
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Xiaofeng Chen, Dazhong Wu, Liqiang Chen, et al.
Information & Management (2018) Vol. 55, Iss. 8, pp. 1049-1060
Closed Access | Times Cited: 76
Showing 1-25 of 76 citing articles:
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 89
Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management (2020) Vol. 54, pp. 102152-102152
Closed Access | Times Cited: 89
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 81
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 81
Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80
What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 32
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 32
Peers matter: The moderating role of social influence on information security policy compliance
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 64
Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang
Information Systems Journal (2020) Vol. 30, Iss. 5, pp. 791-844
Closed Access | Times Cited: 64
Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry
Murilo Catussi Almeida, Adilson Carlos Yoshikuni, Rajeev Dwivedi, et al.
Global Journal of Flexible Systems Management (2022) Vol. 23, Iss. 4, pp. 535-550
Closed Access | Times Cited: 30
Murilo Catussi Almeida, Adilson Carlos Yoshikuni, Rajeev Dwivedi, et al.
Global Journal of Flexible Systems Management (2022) Vol. 23, Iss. 4, pp. 535-550
Closed Access | Times Cited: 30
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers
Joseph K. Nwankpa, Pratim Datta
Computers & Security (2023) Vol. 130, pp. 103266-103266
Closed Access | Times Cited: 19
Joseph K. Nwankpa, Pratim Datta
Computers & Security (2023) Vol. 130, pp. 103266-103266
Closed Access | Times Cited: 19
Understanding the state of criminological scholarship on cybercrimes
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 23
Thomas J. Holt
Computers in Human Behavior (2022) Vol. 139, pp. 107493-107493
Closed Access | Times Cited: 23
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption
Xiaoling Jin, Zhongyun Zhou, Yiwei Tian
Journal of Business Ethics (2020) Vol. 175, Iss. 1, pp. 135-166
Closed Access | Times Cited: 37
Xiaoling Jin, Zhongyun Zhou, Yiwei Tian
Journal of Business Ethics (2020) Vol. 175, Iss. 1, pp. 135-166
Closed Access | Times Cited: 37
Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 27
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 27
Information Security Policy Compliance: Systematic Literature Review
Angraini Angraini, Rose Alinda Alias, Okfalisa
Procedia Computer Science (2019) Vol. 161, pp. 1216-1224
Open Access | Times Cited: 31
Angraini Angraini, Rose Alinda Alias, Okfalisa
Procedia Computer Science (2019) Vol. 161, pp. 1216-1224
Open Access | Times Cited: 31
The influence of hardiness and habit on security behaviour intention
Queen A. Aigbefo, Yvette Blount, Mauricio Marrone
Behaviour and Information Technology (2020) Vol. 41, Iss. 6, pp. 1151-1170
Closed Access | Times Cited: 28
Queen A. Aigbefo, Yvette Blount, Mauricio Marrone
Behaviour and Information Technology (2020) Vol. 41, Iss. 6, pp. 1151-1170
Closed Access | Times Cited: 28
Curbing cyberloafing: studying general and specific deterrence effects with field evidence
Przemysław Hensel, Agnieszka Kacprzak
European Journal of Information Systems (2020) Vol. 30, Iss. 2, pp. 219-235
Closed Access | Times Cited: 27
Przemysław Hensel, Agnieszka Kacprzak
European Journal of Information Systems (2020) Vol. 30, Iss. 2, pp. 219-235
Closed Access | Times Cited: 27
Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 18
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 18
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Mikko Siponen, Wael Soliman, Anthony Vance
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2022) Vol. 53, Iss. 1, pp. 25-60
Open Access | Times Cited: 16
Mikko Siponen, Wael Soliman, Anthony Vance
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2022) Vol. 53, Iss. 1, pp. 25-60
Open Access | Times Cited: 16
“Standardizing information security – a structurational analysis”
Annika Andersson, Karin Hedström, Fredrik Karlsson
Information & Management (2022) Vol. 59, Iss. 3, pp. 103623-103623
Open Access | Times Cited: 16
Annika Andersson, Karin Hedström, Fredrik Karlsson
Information & Management (2022) Vol. 59, Iss. 3, pp. 103623-103623
Open Access | Times Cited: 16
Cybersecurity as a Competitive Advantage for Entrepreneurs
Nangamso Mmango, Tapiwa Gundu
Communications in computer and information science (2024), pp. 374-387
Closed Access | Times Cited: 3
Nangamso Mmango, Tapiwa Gundu
Communications in computer and information science (2024), pp. 374-387
Closed Access | Times Cited: 3
Exploring the Factors Influencing Information Security Policy Compliance and Violations: A Systematic Literature Review
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 3
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 3
Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks
Bora Kim, Do-Yeon Lee, Beomsoo Kim
Behaviour and Information Technology (2019) Vol. 39, Iss. 11, pp. 1156-1175
Closed Access | Times Cited: 27
Bora Kim, Do-Yeon Lee, Beomsoo Kim
Behaviour and Information Technology (2019) Vol. 39, Iss. 11, pp. 1156-1175
Closed Access | Times Cited: 27
Systematic Literature Review of Information Security Compliance Behaviour Theories
Puspadevi Kuppusamy, Ganthan Narayana Samy, Nurazean Maarop, et al.
Journal of Physics Conference Series (2020) Vol. 1551, Iss. 1, pp. 012005-012005
Open Access | Times Cited: 25
Puspadevi Kuppusamy, Ganthan Narayana Samy, Nurazean Maarop, et al.
Journal of Physics Conference Series (2020) Vol. 1551, Iss. 1, pp. 012005-012005
Open Access | Times Cited: 25
Can financial incentives help with the struggle for security policy compliance?
Sanjay Goel, Kevin J. Williams, Jingyi Huang, et al.
Information & Management (2021) Vol. 58, Iss. 4, pp. 103447-103447
Open Access | Times Cited: 21
Sanjay Goel, Kevin J. Williams, Jingyi Huang, et al.
Information & Management (2021) Vol. 58, Iss. 4, pp. 103447-103447
Open Access | Times Cited: 21
A neo-institutional perspective on the establishment of information security knowledge sharing practices
Farkhondeh Hassandoust, Subasinghage Maduka Nuwangi, Allen C. Johnston
Information & Management (2021) Vol. 59, Iss. 1, pp. 103574-103574
Closed Access | Times Cited: 20
Farkhondeh Hassandoust, Subasinghage Maduka Nuwangi, Allen C. Johnston
Information & Management (2021) Vol. 59, Iss. 1, pp. 103574-103574
Closed Access | Times Cited: 20
Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender
Chenhui Liu, Huigang Liang, Nengmin Wang, et al.
Information Technology and People (2021) Vol. 35, Iss. 2, pp. 802-834
Closed Access | Times Cited: 18
Chenhui Liu, Huigang Liang, Nengmin Wang, et al.
Information Technology and People (2021) Vol. 35, Iss. 2, pp. 802-834
Closed Access | Times Cited: 18
Impact of negative emotions on violations of information security policy and possible mitigations
Jie Zhen, Zongxiao Xie, Kunxiang Dong, et al.
Behaviour and Information Technology (2021) Vol. 41, Iss. 11, pp. 2342-2354
Closed Access | Times Cited: 18
Jie Zhen, Zongxiao Xie, Kunxiang Dong, et al.
Behaviour and Information Technology (2021) Vol. 41, Iss. 11, pp. 2342-2354
Closed Access | Times Cited: 18