OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, et al.
International Journal of Information Management (2022) Vol. 65, pp. 102498-102498
Open Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

Digital transformation in operations management: Fundamental change through agency reversal
Spyros Angelopoulos, Elliot Bendoly, Jan C. Fransoo, et al.
Journal of Operations Management (2023) Vol. 69, Iss. 6, pp. 876-889
Open Access | Times Cited: 39

Investigating the Effect of Perceived Security, Perceived Trust, and Information Quality on Mobile Payment Usage through Near-Field Communication (NFC) in Saudi Arabia
Mohammed Amin Almaiah, Ali Mugahed Al-Rahmi, Fahad Alturise, et al.
Electronics (2022) Vol. 11, Iss. 23, pp. 3926-3926
Open Access | Times Cited: 52

A framework for cyber-risk insurance against ransomware: A mixed-method approach
Arunabha Mukhopadhyay, Swati Jain
International Journal of Information Management (2023) Vol. 74, pp. 102724-102724
Closed Access | Times Cited: 15

A Field Experiment on Response Strategy in Non-alternative Environments: A Moderated-Mediation Model
Hamid Reza Nikkhah
Information & Management (2025), pp. 104134-104134
Closed Access

Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control
Vinton Morris, Kevin Kornegay
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2025), pp. 00307-00314
Closed Access

Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses
Paras Bhatt, Rohit Valecha, Hengyi Rao
International Journal of Information Management (2025) Vol. 83, pp. 102902-102902
Closed Access

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Government Information Quarterly (2022) Vol. 39, Iss. 4, pp. 101721-101721
Closed Access | Times Cited: 19

Predicting the Occurrence of a Data Breach
Mehdi Barati, Benjamin Yankson
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 2, pp. 100128-100128
Open Access | Times Cited: 18

Developing a data breach protection capability framework in retailing
Mohammad Rajib Uddin, Shahriar Akter, Wai Jin Thomas Lee
International Journal of Production Economics (2024) Vol. 271, pp. 109202-109202
Open Access | Times Cited: 3

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 3

Unraveling influential factors shaping employee cybersecurity behaviors: an empirical investigation of public servants in Vietnam
Dien Van Tran, Phuong V. Nguyen, Demetris Vrontis, et al.
Journal of Asia Business Studies (2024)
Closed Access | Times Cited: 2

Factors impacting cybersecurity transformation: An Industry 5.0 perspective
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2

Machine Learning in Information and Communications Technology: A Survey
Ηλίας Δρίτσας, Μαρία Τρίγκα
Information (2024) Vol. 16, Iss. 1, pp. 8-8
Open Access | Times Cited: 1

Strategizing Responses to Data Breaches: A Multi-Method Study of Organizational Responsibility and Effective Communication with Stakeholders
Hamid Reza Nikkhah, Varun Grover
Journal of Management Information Systems (2024) Vol. 41, Iss. 4, pp. 1042-1077
Closed Access | Times Cited: 1

A New Technological Model on Investigating the Utilization of Mobile Learning Applications: Extending the TAM
Rima Shishakly, Mohammed Amin Almaiah, Shaha Al‐Otaibi, et al.
Multimodal Technologies and Interaction (2023) Vol. 7, Iss. 9, pp. 92-92
Open Access | Times Cited: 4

Examining the Factors That Influence User Information Security Behavior toward COVID-19 Scams
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4

Blazing the Trail: Considering Browsing Path Dependence in Online Service Response Strategy
Meihua Zuo, Spyros Angelopoulos, Zhouyang Liang, et al.
Information Systems Frontiers (2022) Vol. 25, Iss. 4, pp. 1605-1619
Open Access | Times Cited: 6

How to keep your information secure? Toward a better understanding of users security behavior
Álvaro Arenas, Gautam Ray, Antonio Hidalgo Nuchera, et al.
Technological Forecasting and Social Change (2023) Vol. 198, pp. 123028-123028
Open Access | Times Cited: 3

Exploring the Success Factors of Smart City Adoption via Structural Equation Modeling
Tayseer Alkdour, Mohammed Amin Almaiah, Rima Shishakly, et al.
Sustainability (2023) Vol. 15, Iss. 22, pp. 15915-15915
Open Access | Times Cited: 2

Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
Galathara Kahanda, Sasha Rider, Sayantini Mukhopadhyay
Advanced sciences and technologies for security applications (2024), pp. 77-96
Closed Access

Vaccination Model: self-protective behavior in the face of Ransomware Attack in SMEs
Amit Rechavi, Tamar Berenblum
Research Square (Research Square) (2024)
Open Access

Safeguarding the Digital Realm
Rajkumar Veeran, Priyadharshini Gunasekaran
Advances in library and information science (ALIS) book series (2024), pp. 81-103
Closed Access

Impulsive consumer digital shift: virtual reality as a new mode of physical experience
Varun Nayyar
Total Quality Management & Business Excellence (2024), pp. 1-22
Closed Access

Page 1 - Next Page

Scroll to top