
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 368
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 368
Showing 26-50 of 368 citing articles:
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 79
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 79
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 70
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 70
Acceptance of protection technology in a time of fear: the case of Covid-19 exposure detection apps
Abdallah Alsaad, Manaf Al‐Okaily
Information Technology and People (2021) Vol. 35, Iss. 3, pp. 1116-1135
Closed Access | Times Cited: 66
Abdallah Alsaad, Manaf Al‐Okaily
Information Technology and People (2021) Vol. 35, Iss. 3, pp. 1116-1135
Closed Access | Times Cited: 66
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei‐Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 64
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei‐Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 64
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 57
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 57
What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 32
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 32
A new perspective on neutralization and deterrence: Predicting shadow IT usage
Mario Silić, Jordan B. Barlow, Andrea Bäck
Information & Management (2017) Vol. 54, Iss. 8, pp. 1023-1037
Closed Access | Times Cited: 85
Mario Silić, Jordan B. Barlow, Andrea Bäck
Information & Management (2017) Vol. 54, Iss. 8, pp. 1023-1037
Closed Access | Times Cited: 85
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination
Merrill Warkentin, Eric Walden, Allen C. Johnston, et al.
Journal of the Association for Information Systems (2016) Vol. 17, Iss. 3, pp. 194-215
Open Access | Times Cited: 80
Merrill Warkentin, Eric Walden, Allen C. Johnston, et al.
Journal of the Association for Information Systems (2016) Vol. 17, Iss. 3, pp. 194-215
Open Access | Times Cited: 80
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks
Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
MIS Quarterly (2017) Vol. 41, Iss. 2, pp. 497-523
Open Access | Times Cited: 74
Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
MIS Quarterly (2017) Vol. 41, Iss. 2, pp. 497-523
Open Access | Times Cited: 74
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
Anat Hovav, Frida Ferdani Putri
Pervasive and Mobile Computing (2016) Vol. 32, pp. 35-49
Closed Access | Times Cited: 66
Anat Hovav, Frida Ferdani Putri
Pervasive and Mobile Computing (2016) Vol. 32, pp. 35-49
Closed Access | Times Cited: 66
Dealing with digital traces: Understanding protective behaviors on mobile devices
France Bélanger, Robert E. Crossler
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 34-49
Closed Access | Times Cited: 64
France Bélanger, Robert E. Crossler
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 34-49
Closed Access | Times Cited: 64
PLS-Based Model Selection: The Role of Alternative Explanations in Information Systems Research
Pratyush Nidhi Sharma, Marko Sarstedt, Galit Shmueli, et al.
Journal of the Association for Information Systems (2019) Vol. 20, Iss. 4, pp. 346-397
Closed Access | Times Cited: 60
Pratyush Nidhi Sharma, Marko Sarstedt, Galit Shmueli, et al.
Journal of the Association for Information Systems (2019) Vol. 20, Iss. 4, pp. 346-397
Closed Access | Times Cited: 60
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
Mari Karjalainen, Suprateek Sarker, Mikko Siponen
Information Systems Research (2019) Vol. 30, Iss. 2, pp. 687-704
Closed Access | Times Cited: 60
Mari Karjalainen, Suprateek Sarker, Mikko Siponen
Information Systems Research (2019) Vol. 30, Iss. 2, pp. 687-704
Closed Access | Times Cited: 60
Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements
Bernadette Kamleitner, Vincent‐Wayne Mitchell
Journal of Public Policy & Marketing (2019) Vol. 38, Iss. 4, pp. 433-450
Open Access | Times Cited: 57
Bernadette Kamleitner, Vincent‐Wayne Mitchell
Journal of Public Policy & Marketing (2019) Vol. 38, Iss. 4, pp. 433-450
Open Access | Times Cited: 57
Running field experiments using Facebook split test
Davide C. Orazi, Allen C. Johnston
Journal of Business Research (2020) Vol. 118, pp. 189-198
Open Access | Times Cited: 56
Davide C. Orazi, Allen C. Johnston
Journal of Business Research (2020) Vol. 118, pp. 189-198
Open Access | Times Cited: 56
College students information security awareness: a comparison between smartphones and computers
Nashrawan Taha, Laila Dahabiyeh
Education and Information Technologies (2020) Vol. 26, Iss. 2, pp. 1721-1736
Closed Access | Times Cited: 53
Nashrawan Taha, Laila Dahabiyeh
Education and Information Technologies (2020) Vol. 26, Iss. 2, pp. 1721-1736
Closed Access | Times Cited: 53
Protection Motivation Theory in Information Systems Security Research
Steffi Haag, Mikko Siponen, Fufan Liu
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. 2, pp. 25-67
Open Access | Times Cited: 41
Steffi Haag, Mikko Siponen, Fufan Liu
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. 2, pp. 25-67
Open Access | Times Cited: 41
IS professionals’ information security behaviors in Chinese IT organizations for information security protection
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 40
Xiaofen Ma
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102744-102744
Closed Access | Times Cited: 40
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 32
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 32
Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, et al.
International Journal of Information Management (2022) Vol. 65, pp. 102498-102498
Open Access | Times Cited: 28
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, et al.
International Journal of Information Management (2022) Vol. 65, pp. 102498-102498
Open Access | Times Cited: 28
Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 16
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 16
The Role of Messenger in Advertising Content: Bayesian Persuasion Perspective
Jiwoong Shin, Chi-Ying Wang
Marketing Science (2024) Vol. 43, Iss. 4, pp. 840-862
Closed Access | Times Cited: 7
Jiwoong Shin, Chi-Ying Wang
Marketing Science (2024) Vol. 43, Iss. 4, pp. 840-862
Closed Access | Times Cited: 7