rodríguez
Tourism Management (2014) Vol. 47, pp. 286-302
Closed Access | Times Cited: 635
The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review
Susanne Barth, Menno D.T. de Jong
Telematics and Informatics (2017) Vol. 34, Iss. 7, pp. 1038-1058
Open Access | Times Cited: 629
Susanne Barth, Menno D.T. de Jong
Telematics and Informatics (2017) Vol. 34, Iss. 7, pp. 1038-1058
Open Access | Times Cited: 629
The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing
Heng Xu, Xin Luo, John M. Carroll, et al.
Decision Support Systems (2010) Vol. 51, Iss. 1, pp. 42-52
Closed Access | Times Cited: 627
Heng Xu, Xin Luo, John M. Carroll, et al.
Decision Support Systems (2010) Vol. 51, Iss. 1, pp. 42-52
Closed Access | Times Cited: 627
Big data analytics in E-commerce: a systematic review and agenda for future research
Shahriar Akter, Samuel Fosso Wamba
Electronic Markets (2016) Vol. 26, Iss. 2, pp. 173-194
Open Access | Times Cited: 608
Shahriar Akter, Samuel Fosso Wamba
Electronic Markets (2016) Vol. 26, Iss. 2, pp. 173-194
Open Access | Times Cited: 608
The Value of Privacy Assurance: An Exploratory Field Experiment
Kai-Lung Hui, Teo, Sang‐Yong Tom Lee
MIS Quarterly (2007) Vol. 31, Iss. 1, pp. 19-19
Closed Access | Times Cited: 599
Kai-Lung Hui, Teo, Sang‐Yong Tom Lee
MIS Quarterly (2007) Vol. 31, Iss. 1, pp. 19-19
Closed Access | Times Cited: 599
An empirical study of wearable technology acceptance in healthcare
Yiwen Gao, He Li, Yan Luo
Industrial Management & Data Systems (2015) Vol. 115, Iss. 9, pp. 1704-1723
Closed Access | Times Cited: 589
Yiwen Gao, He Li, Yan Luo
Industrial Management & Data Systems (2015) Vol. 115, Iss. 9, pp. 1704-1723
Closed Access | Times Cited: 589
Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model
Son Son, Kim
MIS Quarterly (2008) Vol. 32, Iss. 3, pp. 503-503
Closed Access | Times Cited: 576
Son Son, Kim
MIS Quarterly (2008) Vol. 32, Iss. 3, pp. 503-503
Closed Access | Times Cited: 576
The Internet-of-Things: Review and research directions
Irene C. L. Ng, Susan Y. L. Wakenshaw
International Journal of Research in Marketing (2016) Vol. 34, Iss. 1, pp. 3-21
Open Access | Times Cited: 565
Irene C. L. Ng, Susan Y. L. Wakenshaw
International Journal of Research in Marketing (2016) Vol. 34, Iss. 1, pp. 3-21
Open Access | Times Cited: 565
Online Social Networks: Why We Disclose
Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, et al.
Journal of Information Technology (2010) Vol. 25, Iss. 2, pp. 109-125
Open Access | Times Cited: 525
Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, et al.
Journal of Information Technology (2010) Vol. 25, Iss. 2, pp. 109-125
Open Access | Times Cited: 525
Which is more important in Internet shopping, perceived price or trust?
Hee‐Woong Kim, Yunjie Xu, Sumeet Gupta
Electronic Commerce Research and Applications (2011) Vol. 11, Iss. 3, pp. 241-252
Closed Access | Times Cited: 513
Hee‐Woong Kim, Yunjie Xu, Sumeet Gupta
Electronic Commerce Research and Applications (2011) Vol. 11, Iss. 3, pp. 241-252
Closed Access | Times Cited: 513
The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information
Catherine Anderson, Ritu Agarwal
Information Systems Research (2011) Vol. 22, Iss. 3, pp. 469-490
Closed Access | Times Cited: 493
Catherine Anderson, Ritu Agarwal
Information Systems Research (2011) Vol. 22, Iss. 3, pp. 469-490
Closed Access | Times Cited: 493
What Is Privacy Worth?
Alessandro Acquisti, Leslie K. John, George Loewenstein
The Journal of Legal Studies (2013) Vol. 42, Iss. 2, pp. 249-274
Open Access | Times Cited: 486
Alessandro Acquisti, Leslie K. John, George Loewenstein
The Journal of Legal Studies (2013) Vol. 42, Iss. 2, pp. 249-274
Open Access | Times Cited: 486
Alexa, Are You Listening?
Josephine Lau, Benjamin Zimmerman, Florian Schaub
Proceedings of the ACM on Human-Computer Interaction (2018) Vol. 2, Iss. CSCW, pp. 1-31
Closed Access | Times Cited: 473
Josephine Lau, Benjamin Zimmerman, Florian Schaub
Proceedings of the ACM on Human-Computer Interaction (2018) Vol. 2, Iss. CSCW, pp. 1-31
Closed Access | Times Cited: 473
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
Tamara Dinev, Heng Xu, Jeff Smith, et al.
European Journal of Information Systems (2012) Vol. 22, Iss. 3, pp. 295-316
Closed Access | Times Cited: 418
Tamara Dinev, Heng Xu, Jeff Smith, et al.
European Journal of Information Systems (2012) Vol. 22, Iss. 3, pp. 295-316
Closed Access | Times Cited: 418
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
Weiyin Hong, James Y.L. Thong
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 275-298
Closed Access | Times Cited: 412
Weiyin Hong, James Y.L. Thong
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 275-298
Closed Access | Times Cited: 412
The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value
Norman Shaw, Ksenia Sergueeva
International Journal of Information Management (2018) Vol. 45, pp. 44-55
Closed Access | Times Cited: 408
Norman Shaw, Ksenia Sergueeva
International Journal of Information Management (2018) Vol. 45, pp. 44-55
Closed Access | Times Cited: 408