
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks
Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
MIS Quarterly (2017) Vol. 41, Iss. 2, pp. 497-523
Open Access | Times Cited: 74
Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
MIS Quarterly (2017) Vol. 41, Iss. 2, pp. 497-523
Open Access | Times Cited: 74
Showing 1-25 of 74 citing articles:
Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain
Hao Hua Sun Yin, Klaus Christian Langenheldt, Mikkel Alexander Harlev, et al.
Journal of Management Information Systems (2019) Vol. 36, Iss. 1, pp. 37-73
Closed Access | Times Cited: 192
Hao Hua Sun Yin, Klaus Christian Langenheldt, Mikkel Alexander Harlev, et al.
Journal of Management Information Systems (2019) Vol. 36, Iss. 1, pp. 37-73
Closed Access | Times Cited: 192
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Paul Benjamin Lowry, Tamara Dinev, Robert Willison
European Journal of Information Systems (2017) Vol. 26, Iss. 6, pp. 546-563
Open Access | Times Cited: 151
Cyber-Dependent Crimes: An Interdisciplinary Review
David Maimon, Eric R. Louderback
Annual Review of Criminology (2018) Vol. 2, Iss. 1, pp. 191-216
Closed Access | Times Cited: 120
David Maimon, Eric R. Louderback
Annual Review of Criminology (2018) Vol. 2, Iss. 1, pp. 191-216
Closed Access | Times Cited: 120
Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment
Mohammad S. Jalali, Michael I. Siegel, Stuart Madnick
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 66-82
Open Access | Times Cited: 84
Mohammad S. Jalali, Michael I. Siegel, Stuart Madnick
The Journal of Strategic Information Systems (2018) Vol. 28, Iss. 1, pp. 66-82
Open Access | Times Cited: 84
Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach
Mohammadreza Ebrahimi, Jay F. Nunamaker, Hsinchun Chen
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 694-722
Closed Access | Times Cited: 59
Mohammadreza Ebrahimi, Jay F. Nunamaker, Hsinchun Chen
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 694-722
Closed Access | Times Cited: 59
Too Good to Be True: Firm Social Performance and the Risk of Data Breach
John D’Arcy, Idris Adjerid, Corey M. Angst, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1200-1223
Closed Access | Times Cited: 53
John D’Arcy, Idris Adjerid, Corey M. Angst, et al.
Information Systems Research (2020) Vol. 31, Iss. 4, pp. 1200-1223
Closed Access | Times Cited: 53
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning
Mohammadreza Ebrahimi, Yidong Chai, Sagar Samtani, et al.
MIS Quarterly (2022) Vol. 46, Iss. 2, pp. 1209-1226
Closed Access | Times Cited: 29
Mohammadreza Ebrahimi, Yidong Chai, Sagar Samtani, et al.
MIS Quarterly (2022) Vol. 46, Iss. 2, pp. 1209-1226
Closed Access | Times Cited: 29
Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement
Luis Aguiar, Jörg Claussen, Christian Peukert
Information Systems Research (2018) Vol. 29, Iss. 3, pp. 656-678
Open Access | Times Cited: 53
Luis Aguiar, Jörg Claussen, Christian Peukert
Information Systems Research (2018) Vol. 29, Iss. 3, pp. 656-678
Open Access | Times Cited: 53
Examination of cybercrime and its effects on corporate stock value
Katherine Taken Smith, Amie Jones, Leigh Redd Johnson, et al.
Journal of Information Communication and Ethics in Society (2018) Vol. 17, Iss. 1, pp. 42-60
Closed Access | Times Cited: 47
Katherine Taken Smith, Amie Jones, Leigh Redd Johnson, et al.
Journal of Information Communication and Ethics in Society (2018) Vol. 17, Iss. 1, pp. 42-60
Closed Access | Times Cited: 47
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?
Seung Hyun Kim, Juhee Kwon
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1184-1202
Closed Access | Times Cited: 47
Seung Hyun Kim, Juhee Kwon
Information Systems Research (2019) Vol. 30, Iss. 4, pp. 1184-1202
Closed Access | Times Cited: 47
Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of U.S. federal government
Min‐Seok Pang, Hüseyi̇n Tanriverdi̇
The Journal of Strategic Information Systems (2022) Vol. 31, Iss. 1, pp. 101707-101707
Closed Access | Times Cited: 23
Min‐Seok Pang, Hüseyi̇n Tanriverdi̇
The Journal of Strategic Information Systems (2022) Vol. 31, Iss. 1, pp. 101707-101707
Closed Access | Times Cited: 23
Metacrime and Cybercrime: Exploring the Convergence and Divergence in Digital Criminality
You Zhou, Milind Tiwari, Ausma Bernot, et al.
Asian Journal of Criminology (2024) Vol. 19, Iss. 3, pp. 419-439
Open Access | Times Cited: 4
You Zhou, Milind Tiwari, Ausma Bernot, et al.
Asian Journal of Criminology (2024) Vol. 19, Iss. 3, pp. 419-439
Open Access | Times Cited: 4
Regulating Information and Network Security: Review and Challenges
Tayssir Bouraffa, Kai-Lung Hui
ACM Computing Surveys (2025)
Closed Access
Tayssir Bouraffa, Kai-Lung Hui
ACM Computing Surveys (2025)
Closed Access
Do States Constrain Non-State Hackers? International Telecommunication Union Elections and Non-State Cyber Aggression
Conner B. Joyce
Journal of Conflict Resolution (2025)
Closed Access
Conner B. Joyce
Journal of Conflict Resolution (2025)
Closed Access
The Pursuit of Innovative Theory in the Digital Age
Varun Grover, Kalle Lyytinen
Journal of Information Technology (2022) Vol. 38, Iss. 1, pp. 45-59
Closed Access | Times Cited: 21
Varun Grover, Kalle Lyytinen
Journal of Information Technology (2022) Vol. 38, Iss. 1, pp. 45-59
Closed Access | Times Cited: 21
Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions
Jason Chan, Shu He, Dandan Qiao, et al.
Information Systems Research (2023) Vol. 35, Iss. 1, pp. 145-164
Open Access | Times Cited: 11
Jason Chan, Shu He, Dandan Qiao, et al.
Information Systems Research (2023) Vol. 35, Iss. 1, pp. 145-164
Open Access | Times Cited: 11
Context-specific theorizing in ICT4D research
Francis Kofi Andoh‐Baidoo
Information Technology for Development (2017) Vol. 23, Iss. 2, pp. 195-211
Closed Access | Times Cited: 35
Francis Kofi Andoh‐Baidoo
Information Technology for Development (2017) Vol. 23, Iss. 2, pp. 195-211
Closed Access | Times Cited: 35
Antecedents for enhanced level of cyber-security in organisations
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia, et al.
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 6, pp. 1597-1629
Open Access | Times Cited: 31
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia, et al.
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 6, pp. 1597-1629
Open Access | Times Cited: 31
Cloud Service Model’s Role in Provider and User Security Investment Incentives
Mingwen Yang, Varghese S. Jacob, Srinivasan Raghunathan
Production and Operations Management (2020) Vol. 30, Iss. 2, pp. 419-437
Closed Access | Times Cited: 22
Mingwen Yang, Varghese S. Jacob, Srinivasan Raghunathan
Production and Operations Management (2020) Vol. 30, Iss. 2, pp. 419-437
Closed Access | Times Cited: 22
To alert or alleviate? A natural experiment on the effect of anti-phishing laws on corporate IT and security investments
Xiaoxiao Wang, Wilson Li, Alvin Chung Man Leung, et al.
Decision Support Systems (2024) Vol. 179, pp. 114173-114173
Open Access | Times Cited: 2
Xiaoxiao Wang, Wilson Li, Alvin Chung Man Leung, et al.
Decision Support Systems (2024) Vol. 179, pp. 114173-114173
Open Access | Times Cited: 2
Unpacking the complexities of health record misuse: insights from Australian health services
Javad Khazaei Pool, Saeed Akhlaghpour, Andrew Burton‐Jones
Information Technology and People (2024)
Closed Access | Times Cited: 2
Javad Khazaei Pool, Saeed Akhlaghpour, Andrew Burton‐Jones
Information Technology and People (2024)
Closed Access | Times Cited: 2
Malware Trends on ‘Darknet’ Crypto-Markets: Research Review
Roderic Broadhurst, David Lord, Donald Maxim, et al.
SSRN Electronic Journal (2018)
Closed Access | Times Cited: 22
Roderic Broadhurst, David Lord, Donald Maxim, et al.
SSRN Electronic Journal (2018)
Closed Access | Times Cited: 22
Visualizing Sustainability Research in Business and Management (1990–2019) and Emerging Topics: A Large-Scale Bibliometric Analysis
Qiong Jia, Liyuan Wei, Xiaotong Li
Sustainability (2019) Vol. 11, Iss. 20, pp. 5596-5596
Open Access | Times Cited: 21
Qiong Jia, Liyuan Wei, Xiaotong Li
Sustainability (2019) Vol. 11, Iss. 20, pp. 5596-5596
Open Access | Times Cited: 21
Malicious Spam Distribution: A Routine Activities Approach
Robert C. Perkins, C. Jordan Howell, Cassandra Dodge, et al.
Deviant Behavior (2020) Vol. 43, Iss. 2, pp. 196-212
Closed Access | Times Cited: 18
Robert C. Perkins, C. Jordan Howell, Cassandra Dodge, et al.
Deviant Behavior (2020) Vol. 43, Iss. 2, pp. 196-212
Closed Access | Times Cited: 18
Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan
Mohammad Al-Ma’aitah
The Electronic Journal of Information Systems in Developing Countries (2022) Vol. 88, Iss. 5
Closed Access | Times Cited: 11
Mohammad Al-Ma’aitah
The Electronic Journal of Information Systems in Developing Countries (2022) Vol. 88, Iss. 5
Closed Access | Times Cited: 11