
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261
Showing 1-25 of 261 citing articles:
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
Creativity and Innovation Under Constraints: A Cross-Disciplinary Integrative Review
Oguz A. Acar, Murat Tarakci, Daan van Knippenberg
Journal of Management (2018) Vol. 45, Iss. 1, pp. 96-121
Open Access | Times Cited: 307
Oguz A. Acar, Murat Tarakci, Daan van Knippenberg
Journal of Management (2018) Vol. 45, Iss. 1, pp. 96-121
Open Access | Times Cited: 307
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 276
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 276
Getting value from Business Intelligence systems: A review and research agenda
Van-Hau Trieu
Decision Support Systems (2016) Vol. 93, pp. 111-124
Closed Access | Times Cited: 258
Van-Hau Trieu
Decision Support Systems (2016) Vol. 93, pp. 111-124
Closed Access | Times Cited: 258
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
More than the individual: Examining the relationship between culture and Information Security Awareness
Ashleigh Morgan Wiley, Agata McCormac, Dragana Calic
Computers & Security (2019) Vol. 88, pp. 101640-101640
Closed Access | Times Cited: 133
Ashleigh Morgan Wiley, Agata McCormac, Dragana Calic
Computers & Security (2019) Vol. 88, pp. 101640-101640
Closed Access | Times Cited: 133
The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use
Sutirtha Chatterjee, Suprateek Sarker, Joseph S. Valacich
Journal of Management Information Systems (2015) Vol. 31, Iss. 4, pp. 49-87
Closed Access | Times Cited: 126
Sutirtha Chatterjee, Suprateek Sarker, Joseph S. Valacich
Journal of Management Information Systems (2015) Vol. 31, Iss. 4, pp. 49-87
Closed Access | Times Cited: 126
Impacts of Comprehensive Information Security Programs on Information Security Culture
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Computer Information Systems (2015) Vol. 55, Iss. 3, pp. 11-19
Closed Access | Times Cited: 121
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Computer Information Systems (2015) Vol. 55, Iss. 3, pp. 11-19
Closed Access | Times Cited: 121
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
Teodor Sommestad, Henrik Karlzén, Jonas Hallberg
International Journal of Information Security and Privacy (2015) Vol. 9, Iss. 1, pp. 26-46
Closed Access | Times Cited: 112
Teodor Sommestad, Henrik Karlzén, Jonas Hallberg
International Journal of Information Security and Privacy (2015) Vol. 9, Iss. 1, pp. 26-46
Closed Access | Times Cited: 112
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls
Lara Khansa, Jungwon Kuem, Mikko Siponen, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 1, pp. 141-176
Closed Access | Times Cited: 107
Lara Khansa, Jungwon Kuem, Mikko Siponen, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 1, pp. 141-176
Closed Access | Times Cited: 107
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80
What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33
Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 9
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 9
An authorization framework for body area network: A policy verification and smart contract-based integrity assurance approach
Ramadan Abdunabi, M A Shariful Amin, Rejina Basnet
Journal of Computer Security (2025)
Closed Access | Times Cited: 1
Ramadan Abdunabi, M A Shariful Amin, Rejina Basnet
Journal of Computer Security (2025)
Closed Access | Times Cited: 1
Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Determinants of early conformance with information security policies
France Bélanger, Stéphane Collignon, Kathryn Enget, et al.
Information & Management (2017) Vol. 54, Iss. 7, pp. 887-901
Closed Access | Times Cited: 85
France Bélanger, Stéphane Collignon, Kathryn Enget, et al.
Information & Management (2017) Vol. 54, Iss. 7, pp. 887-901
Closed Access | Times Cited: 85
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80
Why not comply with information security? An empirical approach for the causes of non-compliance
Inho Hwang, Daejin Kim, Taeha Kim, et al.
Online Information Review (2017) Vol. 41, Iss. 1, pp. 2-18
Closed Access | Times Cited: 79
Inho Hwang, Daejin Kim, Taeha Kim, et al.
Online Information Review (2017) Vol. 41, Iss. 1, pp. 2-18
Closed Access | Times Cited: 79