
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A new perspective on neutralization and deterrence: Predicting shadow IT usage
Mario Silić, Jordan B. Barlow, Andrea Bäck
Information & Management (2017) Vol. 54, Iss. 8, pp. 1023-1037
Closed Access | Times Cited: 85
Mario Silić, Jordan B. Barlow, Andrea Bäck
Information & Management (2017) Vol. 54, Iss. 8, pp. 1023-1037
Closed Access | Times Cited: 85
Showing 1-25 of 85 citing articles:
Cultural drivers behind employees neutralizing deviant information systems security behaviors
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 1
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
Journal of Knowledge Management (2025)
Closed Access | Times Cited: 1
Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 90
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 90
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 80
John D’Arcy, Pei‐Lee Teh
Information & Management (2019) Vol. 56, Iss. 7, pp. 103151-103151
Closed Access | Times Cited: 80
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Peers matter: The moderating role of social influence on information security policy compliance
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 64
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 64
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 52
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1240-1259
Closed Access | Times Cited: 52
When does social desirability become a problem? Detection and reduction of social desirability bias in information systems research
Dong-Heon Kwak, Xiao Ma, Sumin Kim
Information & Management (2021) Vol. 58, Iss. 7, pp. 103500-103500
Closed Access | Times Cited: 40
Dong-Heon Kwak, Xiao Ma, Sumin Kim
Information & Management (2021) Vol. 58, Iss. 7, pp. 103500-103500
Closed Access | Times Cited: 40
Information security policies compliance in a global setting: An employee's perspective
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 16
Mansour Naser Alraja, Usman Javed Butt, Maysam Abbod
Computers & Security (2023) Vol. 129, pp. 103208-103208
Open Access | Times Cited: 16
Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review
Stefan Klotz, Andreas Kopper, Markus Westner, et al.
Deleted Journal (2022) Vol. 7, Iss. 1, pp. 15-43
Open Access | Times Cited: 24
Stefan Klotz, Andreas Kopper, Markus Westner, et al.
Deleted Journal (2022) Vol. 7, Iss. 1, pp. 15-43
Open Access | Times Cited: 24
Reconsidering Neutralization Techniques in behavioral Cybersecurity as Cybersecurity Hygiene Discounting
Mikko Siponen, Volkan Topalli, Wael Soliman, et al.
Computers & Security (2025), pp. 104306-104306
Closed Access
Mikko Siponen, Volkan Topalli, Wael Soliman, et al.
Computers & Security (2025), pp. 104306-104306
Closed Access
The thrust and drag forces affecting norm violation in live streaming eCommerce
Yu-Ting Chang-Chien, Kuang‐Ting Cheng, Jack Shih‐Chieh Hsu, et al.
Electronic Commerce Research and Applications (2025), pp. 101478-101478
Closed Access
Yu-Ting Chang-Chien, Kuang‐Ting Cheng, Jack Shih‐Chieh Hsu, et al.
Electronic Commerce Research and Applications (2025), pp. 101478-101478
Closed Access
Continuance intention to use mobile fitness applications: the role of switching costs, guilt and neutralization techniques
Rasha Najib Aljabali, Norasnita Ahmad, Weisheng Chiu
International Journal of Sports Marketing and Sponsorship (2025)
Closed Access
Rasha Najib Aljabali, Norasnita Ahmad, Weisheng Chiu
International Journal of Sports Marketing and Sponsorship (2025)
Closed Access
The Role of Collectivism, Power Distance, and Neutralization Techniques on Deviant Information Security Behavior
Yimer Mohammed, Merrill Warkentin, Chinju Paul, et al.
Technology in Society (2025), pp. 102857-102857
Closed Access
Yimer Mohammed, Merrill Warkentin, Chinju Paul, et al.
Technology in Society (2025), pp. 102857-102857
Closed Access
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
Mikko Siponen, Petri Puhakainen, Anthony Vance
Computers & Security (2019) Vol. 88, pp. 101617-101617
Open Access | Times Cited: 42
Mikko Siponen, Petri Puhakainen, Anthony Vance
Computers & Security (2019) Vol. 88, pp. 101617-101617
Open Access | Times Cited: 42
A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption
Xiaoling Jin, Zhongyun Zhou, Yiwei Tian
Journal of Business Ethics (2020) Vol. 175, Iss. 1, pp. 135-166
Closed Access | Times Cited: 37
Xiaoling Jin, Zhongyun Zhou, Yiwei Tian
Journal of Business Ethics (2020) Vol. 175, Iss. 1, pp. 135-166
Closed Access | Times Cited: 37
Aligning the IT portfolio with business strategy: Evidence for complementarity of corporate and business unit alignment
Magno Queiroz, Paul P. Tallon, Tim Coltman, et al.
The Journal of Strategic Information Systems (2020) Vol. 29, Iss. 3, pp. 101623-101623
Closed Access | Times Cited: 34
Magno Queiroz, Paul P. Tallon, Tim Coltman, et al.
The Journal of Strategic Information Systems (2020) Vol. 29, Iss. 3, pp. 101623-101623
Closed Access | Times Cited: 34
Compliance with bring your own device security policies in organizations: A systematic literature review
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 32
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 32
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context
Mario Sillic
Computers & Security (2018) Vol. 80, pp. 108-119
Closed Access | Times Cited: 37
Mario Sillic
Computers & Security (2018) Vol. 80, pp. 108-119
Closed Access | Times Cited: 37
Curbing cyberloafing: studying general and specific deterrence effects with field evidence
Przemysław Hensel, Agnieszka Kacprzak
European Journal of Information Systems (2020) Vol. 30, Iss. 2, pp. 219-235
Closed Access | Times Cited: 27
Przemysław Hensel, Agnieszka Kacprzak
European Journal of Information Systems (2020) Vol. 30, Iss. 2, pp. 219-235
Closed Access | Times Cited: 27
Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 18
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 18
Why cyberloafing can be socially learned in the workplace: the role of employees' perceived certainty of formal and informal sanctions
Jinnan Wu, Mengmeng Song, Pablo Zoghbi‐Manrique‐de‐Lara, et al.
Information Technology and People (2022) Vol. 36, Iss. 4, pp. 1603-1625
Open Access | Times Cited: 16
Jinnan Wu, Mengmeng Song, Pablo Zoghbi‐Manrique‐de‐Lara, et al.
Information Technology and People (2022) Vol. 36, Iss. 4, pp. 1603-1625
Open Access | Times Cited: 16
I want it my way: Using consumerism and neutralization theory to understand students’ cyberslacking behavior
Shwadhin Sharma
International Journal of Information Management (2020) Vol. 53, pp. 102131-102131
Closed Access | Times Cited: 26
Shwadhin Sharma
International Journal of Information Management (2020) Vol. 53, pp. 102131-102131
Closed Access | Times Cited: 26
The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis
Lennart Jaeger, Andreas Eckhardt, Julia Kroenung
Information & Management (2020) Vol. 58, Iss. 3, pp. 103318-103318
Closed Access | Times Cited: 26
Lennart Jaeger, Andreas Eckhardt, Julia Kroenung
Information & Management (2020) Vol. 58, Iss. 3, pp. 103318-103318
Closed Access | Times Cited: 26
That's not my fault: Excuses given by players exhibiting in-game intra-team aggressive behavior in online games
Wee-Kheng Tan, Luming Chen
Computers in Human Behavior (2021) Vol. 127, pp. 107045-107045
Closed Access | Times Cited: 22
Wee-Kheng Tan, Luming Chen
Computers in Human Behavior (2021) Vol. 127, pp. 107045-107045
Closed Access | Times Cited: 22
Beyond anger: A neutralization perspective of customer revenge
Chaofan Yang, Yongqiang Sun, Xiao‐Liang Shen
Journal of Business Research (2022) Vol. 146, pp. 363-374
Closed Access | Times Cited: 15
Chaofan Yang, Yongqiang Sun, Xiao‐Liang Shen
Journal of Business Research (2022) Vol. 146, pp. 363-374
Closed Access | Times Cited: 15