
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Information security management needs more holistic approach: A literature review
Zahoor Ahmed Soomro, Mahmood Shah, Javed Ahmed
International Journal of Information Management (2015) Vol. 36, Iss. 2, pp. 215-225
Closed Access | Times Cited: 401
Zahoor Ahmed Soomro, Mahmood Shah, Javed Ahmed
International Journal of Information Management (2015) Vol. 36, Iss. 2, pp. 215-225
Closed Access | Times Cited: 401
Showing 1-25 of 401 citing articles:
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 264
Ling Li, Wu He, Li Da Xu, et al.
International Journal of Information Management (2018) Vol. 45, pp. 13-24
Closed Access | Times Cited: 264
Sustainability of SMEs in the Competition: A Systemic Review on Technological Challenges and SME Performance
Rpir Prasanna, Jmsb Jayasundara, Sisira Kumara Naradda Gamage, et al.
Journal of Open Innovation Technology Market and Complexity (2019) Vol. 5, Iss. 4, pp. 100-100
Open Access | Times Cited: 262
Rpir Prasanna, Jmsb Jayasundara, Sisira Kumara Naradda Gamage, et al.
Journal of Open Innovation Technology Market and Complexity (2019) Vol. 5, Iss. 4, pp. 100-100
Open Access | Times Cited: 262
Threat modeling – A systematic literature review
Wenjun Xiong, Robert Lagerström
Computers & Security (2019) Vol. 84, pp. 53-69
Closed Access | Times Cited: 196
Wenjun Xiong, Robert Lagerström
Computers & Security (2019) Vol. 84, pp. 53-69
Closed Access | Times Cited: 196
Design of personnel big data management system based on blockchain
Jian Chen, Zhihan Lv, Houbing Song
Future Generation Computer Systems (2019) Vol. 101, pp. 1122-1129
Closed Access | Times Cited: 177
Jian Chen, Zhihan Lv, Houbing Song
Future Generation Computer Systems (2019) Vol. 101, pp. 1122-1129
Closed Access | Times Cited: 177
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 171
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 171
Forty years of the International Journal of Information Management: A bibliometric analysis
Naveen Donthu, Satish Kumar, Nitesh Pandey, et al.
International Journal of Information Management (2021) Vol. 57, pp. 102307-102307
Closed Access | Times Cited: 134
Naveen Donthu, Satish Kumar, Nitesh Pandey, et al.
International Journal of Information Management (2021) Vol. 57, pp. 102307-102307
Closed Access | Times Cited: 134
Fifty years of information management research: A conceptual structure analysis using structural topic modeling
Anuj Sharma, Nripendra P. Rana, Robin Nunkoo
International Journal of Information Management (2021) Vol. 58, pp. 102316-102316
Closed Access | Times Cited: 108
Anuj Sharma, Nripendra P. Rana, Robin Nunkoo
International Journal of Information Management (2021) Vol. 58, pp. 102316-102316
Closed Access | Times Cited: 108
Leveraging human factors in cybersecurity: an integrated methodological approach
Alessandro Pollini, Tiziana C. Callari, Alessandra Tedeschi, et al.
Cognition Technology & Work (2021) Vol. 24, Iss. 2, pp. 371-390
Open Access | Times Cited: 106
Alessandro Pollini, Tiziana C. Callari, Alessandra Tedeschi, et al.
Cognition Technology & Work (2021) Vol. 24, Iss. 2, pp. 371-390
Open Access | Times Cited: 106
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 70
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 70
Data Security and Privacy in the Age of AI and Digital Twins
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed
Advances in business information systems and analytics book series (2024), pp. 99-124
Closed Access | Times Cited: 17
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed
Advances in business information systems and analytics book series (2024), pp. 99-124
Closed Access | Times Cited: 17
Navigating the Smart Circular Economy: A framework for Manufacturing Firms
Shahbaz Khan, Rubee Singh, Jasim Alnahas, et al.
Journal of Cleaner Production (2024), pp. 144007-144007
Closed Access | Times Cited: 15
Shahbaz Khan, Rubee Singh, Jasim Alnahas, et al.
Journal of Cleaner Production (2024), pp. 144007-144007
Closed Access | Times Cited: 15
Exploring SME cybersecurity practices in developing countries
Salah Kabanda, Maureen Tanner, Cameron Kent
Journal of Organizational Computing and Electronic Commerce (2018) Vol. 28, Iss. 3, pp. 269-282
Closed Access | Times Cited: 120
Salah Kabanda, Maureen Tanner, Cameron Kent
Journal of Organizational Computing and Electronic Commerce (2018) Vol. 28, Iss. 3, pp. 269-282
Closed Access | Times Cited: 120
Managing cyber and information risks in supply chains: insights from an exploratory analysis
Claudia Colicchia, Alessandro Creazza, David Menachof
Supply Chain Management An International Journal (2018) Vol. 24, Iss. 2, pp. 215-240
Open Access | Times Cited: 102
Claudia Colicchia, Alessandro Creazza, David Menachof
Supply Chain Management An International Journal (2018) Vol. 24, Iss. 2, pp. 215-240
Open Access | Times Cited: 102
The value of and myths about enterprise architecture
Yiwei Gong, Marijn Janssen
International Journal of Information Management (2018) Vol. 46, pp. 1-9
Open Access | Times Cited: 96
Yiwei Gong, Marijn Janssen
International Journal of Information Management (2018) Vol. 46, pp. 1-9
Open Access | Times Cited: 96
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Ana Paula Henriques de Gusmão, Maísa Mendonça Silva, Thiago Poleto, et al.
International Journal of Information Management (2018) Vol. 43, pp. 248-260
Closed Access | Times Cited: 92
Ana Paula Henriques de Gusmão, Maísa Mendonça Silva, Thiago Poleto, et al.
International Journal of Information Management (2018) Vol. 43, pp. 248-260
Closed Access | Times Cited: 92
A comprehensive model of information security factors for decision-makers
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 89
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security (2020) Vol. 92, pp. 101747-101747
Open Access | Times Cited: 89
A reversible and secure patient information hiding system for IoT driven e-health
Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, et al.
International Journal of Information Management (2018) Vol. 45, pp. 262-275
Closed Access | Times Cited: 86
Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, et al.
International Journal of Information Management (2018) Vol. 45, pp. 262-275
Closed Access | Times Cited: 86
Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2020) Vol. 114, pp. 106531-106531
Open Access | Times Cited: 84
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2020) Vol. 114, pp. 106531-106531
Open Access | Times Cited: 84
Evaluating the cyber security readiness of organizations and its influence on performance
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 81
Shaikha A. Hasan, Mazen Ali, Sherah Kurnia, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102726-102726
Closed Access | Times Cited: 81
A Systematic Literature Review on the Cyber Security
Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, et al.
International Journal of Scientific Research and Management (IJSRM) (2021) Vol. 9, Iss. 12, pp. 669-710
Open Access | Times Cited: 81
Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, et al.
International Journal of Scientific Research and Management (IJSRM) (2021) Vol. 9, Iss. 12, pp. 669-710
Open Access | Times Cited: 81
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
Are External Auditors Concerned about Cyber Incidents? Evidence from Audit Fees
He Li, Won Gyun No, J. Efrim Boritz
Auditing A Journal of Practice & Theory (2019) Vol. 39, Iss. 1, pp. 151-171
Closed Access | Times Cited: 75
He Li, Won Gyun No, J. Efrim Boritz
Auditing A Journal of Practice & Theory (2019) Vol. 39, Iss. 1, pp. 151-171
Closed Access | Times Cited: 75
Cyber risk management: History and future research directions
Martin Eling, Michael K. McShane, Trung Nguyen
Risk Management and Insurance Review (2021) Vol. 24, Iss. 1, pp. 93-125
Closed Access | Times Cited: 63
Martin Eling, Michael K. McShane, Trung Nguyen
Risk Management and Insurance Review (2021) Vol. 24, Iss. 1, pp. 93-125
Closed Access | Times Cited: 63
Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management
Rishabh Rajan, Nripendra P. Rana, Nakul Parameswar, et al.
Technological Forecasting and Social Change (2021) Vol. 170, pp. 120872-120872
Open Access | Times Cited: 62
Rishabh Rajan, Nripendra P. Rana, Nakul Parameswar, et al.
Technological Forecasting and Social Change (2021) Vol. 170, pp. 120872-120872
Open Access | Times Cited: 62
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead
Megan Gale, Ivano Bongiovanni, Sergeja Slapničar
Computers & Security (2022) Vol. 121, pp. 102840-102840
Closed Access | Times Cited: 40
Megan Gale, Ivano Bongiovanni, Sergeja Slapničar
Computers & Security (2022) Vol. 121, pp. 102840-102840
Closed Access | Times Cited: 40