
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei‐Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 63
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei‐Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 63
Showing 1-25 of 63 citing articles:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation
Alex Koohang, Jeretta Horn Nord, Keng‐Boon Ooi, et al.
Journal of Computer Information Systems (2023) Vol. 63, Iss. 3, pp. 735-765
Open Access | Times Cited: 352
Alex Koohang, Jeretta Horn Nord, Keng‐Boon Ooi, et al.
Journal of Computer Information Systems (2023) Vol. 63, Iss. 3, pp. 735-765
Open Access | Times Cited: 352
A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 69
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 69
How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances
Jacopo Ballerini, Dennis Herhausen, Alberto Ferraris
International Journal of Information Management (2023) Vol. 72, pp. 102649-102649
Open Access | Times Cited: 40
Jacopo Ballerini, Dennis Herhausen, Alberto Ferraris
International Journal of Information Management (2023) Vol. 72, pp. 102649-102649
Open Access | Times Cited: 40
CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
Cybersecurity Measures for Logistics Industry
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 7
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 7
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
A Model for Information Security Vulnerability Awareness
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Roberto J. Mejías, Jim Greer, Gabrila C. Greer, et al.
Computers & Security (2025) Vol. 151, pp. 104305-104305
Closed Access
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, et al.
SAGE Open (2025) Vol. 15, Iss. 1
Open Access
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Unraveling the Role of Citizens' Concerns and Cognitive Appraisals in E‐Government Adoption: The Impact of Social Media and Trust
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises
Neeshe Khan, Steven Furnell, Maria Bada, et al.
Computers & Security (2025), pp. 104448-104448
Open Access
Neeshe Khan, Steven Furnell, Maria Bada, et al.
Computers & Security (2025), pp. 104448-104448
Open Access
A framework for cyber-risk insurance against ransomware: A mixed-method approach
Arunabha Mukhopadhyay, Swati Jain
International Journal of Information Management (2023) Vol. 74, pp. 102724-102724
Closed Access | Times Cited: 15
Arunabha Mukhopadhyay, Swati Jain
International Journal of Information Management (2023) Vol. 74, pp. 102724-102724
Closed Access | Times Cited: 15
Creatability, achievability, and immersibility: New game design elements that increase online game usage
Ching‐I Teng, Tzu-Ling Huang, Guanling Huang, et al.
International Journal of Information Management (2023) Vol. 75, pp. 102732-102732
Open Access | Times Cited: 14
Ching‐I Teng, Tzu-Ling Huang, Guanling Huang, et al.
International Journal of Information Management (2023) Vol. 75, pp. 102732-102732
Open Access | Times Cited: 14
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 4
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Computers & Security (2024) Vol. 141, pp. 103826-103826
Open Access | Times Cited: 4
Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains
Harpreet Kaur, Mahima Gupta, Surya Prakash Singh
International Journal of Production Economics (2024) Vol. 275, pp. 109338-109338
Closed Access | Times Cited: 4
Harpreet Kaur, Mahima Gupta, Surya Prakash Singh
International Journal of Production Economics (2024) Vol. 275, pp. 109338-109338
Closed Access | Times Cited: 4
Countermeasure Strategies to Address Cybersecurity Challenges Amidst Major Crises in the Higher Education and Research Sector: An Organisational Learning Perspective
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 3
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Information (2024) Vol. 15, Iss. 2, pp. 106-106
Open Access | Times Cited: 3
Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 3
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 3
Adapt or die: a competitive digital supply chain quality management strategy
Ai‐Fen Lim, Keng‐Boon Ooi, Garry Wei‐Han Tan, et al.
Journal of Enterprise Information Management (2022) Vol. 37, Iss. 2, pp. 698-720
Open Access | Times Cited: 16
Ai‐Fen Lim, Keng‐Boon Ooi, Garry Wei‐Han Tan, et al.
Journal of Enterprise Information Management (2022) Vol. 37, Iss. 2, pp. 698-720
Open Access | Times Cited: 16
VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 8
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, et al.
Information & Management (2023) Vol. 61, Iss. 1, pp. 103877-103877
Open Access | Times Cited: 8
Organizational information security threats: Status and challenges
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2
Cybersecurity in Accounting: Protecting Financial Data in the Digital Age
Muhammed Zakir Hossain, Fatema Tuj Johora
(2024)
Closed Access | Times Cited: 2
Muhammed Zakir Hossain, Fatema Tuj Johora
(2024)
Closed Access | Times Cited: 2
Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Joaquín Navajas, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2315-2331
Open Access | Times Cited: 2
Building a thematic framework of cybersecurity: a systematic literature review approach
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 2
Tze Yin Khaw, Azlan Amran, Ai Ping Teoh
Journal of Systems and Information Technology (2024) Vol. 26, Iss. 2, pp. 234-256
Closed Access | Times Cited: 2