
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace
Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno
Computers in Human Behavior (2016) Vol. 67, pp. 196-206
Closed Access | Times Cited: 31
Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno
Computers in Human Behavior (2016) Vol. 67, pp. 196-206
Closed Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?
Zheng Yan, Thomas Robertson, River Yan, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 375-382
Closed Access | Times Cited: 84
Zheng Yan, Thomas Robertson, River Yan, et al.
Computers in Human Behavior (2018) Vol. 84, pp. 375-382
Closed Access | Times Cited: 84
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 81
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 81
Moving beyond cyber security awareness and training to engendering security knowledge sharing
Saad Alahmari, Karen Renaud, Inah Omoronyia
Information Systems and e-Business Management (2022) Vol. 21, Iss. 1, pp. 123-158
Open Access | Times Cited: 17
Saad Alahmari, Karen Renaud, Inah Omoronyia
Information Systems and e-Business Management (2022) Vol. 21, Iss. 1, pp. 123-158
Open Access | Times Cited: 17
Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters
Maia J. Boyd, Jamar L. Sullivan, Marshini Chetty, et al.
(2021), pp. 1-18
Open Access | Times Cited: 18
Maia J. Boyd, Jamar L. Sullivan, Marshini Chetty, et al.
(2021), pp. 1-18
Open Access | Times Cited: 18
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Can peers help reduce violations of information security policies? The role of peer monitoring
Adel Yazdanmehr, Jingguo Wang
European Journal of Information Systems (2021) Vol. 32, Iss. 3, pp. 508-528
Closed Access | Times Cited: 16
Adel Yazdanmehr, Jingguo Wang
European Journal of Information Systems (2021) Vol. 32, Iss. 3, pp. 508-528
Closed Access | Times Cited: 16
An Approach to Estimating of Criticality of Social Engineering Attacks Traces
Anastasiia Khlobystova, Maxim V. Abramov, Alexander Lvovich Tulupyev
Studies in systems, decision and control (2019), pp. 446-456
Closed Access | Times Cited: 15
Anastasiia Khlobystova, Maxim V. Abramov, Alexander Lvovich Tulupyev
Studies in systems, decision and control (2019), pp. 446-456
Closed Access | Times Cited: 15
Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
Ali Farooq, Joshua Rumo Ndiege, Jouni Isoaho
(2019), pp. 1-8
Closed Access | Times Cited: 13
Ali Farooq, Joshua Rumo Ndiege, Jouni Isoaho
(2019), pp. 1-8
Closed Access | Times Cited: 13
“There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment
Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, et al.
(2023), pp. 1-17
Open Access | Times Cited: 4
Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, et al.
(2023), pp. 1-17
Open Access | Times Cited: 4
Establishing a Model for the User Acceptance of Cybersecurity Training
Wesam Fallatah, Joakim Kävrestad, Steven Furnell
Future Internet (2024) Vol. 16, Iss. 8, pp. 294-294
Open Access | Times Cited: 1
Wesam Fallatah, Joakim Kävrestad, Steven Furnell
Future Internet (2024) Vol. 16, Iss. 8, pp. 294-294
Open Access | Times Cited: 1
From hindrance to challenge
Ying Li, Ting Pan, Nan Zhang
Journal of Enterprise Information Management (2019) Vol. 33, Iss. 1, pp. 191-213
Closed Access | Times Cited: 10
Ying Li, Ting Pan, Nan Zhang
Journal of Enterprise Information Management (2019) Vol. 33, Iss. 1, pp. 191-213
Closed Access | Times Cited: 10
On improving the memorability of system-assigned recognition-based passwords
Mahdi Nasrullah Al-Ameen, Sonali Tukaram Marne, Kanis Fatema, et al.
Behaviour and Information Technology (2020) Vol. 41, Iss. 5, pp. 1115-1131
Open Access | Times Cited: 9
Mahdi Nasrullah Al-Ameen, Sonali Tukaram Marne, Kanis Fatema, et al.
Behaviour and Information Technology (2020) Vol. 41, Iss. 5, pp. 1115-1131
Open Access | Times Cited: 9
Raising Information Security Awareness in the Field of Urban and Regional Planning
Margit Scholl
International Journal of E-Planning Research (2019) Vol. 8, Iss. 3, pp. 62-86
Closed Access | Times Cited: 6
Margit Scholl
International Journal of E-Planning Research (2019) Vol. 8, Iss. 3, pp. 62-86
Closed Access | Times Cited: 6
A Descriptive Review and Classification of Organizational Information Security Awareness Research
Gershon Hutchinson, Jacques Ophoff
Communications in computer and information science (2020), pp. 114-130
Closed Access | Times Cited: 5
Gershon Hutchinson, Jacques Ophoff
Communications in computer and information science (2020), pp. 114-130
Closed Access | Times Cited: 5
Shaping extra-role security behaviors through employee-agent relations: A dual-channel motivational perspective
Joshua M. Davis, Deepti Agrawal, Obi Ogbanufe
International Journal of Information Management (2024) Vol. 80, pp. 102833-102833
Open Access
Joshua M. Davis, Deepti Agrawal, Obi Ogbanufe
International Journal of Information Management (2024) Vol. 80, pp. 102833-102833
Open Access
O Uso da Accountability Theory em Pesquisas sobre Transparência Governamental: Abordagens e Perspectivas
Rodrigo Hickmann Klein, Deisy Cristina Barbiero Klein, Edimara Mezzomo Luciano
Revista de Administração Sociedade e Inovação (2018) Vol. 4, Iss. 2, pp. 204-224
Open Access | Times Cited: 3
Rodrigo Hickmann Klein, Deisy Cristina Barbiero Klein, Edimara Mezzomo Luciano
Revista de Administração Sociedade e Inovação (2018) Vol. 4, Iss. 2, pp. 204-224
Open Access | Times Cited: 3
A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness
Saad Alahmari, Karen Renaud, Inah Omoronyia
Lecture notes in business information processing (2020), pp. 376-390
Closed Access | Times Cited: 3
Saad Alahmari, Karen Renaud, Inah Omoronyia
Lecture notes in business information processing (2020), pp. 376-390
Closed Access | Times Cited: 3
Network Analytics for Improving Students’ Cybersecurity Awareness in Online Learning Systems
Minh Hoang, Duy Dang-Pham, Ai-Phuong Hoang, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2020), pp. 1-7
Closed Access | Times Cited: 3
Minh Hoang, Duy Dang-Pham, Ai-Phuong Hoang, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2020), pp. 1-7
Closed Access | Times Cited: 3
An Empirical Examination of Employee Information Security Advice Sharing
Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 31-46
Closed Access | Times Cited: 1
Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, et al.
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 31-46
Closed Access | Times Cited: 1
RESEARCH ON THE QUALITY OF WORK LIFE AND EMPLOYEE MOTIVATION IN IT COMPANY
Saša Kukolj, Nemanja Deretić, Alen Kamiš
SCIENCE International Journal (2023) Vol. 2, Iss. 3, pp. 157-163
Open Access | Times Cited: 1
Saša Kukolj, Nemanja Deretić, Alen Kamiš
SCIENCE International Journal (2023) Vol. 2, Iss. 3, pp. 157-163
Open Access | Times Cited: 1
Environmental Uncertainty and End-User Security Behaviour: A Study During the COVID-19 Pandemic
Popyeni Kautondokwa, Zainab Ruhwanya, Jacques Ophoff
IFIP advances in information and communication technology (2021), pp. 111-125
Open Access | Times Cited: 3
Popyeni Kautondokwa, Zainab Ruhwanya, Jacques Ophoff
IFIP advances in information and communication technology (2021), pp. 111-125
Open Access | Times Cited: 3
A systematic review of Information security knowledge-sharing research
Saad Alahmari, Karen Renaud, Inah Omoronyia
Information Security and Assurance (2018), pp. 101-110
Closed Access | Times Cited: 2
Saad Alahmari, Karen Renaud, Inah Omoronyia
Information Security and Assurance (2018), pp. 101-110
Closed Access | Times Cited: 2
The Software Application for Increasing the Awareness of Industrial Enterprise Workers on Information Security of Significant Objects of Critical Information Infrastructure
Л. В. Астахова, I. A. Medvedev
2018 Global Smart Industry Conference (GloSIC) (2020), pp. 121-126
Closed Access | Times Cited: 2
Л. В. Астахова, I. A. Medvedev
2018 Global Smart Industry Conference (GloSIC) (2020), pp. 121-126
Closed Access | Times Cited: 2
Modelling employees’ social networking behaviours on enterprise social media: the influence of enterprise social media visibility
Rui Miao, Xiao He, Lihua Huang
Behaviour and Information Technology (2021) Vol. 41, Iss. 16, pp. 3574-3590
Closed Access | Times Cited: 2
Rui Miao, Xiao He, Lihua Huang
Behaviour and Information Technology (2021) Vol. 41, Iss. 16, pp. 3574-3590
Closed Access | Times Cited: 2