OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Management Information Systems (2012) Vol. 29, Iss. 3, pp. 157-188
Closed Access | Times Cited: 261

Showing 1-25 of 261 citing articles:

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425

Creativity and Innovation Under Constraints: A Cross-Disciplinary Integrative Review
Oguz A. Acar, Murat Tarakci, Daan van Knippenberg
Journal of Management (2018) Vol. 45, Iss. 1, pp. 96-121
Open Access | Times Cited: 307

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 276

Getting value from Business Intelligence systems: A review and research agenda
Van-Hau Trieu
Decision Support Systems (2016) Vol. 93, pp. 111-124
Closed Access | Times Cited: 258

Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Mario Silić, Paul Benjamin Lowry
Journal of Management Information Systems (2020) Vol. 37, Iss. 1, pp. 129-161
Closed Access | Times Cited: 161

Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142

More than the individual: Examining the relationship between culture and Information Security Awareness
Ashleigh Morgan Wiley, Agata McCormac, Dragana Calic
Computers & Security (2019) Vol. 88, pp. 101640-101640
Closed Access | Times Cited: 133

The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use
Sutirtha Chatterjee, Suprateek Sarker, Joseph S. Valacich
Journal of Management Information Systems (2015) Vol. 31, Iss. 4, pp. 49-87
Closed Access | Times Cited: 126

Impacts of Comprehensive Information Security Programs on Information Security Culture
Yan Chen, K. Ramamurthy, Kuang‐Wei Wen
Journal of Computer Information Systems (2015) Vol. 55, Iss. 3, pp. 11-19
Closed Access | Times Cited: 121

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
Teodor Sommestad, Henrik Karlzén, Jonas Hallberg
International Journal of Information Security and Privacy (2015) Vol. 9, Iss. 1, pp. 26-46
Closed Access | Times Cited: 112

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls
Lara Khansa, Jungwon Kuem, Mikko Siponen, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 1, pp. 141-176
Closed Access | Times Cited: 107

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 90

Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Charlette Donalds, Kweku-Muata Osei-Bryson
International Journal of Information Management (2019) Vol. 51, pp. 102056-102056
Closed Access | Times Cited: 84

A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 80

What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 33

Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 9

An authorization framework for body area network: A policy verification and smart contract-based integrity assurance approach
Ramadan Abdunabi, M A Shariful Amin, Rejina Basnet
Journal of Computer Security (2025)
Closed Access | Times Cited: 1

Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
Alfonso de Vicente, Luis Díaz-Marcos, Oscar AGUADO-TEVAR, et al.
Future Business Journal (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Determinants of early conformance with information security policies
France Bélanger, Stéphane Collignon, Kathryn Enget, et al.
Information & Management (2017) Vol. 54, Iss. 7, pp. 887-901
Closed Access | Times Cited: 85

Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 80

Why not comply with information security? An empirical approach for the causes of non-compliance
Inho Hwang, Daejin Kim, Taeha Kim, et al.
Online Information Review (2017) Vol. 41, Iss. 1, pp. 2-18
Closed Access | Times Cited: 79

Page 1 - Next Page

Scroll to top