
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7
Emmanuel Ayaburi, Francis Kofi Andoh‐Baidoo
European Journal of Information Systems (2023) Vol. 33, Iss. 4, pp. 540-560
Closed Access | Times Cited: 7
Showing 7 citing articles:
Smishing: Exploring How Different Persuasion Techniques Influence Users Emotions, Cognitions, and Identification Accuracy
Nour El Shamy, Xie Wei, Chen Zhong
Lecture notes in information systems and organisation (2025), pp. 345-355
Closed Access
Nour El Shamy, Xie Wei, Chen Zhong
Lecture notes in information systems and organisation (2025), pp. 345-355
Closed Access
You’ve got mail – whether you want it or not: An emic investigation into how email use can be managed
Andre Lanctot, Linda Duxbury
Computers in Human Behavior Reports (2025) Vol. 18, pp. 100618-100618
Closed Access
Andre Lanctot, Linda Duxbury
Computers in Human Behavior Reports (2025) Vol. 18, pp. 100618-100618
Closed Access
The whole of cyber defense: Syncing practice and theory
Kristel M. de Nobrega, Anne-F. Rutkowski, Carol Saunders
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 4, pp. 101861-101861
Open Access | Times Cited: 2
Kristel M. de Nobrega, Anne-F. Rutkowski, Carol Saunders
The Journal of Strategic Information Systems (2024) Vol. 33, Iss. 4, pp. 101861-101861
Open Access | Times Cited: 2
Assessment of existing cyber-attack detection models for web-based systems
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
The influence of affective processing on phishing susceptibility
Chuan Tian, Matthew L. Jensen, Gregory J. Bott, et al.
European Journal of Information Systems (2024), pp. 1-15
Closed Access
Chuan Tian, Matthew L. Jensen, Gregory J. Bott, et al.
European Journal of Information Systems (2024), pp. 1-15
Closed Access
Psychological Impact on the Public Susceptible to Online Scams
Zahir Osman, Noral Hidayah Alwi, Bibi Nabi Ahmad Khan
International Journal of Academic Research in Business and Social Sciences (2024) Vol. 14, Iss. 5
Open Access
Zahir Osman, Noral Hidayah Alwi, Bibi Nabi Ahmad Khan
International Journal of Academic Research in Business and Social Sciences (2024) Vol. 14, Iss. 5
Open Access
Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment
Dennik Baltuttis, Timm Teubner
Computers & Security (2024) Vol. 144, pp. 103940-103940
Open Access
Dennik Baltuttis, Timm Teubner
Computers & Security (2024) Vol. 144, pp. 103940-103940
Open Access