
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
Anthony Vance, Paul Benjamin Lowry, Dennis L. Eggett
MIS Quarterly (2015) Vol. 39, Iss. 2, pp. 345-366
Closed Access | Times Cited: 246
Anthony Vance, Paul Benjamin Lowry, Dennis L. Eggett
MIS Quarterly (2015) Vol. 39, Iss. 2, pp. 345-366
Closed Access | Times Cited: 246
Showing 1-25 of 246 citing articles:
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 837-864
Closed Access | Times Cited: 520
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 962-986
Closed Access | Times Cited: 351
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 962-986
Closed Access | Times Cited: 351
Towards a typology of adaptive governance in the digital government context: The role of decision-making and accountability
Cancan Wang, Rony Medaglia, Lei Zheng
Government Information Quarterly (2017) Vol. 35, Iss. 2, pp. 306-322
Closed Access | Times Cited: 192
Cancan Wang, Rony Medaglia, Lei Zheng
Government Information Quarterly (2017) Vol. 35, Iss. 2, pp. 306-322
Closed Access | Times Cited: 192
Confirmatory Composite Analysis
Florian Schuberth, Jörg Henseler, Theo K. Dijkstra
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 174
Florian Schuberth, Jörg Henseler, Theo K. Dijkstra
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 174
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161
“Oh, My God, Buy It!” Investigating Impulse Buying Behavior in Live Streaming Commerce
Zhang Xiao-ping, Xusen Cheng, Xiaowen Huang
International Journal of Human-Computer Interaction (2022) Vol. 39, Iss. 12, pp. 2436-2449
Closed Access | Times Cited: 81
Zhang Xiao-ping, Xusen Cheng, Xiaowen Huang
International Journal of Human-Computer Interaction (2022) Vol. 39, Iss. 12, pp. 2436-2449
Closed Access | Times Cited: 81
Dispositional and situational factors: influences on information security policy violations
Allen C. Johnston, Merrill Warkentin, Maranda McBride, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 3, pp. 231-251
Closed Access | Times Cited: 157
Allen C. Johnston, Merrill Warkentin, Maranda McBride, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 3, pp. 231-251
Closed Access | Times Cited: 157
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
Tabitha James, Paul Benjamin Lowry, Linda L. Wallace, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 2, pp. 560-596
Closed Access | Times Cited: 145
Tabitha James, Paul Benjamin Lowry, Linda L. Wallace, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 2, pp. 560-596
Closed Access | Times Cited: 145
Distinguishing the effects of B2B information quality, system quality, and service outcome quality on trust and distrust
D. Harrison McKnight, Nancy K. Lankton, Andreas I. Nicolaou, et al.
The Journal of Strategic Information Systems (2017) Vol. 26, Iss. 2, pp. 118-141
Closed Access | Times Cited: 142
D. Harrison McKnight, Nancy K. Lankton, Andreas I. Nicolaou, et al.
The Journal of Strategic Information Systems (2017) Vol. 26, Iss. 2, pp. 118-141
Closed Access | Times Cited: 142
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives
Tommy K. H. Chan, Christy M.K. Cheung, Randy Yee Man Wong
Journal of Management Information Systems (2019) Vol. 36, Iss. 2, pp. 574-609
Open Access | Times Cited: 140
Tommy K. H. Chan, Christy M.K. Cheung, Randy Yee Man Wong
Journal of Management Information Systems (2019) Vol. 36, Iss. 2, pp. 574-609
Open Access | Times Cited: 140
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 133
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 133
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 131
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 131
Determinants of the intention to use Buy-Online, Pickup In-Store (BOPS): The moderating effects of situational factors and product type
Eunhye Kim, Myeong-Cheol Park, Jongtae Lee
Telematics and Informatics (2017) Vol. 34, Iss. 8, pp. 1721-1735
Closed Access | Times Cited: 99
Eunhye Kim, Myeong-Cheol Park, Jongtae Lee
Telematics and Informatics (2017) Vol. 34, Iss. 8, pp. 1721-1735
Closed Access | Times Cited: 99
Gamification and reputation: key determinants of e-commerce usage and repurchase intention
Manuela Aparício, Carlos J. Costa, Rafael Moises
Heliyon (2021) Vol. 7, Iss. 3, pp. e06383-e06383
Open Access | Times Cited: 97
Manuela Aparício, Carlos J. Costa, Rafael Moises
Heliyon (2021) Vol. 7, Iss. 3, pp. e06383-e06383
Open Access | Times Cited: 97
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Philip Menard, Merrill Warkentin, Paul Benjamin Lowry
Computers & Security (2018) Vol. 75, pp. 147-166
Closed Access | Times Cited: 91
Texting with Humanlike Conversational Agents: Designing for Anthropomorphism
Anna-Maria Seeger, Jella Pfeiffer, Armin Heinzl
Journal of the Association for Information Systems (2021) Vol. 22, Iss. 4, pp. 931-967
Closed Access | Times Cited: 85
Anna-Maria Seeger, Jella Pfeiffer, Armin Heinzl
Journal of the Association for Information Systems (2021) Vol. 22, Iss. 4, pp. 931-967
Closed Access | Times Cited: 85
Monetary Rewards, Intrinsic Motivators, and Work Engagement in the IT‐Enabled Sharing Economy: A Mixed‐Methods Investigation of Internet Taxi Drivers*
Ying Hua, Xusen Cheng, Tingting Hou, et al.
Decision Sciences (2019) Vol. 51, Iss. 3, pp. 755-785
Closed Access | Times Cited: 82
Ying Hua, Xusen Cheng, Tingting Hou, et al.
Decision Sciences (2019) Vol. 51, Iss. 3, pp. 755-785
Closed Access | Times Cited: 82
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 59
What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation
Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, et al.
Journal of Management Information Systems (2015) Vol. 32, Iss. 3, pp. 158-196
Closed Access | Times Cited: 89
Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, et al.
Journal of Management Information Systems (2015) Vol. 32, Iss. 3, pp. 158-196
Closed Access | Times Cited: 89
An interactional view of social presence: Making the virtual other “real”
Ulrike Schultze, Jo Ann M. Brooks
Information Systems Journal (2018) Vol. 29, Iss. 3, pp. 707-737
Closed Access | Times Cited: 83
Ulrike Schultze, Jo Ann M. Brooks
Information Systems Journal (2018) Vol. 29, Iss. 3, pp. 707-737
Closed Access | Times Cited: 83
iSpy? Tailored versus Invasive Ads and Consumers’ Perceptions of Personalized Advertising
John T. Gironda, Pradeep Korgaonkar
Electronic Commerce Research and Applications (2018) Vol. 29, pp. 64-77
Closed Access | Times Cited: 82
John T. Gironda, Pradeep Korgaonkar
Electronic Commerce Research and Applications (2018) Vol. 29, pp. 64-77
Closed Access | Times Cited: 82
An empirical examination of the influence of biased personalized product recommendations on consumers' decision making outcomes
Bo Xiao, Izak Benbasat
Decision Support Systems (2018) Vol. 110, pp. 46-57
Closed Access | Times Cited: 80
Bo Xiao, Izak Benbasat
Decision Support Systems (2018) Vol. 110, pp. 46-57
Closed Access | Times Cited: 80