OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
Anat Hovav, Frida Ferdani Putri
Pervasive and Mobile Computing (2016) Vol. 32, pp. 35-49
Closed Access | Times Cited: 66

Showing 1-25 of 66 citing articles:

Employees’ behavioural intention to smartphone security: A gender-based, cross-national study
Nisreen Ameen, Ali Tarhini, Mahmood Shah, et al.
Computers in Human Behavior (2019) Vol. 104, pp. 106184-106184
Open Access | Times Cited: 80

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies
Yves Barlette, Annabelle Jaouen, Paméla Baillette
International Journal of Information Management (2020) Vol. 56, pp. 102212-102212
Open Access | Times Cited: 55

BYOD Policy Compliance: Risks and Strategies in Organizations
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2020) Vol. 62, Iss. 1, pp. 61-72
Closed Access | Times Cited: 39

Security Education, Training, and Awareness Programs: Literature Review
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 34

Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
Paméla Baillette, Yves Barlette, Aurélie Leclercq‐Vandelannoitte
International Journal of Information Management (2018) Vol. 43, pp. 76-84
Closed Access | Times Cited: 40

Compliance with bring your own device security policies in organizations: A systematic literature review
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Computers & Security (2020) Vol. 98, pp. 101998-101998
Closed Access | Times Cited: 32

A Review of BYOD Security Challenges, Solutions and Policy Best Practices
Bashayer Alotaibi, Haya Almagwashi
(2018)
Closed Access | Times Cited: 31

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
Chalee Vorakulpipat, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, et al.
Security and Communication Networks (2017) Vol. 2017, pp. 1-11
Open Access | Times Cited: 29

Leveraging Bring Your Own Device for Mobility of Library Reference Services: The Nigerian Perspective
Adebowale Jeremy Adetayo
The Reference Librarian (2021) Vol. 62, Iss. 2, pp. 106-125
Closed Access | Times Cited: 20

Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue
Hao Chen, Ying Li, Lirong Chen, et al.
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 3, pp. 770-792
Closed Access | Times Cited: 23

Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT
Efpraxia D. Zamani, Athanasia Pouloudi
Information Systems Journal (2020) Vol. 31, Iss. 3, pp. 384-428
Open Access | Times Cited: 21

Impact of negative emotions on violations of information security policy and possible mitigations
Jie Zhen, Zongxiao Xie, Kunxiang Dong, et al.
Behaviour and Information Technology (2021) Vol. 41, Iss. 11, pp. 2342-2354
Closed Access | Times Cited: 18

BYOD security issues: a systematic literature review
Melva M. Ratchford, Omar El-Gayar, Cherie Noteboom, et al.
Information Security Journal A Global Perspective (2021) Vol. 31, Iss. 3, pp. 253-273
Closed Access | Times Cited: 18

Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet
Efpraxia D. Zamani, Athanasia Pouloudi, George M. Giaglis, et al.
Information Systems Frontiers (2020) Vol. 24, Iss. 1, pp. 97-119
Open Access | Times Cited: 19

Adoption of enterprise mobile systems – An alternative theoretical perspective
Praveen Choudhary, Susmi Routray, Parijat Upadhyay, et al.
International Journal of Information Management (2022) Vol. 67, pp. 102539-102539
Closed Access | Times Cited: 11

The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective
Siqi Hu, Carol Hsu, Zhongyun Zhou
Computers & Security (2021) Vol. 109, pp. 102404-102404
Closed Access | Times Cited: 15

Securing online accounts and assets: An examination of personal investments and protection motivation
Obi Ogbanufe
International Journal of Information Management (2022) Vol. 68, pp. 102590-102590
Closed Access | Times Cited: 10

Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
Martin Kang, Anat Hovav
Information Systems Frontiers (2018) Vol. 22, Iss. 1, pp. 221-242
Closed Access | Times Cited: 18

The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid
International Journal of Engineering & Technology (2018) Vol. 7, Iss. 2.29, pp. 737-737
Open Access | Times Cited: 16

Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case
Soohyun Jeon, Insoo Son, Jinyoung Han
Information Technology and People (2020) Vol. 34, Iss. 2, pp. 599-616
Closed Access | Times Cited: 14

Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, et al.
Information Technology and People (2024)
Closed Access | Times Cited: 1

A field experiment on ISP training designs for enhancing employee information security compliance
Ilja Nastjuk, Florian Rampold, Simon Trang, et al.
European Journal of Information Systems (2024), pp. 1-24
Closed Access | Times Cited: 1

sExplanatory and Predictive Modeling of Cybersecurity Behaviors using Protection Motivation Theory
U. V. Kiran, Naurin Farooq Khan, Hajra Murtaza, et al.
Computers & Security (2024) Vol. 149, pp. 104204-104204
Open Access | Times Cited: 1

MIGRANT
Nora Alkaldi, Karen Renaud
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2022) Vol. 53, Iss. 2, pp. 63-95
Open Access | Times Cited: 7

Mitigation Strategies for Unintentional Insider Threats on Information Leaks
Wan Basri Wan Ismail, Maryati Mohd Yusof
International Journal of Security and Its Applications (2018) Vol. 12, Iss. 1, pp. 37-46
Open Access | Times Cited: 12

Page 1 - Next Page

Scroll to top