OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Simon Trang, Benedikt Brendel
Information Systems Frontiers (2019) Vol. 21, Iss. 6, pp. 1265-1284
Closed Access | Times Cited: 79

Showing 1-25 of 79 citing articles:

Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2
Kuttimani Tamilmani, Nripendra P. Rana, Yogesh K. Dwivedi
Information Systems Frontiers (2020) Vol. 23, Iss. 4, pp. 987-1005
Open Access | Times Cited: 211

A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level
Yang Zhao, Yixuan Li, Ning Wang, et al.
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1667-1688
Open Access | Times Cited: 104

Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts
Ilja Nastjuk, Simon Trang, Julius-Viktor Grummeck-Braamt, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 3, pp. 361-382
Open Access | Times Cited: 58

Determinants of behaviour and their efficacy as targets of behavioural change interventions
Dolores Albarracín, Bita Fayaz-Farkhad, Javier A. Granados Samayoa
Nature Reviews Psychology (2024) Vol. 3, Iss. 6, pp. 377-392
Closed Access | Times Cited: 46

Cultural drivers behind employees neutralizing deviant information systems security behaviors
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 1

Meta-analysis in information systems research: Review and recommendations
Anand Jeyaraj, Yogesh K. Dwivedi
International Journal of Information Management (2020) Vol. 55, pp. 102226-102226
Open Access | Times Cited: 85

Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76

The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
Eunkyung Kweon, Hansol Lee, Sangmi Chai, et al.
Information Systems Frontiers (2019) Vol. 23, Iss. 2, pp. 361-373
Closed Access | Times Cited: 66

Does Context Always Matter?
Sebastian Hengstler
(2025)
Closed Access

Understanding the state of criminological scholarship on cybercrimes
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 23

Reducing fraud in organizations through information security policy compliance: An information security controls perspective
Dennis Brown, Gunjan Batra, Humayun Zafar, et al.
Computers & Security (2024) Vol. 144, pp. 103958-103958
Closed Access | Times Cited: 4

Determinants for Drunk Driving Recidivism—An Application of the Integrated Prototype Willingness Model
Rong‐Chang Jou, Henry Hsu
Behavioral Sciences (2025) Vol. 15, Iss. 1, pp. 48-48
Open Access

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access

The Role of Collectivism, Power Distance, and Neutralization Techniques on Deviant Information Security Behavior
Yimer Mohammed, Merrill Warkentin, Chinju Paul, et al.
Technology in Society (2025), pp. 102857-102857
Closed Access

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 19

The cybersecurity behavioral research: A tertiary study
Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, et al.
Computers & Security (2022) Vol. 120, pp. 102826-102826
Closed Access | Times Cited: 18

The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital
Cynthia K. Riemenschneider, Laurie L. Burney, Saman Bina
Information and Computer Security (2023) Vol. 31, Iss. 2, pp. 172-198
Closed Access | Times Cited: 9

Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees
Rao Faizan Ali, P.D.D. Dominic, Kashif Ali
Sustainability (2020) Vol. 12, Iss. 20, pp. 8576-8576
Open Access | Times Cited: 25

COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study
Kiara Jordan Butler, Irwin Brown
Information and Computer Security (2023) Vol. 31, Iss. 2, pp. 221-243
Closed Access | Times Cited: 8

Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review
Mohammed Mubarkoot, Jörn Altmann, Morteza Rasti‐Barzoki, et al.
Computers & Security (2022) Vol. 124, pp. 102985-102985
Open Access | Times Cited: 12

A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
Findlay Whitelaw, Jackie Riley, Nebrase Elmrabit
IEEE Access (2024) Vol. 12, pp. 34752-34768
Open Access | Times Cited: 2

Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour
Simon Trang, Ilja Nastjuk
Computers & Security (2021) Vol. 104, pp. 102222-102222
Closed Access | Times Cited: 17

Page 1 - Next Page

Scroll to top