
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Organizational Computing and Electronic Commerce (2021) Vol. 31, Iss. 4, pp. 320-342
Closed Access | Times Cited: 7
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Organizational Computing and Electronic Commerce (2021) Vol. 31, Iss. 4, pp. 320-342
Closed Access | Times Cited: 7
Showing 7 citing articles:
Information Security Awareness in Higher Education Institutes: A Work in Progress
Rohani Rohan, Suree Funilkul, Wichian Chutimaskul, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 11
Rohani Rohan, Suree Funilkul, Wichian Chutimaskul, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 11
CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Swati Jain, Arunabha Mukhopadhyay, Saloni Jain
Journal of Organizational Computing and Electronic Commerce (2023) Vol. 33, Iss. 1-2, pp. 41-69
Closed Access | Times Cited: 7
Employees’ BYOD Security Policy Compliance in the Public Sector
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 62-77
Closed Access | Times Cited: 3
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Journal of Computer Information Systems (2023) Vol. 64, Iss. 1, pp. 62-77
Closed Access | Times Cited: 3
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022)
Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Abdul Ghani
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-08
Closed Access | Times Cited: 3
Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Abdul Ghani
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-08
Closed Access | Times Cited: 3
Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
Akshay Aggarwal, Shashi Srivastava
Journal of Organizational Computing and Electronic Commerce (2024) Vol. 34, Iss. 4, pp. 338-369
Closed Access
Akshay Aggarwal, Shashi Srivastava
Journal of Organizational Computing and Electronic Commerce (2024) Vol. 34, Iss. 4, pp. 338-369
Closed Access
Overcoming Policy Fatigue and Non-compliance
Magen Burkitt, Daniel Patricko Hutabarat
Lecture notes in electrical engineering (2024), pp. 525-537
Closed Access
Magen Burkitt, Daniel Patricko Hutabarat
Lecture notes in electrical engineering (2024), pp. 525-537
Closed Access
The Increase in Security Breaches through Remote Working
Syed Adnan Jawaid
(2022)
Open Access | Times Cited: 2
Syed Adnan Jawaid
(2022)
Open Access | Times Cited: 2