
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
Showing 1-25 of 73 citing articles:
Hormone Measurements in the Research Field of Interruption Science: Review of Applied Methods
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 95-114
Closed Access | Times Cited: 2
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 95-114
Closed Access | Times Cited: 2
Autonomic Nervous System Activity Measurements in the Research Field of Interruption Science: Insights into Applied Methods
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 47-69
Closed Access | Times Cited: 2
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 47-69
Closed Access | Times Cited: 2
Brain Imaging Methods in the Research Field of Interruption Science: An Analysis of Applied Methods
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 71-93
Closed Access | Times Cited: 2
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2025), pp. 71-93
Closed Access | Times Cited: 2
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Appealing to Sense and Sensibility: System 1 and System 2 Interventions for Fake News on Social Media
Patricia Moravec, Antino Kim, Alan R. Dennis
Information Systems Research (2020) Vol. 31, Iss. 3, pp. 987-1006
Open Access | Times Cited: 121
Patricia Moravec, Antino Kim, Alan R. Dennis
Information Systems Research (2020) Vol. 31, Iss. 3, pp. 987-1006
Open Access | Times Cited: 121
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable
Jeffrey Jenkins, Bonnie Brinton Anderson, Anthony Vance, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 880-896
Open Access | Times Cited: 113
Jeffrey Jenkins, Bonnie Brinton Anderson, Anthony Vance, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 880-896
Open Access | Times Cited: 113
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments
Anthony Vance, Jeffrey Jenkins, Bonnie Brinton Anderson, et al.
MIS Quarterly (2018) Vol. 42, Iss. 2, pp. 355-380
Open Access | Times Cited: 92
Anthony Vance, Jeffrey Jenkins, Bonnie Brinton Anderson, et al.
MIS Quarterly (2018) Vol. 42, Iss. 2, pp. 355-380
Open Access | Times Cited: 92
Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 90
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 90
Advancing a NeuroIS research agenda with four areas of societal contributions
Jan vom Brocke, Alan R. Hevner, Pierre Majorique Léger, et al.
European Journal of Information Systems (2020) Vol. 29, Iss. 1, pp. 9-24
Open Access | Times Cited: 78
Jan vom Brocke, Alan R. Hevner, Pierre Majorique Léger, et al.
European Journal of Information Systems (2020) Vol. 29, Iss. 1, pp. 9-24
Open Access | Times Cited: 78
A Decade of NeuroIS Research
René Riedl, Thomas Fischer, Pierre‐Majorique Léger, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2020) Vol. 51, Iss. 3, pp. 13-54
Closed Access | Times Cited: 74
René Riedl, Thomas Fischer, Pierre‐Majorique Léger, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2020) Vol. 51, Iss. 3, pp. 13-54
Closed Access | Times Cited: 74
Questioning Racial and Gender Bias in AI-based Recommendations: Do Espoused National Cultural Values Matter?
Manjul Gupta, Carlos M. Parra, Denis Dennehy
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1465-1481
Open Access | Times Cited: 69
Manjul Gupta, Carlos M. Parra, Denis Dennehy
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1465-1481
Open Access | Times Cited: 69
Neurophysiological Measurements in the Research Field of Interruption Science: Insights into Applied Methods for Different Interruption Types Based on an Umbrella Review
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2024), pp. 123-152
Closed Access | Times Cited: 8
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2024), pp. 123-152
Closed Access | Times Cited: 8
Eyes wide open: The role of situational information security awareness for security‐related behaviour
Lennart Jaeger, Andreas Eckhardt
Information Systems Journal (2020) Vol. 31, Iss. 3, pp. 429-472
Closed Access | Times Cited: 65
Lennart Jaeger, Andreas Eckhardt
Information Systems Journal (2020) Vol. 31, Iss. 3, pp. 429-472
Closed Access | Times Cited: 65
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites
Ahmed Abbasi, David G. Dobolyi, Anthony Vance, et al.
Information Systems Research (2021) Vol. 32, Iss. 2, pp. 410-436
Closed Access | Times Cited: 50
Ahmed Abbasi, David G. Dobolyi, Anthony Vance, et al.
Information Systems Research (2021) Vol. 32, Iss. 2, pp. 410-436
Closed Access | Times Cited: 50
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7
Enhancing information security compliance behavior through knowledge interventions: insights from EEG
Zhiying Wang, Hangyu Deng, Guiyun Li
Information and Computer Security (2025)
Closed Access
Zhiying Wang, Hangyu Deng, Guiyun Li
Information and Computer Security (2025)
Closed Access
XAI-Supported Decision-Making: Insights from NeuroIS Studies for a User Perspective
Yulia Litvinova, Ksenia Keplinger
Lecture notes in information systems and organisation (2025), pp. 157-177
Closed Access
Yulia Litvinova, Ksenia Keplinger
Lecture notes in information systems and organisation (2025), pp. 157-177
Closed Access
From Peaks to Preferences: Exploring Skin Conductance in Online Hotel Selection Decisions—A Neurophysiological Investigation
Stefan Eibl, Thomas Kalischko, Andreas Auinger
Lecture notes in information systems and organisation (2025), pp. 211-221
Closed Access
Stefan Eibl, Thomas Kalischko, Andreas Auinger
Lecture notes in information systems and organisation (2025), pp. 211-221
Closed Access
Smishing: Exploring How Different Persuasion Techniques Influence Users Emotions, Cognitions, and Identification Accuracy
Nour El Shamy, Xie Wei, Chen Zhong
Lecture notes in information systems and organisation (2025), pp. 345-355
Closed Access
Nour El Shamy, Xie Wei, Chen Zhong
Lecture notes in information systems and organisation (2025), pp. 345-355
Closed Access
Attention Adjustment, Renewal, and Equilibrium Seeking in Online Search: An Eye-Tracking Approach
Jae‐Hyeon Ahn, Yoon-Soo Bae, Jaehyeon Ju, et al.
Journal of Management Information Systems (2018) Vol. 35, Iss. 4, pp. 1218-1250
Closed Access | Times Cited: 52
Jae‐Hyeon Ahn, Yoon-Soo Bae, Jaehyeon Ju, et al.
Journal of Management Information Systems (2018) Vol. 35, Iss. 4, pp. 1218-1250
Closed Access | Times Cited: 52
Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 45
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 45
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools
Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103394-103394
Open Access | Times Cited: 41
Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103394-103394
Open Access | Times Cited: 41
Tracking the Unseen and Unaware: Deciphering Controllers’ Detection Failures to Warnings Through Eye-Tracking Metrics
Zhimin Li, Fan Li, Mengtao Lyu
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
Zhimin Li, Fan Li, Mengtao Lyu
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access
NeuroIS: A Systematic Review of NeuroIS Through Bibliometric Analysis
Nahid Entezarian, Rouhollah Bagheri, Javad Rezazadeh, et al.
Metrics (2025) Vol. 2, Iss. 1, pp. 4-4
Open Access
Nahid Entezarian, Rouhollah Bagheri, Javad Rezazadeh, et al.
Metrics (2025) Vol. 2, Iss. 1, pp. 4-4
Open Access
Familiarity with Internet threats: Beyond awareness
Debora Jeske, Paul van Schaik
Computers & Security (2017) Vol. 66, pp. 129-141
Open Access | Times Cited: 44
Debora Jeske, Paul van Schaik
Computers & Security (2017) Vol. 66, pp. 129-141
Open Access | Times Cited: 44