
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination
Merrill Warkentin, Eric Walden, Allen C. Johnston, et al.
Journal of the Association for Information Systems (2016) Vol. 17, Iss. 3, pp. 194-215
Open Access | Times Cited: 80
Merrill Warkentin, Eric Walden, Allen C. Johnston, et al.
Journal of the Association for Information Systems (2016) Vol. 17, Iss. 3, pp. 194-215
Open Access | Times Cited: 80
Showing 1-25 of 80 citing articles:
Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective
Mohsen Jozani, Emmanuel Ayaburi, Myung Ko, et al.
Computers in Human Behavior (2020) Vol. 107, pp. 106260-106260
Closed Access | Times Cited: 200
Mohsen Jozani, Emmanuel Ayaburi, Myung Ko, et al.
Computers in Human Behavior (2020) Vol. 107, pp. 106260-106260
Closed Access | Times Cited: 200
Organizational information security policies: a review and research framework
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 171
W. Alec Cram, Jeffrey Gainer Proudfoot, John D’Arcy
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 605-641
Closed Access | Times Cited: 171
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 130
A. J. Burns, Clay Posey, Tom Roberts, et al.
Computers in Human Behavior (2016) Vol. 68, pp. 190-209
Closed Access | Times Cited: 130
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 129
Robert Willison, Merrill Warkentin, Allen C. Johnston
Information Systems Journal (2016) Vol. 28, Iss. 2, pp. 266-293
Open Access | Times Cited: 129
Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance
Chul Woo Yoo, G. Lawrence Sanders, Robert P. Cerveny
Decision Support Systems (2018) Vol. 108, pp. 107-118
Closed Access | Times Cited: 117
Chul Woo Yoo, G. Lawrence Sanders, Robert P. Cerveny
Decision Support Systems (2018) Vol. 108, pp. 107-118
Closed Access | Times Cited: 117
Continuance of protective security behavior: A longitudinal study
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 106
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, et al.
Decision Support Systems (2016) Vol. 92, pp. 25-35
Closed Access | Times Cited: 106
The impact of information security threat awareness on privacy-protective behaviors
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 104
Stanislav Mamonov, Raquel Benbunan‐Fich
Computers in Human Behavior (2018) Vol. 83, pp. 32-44
Closed Access | Times Cited: 104
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments
Anthony Vance, Jeffrey Jenkins, Bonnie Brinton Anderson, et al.
MIS Quarterly (2018) Vol. 42, Iss. 2, pp. 355-380
Open Access | Times Cited: 92
Anthony Vance, Jeffrey Jenkins, Bonnie Brinton Anderson, et al.
MIS Quarterly (2018) Vol. 42, Iss. 2, pp. 355-380
Open Access | Times Cited: 92
A Decade of NeuroIS Research
René Riedl, Thomas Fischer, Pierre‐Majorique Léger, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2020) Vol. 51, Iss. 3, pp. 13-54
Closed Access | Times Cited: 74
René Riedl, Thomas Fischer, Pierre‐Majorique Léger, et al.
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2020) Vol. 51, Iss. 3, pp. 13-54
Closed Access | Times Cited: 74
Platform Government in the Era of Smart Technology
Soonhee Kim, Kim Normann Andersen, Jungwoo Lee
Public Administration Review (2021) Vol. 82, Iss. 2, pp. 362-368
Closed Access | Times Cited: 71
Soonhee Kim, Kim Normann Andersen, Jungwoo Lee
Public Administration Review (2021) Vol. 82, Iss. 2, pp. 362-368
Closed Access | Times Cited: 71
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 70
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 70
Neurophysiological Measurements in the Research Field of Interruption Science: Insights into Applied Methods for Different Interruption Types Based on an Umbrella Review
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2024), pp. 123-152
Closed Access | Times Cited: 8
Fabian J. Stangl, René Riedl
Lecture notes in information systems and organisation (2024), pp. 123-152
Closed Access | Times Cited: 8
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, et al.
Journal of Network and Computer Applications (2014) Vol. 48, pp. 44-57
Closed Access | Times Cited: 80
Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, et al.
Journal of Network and Computer Applications (2014) Vol. 48, pp. 44-57
Closed Access | Times Cited: 80
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, et al.
European Journal of Information Systems (2016) Vol. 25, Iss. 4, pp. 364-390
Open Access | Times Cited: 73
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1228-1247
Open Access | Times Cited: 64
A. J. Burns, Tom Roberts, Clay Posey, et al.
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1228-1247
Open Access | Times Cited: 64
Protection Motivation Theory in Information Systems Security Research
Steffi Haag, Mikko Siponen, Fufan Liu
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. 2, pp. 25-67
Open Access | Times Cited: 41
Steffi Haag, Mikko Siponen, Fufan Liu
ACM SIGMIS Database the DATABASE for Advances in Information Systems (2021) Vol. 52, Iss. 2, pp. 25-67
Open Access | Times Cited: 41
Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe, et al.
Computers & Security (2022) Vol. 124, pp. 102954-102954
Open Access | Times Cited: 33
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe, et al.
Computers & Security (2022) Vol. 124, pp. 102954-102954
Open Access | Times Cited: 33
Fostering information security compliance as organizational citizenship behavior
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 5
Ali Vedadi, Merrill Warkentin, Detmar W. Straub, et al.
Information & Management (2024) Vol. 61, Iss. 5, pp. 103968-103968
Closed Access | Times Cited: 5
Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making
Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, et al.
Decision Sciences (2018) Vol. 50, Iss. 2, pp. 245-284
Open Access | Times Cited: 52
Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, et al.
Decision Sciences (2018) Vol. 50, Iss. 2, pp. 245-284
Open Access | Times Cited: 52
Evaluating the effectiveness of learner controlled information security training
Sherly Abraham, InduShobha Chengalur‐Smith
Computers & Security (2019) Vol. 87, pp. 101586-101586
Closed Access | Times Cited: 50
Sherly Abraham, InduShobha Chengalur‐Smith
Computers & Security (2019) Vol. 87, pp. 101586-101586
Closed Access | Times Cited: 50
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 48
Jeffrey D. Wall, Merrill Warkentin
Information & Management (2019) Vol. 56, Iss. 8, pp. 103157-103157
Closed Access | Times Cited: 48
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
Simon Vrhovec, Anže Mihelič
Computers & Security (2021) Vol. 106, pp. 102309-102309
Closed Access | Times Cited: 36
Simon Vrhovec, Anže Mihelič
Computers & Security (2021) Vol. 106, pp. 102309-102309
Closed Access | Times Cited: 36
Users’ reactions to website designs: A neuroimaging study based on evolutionary psychology with a focus on color and button shape
Anika Nissen, René Riedl, Reinhard Schütte
Computers in Human Behavior (2024) Vol. 155, pp. 108168-108168
Open Access | Times Cited: 4
Anika Nissen, René Riedl, Reinhard Schütte
Computers in Human Behavior (2024) Vol. 155, pp. 108168-108168
Open Access | Times Cited: 4
Exploring the Cognitive Mechanisms Behind the Adoption of Algorithmic Advice
Yiwen Wang, Min Xu, Lin Zhao
Business & Information Systems Engineering (2025)
Closed Access
Yiwen Wang, Min Xu, Lin Zhao
Business & Information Systems Engineering (2025)
Closed Access