OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, et al.
Information Systems Research (2021) Vol. 32, Iss. 3, pp. 1043-1065
Closed Access | Times Cited: 57

Showing 1-25 of 57 citing articles:

Antecedents and consequences of data breaches: A systematic review
Frederic Schlackl, Nico Link, Hartmut Hoehle
Information & Management (2022) Vol. 59, Iss. 4, pp. 103638-103638
Closed Access | Times Cited: 79

A systematic analysis of failures in protecting personal health data: A scoping review
Javad Khazaei Pool, Saeed Akhlaghpour, Farhad Fatehi, et al.
International Journal of Information Management (2023) Vol. 74, pp. 102719-102719
Open Access | Times Cited: 70

What are the trend and core knowledge of information security? A citation and co-citation analysis
Wen‐Lung Shiau, Xiaoqun Wang, Fei Zheng
Information & Management (2023) Vol. 60, Iss. 3, pp. 103774-103774
Closed Access | Times Cited: 32

Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective
Gurvirender Tejay, Zareef A. Mohammed
Information & Management (2022) Vol. 60, Iss. 3, pp. 103751-103751
Closed Access | Times Cited: 32

Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 5

A systematic literature review of how cybersecurity-related behavior has been assessed
Kristian Kannelønning, Sokratis Katsikas
Information and Computer Security (2023) Vol. 31, Iss. 4, pp. 463-477
Open Access | Times Cited: 15

The Influence of Self‐Efficacy, Trust, Perceived Costs and Healthcare‐Environment on Compliance With the Data Protection and Privacy Act by Health Workers in Uganda
Barbara N. Kayondo, Michael Kyobe
The Electronic Journal of Information Systems in Developing Countries (2025) Vol. 91, Iss. 2
Open Access

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access

Exploring different appraisals in deviant sharing behaviors: A mixed-methods study
Tingting Hou, Xin Luo, Dan Ke, et al.
Journal of Business Research (2021) Vol. 139, pp. 496-509
Closed Access | Times Cited: 26

Beyond adaptive security coping behaviors: Theory and empirical evidence
Yan Chen, Xin Luo, Li Han
Information & Management (2021) Vol. 59, Iss. 2, pp. 103575-103575
Closed Access | Times Cited: 23

Understanding the effects of the textual complexity on government communication: Insights from China’s online public service platform
Liangdong Lu, Jia Xu, Jiuchang Wei
Telematics and Informatics (2023) Vol. 83, pp. 102028-102028
Closed Access | Times Cited: 9

Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 3

Exploring the Factors Influencing Information Security Policy Compliance and Violations: A Systematic Literature Review
N Balagopal, Saji K. Mathew
Computers & Security (2024) Vol. 147, pp. 104062-104062
Closed Access | Times Cited: 3

Is the internet a double-edged sword for organizations? An empirical study on cyberloafing
Muddassar Sarfraz, Kausar Fiaz Khawaja, Um-e-Farwah
Information Technology and Management (2023) Vol. 25, Iss. 4, pp. 319-333
Closed Access | Times Cited: 8

Rethinking information disclosure to GenAI in hotels: An extended parallel process model
Cristian Morosan
International Journal of Hospitality Management (2024) Vol. 124, pp. 103965-103965
Closed Access | Times Cited: 2

Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital
Hao Chen, Mengya Liu, Tu Lyu
Information and Computer Security (2022) Vol. 30, Iss. 5, pp. 751-770
Closed Access | Times Cited: 11

Cybersecurity research from a management perspective: A systematic literature review and future research agenda
Franz T. Lohrke, Cynthia Frownfelter-Lohrke
Journal of General Management (2023)
Closed Access | Times Cited: 6

The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation
Feng Xu, Carol Hsu, Tawei Wang, et al.
Information Systems Journal (2023) Vol. 34, Iss. 4, pp. 1144-1174
Open Access | Times Cited: 6

Self-efficacy in Information Security: A Replication Study
Botong Xue, Merrill Warkentin, Leigh A. Mutchler, et al.
Journal of Computer Information Systems (2021) Vol. 63, Iss. 1, pp. 1-10
Closed Access | Times Cited: 14

Information security ignorance: An exploration of the concept and its antecedents
Andy Yu Wu, Bartlomiej Hanus, Botong Xue, et al.
Information & Management (2023) Vol. 60, Iss. 2, pp. 103753-103753
Closed Access | Times Cited: 5

The security mindset: characteristics, development, and consequences
Koen Schoenmakers, Daniel Greene, Sarah E. Stutterheim, et al.
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 5

Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective
Nan Liang, Rudy Hirschheim, Xin Luo, et al.
Journal of Information Technology (2023) Vol. 38, Iss. 4, pp. 382-415
Closed Access | Times Cited: 5

Security is Local: The Influence of the Immediate Workgroup on Information Security
Dawei Wang, Alexandra Durcikova, Alan R. Dennis
Journal of the Association for Information Systems (2023) Vol. 24, Iss. 4, pp. 1052-1101
Open Access | Times Cited: 5

Employees' in-role and extra-role information security behaviors from the P-E fit perspective
Yin Ya, Carol Hsu, Zhongyun Zhou
Computers & Security (2023) Vol. 133, pp. 103390-103390
Closed Access | Times Cited: 5

Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis
Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran, et al.
Journal of Management Information Systems (2023) Vol. 40, Iss. 4, pp. 1099-1138
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top