
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A systematic review of multi perspectives on human cybersecurity behavior
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
Technology in Society (2023) Vol. 73, pp. 102258-102258
Closed Access | Times Cited: 40
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran, et al.
Technology in Society (2023) Vol. 73, pp. 102258-102258
Closed Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
Drivers of generative artificial intelligence to fostering exploitative and exploratory innovation: A TOE framework
Ayman Wael Al‐Khatib
Technology in Society (2023) Vol. 75, pp. 102403-102403
Closed Access | Times Cited: 47
Ayman Wael Al‐Khatib
Technology in Society (2023) Vol. 75, pp. 102403-102403
Closed Access | Times Cited: 47
Unlocking the potential of cybersecurity behavior in the metaverse: Overview, opportunities, challenges, and future research agendas
Mostafa Al‐Emran, Muhammet Deveci
Technology in Society (2024) Vol. 77, pp. 102498-102498
Closed Access | Times Cited: 14
Mostafa Al‐Emran, Muhammet Deveci
Technology in Society (2024) Vol. 77, pp. 102498-102498
Closed Access | Times Cited: 14
The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 14
Byung‐Jik Kim, Min‐Jik Kim
Technology in Society (2024) Vol. 77, pp. 102543-102543
Closed Access | Times Cited: 14
Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 26
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 26
Chatbot Adoption: A Multiperspective Systematic Review and Future Research Agenda
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10232-10244
Closed Access | Times Cited: 24
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 10232-10244
Closed Access | Times Cited: 24
Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises
Tran Duc Le, Thang Le Dinh, Sylvestre Uwizeyemungu
Technology in Society (2024) Vol. 76, pp. 102470-102470
Closed Access | Times Cited: 9
Tran Duc Le, Thang Le Dinh, Sylvestre Uwizeyemungu
Technology in Society (2024) Vol. 76, pp. 102470-102470
Closed Access | Times Cited: 9
Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 7
Byung‐Jik Kim, Min-Jik Kim, Julak Lee
Current Psychology (2024) Vol. 43, Iss. 19, pp. 17146-17162
Closed Access | Times Cited: 7
Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 5
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi, et al.
Computers in Human Behavior (2024) Vol. 159, pp. 108315-108315
Closed Access | Times Cited: 5
Enhancing information security compliance behavior through knowledge interventions: insights from EEG
Zhiying Wang, Hangyu Deng, Guiyun Li
Information and Computer Security (2025)
Closed Access
Zhiying Wang, Hangyu Deng, Guiyun Li
Information and Computer Security (2025)
Closed Access
Response-efficacy messages produce stronger passwords than self-efficacy messages… for now: A longitudinal experimental study of the efficacy of coping message types on password creation behaviour
Judit Simon, Steve Watson, Iris van Sintemaartensdijk
Computers in Human Behavior Reports (2025), pp. 100615-100615
Open Access
Judit Simon, Steve Watson, Iris van Sintemaartensdijk
Computers in Human Behavior Reports (2025), pp. 100615-100615
Open Access
The impact of corporate social responsibility on cybersecurity behavior: The crucial role of organizationally-prescribed perfectionism
Byung‐Jik Kim, Julak Lee
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Byung‐Jik Kim, Julak Lee
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran, et al.
Online Information Review (2025)
Closed Access
What drives new knowledge in human cybersecurity behavior? Insights from bibliometrics and thematic review
Dragoș M. Obreja, Răzvan Rughiniş, Dinu Țurcanu
Computers in Human Behavior Reports (2025), pp. 100650-100650
Open Access
Dragoș M. Obreja, Răzvan Rughiniş, Dinu Țurcanu
Computers in Human Behavior Reports (2025), pp. 100650-100650
Open Access
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
Samanta Mikuletič, Simon Vrhovec, Brigita Skela‐Savič, et al.
Computers & Security (2023) Vol. 136, pp. 103489-103489
Open Access | Times Cited: 13
Samanta Mikuletič, Simon Vrhovec, Brigita Skela‐Savič, et al.
Computers & Security (2023) Vol. 136, pp. 103489-103489
Open Access | Times Cited: 13
Exploring the economic role of cybersecurity in SMEs: A case study of the UK
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Technology in Society (2024) Vol. 78, pp. 102670-102670
Open Access | Times Cited: 4
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Technology in Society (2024) Vol. 78, pp. 102670-102670
Open Access | Times Cited: 4
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Human Factors in Cybersecurity
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud
Arif Perdana, Hee Jhee Jiow
Telematics and Informatics (2024), pp. 102191-102191
Open Access | Times Cited: 2
Arif Perdana, Hee Jhee Jiow
Telematics and Informatics (2024), pp. 102191-102191
Open Access | Times Cited: 2
Mitigating the Impact of Work Overload on Cybersecurity Behavior: The Moderating Influence of Corporate Ethics—A Mediated Moderation Analysis
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4
Yunsook Hong, Min‐Jik Kim, Taewoo Roh
Sustainability (2023) Vol. 15, Iss. 19, pp. 14327-14327
Open Access | Times Cited: 4
Examining the Factors That Influence User Information Security Behavior toward COVID-19 Scams
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4
Ahlam Al-Balushi, Ali Tarhini, Fulya Açikgöz, et al.
International Journal of Human-Computer Interaction (2023), pp. 1-18
Closed Access | Times Cited: 4
Behavior Types from Cybersecurity Perspective: An Overview
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1
Afrah Almansoori
Studies in computational intelligence (2024), pp. 203-215
Closed Access | Times Cited: 1
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Morgan Djotaroeno, Erik Beulen
Information (2024) Vol. 15, Iss. 8, pp. 505-505
Open Access | Times Cited: 1
Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Security challenges in civil registration: safeguarding vital information in an evolving landscape
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2