
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Specifying Formative Constructs in Information Systems Research
Stacie Petter, Straub, Rai
MIS Quarterly (2007) Vol. 31, Iss. 4, pp. 623-623
Open Access | Times Cited: 2865
Stacie Petter, Straub, Rai
MIS Quarterly (2007) Vol. 31, Iss. 4, pp. 623-623
Open Access | Times Cited: 2865
Showing 1-25 of 2865 citing articles:
Using PLS Path Modeling for Assessing Hierarchical Construct Models: Guidelines and Empirical Illustration
Martin Wetzels, Odekerken-Schröder, van Oppen
MIS Quarterly (2009) Vol. 33, Iss. 1, pp. 177-177
Open Access | Times Cited: 4270
Martin Wetzels, Odekerken-Schröder, van Oppen
MIS Quarterly (2009) Vol. 33, Iss. 1, pp. 177-177
Open Access | Times Cited: 4270
Specification, evaluation, and interpretation of structural equation models
Richard P. Bagozzi, Youjae Yi
Journal of the Academy of Marketing Science (2011) Vol. 40, Iss. 1, pp. 8-34
Closed Access | Times Cited: 3250
Richard P. Bagozzi, Youjae Yi
Journal of the Academy of Marketing Science (2011) Vol. 40, Iss. 1, pp. 8-34
Closed Access | Times Cited: 3250
Lateral Collinearity and Misleading Results in Variance-Based SEM: An Illustration and Recommendations
Ned Kock, Gary S. Lynn
Journal of the Association for Information Systems (2012) Vol. 13, Iss. 7, pp. 546-580
Open Access | Times Cited: 2702
Ned Kock, Gary S. Lynn
Journal of the Association for Information Systems (2012) Vol. 13, Iss. 7, pp. 546-580
Open Access | Times Cited: 2702
Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques
MacKenzie, Podsakoff, Podsakoff
MIS Quarterly (2011) Vol. 35, Iss. 2, pp. 293-293
Closed Access | Times Cited: 2599
MacKenzie, Podsakoff, Podsakoff
MIS Quarterly (2011) Vol. 35, Iss. 2, pp. 293-293
Closed Access | Times Cited: 2599
The Use of Partial Least Squares Structural Equation Modeling in Strategic Management Research: A Review of Past Practices and Recommendations for Future Applications
Joseph F. Hair, Marko Sarstedt, Torsten M. Pieper, et al.
Long Range Planning (2012) Vol. 45, Iss. 5-6, pp. 320-340
Closed Access | Times Cited: 1933
Joseph F. Hair, Marko Sarstedt, Torsten M. Pieper, et al.
Long Range Planning (2012) Vol. 45, Iss. 5-6, pp. 320-340
Closed Access | Times Cited: 1933
Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS
Ken Kwong-Kay Wong
(2013)
Closed Access | Times Cited: 1826
Ken Kwong-Kay Wong
(2013)
Closed Access | Times Cited: 1826
Hierarchical Latent Variable Models in PLS-SEM: Guidelines for Using Reflective-Formative Type Models
Jan-Michael Becker, Kristina Klein, Martin Wetzels
Long Range Planning (2012) Vol. 45, Iss. 5-6, pp. 359-394
Closed Access | Times Cited: 1724
Jan-Michael Becker, Kristina Klein, Martin Wetzels
Long Range Planning (2012) Vol. 45, Iss. 5-6, pp. 359-394
Closed Access | Times Cited: 1724
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu, Hasan Cavusoglu, Benbasat
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 523-523
Closed Access | Times Cited: 1704
Bulgurcu, Hasan Cavusoglu, Benbasat
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 523-523
Closed Access | Times Cited: 1704
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It
Paul Benjamin Lowry, James Gaskin
IEEE Transactions on Professional Communication (2014) Vol. 57, Iss. 2, pp. 123-146
Closed Access | Times Cited: 1619
Paul Benjamin Lowry, James Gaskin
IEEE Transactions on Professional Communication (2014) Vol. 57, Iss. 2, pp. 123-146
Closed Access | Times Cited: 1619
Technostress: Technological Antecedents and Implications
Ayyagari, Grover, Purvis
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 831-831
Closed Access | Times Cited: 1547
Ayyagari, Grover, Purvis
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 831-831
Closed Access | Times Cited: 1547
Synthesizing information systems knowledge: A typology of literature reviews
Guy Paré, Marie-Claude Trudel, Mirou Jaana, et al.
Information & Management (2014) Vol. 52, Iss. 2, pp. 183-199
Closed Access | Times Cited: 1485
Guy Paré, Marie-Claude Trudel, Mirou Jaana, et al.
Information & Management (2014) Vol. 52, Iss. 2, pp. 183-199
Closed Access | Times Cited: 1485
Structural Equation Modeling in Information Systems Research Using Partial Least Squares
Nils Urbach, Frederik Ahlemann
The Journal of Information Technology Theory and Application (2010) Vol. 11, Iss. 2, pp. 2
Closed Access | Times Cited: 1387
Nils Urbach, Frederik Ahlemann
The Journal of Information Technology Theory and Application (2010) Vol. 11, Iss. 2, pp. 2
Closed Access | Times Cited: 1387
Using partial least squares in operations management research: A practical guideline and summary of past research
David Xiaosong Peng, Fujun Lai
Journal of Operations Management (2012) Vol. 30, Iss. 6, pp. 467-480
Closed Access | Times Cited: 1345
David Xiaosong Peng, Fujun Lai
Journal of Operations Management (2012) Vol. 30, Iss. 6, pp. 467-480
Closed Access | Times Cited: 1345
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1146
Tejaswini Herath, H. Raghav Rao
European Journal of Information Systems (2009) Vol. 18, Iss. 2, pp. 106-125
Closed Access | Times Cited: 1146
Understanding the Link Between Information Technology Capability and Organizational Agility: An Empirical Examination
Lǖ, K. Ramamurthy
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 931-931
Closed Access | Times Cited: 1123
Lǖ, K. Ramamurthy
MIS Quarterly (2011) Vol. 35, Iss. 4, pp. 931-931
Closed Access | Times Cited: 1123
Fear Appeals and Information Security Behaviors: An Empirical Study
J R Johnston, Merrill Warkentin
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 549-549
Closed Access | Times Cited: 1121
J R Johnston, Merrill Warkentin
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 549-549
Closed Access | Times Cited: 1121
Toward the development of a big data analytics capability
Manjul Gupta, Joey F. George
Information & Management (2016) Vol. 53, Iss. 8, pp. 1049-1064
Closed Access | Times Cited: 1097
Manjul Gupta, Joey F. George
Information & Management (2016) Vol. 53, Iss. 8, pp. 1049-1064
Closed Access | Times Cited: 1097
Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services
Xin Luo, Han Li, Jie Zhang, et al.
Decision Support Systems (2010) Vol. 49, Iss. 2, pp. 222-234
Closed Access | Times Cited: 1030
Xin Luo, Han Li, Jie Zhang, et al.
Decision Support Systems (2010) Vol. 49, Iss. 2, pp. 222-234
Closed Access | Times Cited: 1030
Value co-creation: concept and measurement
Kumar Rakesh Ranjan, Stuart Read
Journal of the Academy of Marketing Science (2014) Vol. 44, Iss. 3, pp. 290-315
Closed Access | Times Cited: 1021
Kumar Rakesh Ranjan, Stuart Read
Journal of the Academy of Marketing Science (2014) Vol. 44, Iss. 3, pp. 290-315
Closed Access | Times Cited: 1021
Predictive Analytics in Information Systems Research
Shmueli, Koppius
MIS Quarterly (2011) Vol. 35, Iss. 3, pp. 553-553
Open Access | Times Cited: 966
Shmueli, Koppius
MIS Quarterly (2011) Vol. 35, Iss. 3, pp. 553-553
Open Access | Times Cited: 966
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
Mikko Siponen, Anthony Vance
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 487-487
Closed Access | Times Cited: 863
Mikko Siponen, Anthony Vance
MIS Quarterly (2010) Vol. 34, Iss. 3, pp. 487-487
Closed Access | Times Cited: 863
Information technology-enabled dynamic capabilities and their indirect effect on competitive performance: Findings from PLS-SEM and fsQCA
Patrick Mikalef, Adamantia Pateli
Journal of Business Research (2016) Vol. 70, pp. 1-16
Closed Access | Times Cited: 811
Patrick Mikalef, Adamantia Pateli
Journal of Business Research (2016) Vol. 70, pp. 1-16
Closed Access | Times Cited: 811
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath, H. Raghav Rao
Decision Support Systems (2009) Vol. 47, Iss. 2, pp. 154-165
Closed Access | Times Cited: 793
Tejaswini Herath, H. Raghav Rao
Decision Support Systems (2009) Vol. 47, Iss. 2, pp. 154-165
Closed Access | Times Cited: 793
Variance-Based Structural Equation Modeling
José L. Roldán, Manuel J. Sánchez‐Franco
IGI Global eBooks (2012), pp. 193-221
Closed Access | Times Cited: 765
José L. Roldán, Manuel J. Sánchez‐Franco
IGI Global eBooks (2012), pp. 193-221
Closed Access | Times Cited: 765
Artificial intelligence capability: Conceptualization, measurement calibration, and empirical study on its impact on organizational creativity and firm performance
Patrick Mikalef, Manjul Gupta
Information & Management (2021) Vol. 58, Iss. 3, pp. 103434-103434
Open Access | Times Cited: 721
Patrick Mikalef, Manjul Gupta
Information & Management (2021) Vol. 58, Iss. 3, pp. 103434-103434
Open Access | Times Cited: 721