
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
Rao Faizan Ali, P.D.D. Dominic, Syed Emad Azhar Ali, et al.
Applied Sciences (2021) Vol. 11, Iss. 8, pp. 3383-3383
Open Access | Times Cited: 76
Showing 1-25 of 76 citing articles:
Digital information security management policy in academic libraries: A systematic review (2010–2022)
Ghulam Farid, Nosheen Fatima Warraich, Sadaf Iftikhar
Journal of Information Science (2023)
Open Access | Times Cited: 81
Ghulam Farid, Nosheen Fatima Warraich, Sadaf Iftikhar
Journal of Information Science (2023)
Open Access | Times Cited: 81
A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0
Juan Vicente Barraza de la Paz, Luis Alberto Rodríguez‐Picón, Víctor Morales-Rocha, et al.
Systems (2023) Vol. 11, Iss. 5, pp. 218-218
Open Access | Times Cited: 39
Juan Vicente Barraza de la Paz, Luis Alberto Rodríguez‐Picón, Víctor Morales-Rocha, et al.
Systems (2023) Vol. 11, Iss. 5, pp. 218-218
Open Access | Times Cited: 39
CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees
Ebrahim A. A. Ghaleb, P.D.D. Dominic, Suliman Mohamed Fati, et al.
Sustainability (2021) Vol. 13, Iss. 15, pp. 8379-8379
Open Access | Times Cited: 78
Ebrahim A. A. Ghaleb, P.D.D. Dominic, Suliman Mohamed Fati, et al.
Sustainability (2021) Vol. 13, Iss. 15, pp. 8379-8379
Open Access | Times Cited: 78
The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector
Fotis Kitsios, Elpiniki Chatzidimitriou, Maria Kamariotou
Sustainability (2023) Vol. 15, Iss. 7, pp. 5828-5828
Open Access | Times Cited: 35
Fotis Kitsios, Elpiniki Chatzidimitriou, Maria Kamariotou
Sustainability (2023) Vol. 15, Iss. 7, pp. 5828-5828
Open Access | Times Cited: 35
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Paweł Weichbroth, Kacper Wereszko, Helena Anacka, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3155-3155
Open Access | Times Cited: 23
Paweł Weichbroth, Kacper Wereszko, Helena Anacka, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3155-3155
Open Access | Times Cited: 23
Classifications of Sustainable Factors in Blockchain Adoption: A Literature Review and Bibliometric Analysis
Ammar AL-Ashmori, Shuib Basri, P.D.D. Dominic, et al.
Sustainability (2022) Vol. 14, Iss. 9, pp. 5176-5176
Open Access | Times Cited: 31
Ammar AL-Ashmori, Shuib Basri, P.D.D. Dominic, et al.
Sustainability (2022) Vol. 14, Iss. 9, pp. 5176-5176
Open Access | Times Cited: 31
Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response
Lucian Florin Ilca, Petre Ogrutan, Titus Bălan
Sensors (2023) Vol. 23, Iss. 15, pp. 6757-6757
Open Access | Times Cited: 20
Lucian Florin Ilca, Petre Ogrutan, Titus Bălan
Sensors (2023) Vol. 23, Iss. 15, pp. 6757-6757
Open Access | Times Cited: 20
A study of human factors toward compliance with organization’s information security policy
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
Muhammad Arif, Mădălina-Ioana Bădilă, Julia Warden, et al.
Information Security Journal A Global Perspective (2025), pp. 1-16
Closed Access
End-User Compliance with Information Security Policy Framework for Government Departments in South Africa
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Regulating Information and Network Security: Review and Challenges
Tayssir Bouraffa, Kai-Lung Hui
ACM Computing Surveys (2025)
Closed Access
Tayssir Bouraffa, Kai-Lung Hui
ACM Computing Surveys (2025)
Closed Access
Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Education and Information Technologies (2025)
Closed Access
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Education and Information Technologies (2025)
Closed Access
Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al‐Sharafi, et al.
International Journal of Human-Computer Interaction (2025), pp. 1-22
Closed Access
Determinants of Behavioral Intention and Compliance Behavior Among Transportation Network Vehicle Service Drivers During the COVID-19 Pandemic
Ma. Janice J. Gumasing
COVID (2025) Vol. 5, Iss. 3, pp. 38-38
Open Access
Ma. Janice J. Gumasing
COVID (2025) Vol. 5, Iss. 3, pp. 38-38
Open Access
АНАЛІЗ КОМПЛАЄНС-СЕРЕДОВИЩА БАНКІВ УКРАЇНИ КРІЗЬ ПРИЗМУ ЗАХОДІВ ВПЛИВУ НБУ
Іryna Krasnova, Ганна Пилипенко
Економіка та суспільство (2025), Iss. 71
Open Access
Іryna Krasnova, Ганна Пилипенко
Економіка та суспільство (2025), Iss. 71
Open Access
Multi-Level Determinants of Sustainable Blockchain Technology Adoption in SCM: Individual, Organisational, and Societal Perspectives
Xiaofei Han, Leong-Mow Gooi
Sustainability (2025) Vol. 17, Iss. 6, pp. 2621-2621
Open Access
Xiaofei Han, Leong-Mow Gooi
Sustainability (2025) Vol. 17, Iss. 6, pp. 2621-2621
Open Access
The effects of antecedents and mediating factors on cybersecurity protection behavior
Ling Li, Li Da Xu, Wu He
Computers in Human Behavior Reports (2021) Vol. 5, pp. 100165-100165
Open Access | Times Cited: 28
Ling Li, Li Da Xu, Wu He
Computers in Human Behavior Reports (2021) Vol. 5, pp. 100165-100165
Open Access | Times Cited: 28
Stock market reactions to favorable and unfavorable information security events: A systematic literature review
Syed Emad Azhar Ali, Fong‐Woon Lai, P.D.D. Dominic, et al.
Computers & Security (2021) Vol. 110, pp. 102451-102451
Open Access | Times Cited: 27
Syed Emad Azhar Ali, Fong‐Woon Lai, P.D.D. Dominic, et al.
Computers & Security (2021) Vol. 110, pp. 102451-102451
Open Access | Times Cited: 27
Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 27
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 27
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
A Survey of Major Cybersecurity Compliance Frameworks
Wenjia Wang, S. Masoud Sadjadi, Naphtali Rishe
(2024), pp. 23-34
Closed Access | Times Cited: 3
Wenjia Wang, S. Masoud Sadjadi, Naphtali Rishe
(2024), pp. 23-34
Closed Access | Times Cited: 3
The cybersecurity behavioral research: A tertiary study
Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, et al.
Computers & Security (2022) Vol. 120, pp. 102826-102826
Closed Access | Times Cited: 18
Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, et al.
Computers & Security (2022) Vol. 120, pp. 102826-102826
Closed Access | Times Cited: 18
Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Sérgio Apolinário, Adilson Carlos Yoshikuni, Cláudio Luís Carvalho Larieira
Computers in Human Behavior (2023) Vol. 145, pp. 107772-107772
Closed Access | Times Cited: 10
Factors affecting consumer post COVID-19 online shopping behavior: the moderating role of commitment – evidence from Palestine
Samir Baidoun, Mohammed Salem
Journal of Strategic Marketing (2023) Vol. 32, Iss. 3, pp. 358-373
Closed Access | Times Cited: 10
Samir Baidoun, Mohammed Salem
Journal of Strategic Marketing (2023) Vol. 32, Iss. 3, pp. 358-373
Closed Access | Times Cited: 10
A Readiness Model and Factors Influencing Blockchain Adoption in Malaysia’s Software Sector: A Survey Study
Ammar AL-Ashmori, Gunasekar Thangarasu, P.D.D. Dominic, et al.
Sustainability (2023) Vol. 15, Iss. 16, pp. 12139-12139
Open Access | Times Cited: 10
Ammar AL-Ashmori, Gunasekar Thangarasu, P.D.D. Dominic, et al.
Sustainability (2023) Vol. 15, Iss. 16, pp. 12139-12139
Open Access | Times Cited: 10