OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 371

Showing 1-25 of 371 citing articles:

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520

Health information privacy concerns, antecedents, and information disclosure intention in online health communities
Zhang Xing, Shan Liu, Chen Xing, et al.
Information & Management (2017) Vol. 55, Iss. 4, pp. 482-493
Closed Access | Times Cited: 357

Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, et al.
Computers & Security (2016) Vol. 59, pp. 138-150
Open Access | Times Cited: 287

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Philip Menard, Gregory J. Bott, Robert E. Crossler
Journal of Management Information Systems (2017) Vol. 34, Iss. 4, pp. 1203-1230
Closed Access | Times Cited: 227

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161

Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations
Zhenya Tang, Andrew S. Miller, Zhongyun Zhou, et al.
Government Information Quarterly (2021) Vol. 38, Iss. 2, pp. 101572-101572
Open Access | Times Cited: 115

Dispositional and situational factors: influences on information security policy violations
Allen C. Johnston, Merrill Warkentin, Maranda McBride, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 3, pp. 231-251
Closed Access | Times Cited: 157

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151

“Security begins at home”: Determinants of home computer and mobile device security behavior
Nik Thompson, Tanya McGill, Xuequn Wang
Computers & Security (2017) Vol. 70, pp. 376-391
Closed Access | Times Cited: 147

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 131

Appealing to Sense and Sensibility: System 1 and System 2 Interventions for Fake News on Social Media
Patricia Moravec, Antino Kim, Alan R. Dennis
Information Systems Research (2020) Vol. 31, Iss. 3, pp. 987-1006
Open Access | Times Cited: 125

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 564-584
Closed Access | Times Cited: 113

Continuance of protective security behavior: A longitudinal study
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 111

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls
Lara Khansa, Jungwon Kuem, Mikko Siponen, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 1, pp. 141-176
Closed Access | Times Cited: 107

The impact of information security threat awareness on privacy-protective behaviors
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 107

Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences
Jingguo Wang, Yuan Li, H. Raghav Rao
Information Systems Research (2017) Vol. 28, Iss. 2, pp. 378-396
Closed Access | Times Cited: 106

Factors Affecting the Adoption of an Electronic Word of Mouth Message: A Meta-Analysis
Hamed Qahri‐Saremi, Ali Reza Montazemi
Journal of Management Information Systems (2019) Vol. 36, Iss. 3, pp. 969-1001
Closed Access | Times Cited: 98

The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory
Nadine Guhr, Benedikt Lebek, Michael H. Breitner
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 340-362
Closed Access | Times Cited: 97

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91

Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 91

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90

Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment
Mohammad S. Jalali, Michael I. Siegel, Stuart Madnick
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 66-82
Open Access | Times Cited: 88

Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83

Page 1 - Next Page

Scroll to top