
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory
Cassandra Dodge, Nathan Fisk, George W. Burruss, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 849-868
Closed Access | Times Cited: 17
Cassandra Dodge, Nathan Fisk, George W. Burruss, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 849-868
Closed Access | Times Cited: 17
Showing 17 citing articles:
An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
Shah Khalid Khan, Nirajan Shiwakoti, Ao Wang, et al.
Future Transportation (2025) Vol. 5, Iss. 1, pp. 5-5
Open Access
Shah Khalid Khan, Nirajan Shiwakoti, Ao Wang, et al.
Future Transportation (2025) Vol. 5, Iss. 1, pp. 5-5
Open Access
Pandemic and predation: an analysis of economic stressors and online scam susceptibility during COVID-19
George W. Burruss, Courtney Weber, Nathan Fisk, et al.
Journal of Crime and Justice (2025), pp. 1-16
Closed Access
George W. Burruss, Courtney Weber, Nathan Fisk, et al.
Journal of Crime and Justice (2025), pp. 1-16
Closed Access
Does protection motivation predict self-protective online behaviour? Comparing self-reported and actual online behaviour using a population-based survey experiment.
M.S. van ’t Hoff-de Goede, Rutger Leukfeldt, Steve van de Weijer, et al.
Computers in Human Behavior Reports (2025), pp. 100649-100649
Open Access
M.S. van ’t Hoff-de Goede, Rutger Leukfeldt, Steve van de Weijer, et al.
Computers in Human Behavior Reports (2025), pp. 100649-100649
Open Access
"A five-year-old could understand it" versus "This is way too confusing": Exploring Non-expert Understandings and Perceptions of Cybersecurity Definitions
Lorenzo Neil, Charlotte Healy, Julie M. Haney
(2025), pp. 1-19
Closed Access
Lorenzo Neil, Charlotte Healy, Julie M. Haney
(2025), pp. 1-19
Closed Access
Protection motivation theory and health behaviour: conceptual review, discussion of limitations, and recommendations for best practice and future research
Jessica Balla, Martin S. Hagger
Health Psychology Review (2024), pp. 1-27
Open Access | Times Cited: 3
Jessica Balla, Martin S. Hagger
Health Psychology Review (2024), pp. 1-27
Open Access | Times Cited: 3
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Journal of Computer Information Systems (2024), pp. 1-21
Open Access | Times Cited: 2
Marta F. Arroyabe, Carlos F.A. Arranz, Ignacio Fernandez De Arroyabe, et al.
Journal of Computer Information Systems (2024), pp. 1-21
Open Access | Times Cited: 2
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Nele Borgert, Luisa Jansen, Imke Böse, et al.
(2024), pp. 1-32
Open Access | Times Cited: 2
Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 2
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah, et al.
Computers & Security (2024) Vol. 149, pp. 104208-104208
Closed Access | Times Cited: 2
Artificial Intelligence and Robotics in the Nail Care Industry
Laura Ann Jones
Advances in medical technologies and clinical practice book series (2024), pp. 274-295
Closed Access | Times Cited: 1
Laura Ann Jones
Advances in medical technologies and clinical practice book series (2024), pp. 274-295
Closed Access | Times Cited: 1
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1
Ahmed M. Asfahani
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2515-2530
Closed Access | Times Cited: 1
Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Navigating Cybersecurity Implementation: Exploring the Influence of Environment on Standards Adoption and Board Involvement
Juan Carlos Fernández de Arróyabe, Ignacio Fernandez De Arroyabe, Marta F. Arroyabe, et al.
(2024)
Closed Access
Juan Carlos Fernández de Arróyabe, Ignacio Fernandez De Arroyabe, Marta F. Arroyabe, et al.
(2024)
Closed Access
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, et al.
Information and Computer Security (2024)
Closed Access
Indoor Air Quality: Predicting and Comparing Protective Behaviors in Germany and Portugal
Inês Veiga, Mijail Naranjo-Zolotov, Ricardo Martins, et al.
Indoor Air (2024) Vol. 2024, Iss. 1
Open Access
Inês Veiga, Mijail Naranjo-Zolotov, Ricardo Martins, et al.
Indoor Air (2024) Vol. 2024, Iss. 1
Open Access
Forecasting Cyber Threats and Pertinent Mitigation Technologies
Zaid Almahmoud, Paul D. Yoo, Ernesto Damiani, et al.
Technological Forecasting and Social Change (2024) Vol. 210, pp. 123836-123836
Open Access
Zaid Almahmoud, Paul D. Yoo, Ernesto Damiani, et al.
Technological Forecasting and Social Change (2024) Vol. 210, pp. 123836-123836
Open Access
Worry about online fraud and older adults: Avoidant and protective responses
Steven Kemp, Esther Sitgés Maciá, Nieves Erades-Pérez
Journal of Criminology (2024)
Closed Access
Steven Kemp, Esther Sitgés Maciá, Nieves Erades-Pérez
Journal of Criminology (2024)
Closed Access
Thematic Exploration and Analysis of Cybersecurity Policies of Businesses: An NLP-Based Approach
Abhik Chaudhuri, Sobhan Sarkar, Pradip Kumar Bala
Journal of Organizational Computing and Electronic Commerce (2024), pp. 1-31
Closed Access
Abhik Chaudhuri, Sobhan Sarkar, Pradip Kumar Bala
Journal of Organizational Computing and Electronic Commerce (2024), pp. 1-31
Closed Access
Self-promotion with a chance of warnings: Exploring Cybersecurity Communication Among Government Institutions on LinkedIn
Alexander Johannes Wilke, Jan Magnus Nold, Oskar Braun, et al.
(2024), pp. 119-132
Open Access
Alexander Johannes Wilke, Jan Magnus Nold, Oskar Braun, et al.
(2024), pp. 119-132
Open Access