OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73

Showing 1-25 of 73 citing articles:

Hormone Measurements in the Research Field of Interruption Science: Review of Applied Methods
Fabian J. Stangl, René Riedl‬
Lecture notes in information systems and organisation (2025), pp. 95-114
Closed Access | Times Cited: 2

Autonomic Nervous System Activity Measurements in the Research Field of Interruption Science: Insights into Applied Methods
Fabian J. Stangl, René Riedl‬
Lecture notes in information systems and organisation (2025), pp. 47-69
Closed Access | Times Cited: 2

Brain Imaging Methods in the Research Field of Interruption Science: An Analysis of Applied Methods
Fabian J. Stangl, René Riedl‬
Lecture notes in information systems and organisation (2025), pp. 71-93
Closed Access | Times Cited: 2

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151

Appealing to Sense and Sensibility: System 1 and System 2 Interventions for Fake News on Social Media
Patricia Moravec, Antino Kim, Alan R. Dennis
Information Systems Research (2020) Vol. 31, Iss. 3, pp. 987-1006
Open Access | Times Cited: 121

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable
Jeffrey Jenkins, Bonnie Brinton Anderson, Anthony Vance, et al.
Information Systems Research (2016) Vol. 27, Iss. 4, pp. 880-896
Open Access | Times Cited: 113

Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments
Anthony Vance, Jeffrey Jenkins, Bonnie Brinton Anderson, et al.
MIS Quarterly (2018) Vol. 42, Iss. 2, pp. 355-380
Open Access | Times Cited: 92

Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, et al.
Journal of the Association for Information Systems (2018) Vol. 19, pp. 689-715
Closed Access | Times Cited: 90

Advancing a NeuroIS research agenda with four areas of societal contributions
Jan vom Brocke, Alan R. Hevner, Pierre Majorique Léger, et al.
European Journal of Information Systems (2020) Vol. 29, Iss. 1, pp. 9-24
Open Access | Times Cited: 78

A Decade of NeuroIS Research
René Riedl‬, Thomas Fischer, Pierre‐Majorique Léger, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2020) Vol. 51, Iss. 3, pp. 13-54
Closed Access | Times Cited: 74

Questioning Racial and Gender Bias in AI-based Recommendations: Do Espoused National Cultural Values Matter?
Manjul Gupta, Carlos M. Parra, Denis Dennehy
Information Systems Frontiers (2021) Vol. 24, Iss. 5, pp. 1465-1481
Open Access | Times Cited: 69

Neurophysiological Measurements in the Research Field of Interruption Science: Insights into Applied Methods for Different Interruption Types Based on an Umbrella Review
Fabian J. Stangl, René Riedl‬
Lecture notes in information systems and organisation (2024), pp. 123-152
Closed Access | Times Cited: 8

Eyes wide open: The role of situational information security awareness for security‐related behaviour
Lennart Jaeger, Andreas Eckhardt
Information Systems Journal (2020) Vol. 31, Iss. 3, pp. 429-472
Closed Access | Times Cited: 65

The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites
Ahmed Abbasi, David G. Dobolyi, Anthony Vance, et al.
Information Systems Research (2021) Vol. 32, Iss. 2, pp. 410-436
Closed Access | Times Cited: 50

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

Enhancing information security compliance behavior through knowledge interventions: insights from EEG
Zhiying Wang, Hangyu Deng, Guiyun Li
Information and Computer Security (2025)
Closed Access

XAI-Supported Decision-Making: Insights from NeuroIS Studies for a User Perspective
Yulia Litvinova, Ksenia Keplinger
Lecture notes in information systems and organisation (2025), pp. 157-177
Closed Access

From Peaks to Preferences: Exploring Skin Conductance in Online Hotel Selection Decisions—A Neurophysiological Investigation
Stefan Eibl, Thomas Kalischko, Andreas Auinger
Lecture notes in information systems and organisation (2025), pp. 211-221
Closed Access

Smishing: Exploring How Different Persuasion Techniques Influence Users Emotions, Cognitions, and Identification Accuracy
Nour El Shamy, Xie Wei, Chen Zhong
Lecture notes in information systems and organisation (2025), pp. 345-355
Closed Access

Attention Adjustment, Renewal, and Equilibrium Seeking in Online Search: An Eye-Tracking Approach
Jae‐Hyeon Ahn, Yoon-Soo Bae, Jaehyeon Ju, et al.
Journal of Management Information Systems (2018) Vol. 35, Iss. 4, pp. 1218-1250
Closed Access | Times Cited: 52

Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
Mark Grimes, Jim Marquardson
Decision Support Systems (2019) Vol. 119, pp. 23-34
Closed Access | Times Cited: 45

Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools
Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, et al.
Information & Management (2020) Vol. 58, Iss. 1, pp. 103394-103394
Open Access | Times Cited: 41

Tracking the Unseen and Unaware: Deciphering Controllers’ Detection Failures to Warnings Through Eye-Tracking Metrics
Zhimin Li, Fan Li, Mengtao Lyu
International Journal of Human-Computer Interaction (2025), pp. 1-20
Closed Access

NeuroIS: A Systematic Review of NeuroIS Through Bibliometric Analysis
Nahid Entezarian, Rouhollah Bagheri, Javad Rezazadeh, et al.
Metrics (2025) Vol. 2, Iss. 1, pp. 4-4
Open Access

Familiarity with Internet threats: Beyond awareness
Debora Jeske, Paul van Schaik
Computers & Security (2017) Vol. 66, pp. 129-141
Open Access | Times Cited: 44

Page 1 - Next Page

Scroll to top