
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 53
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
Informational or emotional? Exploring the relative effects of chatbots’ self-recovery strategies on consumer satisfaction
Cheng Zhou, Qian Chang
Journal of Retailing and Consumer Services (2024) Vol. 78, pp. 103779-103779
Closed Access | Times Cited: 16
Cheng Zhou, Qian Chang
Journal of Retailing and Consumer Services (2024) Vol. 78, pp. 103779-103779
Closed Access | Times Cited: 16
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
Malte Greulich, Sebastian Lins, Daniel Pienta, et al.
Information Systems Research (2024) Vol. 35, Iss. 4, pp. 1586-1608
Closed Access | Times Cited: 10
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites
Ahmed Abbasi, David G. Dobolyi, Anthony Vance, et al.
Information Systems Research (2021) Vol. 32, Iss. 2, pp. 410-436
Closed Access | Times Cited: 50
Ahmed Abbasi, David G. Dobolyi, Anthony Vance, et al.
Information Systems Research (2021) Vol. 32, Iss. 2, pp. 410-436
Closed Access | Times Cited: 50
Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective
Gurvirender Tejay, Zareef A. Mohammed
Information & Management (2022) Vol. 60, Iss. 3, pp. 103751-103751
Closed Access | Times Cited: 38
Gurvirender Tejay, Zareef A. Mohammed
Information & Management (2022) Vol. 60, Iss. 3, pp. 103751-103751
Closed Access | Times Cited: 38
Discovering the juxtaposed affordances in digitally transformed live streaming e-commerce: A mixed-methods study from a vicarious learning perspective
Ying Hua, Dongyi Wang, Xin Luo, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 469-500
Closed Access | Times Cited: 19
Ying Hua, Dongyi Wang, Xin Luo, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 469-500
Closed Access | Times Cited: 19
Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior
Jimoh G. Fatoki, Zixing Shen, Carlo A. Mora‐Monge
Computers & Security (2024) Vol. 141, pp. 103812-103812
Closed Access | Times Cited: 8
Jimoh G. Fatoki, Zixing Shen, Carlo A. Mora‐Monge
Computers & Security (2024) Vol. 141, pp. 103812-103812
Closed Access | Times Cited: 8
Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 8
Generative AI Degrades Online Communities
Gordon Burtch, Dokyun Lee, Zhichen Chen
Communications of the ACM (2024) Vol. 67, Iss. 3, pp. 40-42
Open Access | Times Cited: 5
Gordon Burtch, Dokyun Lee, Zhichen Chen
Communications of the ACM (2024) Vol. 67, Iss. 3, pp. 40-42
Open Access | Times Cited: 5
Exploring the Factors Influencing Information Security Policy Compliance and Violations: A Systematic Literature Review
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 4
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 4
With Great Power Comes Great Responsibility
Stacie Petter, Yasamin Hadavi
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. SI, pp. 10-23
Closed Access | Times Cited: 25
Stacie Petter, Yasamin Hadavi
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. SI, pp. 10-23
Closed Access | Times Cited: 25
Beyond anger: A neutralization perspective of customer revenge
Chaofan Yang, Yongqiang Sun, Xiao‐Liang Shen
Journal of Business Research (2022) Vol. 146, pp. 363-374
Closed Access | Times Cited: 17
Chaofan Yang, Yongqiang Sun, Xiao‐Liang Shen
Journal of Business Research (2022) Vol. 146, pp. 363-374
Closed Access | Times Cited: 17
Developing a data breach protection capability framework in retailing
Mohammad Rajib Uddin, Shahriar Akter, Wai Jin Thomas Lee
International Journal of Production Economics (2024) Vol. 271, pp. 109202-109202
Open Access | Times Cited: 3
Mohammad Rajib Uddin, Shahriar Akter, Wai Jin Thomas Lee
International Journal of Production Economics (2024) Vol. 271, pp. 109202-109202
Open Access | Times Cited: 3
Unpacking the complexities of health record misuse: insights from Australian health services
Javad Khazaei Pool, Saeed Akhlaghpour, Andrew Burton‐Jones
Information Technology and People (2024)
Closed Access | Times Cited: 3
Javad Khazaei Pool, Saeed Akhlaghpour, Andrew Burton‐Jones
Information Technology and People (2024)
Closed Access | Times Cited: 3
Advancing digital health in information systems research: Insights from a text mining analysis
Silke Weissenfels, Anika Nissen, Stefan Smolnik
Electronic Markets (2025) Vol. 35, Iss. 1
Open Access
Silke Weissenfels, Anika Nissen, Stefan Smolnik
Electronic Markets (2025) Vol. 35, Iss. 1
Open Access
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research
W. Alec Cram, John D’Arcy
Information Systems Frontiers (2025)
Closed Access
W. Alec Cram, John D’Arcy
Information Systems Frontiers (2025)
Closed Access
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Mikko Siponen, Wael Soliman, Anthony Vance
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2022) Vol. 53, Iss. 1, pp. 25-60
Open Access | Times Cited: 16
Mikko Siponen, Wael Soliman, Anthony Vance
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2022) Vol. 53, Iss. 1, pp. 25-60
Open Access | Times Cited: 16
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15
VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 9
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 9
Beyond effective use: Integrating wise reasoning in machine learning development
Morteza Namvar, Ali Intezari, Saeed Akhlaghpour, et al.
International Journal of Information Management (2022) Vol. 69, pp. 102566-102566
Closed Access | Times Cited: 14
Morteza Namvar, Ali Intezari, Saeed Akhlaghpour, et al.
International Journal of Information Management (2022) Vol. 69, pp. 102566-102566
Closed Access | Times Cited: 14
Lessons on employees' digital resilience from COVID-19-induced transitions to remote work – a mixed methods study
Vanessa Kohn, Muriel Frank, Roland Holten
Journal of Enterprise Information Management (2023)
Closed Access | Times Cited: 7
Vanessa Kohn, Muriel Frank, Roland Holten
Journal of Enterprise Information Management (2023)
Closed Access | Times Cited: 7
The Impacts of Internet Monitoring on Employees’ Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment
Hemin Jiang, Mikko Siponen, Zhenhui Jiang, et al.
Information Systems Research (2023) Vol. 35, Iss. 3, pp. 1175-1194
Closed Access | Times Cited: 7
Hemin Jiang, Mikko Siponen, Zhenhui Jiang, et al.
Information Systems Research (2023) Vol. 35, Iss. 3, pp. 1175-1194
Closed Access | Times Cited: 7
Leveraging digital technology to improve self-efficacy in response to public health crises
Jiandong Lu, Xiaolei Wang, S.Z. Chen, et al.
Information & Management (2024) Vol. 61, Iss. 6, pp. 103987-103987
Closed Access | Times Cited: 2
Jiandong Lu, Xiaolei Wang, S.Z. Chen, et al.
Information & Management (2024) Vol. 61, Iss. 6, pp. 103987-103987
Closed Access | Times Cited: 2
Are you caught in the dilemma of metaverse avatars? The impact of individuals' congruity perceptions on paradoxical emotions and actual behaviors
Xusen Cheng, Shuang Zhang, Jian Mou
Decision Support Systems (2024) Vol. 189, pp. 114387-114387
Closed Access | Times Cited: 2
Xusen Cheng, Shuang Zhang, Jian Mou
Decision Support Systems (2024) Vol. 189, pp. 114387-114387
Closed Access | Times Cited: 2
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors
Puspita Kencana Sari, Putu Wuri Handayani, Achmad Nizar Hidayanto, et al.
Healthcare (2022) Vol. 10, Iss. 12, pp. 2531-2531
Open Access | Times Cited: 11
Puspita Kencana Sari, Putu Wuri Handayani, Achmad Nizar Hidayanto, et al.
Healthcare (2022) Vol. 10, Iss. 12, pp. 2531-2531
Open Access | Times Cited: 11