
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Toward a Unified Model of Information Security Policy Compliance
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Showing 1-25 of 376 citing articles:
Developing a cyber security culture: Current practices and future needs
Betsy Uchendu, Jason R. C. Nurse, Maria Bada, et al.
Computers & Security (2021) Vol. 109, pp. 102387-102387
Open Access | Times Cited: 110
Betsy Uchendu, Jason R. C. Nurse, Maria Bada, et al.
Computers & Security (2021) Vol. 109, pp. 102387-102387
Open Access | Times Cited: 110
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 77
"Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data"
Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, et al.
Journal of the Association for Information Systems (2019), pp. 1272-1307
Open Access | Times Cited: 129
Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, et al.
Journal of the Association for Information Systems (2019), pp. 1272-1307
Open Access | Times Cited: 129
The acceptance of chatbots in an enterprise context – A survey study
Florian Brachten, Tobias Kißmer, Stefan Stieglitz
International Journal of Information Management (2021) Vol. 60, pp. 102375-102375
Closed Access | Times Cited: 101
Florian Brachten, Tobias Kißmer, Stefan Stieglitz
International Journal of Information Management (2021) Vol. 60, pp. 102375-102375
Closed Access | Times Cited: 101
Combination of Steganography and Cryptography: A short Survey
Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer A. S. Lafta, et al.
IOP Conference Series Materials Science and Engineering (2019) Vol. 518, Iss. 5, pp. 052003-052003
Open Access | Times Cited: 100
Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer A. S. Lafta, et al.
IOP Conference Series Materials Science and Engineering (2019) Vol. 518, Iss. 5, pp. 052003-052003
Open Access | Times Cited: 100
Barriers to Digital Transformation in Manufacturing: Development of a Research Agenda
Kristin Vogelsang, Kirsten Liere-Netheler, Sven Packmohr, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2019)
Open Access | Times Cited: 97
Kristin Vogelsang, Kirsten Liere-Netheler, Sven Packmohr, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2019)
Open Access | Times Cited: 97
Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2020) Vol. 114, pp. 106531-106531
Open Access | Times Cited: 90
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2020) Vol. 114, pp. 106531-106531
Open Access | Times Cited: 90
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals
Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, et al.
Journal of Medical Internet Research (2020) Vol. 22, Iss. 1, pp. e16775-e16775
Open Access | Times Cited: 83
Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, et al.
Journal of Medical Internet Research (2020) Vol. 22, Iss. 1, pp. e16775-e16775
Open Access | Times Cited: 83
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 82
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 82
Evaluating the cyber security readiness of organizations and its influence on performance
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 81
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 81
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 78
Acceptance of protection technology in a time of fear: the case of Covid-19 exposure detection apps
Abdallah Alsaad, Manaf Al‐Okaily
Information Technology and People (2021) Vol. 35, Iss. 3, pp. 1116-1135
Closed Access | Times Cited: 66
Abdallah Alsaad, Manaf Al‐Okaily
Information Technology and People (2021) Vol. 35, Iss. 3, pp. 1116-1135
Closed Access | Times Cited: 66
The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates
Wilson Cheong Hin Hong, Chunyang Chi, Jia Liu, et al.
Education and Information Technologies (2022) Vol. 28, Iss. 1, pp. 439-470
Open Access | Times Cited: 49
Wilson Cheong Hin Hong, Chunyang Chi, Jia Liu, et al.
Education and Information Technologies (2022) Vol. 28, Iss. 1, pp. 439-470
Open Access | Times Cited: 49
What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
A typology of cybersecurity behavior among knowledge workers
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11
Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings
Tiange Zhao, Tiago Espinha Gasiba, Ulrike Lechner, et al.
Journal of Systems and Software (2024) Vol. 210, pp. 111946-111946
Open Access | Times Cited: 10
Tiange Zhao, Tiago Espinha Gasiba, Ulrike Lechner, et al.
Journal of Systems and Software (2024) Vol. 210, pp. 111946-111946
Open Access | Times Cited: 10
Artificial Intelligence Enhanced Identity And Access Management Preventing Unauthorized Access In Modern Enterprises
Md Takbir Hossen Sarker, Md Sanaur Rahman
SSRN Electronic Journal (2025)
Closed Access | Times Cited: 1
Md Takbir Hossen Sarker, Md Sanaur Rahman
SSRN Electronic Journal (2025)
Closed Access | Times Cited: 1
Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Panel report: the dark side of the digitization of the individual
Ofir Turel, Christian Matt, Manuel Trenz, et al.
Internet Research (2019) Vol. 29, Iss. 2, pp. 274-288
Closed Access | Times Cited: 74
Ofir Turel, Christian Matt, Manuel Trenz, et al.
Internet Research (2019) Vol. 29, Iss. 2, pp. 274-288
Closed Access | Times Cited: 74
Examining the impact of deterrence factors and norms on resistance to Information Systems Security
Mohammad I. Merhi, Punit Ahluwalia
Computers in Human Behavior (2018) Vol. 92, pp. 37-46
Closed Access | Times Cited: 70
Mohammad I. Merhi, Punit Ahluwalia
Computers in Human Behavior (2018) Vol. 92, pp. 37-46
Closed Access | Times Cited: 70
Peers matter: The moderating role of social influence on information security policy compliance
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 65
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 65
The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance
Srinivasan Venkatraman, Christy M.K. Cheung, Zach W. Y. Lee, et al.
Journal of Management Information Systems (2018) Vol. 35, Iss. 4, pp. 1060-1091
Open Access | Times Cited: 61
Srinivasan Venkatraman, Christy M.K. Cheung, Zach W. Y. Lee, et al.
Journal of Management Information Systems (2018) Vol. 35, Iss. 4, pp. 1060-1091
Open Access | Times Cited: 61