OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston, Merrill Warkentin, Mikko Siponen
MIS Quarterly (2015) Vol. 39, Iss. 1, pp. 113-134
Closed Access | Times Cited: 368

Showing 51-75 of 368 citing articles:

Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 5

Does Context Always Matter?
Sebastian Hengstler
(2025)
Closed Access

Persuasive Security Messages
Shan Xiao, Merrill Warkentin
(2025), pp. 1802-1804
Closed Access

End-User Compliance with Information Security Policy Framework for Government Departments in South Africa
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access

Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts
Wencui Han, Serkan Ada, Raj Sharman, et al.
MIS Quarterly (2015) Vol. 39, Iss. 4, pp. 909-929
Closed Access | Times Cited: 63

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
Abdullah Algarni, Yue Xu, Taizan Chan
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 661-687
Open Access | Times Cited: 60

Information systems security policy implementation in practice: from best practices to situated practices
Elina Niemimaa, Marko Niemimaa
European Journal of Information Systems (2017) Vol. 26, Iss. 1, pp. 1-20
Closed Access | Times Cited: 58

Shifts in Online Consumer Behavior: A Preliminary Investigation of the Net Generation
Donghyun Kim, Anthony P. Ammeter
Journal of theoretical and applied electronic commerce research (2017) Vol. 13, Iss. 1, pp. 1-25
Open Access | Times Cited: 54

The dark side of social networking sites:Understanding phishing risks
Mario Silić, Andrea Bäck
Computers in Human Behavior (2016) Vol. 60, pp. 35-43
Closed Access | Times Cited: 53

The design and evaluation of a theory-based intervention to promote security behaviour against phishing
Jurjen Jansen, Paul van Schaik
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 40-55
Open Access | Times Cited: 53

Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making
Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, et al.
Decision Sciences (2018) Vol. 50, Iss. 2, pp. 245-284
Open Access | Times Cited: 52

Are we ready for cyberterrorist attacks?—Examining the role of individual resilience
Jian Hua, Yan Chen, Xin Luo
Information & Management (2018) Vol. 55, Iss. 7, pp. 928-938
Closed Access | Times Cited: 48

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 48

Information security policy compliance: a higher education case study
Khaled A. Alshare, Peggy L. Lane, Michael R. Lane
Information and Computer Security (2018) Vol. 26, Iss. 1, pp. 91-108
Open Access | Times Cited: 47

Impact of Different Stakeholders of Bike-Sharing Industry on Users’ Intention of Civilized Use of Bike-Sharing
Lin Jia, Xin Liu, Yaqian Liu
Sustainability (2018) Vol. 10, Iss. 5, pp. 1437-1437
Open Access | Times Cited: 47

Security on Autopilot
Alan R. Dennis, Randall K. Minas
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2018) Vol. 49, Iss. SI, pp. 15-38
Open Access | Times Cited: 46

Information security burnout: Identification of sources and mitigating factors from security demands and resources
Hiep Pham, Linda Brennan, Steven Furnell
Journal of Information Security and Applications (2019) Vol. 46, pp. 96-107
Open Access | Times Cited: 44

Secondary Risk Theory: Validation of a Novel Model of Protection Motivation
Christopher Cummings, Sonny Rosenthal, Wei Yi Kong
Risk Analysis (2020) Vol. 41, Iss. 1, pp. 204-220
Closed Access | Times Cited: 43

Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory
Aihui Chen, Yaobin Lu
International Journal of Information Management (2021) Vol. 61, pp. 102402-102402
Closed Access | Times Cited: 38

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
Simon Vrhovec, Anže Mihelič
Computers & Security (2021) Vol. 106, pp. 102309-102309
Closed Access | Times Cited: 36

Sharing economy platforms: An equity theory perspective on reciprocity and commitment
Dinara Davlembayeva, Savvas Papagiannidis, Eleftherios Alamanos
Journal of Business Research (2021) Vol. 127, pp. 151-166
Open Access | Times Cited: 33

Understanding Information Security Policy Violation from a Situational Action Perspective
Han Li, Xin Luo, Yan Chen
Journal of the Association for Information Systems (2021) Vol. 22, Iss. 3, pp. 739-772
Closed Access | Times Cited: 33

Herd behavior in information security decision-making
Ali Vedadi, Merrill Warkentin, Alan R. Dennis
Information & Management (2021) Vol. 58, Iss. 8, pp. 103526-103526
Closed Access | Times Cited: 33

Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective
Ka Chung Ng, Xiaojun Zhang, James Y.L. Thong, et al.
Journal of Management Information Systems (2021) Vol. 38, Iss. 3, pp. 732-764
Open Access | Times Cited: 33

Coping behaviors in short message service (SMS)-based disaster alert systems: From the lens of protection motivation theory as elaboration likelihood
Chul Woo Yoo, Jaeung Lee, Changhyun Yoo, et al.
Information & Management (2021) Vol. 58, Iss. 4, pp. 103454-103454
Closed Access | Times Cited: 32

Scroll to top