
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
John D’Arcy, Tejaswini Herath, Mindy K. Shoss
Journal of Management Information Systems (2014) Vol. 31, Iss. 2, pp. 285-318
Closed Access | Times Cited: 425
Showing 1-25 of 425 citing articles:
The technostress trifecta ‐ techno eustress, techno distress and design: Theoretical directions and an agenda for research
Monideepa Tarafdar, Cary L. Cooper, Jean‐François Stich
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 6-42
Open Access | Times Cited: 503
Monideepa Tarafdar, Cary L. Cooper, Jean‐François Stich
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 6-42
Open Access | Times Cited: 503
Toward a Unified Model of Information Security Policy Compliance
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
Gregory D. Moody, Mikko Siponen, Seppo Pahnila
MIS Quarterly (2018) Vol. 42, Iss. 1, pp. 285-311
Open Access | Times Cited: 376
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 275
Clay Posey, Tom Roberts, Paul Benjamin Lowry
Journal of Management Information Systems (2015) Vol. 32, Iss. 4, pp. 179-214
Closed Access | Times Cited: 275
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
Paul Benjamin Lowry, John D’Arcy, Bryan Hammer, et al.
The Journal of Strategic Information Systems (2016) Vol. 25, Iss. 3, pp. 232-240
Closed Access | Times Cited: 252
Paul Benjamin Lowry, John D’Arcy, Bryan Hammer, et al.
The Journal of Strategic Information Systems (2016) Vol. 25, Iss. 3, pp. 232-240
Closed Access | Times Cited: 252
Explaining the link between technostress and technology addiction for social networking sites: A study of distraction as a coping behavior
Monideepa Tarafdar, Christian Maier, Sven Laumer, et al.
Information Systems Journal (2019) Vol. 30, Iss. 1, pp. 96-124
Open Access | Times Cited: 237
Monideepa Tarafdar, Christian Maier, Sven Laumer, et al.
Information Systems Journal (2019) Vol. 30, Iss. 1, pp. 96-124
Open Access | Times Cited: 237
Thinking responsibly about responsible AI and ‘the dark side’ of AI
Patrick Mikalef, Kieran Conboy, Jenny Eriksson Lundström, et al.
European Journal of Information Systems (2022) Vol. 31, Iss. 3, pp. 257-268
Open Access | Times Cited: 208
Patrick Mikalef, Kieran Conboy, Jenny Eriksson Lundström, et al.
European Journal of Information Systems (2022) Vol. 31, Iss. 3, pp. 257-268
Open Access | Times Cited: 208
Estimating the Contextual Risk of Data Breach: An Empirical Approach
Ravi Sen, Sharad Borle
Journal of Management Information Systems (2015) Vol. 32, Iss. 2, pp. 314-341
Closed Access | Times Cited: 184
Ravi Sen, Sharad Borle
Journal of Management Information Systems (2015) Vol. 32, Iss. 2, pp. 314-341
Closed Access | Times Cited: 184
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 174
Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples
Christian Maier, Sven Laumer, Jakob Wirth, et al.
European Journal of Information Systems (2019) Vol. 28, Iss. 5, pp. 496-522
Closed Access | Times Cited: 162
Christian Maier, Sven Laumer, Jakob Wirth, et al.
European Journal of Information Systems (2019) Vol. 28, Iss. 5, pp. 496-522
Closed Access | Times Cited: 162
Moral Disengagement at Work: A Review and Research Agenda
Alexander Newman, Huong Le, Andrea North‐Samardzic, et al.
Journal of Business Ethics (2019) Vol. 167, Iss. 3, pp. 535-570
Open Access | Times Cited: 161
Alexander Newman, Huong Le, Andrea North‐Samardzic, et al.
Journal of Business Ethics (2019) Vol. 167, Iss. 3, pp. 535-570
Open Access | Times Cited: 161
Deliberate or Instinctive? Proactive and Reactive Coping for Technostress
Henri Pirkkalainen, Markus Salo, Monideepa Tarafdar, et al.
Journal of Management Information Systems (2019) Vol. 36, Iss. 4, pp. 1179-1212
Open Access | Times Cited: 159
Henri Pirkkalainen, Markus Salo, Monideepa Tarafdar, et al.
Journal of Management Information Systems (2019) Vol. 36, Iss. 4, pp. 1179-1212
Open Access | Times Cited: 159
Examining the Impact of Algorithmic Control on Uber Drivers’ Technostress
W. Alec Cram, Martin Wiener, Monideepa Tarafdar, et al.
Journal of Management Information Systems (2022) Vol. 39, Iss. 2, pp. 426-453
Open Access | Times Cited: 92
W. Alec Cram, Martin Wiener, Monideepa Tarafdar, et al.
Journal of Management Information Systems (2022) Vol. 39, Iss. 2, pp. 426-453
Open Access | Times Cited: 92
Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts
Ilja Nastjuk, Simon Trang, Julius-Viktor Grummeck-Braamt, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 3, pp. 361-382
Open Access | Times Cited: 67
Ilja Nastjuk, Simon Trang, Julius-Viktor Grummeck-Braamt, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 3, pp. 361-382
Open Access | Times Cited: 67
The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 16
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 16
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, et al.
Information Systems Journal (2015) Vol. 25, Iss. 3, pp. 193-273
Closed Access | Times Cited: 173
Consumer adaptation and infusion of wearable devices for healthcare
Azizbek Marakhimov, Jaehun Joo
Computers in Human Behavior (2017) Vol. 76, pp. 135-148
Closed Access | Times Cited: 160
Azizbek Marakhimov, Jaehun Joo
Computers in Human Behavior (2017) Vol. 76, pp. 135-148
Closed Access | Times Cited: 160
Training to Mitigate Phishing Attacks Using Mindfulness Techniques
Matthew L. Jensen, Michael Dinger, Ryan Wright, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 2, pp. 597-626
Closed Access | Times Cited: 160
Matthew L. Jensen, Michael Dinger, Ryan Wright, et al.
Journal of Management Information Systems (2017) Vol. 34, Iss. 2, pp. 597-626
Closed Access | Times Cited: 160
Technostress: measuring a new threat to well-being in later life
Galit Nimrod
Aging & Mental Health (2017) Vol. 22, Iss. 8, pp. 1086-1093
Closed Access | Times Cited: 158
Galit Nimrod
Aging & Mental Health (2017) Vol. 22, Iss. 8, pp. 1086-1093
Closed Access | Times Cited: 158
Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Inho Hwang, Oona Cha
Computers in Human Behavior (2017) Vol. 81, pp. 282-293
Closed Access | Times Cited: 154
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems
Markus Salo, Henri Pirkkalainen, Tiina Koskelainen
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 408-435
Open Access | Times Cited: 147
Markus Salo, Henri Pirkkalainen, Tiina Koskelainen
Information Systems Journal (2018) Vol. 29, Iss. 2, pp. 408-435
Open Access | Times Cited: 147
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
John D’Arcy, Paul Benjamin Lowry
Information Systems Journal (2017) Vol. 29, Iss. 1, pp. 43-69
Open Access | Times Cited: 142
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 133
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 133
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 131
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 131
Technostress Dark Side of Technology in the Workplace: A Scientometric Analysis
Giorgia Bondanini, Gabriele Giorgi, Antonio Ariza‐Montes, et al.
International Journal of Environmental Research and Public Health (2020) Vol. 17, Iss. 21, pp. 8013-8013
Open Access | Times Cited: 122
Giorgia Bondanini, Gabriele Giorgi, Antonio Ariza‐Montes, et al.
International Journal of Environmental Research and Public Health (2020) Vol. 17, Iss. 21, pp. 8013-8013
Open Access | Times Cited: 122