
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Dealing with digital traces: Understanding protective behaviors on mobile devices
France Bélanger, Robert E. Crossler
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 34-49
Closed Access | Times Cited: 64
France Bélanger, Robert E. Crossler
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 34-49
Closed Access | Times Cited: 64
Showing 1-25 of 64 citing articles:
Responsibly strategizing with the metaverse: Business implications and DEI opportunities and challenges
Marco Marabelli, Sue Newell
The Journal of Strategic Information Systems (2023) Vol. 32, Iss. 2, pp. 101774-101774
Closed Access | Times Cited: 40
Marco Marabelli, Sue Newell
The Journal of Strategic Information Systems (2023) Vol. 32, Iss. 2, pp. 101774-101774
Closed Access | Times Cited: 40
Mobile users’ information privacy concerns and the role of app permission requests
Kenan Degirmenci
International Journal of Information Management (2019) Vol. 50, pp. 261-272
Open Access | Times Cited: 122
Kenan Degirmenci
International Journal of Information Management (2019) Vol. 50, pp. 261-272
Open Access | Times Cited: 122
Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective
Weiyin Hong, Frank K. Y. Chan, James Y.L. Thong
Journal of Business Ethics (2019) Vol. 168, Iss. 3, pp. 539-564
Open Access | Times Cited: 86
Weiyin Hong, Frank K. Y. Chan, James Y.L. Thong
Journal of Business Ethics (2019) Vol. 168, Iss. 3, pp. 539-564
Open Access | Times Cited: 86
<p>COVID-19 Contact-Tracing Technology: Acceptability and Ethical Issues of Use</p>
Sawsan Abuhammad, Omar F. Khabour, Karem H. Alzoubi
Patient Preference and Adherence (2020) Vol. Volume 14, pp. 1639-1647
Open Access | Times Cited: 83
Sawsan Abuhammad, Omar F. Khabour, Karem H. Alzoubi
Patient Preference and Adherence (2020) Vol. Volume 14, pp. 1639-1647
Open Access | Times Cited: 83
Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app
Jiesen Lin, Lemuria Carter, Dapeng Liu
European Journal of Information Systems (2021), pp. 1-14
Closed Access | Times Cited: 72
Jiesen Lin, Lemuria Carter, Dapeng Liu
European Journal of Information Systems (2021), pp. 1-14
Closed Access | Times Cited: 72
Why would you use medical chatbots? interview and survey
I‐Chiu Chang, Yi-Syuan Shih, Kuang-Ming Kuo
International Journal of Medical Informatics (2022) Vol. 165, pp. 104827-104827
Closed Access | Times Cited: 47
I‐Chiu Chang, Yi-Syuan Shih, Kuang-Ming Kuo
International Journal of Medical Informatics (2022) Vol. 165, pp. 104827-104827
Closed Access | Times Cited: 47
IT’s a matter of trust: Literature reviews and analyses of human trust in information technology
Mary C. Lacity, Sebastian Schuetz, Le Kuai, et al.
Journal of Information Technology (2024)
Closed Access | Times Cited: 10
Mary C. Lacity, Sebastian Schuetz, Le Kuai, et al.
Journal of Information Technology (2024)
Closed Access | Times Cited: 10
Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps
Cong Duc Tran, Tin Trung Nguyen
Technology in Society (2021) Vol. 67, pp. 101755-101755
Open Access | Times Cited: 50
Cong Duc Tran, Tin Trung Nguyen
Technology in Society (2021) Vol. 67, pp. 101755-101755
Open Access | Times Cited: 50
An integrated model of artificially intelligent (AI) facial recognition technology adoption based on perceived risk theory and extended TPB: a comparative analysis of US and South Korea
Jinsoo Hwang, Jungsun Kim, Kyuhyeon Joo, et al.
Journal of Hospitality Marketing & Management (2024) Vol. 33, Iss. 8, pp. 1071-1099
Closed Access | Times Cited: 6
Jinsoo Hwang, Jungsun Kim, Kyuhyeon Joo, et al.
Journal of Hospitality Marketing & Management (2024) Vol. 33, Iss. 8, pp. 1071-1099
Closed Access | Times Cited: 6
From panopticon to heautopticon: A new form of surveillance introduced by quantified‐self practices
Jean‐François De Moya, Jessie Pallud
Information Systems Journal (2020) Vol. 30, Iss. 6, pp. 940-976
Closed Access | Times Cited: 46
Jean‐François De Moya, Jessie Pallud
Information Systems Journal (2020) Vol. 30, Iss. 6, pp. 940-976
Closed Access | Times Cited: 46
BYOD Policy Compliance: Risks and Strategies in Organizations
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 61-72
Closed Access | Times Cited: 39
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 61-72
Closed Access | Times Cited: 39
Unfolding the popularity of video conferencing apps – A privacy calculus perspective
Ramandeep Kaur Sandhu, João Vasconcelos-Gomes, Manoj A. Thomas, et al.
International Journal of Information Management (2022) Vol. 68, pp. 102569-102569
Open Access | Times Cited: 23
Ramandeep Kaur Sandhu, João Vasconcelos-Gomes, Manoj A. Thomas, et al.
International Journal of Information Management (2022) Vol. 68, pp. 102569-102569
Open Access | Times Cited: 23
Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms
Liangmin Wang, Hantao Mei, Victor S. Sheng
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 2, pp. 1079-1088
Closed Access | Times Cited: 32
Liangmin Wang, Hantao Mei, Victor S. Sheng
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 2, pp. 1079-1088
Closed Access | Times Cited: 32
Compliance with bring your own device security policies in organizations: A systematic literature review
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 32
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 32
The roles of privacy concerns and trust in voluntary use of governmental proximity tracing applications
Marina Trkman, Aleš Popovič, Peter Trkman
Government Information Quarterly (2022) Vol. 40, Iss. 1, pp. 101787-101787
Open Access | Times Cited: 21
Marina Trkman, Aleš Popovič, Peter Trkman
Government Information Quarterly (2022) Vol. 40, Iss. 1, pp. 101787-101787
Open Access | Times Cited: 21
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17
Disclosure decisions and the moderating effects of privacy feedback and choice
Bailing Liu, Caroline Lancelot Miltgen, Huimin Xia
Decision Support Systems (2022) Vol. 155, pp. 113717-113717
Open Access | Times Cited: 16
Bailing Liu, Caroline Lancelot Miltgen, Huimin Xia
Decision Support Systems (2022) Vol. 155, pp. 113717-113717
Open Access | Times Cited: 16
Research on the influence mechanism of privacy invasion experiences with privacy protection intentions in social media contexts: Regulatory focus as the moderator
Subai Chen, Chenyu Gu, Juan Wei, et al.
Frontiers in Psychology (2023) Vol. 13
Open Access | Times Cited: 10
Subai Chen, Chenyu Gu, Juan Wei, et al.
Frontiers in Psychology (2023) Vol. 13
Open Access | Times Cited: 10
Do (Not!) Track Me: Relationship Between Willingness to Participate and Sample Composition in Online Information Behavior Tracking Research
Teresa Gil‐López, Clara Christner, Ernesto de León, et al.
Social Science Computer Review (2023) Vol. 41, Iss. 6, pp. 2274-2292
Closed Access | Times Cited: 10
Teresa Gil‐López, Clara Christner, Ernesto de León, et al.
Social Science Computer Review (2023) Vol. 41, Iss. 6, pp. 2274-2292
Closed Access | Times Cited: 10
Perceived benefits as a driver and necessary condition for the willingness of air passengers to provide personal data for non-mandatory digital services at airports
Deodat Mwesiumo, Nigel Halpern, Svein Bråthen, et al.
Transportation Research Part A Policy and Practice (2023) Vol. 171, pp. 103659-103659
Open Access | Times Cited: 9
Deodat Mwesiumo, Nigel Halpern, Svein Bråthen, et al.
Transportation Research Part A Policy and Practice (2023) Vol. 171, pp. 103659-103659
Open Access | Times Cited: 9
Research on Privacy Disclosure Behavior of Mobile App Users from Perspectives of Online Social Support and Gender Differences
Chengyi Le, Zhenjun Zhang, Yan Liu
International Journal of Human-Computer Interaction (2024), pp. 1-15
Closed Access | Times Cited: 3
Chengyi Le, Zhenjun Zhang, Yan Liu
International Journal of Human-Computer Interaction (2024), pp. 1-15
Closed Access | Times Cited: 3
Research on the Antecedents of Data Privacy Concern Toward Intelligent Connected Vehicles
Kexin Cai, Zhiyuan Yu
International Journal of Human-Computer Interaction (2024), pp. 1-14
Closed Access | Times Cited: 3
Kexin Cai, Zhiyuan Yu
International Journal of Human-Computer Interaction (2024), pp. 1-14
Closed Access | Times Cited: 3
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15
Karl van der Schyff, Stephen Flowerday
Computers & Security (2022) Vol. 126, pp. 103071-103071
Open Access | Times Cited: 15
Watchers, Watched, and Watching in the Digital Age: Reconceptualization of Information Technology Monitoring as Complex Action Nets
Aljona Zorina, France Bélanger, Nanda Kumar, et al.
Organization Science (2021) Vol. 32, Iss. 6, pp. 1571-1596
Open Access | Times Cited: 19
Aljona Zorina, France Bélanger, Nanda Kumar, et al.
Organization Science (2021) Vol. 32, Iss. 6, pp. 1571-1596
Open Access | Times Cited: 19
Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information
Yi Yong Lee, Chin Lay Gan, Tze Wei Liew
International Journal of Environmental Research and Public Health (2023) Vol. 20, Iss. 4, pp. 3514-3514
Open Access | Times Cited: 7
Yi Yong Lee, Chin Lay Gan, Tze Wei Liew
International Journal of Environmental Research and Public Health (2023) Vol. 20, Iss. 4, pp. 3514-3514
Open Access | Times Cited: 7