
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Bystanders Join in Cyberbullying on Social Networking Sites: The Deindividuation and Moral Disengagement Perspectives
Tommy K. H. Chan, Christy M.K. Cheung, Izak Benbasat, et al.
Information Systems Research (2022) Vol. 34, Iss. 3, pp. 828-846
Open Access | Times Cited: 32
Tommy K. H. Chan, Christy M.K. Cheung, Izak Benbasat, et al.
Information Systems Research (2022) Vol. 34, Iss. 3, pp. 828-846
Open Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
The role of bystander behavior and employee resilience in mitigating workplace cyberbullying impacts on employee innovative performance
Sami Ullah, Mohit Kukreti, Abdul Sami, et al.
Human Systems Management (2025)
Closed Access
Sami Ullah, Mohit Kukreti, Abdul Sami, et al.
Human Systems Management (2025)
Closed Access
An Integrated Model of Ambivalence and Deterrence of Bystander Inaction in Delegitimizing Doxing
Yang‐Jun Li, Zehao He, Christy M.K. Cheung, et al.
Information & Management (2025), pp. 104118-104118
Open Access
Yang‐Jun Li, Zehao He, Christy M.K. Cheung, et al.
Information & Management (2025), pp. 104118-104118
Open Access
Where Does the Hate Flow? The Impact of Multihoming on User Responses to Content Moderation
Maya Mudambi, Jessica Clark, Lauren Rhue, et al.
SSRN Electronic Journal (2025)
Closed Access
Maya Mudambi, Jessica Clark, Lauren Rhue, et al.
SSRN Electronic Journal (2025)
Closed Access
Study and Analysis of Cyberbullying Message Detection and Prevention Using Machine Learning Techniques
S. Shanmugam, S. Gunasekaran, N Anusha
(2025), pp. 315-331
Closed Access
S. Shanmugam, S. Gunasekaran, N Anusha
(2025), pp. 315-331
Closed Access
Foundations, Definitions, and Directions in Online Hate Research
Stephanie Tom Tong
Routledge eBooks (2024), pp. 37-72
Open Access | Times Cited: 4
Stephanie Tom Tong
Routledge eBooks (2024), pp. 37-72
Open Access | Times Cited: 4
Cyberbullying Perpetration and Socio-Behavioral Correlates in Italian and Spanish Preadolescents: A Cross-National Study and Serial Mediation Analysis
Gianluca Mariano Colella, Rocco Servidio, Anna Lisa Palermiti, et al.
International Journal of Environmental Research and Public Health (2025) Vol. 22, Iss. 3, pp. 389-389
Open Access
Gianluca Mariano Colella, Rocco Servidio, Anna Lisa Palermiti, et al.
International Journal of Environmental Research and Public Health (2025) Vol. 22, Iss. 3, pp. 389-389
Open Access
Are we braver in cyberspace? Social media anonymity enhances moral courage
Xinyu Pan, Yubo Hou, Qi Wang
Computers in Human Behavior (2023) Vol. 148, pp. 107880-107880
Closed Access | Times Cited: 7
Xinyu Pan, Yubo Hou, Qi Wang
Computers in Human Behavior (2023) Vol. 148, pp. 107880-107880
Closed Access | Times Cited: 7
The Role of Self-Control in Cyberbullying Bystander Behavior
Revital Sela‐Shayovitz, Michal Levy, Jonathan Hasson
Social Sciences (2024) Vol. 13, Iss. 1, pp. 64-64
Open Access | Times Cited: 2
Revital Sela‐Shayovitz, Michal Levy, Jonathan Hasson
Social Sciences (2024) Vol. 13, Iss. 1, pp. 64-64
Open Access | Times Cited: 2
Cyberbullying perpetration on social media: A situational action perspective
Siqi Hu, Wenjing Lei, Hong Zhu, et al.
Information & Management (2024) Vol. 61, Iss. 6, pp. 104013-104013
Closed Access | Times Cited: 2
Siqi Hu, Wenjing Lei, Hong Zhu, et al.
Information & Management (2024) Vol. 61, Iss. 6, pp. 104013-104013
Closed Access | Times Cited: 2
From Bystander to Protector: Reducing Impact of Cyberbullying on Employee Innovation Behavior Through Bystander Intervention
Sami Ullah, Muhammad Rehan Shaukat, Mohit Kukreti, et al.
International Journal of Bullying Prevention (2024)
Closed Access | Times Cited: 2
Sami Ullah, Muhammad Rehan Shaukat, Mohit Kukreti, et al.
International Journal of Bullying Prevention (2024)
Closed Access | Times Cited: 2
Why Do People Sometimes Wear an Anonymous Mask? Motivations for Seeking Anonymity Online
Lewis Nitschinsk, Stephanie J. Tobin, Deanna Varley, et al.
Personality and Social Psychology Bulletin (2023)
Open Access | Times Cited: 6
Lewis Nitschinsk, Stephanie J. Tobin, Deanna Varley, et al.
Personality and Social Psychology Bulletin (2023)
Open Access | Times Cited: 6
Öffnung der Wirtschaftsinformatik für breite gesellschaftliche Themen: Chance oder Risiko?
Susanne Strahringer, Thomas Heß, Hubert Österle, et al.
HMD Praxis der Wirtschaftsinformatik (2023) Vol. 60, Iss. 4, pp. 781-791
Open Access | Times Cited: 4
Susanne Strahringer, Thomas Heß, Hubert Österle, et al.
HMD Praxis der Wirtschaftsinformatik (2023) Vol. 60, Iss. 4, pp. 781-791
Open Access | Times Cited: 4
An Experimental Study to Examine Relationships Between IT Identity and Users’ Post-Adoption Behaviors for Different Types of Health Applications
Mahed Maddah, Pouyan Esmaeilzadeh, Tala Mirzaei
Information Systems Management (2023) Vol. 41, Iss. 3, pp. 238-264
Closed Access | Times Cited: 4
Mahed Maddah, Pouyan Esmaeilzadeh, Tala Mirzaei
Information Systems Management (2023) Vol. 41, Iss. 3, pp. 238-264
Closed Access | Times Cited: 4
Yaşlıların Dijitalleşme Profili ve ‘Gri Dijital Şiddet’
Hatice OĞUZ ÖZGÜR
Yaşlı sorunları araştırma dergisi (2024)
Open Access | Times Cited: 1
Hatice OĞUZ ÖZGÜR
Yaşlı sorunları araştırma dergisi (2024)
Open Access | Times Cited: 1
Why Do Players Spend Money on Mobile Massively Multiplayer Online Role-playing Games? A Wixom and Todd Framework
Mingchuan Gong, Christian Wagner, Junkai Wang, et al.
Information & Management (2024) Vol. 61, Iss. 8, pp. 104049-104049
Closed Access | Times Cited: 1
Mingchuan Gong, Christian Wagner, Junkai Wang, et al.
Information & Management (2024) Vol. 61, Iss. 8, pp. 104049-104049
Closed Access | Times Cited: 1
The Digital Siren’s Call: Accepting Unethical AI Advice
Cheng Xu, Hao Xu, Yanqi Sun, et al.
International Journal of Human-Computer Interaction (2024), pp. 1-17
Closed Access | Times Cited: 1
Cheng Xu, Hao Xu, Yanqi Sun, et al.
International Journal of Human-Computer Interaction (2024), pp. 1-17
Closed Access | Times Cited: 1
Problematic Social Media Use, Retaliation, and Moral Disengagement in Cyberbullying and Cybervictimization Among Italian Preadolescents: A Moderated Mediation Model
Gianluca Mariano Colella, Anna Lisa Palermiti, Maria Giuseppina Bartolo, et al.
International Journal of Bullying Prevention (2024)
Open Access | Times Cited: 1
Gianluca Mariano Colella, Anna Lisa Palermiti, Maria Giuseppina Bartolo, et al.
International Journal of Bullying Prevention (2024)
Open Access | Times Cited: 1
Lying in online social networks: a bug or a feature
Mahed Maddah, Pouyan Esmaeilzadeh
Journal of Information Communication and Ethics in Society (2023) Vol. 21, Iss. 4, pp. 438-451
Closed Access | Times Cited: 2
Mahed Maddah, Pouyan Esmaeilzadeh
Journal of Information Communication and Ethics in Society (2023) Vol. 21, Iss. 4, pp. 438-451
Closed Access | Times Cited: 2
Aggressive humor style and cyberbullying perpetration: Normative tolerance and moral disengagement perspective
Hong Zhu, Yilin Ou, Zimeng Zhu
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 4
Hong Zhu, Yilin Ou, Zimeng Zhu
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 4
Institutional Strengthening in the Prevention of Child Marriage in East Kolaka
Arafat Arafat, Rahmat Hidayat, Intan
International Journal of Advanced Technology and Social Sciences (2024) Vol. 2, Iss. 2, pp. 175-188
Open Access
Arafat Arafat, Rahmat Hidayat, Intan
International Journal of Advanced Technology and Social Sciences (2024) Vol. 2, Iss. 2, pp. 175-188
Open Access
The effect of blockability affordance on confrontation against cyberbullying on social networking sites: theoretical and methodological implications
Dong-Heon Kwak, D. Kim, S Lee, et al.
Internet Research (2024)
Closed Access
Dong-Heon Kwak, D. Kim, S Lee, et al.
Internet Research (2024)
Closed Access
Perceived identity threat and brand advocacy responses to different types of brand-related attacks
Junyun Liao, Jiawen Chen, Yanghong Hu, et al.
Internet Research (2024)
Closed Access
Junyun Liao, Jiawen Chen, Yanghong Hu, et al.
Internet Research (2024)
Closed Access
GameStop olayı: Alt kültür ve sosyal kimlik çerçevesinde bir inceleme
Yağmur Tanrıverdi, Bahar Muratoğlu Pehlivan
İstanbul Ticaret Üniversitesi Sosyal Bilimler Dergisi (2024)
Closed Access
Yağmur Tanrıverdi, Bahar Muratoğlu Pehlivan
İstanbul Ticaret Üniversitesi Sosyal Bilimler Dergisi (2024)
Closed Access
Exploring Group Behavior and Discussion Productivity in Anonymous Chatrooms for Ethical Decision-Making
Claudio Álvarez, Gustavo Zurita, Antonio Farías, et al.
Lecture notes in computer science (2024), pp. 61-80
Closed Access
Claudio Álvarez, Gustavo Zurita, Antonio Farías, et al.
Lecture notes in computer science (2024), pp. 61-80
Closed Access
How return policy leniency affects customer patronage in online retailing: moderating roles of novelty seeking and collectivism
Zhenghua Gan, Yang Li, Yan Li
Journal of Data Information and Management (2024) Vol. 6, Iss. 4, pp. 439-459
Closed Access
Zhenghua Gan, Yang Li, Yan Li
Journal of Data Information and Management (2024) Vol. 6, Iss. 4, pp. 439-459
Closed Access