
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
Angst, Agarwal
MIS Quarterly (2009) Vol. 33, Iss. 2, pp. 339-339
Closed Access | Times Cited: 983
Angst, Agarwal
MIS Quarterly (2009) Vol. 33, Iss. 2, pp. 339-339
Closed Access | Times Cited: 983
Showing 1-25 of 983 citing articles:
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
Bélanger, Robert E. Crossler
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 1017-1017
Open Access | Times Cited: 1156
Bélanger, Robert E. Crossler
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 1017-1017
Open Access | Times Cited: 1156
Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM)
Syeda Ayesha Kamal, Muhammad Shafiq, Priyanka Kakria
Technology in Society (2019) Vol. 60, pp. 101212-101212
Closed Access | Times Cited: 698
Syeda Ayesha Kamal, Muhammad Shafiq, Priyanka Kakria
Technology in Society (2019) Vol. 60, pp. 101212-101212
Closed Access | Times Cited: 698
Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms
Yulin Fang, Israr Qureshi, Heshan Sun, et al.
MIS Quarterly (2014) Vol. 38, Iss. 2, pp. 407-427
Open Access | Times Cited: 684
Yulin Fang, Israr Qureshi, Heshan Sun, et al.
MIS Quarterly (2014) Vol. 38, Iss. 2, pp. 407-427
Open Access | Times Cited: 684
Examining the influence of online reviews on consumers' decision-making: A heuristic–systematic model
Kem Z.K. Zhang, Sesia J. Zhao, Christy M.K. Cheung, et al.
Decision Support Systems (2014) Vol. 67, pp. 78-89
Closed Access | Times Cited: 612
Kem Z.K. Zhang, Sesia J. Zhao, Christy M.K. Cheung, et al.
Decision Support Systems (2014) Vol. 67, pp. 78-89
Closed Access | Times Cited: 612
Personal health records: a scoping review
Norm Archer, Urslin Fevrier-Thomas, Cynthia Lokker, et al.
Journal of the American Medical Informatics Association (2011) Vol. 18, Iss. 4, pp. 515-522
Open Access | Times Cited: 591
Norm Archer, Urslin Fevrier-Thomas, Cynthia Lokker, et al.
Journal of the American Medical Informatics Association (2011) Vol. 18, Iss. 4, pp. 515-522
Open Access | Times Cited: 591
An empirical study of wearable technology acceptance in healthcare
Yiwen Gao, He Li, Yan Luo
Industrial Management & Data Systems (2015) Vol. 115, Iss. 9, pp. 1704-1723
Closed Access | Times Cited: 589
Yiwen Gao, He Li, Yan Luo
Industrial Management & Data Systems (2015) Vol. 115, Iss. 9, pp. 1704-1723
Closed Access | Times Cited: 589
e-Government Adoption Model (GAM): Differing service maturity levels
Mahmud Akhter Shareef, Vinod Kumar, Uma Kumar, et al.
Government Information Quarterly (2010) Vol. 28, Iss. 1, pp. 17-35
Closed Access | Times Cited: 538
Mahmud Akhter Shareef, Vinod Kumar, Uma Kumar, et al.
Government Information Quarterly (2010) Vol. 28, Iss. 1, pp. 17-35
Closed Access | Times Cited: 538
Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics
Mohammad Salehan, Dan J. Kim
Decision Support Systems (2015) Vol. 81, pp. 30-40
Closed Access | Times Cited: 519
Mohammad Salehan, Dan J. Kim
Decision Support Systems (2015) Vol. 81, pp. 30-40
Closed Access | Times Cited: 519
Diffusion of Innovations
Fred K. Weigel, Benjamin T. Hazen
Advances in healthcare information systems and administration book series (2013), pp. 136-153
Closed Access | Times Cited: 504
Fred K. Weigel, Benjamin T. Hazen
Advances in healthcare information systems and administration book series (2013), pp. 136-153
Closed Access | Times Cited: 504
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
Qing Hu, Tamara Dinev, Paul Hart, et al.
Decision Sciences (2012) Vol. 43, Iss. 4, pp. 615-660
Closed Access | Times Cited: 466
Qing Hu, Tamara Dinev, Paul Hart, et al.
Decision Sciences (2012) Vol. 43, Iss. 4, pp. 615-660
Closed Access | Times Cited: 466
Trust in driverless cars: Investigating key factors influencing the adoption of driverless cars
Kanwaldeep Kaur, Giselle Rampersad
Journal of Engineering and Technology Management (2018) Vol. 48, pp. 87-96
Open Access | Times Cited: 459
Kanwaldeep Kaur, Giselle Rampersad
Journal of Engineering and Technology Management (2018) Vol. 48, pp. 87-96
Open Access | Times Cited: 459
The influence of online information on investing decisions of reward-based crowdfunding
Sheng Bi, Zhiying Liu, Khalid Usman
Journal of Business Research (2016) Vol. 71, pp. 10-18
Closed Access | Times Cited: 428
Sheng Bi, Zhiying Liu, Khalid Usman
Journal of Business Research (2016) Vol. 71, pp. 10-18
Closed Access | Times Cited: 428
Understanding users’ initial trust in mobile banking: An elaboration likelihood perspective
Tao Zhou
Computers in Human Behavior (2012) Vol. 28, Iss. 4, pp. 1518-1525
Closed Access | Times Cited: 417
Tao Zhou
Computers in Human Behavior (2012) Vol. 28, Iss. 4, pp. 1518-1525
Closed Access | Times Cited: 417
Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic
Wu He, Zuopeng Zhang, Wenzhuo Li
International Journal of Information Management (2020) Vol. 57, pp. 102287-102287
Open Access | Times Cited: 414
Wu He, Zuopeng Zhang, Wenzhuo Li
International Journal of Information Management (2020) Vol. 57, pp. 102287-102287
Open Access | Times Cited: 414
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
Weiyin Hong, James Y.L. Thong
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 275-298
Closed Access | Times Cited: 412
Weiyin Hong, James Y.L. Thong
MIS Quarterly (2013) Vol. 37, Iss. 1, pp. 275-298
Closed Access | Times Cited: 412
Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective
He Li, Jing Wu, Yiwen Gao, et al.
International Journal of Medical Informatics (2016) Vol. 88, pp. 8-17
Closed Access | Times Cited: 384
He Li, Jing Wu, Yiwen Gao, et al.
International Journal of Medical Informatics (2016) Vol. 88, pp. 8-17
Closed Access | Times Cited: 384
An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives
Chin‐Lung Hsu, Judy Chuan‐Chuan Lin
Computers in Human Behavior (2016) Vol. 62, pp. 516-527
Closed Access | Times Cited: 375
Chin‐Lung Hsu, Judy Chuan‐Chuan Lin
Computers in Human Behavior (2016) Vol. 62, pp. 516-527
Closed Access | Times Cited: 375
Persuasion in crowdfunding: An elaboration likelihood model of crowdfunding performance
Thomas H. Allison, Blakley C. Davis, Justin W. Webb, et al.
Journal of Business Venturing (2017) Vol. 32, Iss. 6, pp. 707-725
Closed Access | Times Cited: 374
Thomas H. Allison, Blakley C. Davis, Justin W. Webb, et al.
Journal of Business Venturing (2017) Vol. 32, Iss. 6, pp. 707-725
Closed Access | Times Cited: 374
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371
Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS)
Shahriar Akter, John D’Ambra, Pradeep Ray
Journal of the American Society for Information Science and Technology (2010) Vol. 62, Iss. 1, pp. 100-116
Closed Access | Times Cited: 368
Shahriar Akter, John D’Ambra, Pradeep Ray
Journal of the American Society for Information Science and Technology (2010) Vol. 62, Iss. 1, pp. 100-116
Closed Access | Times Cited: 368
Health information privacy concerns, antecedents, and information disclosure intention in online health communities
Zhang Xing, Shan Liu, Chen Xing, et al.
Information & Management (2017) Vol. 55, Iss. 4, pp. 482-493
Closed Access | Times Cited: 357
Zhang Xing, Shan Liu, Chen Xing, et al.
Information & Management (2017) Vol. 55, Iss. 4, pp. 482-493
Closed Access | Times Cited: 357
Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users
Juliana Sutanto, Elia Palme, Chuan‐Hoo Tan, et al.
MIS Quarterly (2013) Vol. 37, Iss. 4, pp. 1141-1164
Closed Access | Times Cited: 351
Juliana Sutanto, Elia Palme, Chuan‐Hoo Tan, et al.
MIS Quarterly (2013) Vol. 37, Iss. 4, pp. 1141-1164
Closed Access | Times Cited: 351
The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors
Han Li, Rathindra Sarathy, Heng Xu
Decision Support Systems (2011) Vol. 51, Iss. 3, pp. 434-445
Closed Access | Times Cited: 341
Han Li, Rathindra Sarathy, Heng Xu
Decision Support Systems (2011) Vol. 51, Iss. 3, pp. 434-445
Closed Access | Times Cited: 341
Theories in online information privacy research: A critical review and an integrated framework
Yuan Li
Decision Support Systems (2012) Vol. 54, Iss. 1, pp. 471-481
Closed Access | Times Cited: 320
Yuan Li
Decision Support Systems (2012) Vol. 54, Iss. 1, pp. 471-481
Closed Access | Times Cited: 320
Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services
Heng Xu, Hock‐Hai Teo, Bernard C. Y. Tan, et al.
Information Systems Research (2012) Vol. 23, Iss. 4, pp. 1342-1363
Closed Access | Times Cited: 309
Heng Xu, Hock‐Hai Teo, Bernard C. Y. Tan, et al.
Information Systems Research (2012) Vol. 23, Iss. 4, pp. 1342-1363
Closed Access | Times Cited: 309