default search action
Siddhi Pittayachawan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Duy Dang-Pham, Karlheinz Kautz, Ai-Phuong Hoang, Siddhi Pittayachawan:
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis. Comput. Secur. 112: 102505 (2022) - 2021
- [j15]Duy Pham Thien Dang, Long Nguyen, Ai-Phuong Hoang, Siddhi Pittayachawan, Mohammadreza Akbari, Mathews Zanda Nkhoma:
Categorizing Young Facebook Users Based On Their Differential Preference of Social Media Heuristics: A Q-Methodology Approach. Pac. Asia J. Assoc. Inf. Syst. 13(1): 3 (2021) - 2020
- [j14]Andy Weeger, Xuequn Wang, Heiko Gewald, Mahesh S. Raisinghani, Otávio P. Sanchez, Gerald G. Grant, Siddhi Pittayachawan:
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. Inf. Syst. Frontiers 22(1): 203-219 (2020)
2010 – 2019
- 2019
- [j13]Duy Dang-Pham, Karlheinz Kautz, Siddhi Pittayachawan, Vince Bruno:
Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis. Australas. J. Inf. Syst. 23 (2019) - [j12]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno, Karlheinz Kautz:
Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis. Inf. Syst. Frontiers 21(4): 941-955 (2019) - [c19]Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan:
Factors that Impact Customers' Loyalty for Mobile Telecommunication Products and Services in Australia. CONF-IRM 2019: 9 - [c18]Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan:
Development of a Theoretical Framework for Customer Loyalty in Australia. IRICT 2019: 1061-1075 - 2017
- [j11]Heiko Gewald, Xuequn Wang, Andy Weeger, Mahesh S. Raisinghani, Gerald G. Grant, Otávio P. Sanchez, Siddhi Pittayachawan:
Millennials' attitudes toward IT consumerization in the workplace. Commun. ACM 60(10): 62-69 (2017) - [j10]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Comput. Hum. Behav. 67: 196-206 (2017) - [j9]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis. Comput. Secur. 68: 1-15 (2017) - [j8]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Investigation into the formation of information security influence: Network analysis of an emerging organisation. Comput. Secur. 70: 111-123 (2017) - [j7]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace. Inf. Manag. 54(5): 625-637 (2017) - [j6]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Exploring behavioral information security networks in an organizational context: An empirical case study. J. Inf. Secur. Appl. 34: 46-62 (2017) - [c17]Duy Dang-Pham, Karlheinz Kautz, Siddhi Pittayachawan, Vince Bruno:
Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis. ACIS 2017: 27 - [c16]Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan:
The Analysis of Antecedents of Customer Loyalty in the Australian Mobile Telecommunication Market. ICE-B 2017: 91-99 - 2016
- [c15]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach. ACIS 2016: 30 - [c14]Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan:
An Empirical Examination of Customer Retention in Mobile Telecommunication Services in Australia. ICE-B 2016: 72-77 - [i1]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Factors of people-centric security climate: conceptual model and exploratory study in Vietnam. CoRR abs/1606.00884 (2016) - 2015
- [j5]Duy Dang-Pham, Siddhi Pittayachawan, Mathews Nkhoma:
Demystifying online personas of Vietnamese young adults on Facebook: A Q-methodology approach. Australas. J. Inf. Syst. 19 (2015) - [j4]Duy Dang-Pham, Siddhi Pittayachawan:
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Comput. Secur. 48: 281-297 (2015) - [c13]Catherine Han Lin, Angela Wei Hong Yang, Siddhi Pittayachawan, Doug Vogel, Nilmini Wickramasinghe:
Inquiring Knowledge Management Systems - A Chinese Medicine Perspective. HICSS 2015: 3682-3690 - [c12]Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal. PACIS 2015: 238 - 2014
- [c11]Catherine Han Lin, Angela Wei Hong Yang, Siddhi Pittayachawan, Nilmini Wickramasinghe:
Investigating the Possibility for is/IT to Support the Delivery of Chinese Medicine. PACIS 2014: 217 - 2013
- [j3]Hani Brdesee, Brian J. Corbitt, Siddhi Pittayachawan:
Barriers and motivations affecting Information Systems usage by Hajj-Umrah religious tourism operators in Saudi Arabia. Australas. J. Inf. Syst. 18(1) (2013) - [c10]Catherine Han Lin, Angela Wei Hong Yang, Siddhi Pittayachawan, Nilmini Wickramasinghe:
Using IS/IT to Support the Delivery of Chinese Medicine: The Design of a Chinese Medicine Clinic System. ACIS 2013: 13 - [c9]Duy Pham Thien Dang, Siddhi Pittayachawan, Mathews Zanda Nkhoma:
Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach. ACIS 2013: 49 - 2011
- [j2]Alemayehu Molla, Vanessa A. Cooper, Siddhi Pittayachawan:
The Green IT Readiness (G-Readiness) of Organizations: An Exploratory Analysis of a Construct and Instrument. Commun. Assoc. Inf. Syst. 29: 4 (2011) - [c8]Hani Brdesee, Brian J. Corbitt, Siddhi Pittayachawan:
Technology for Business - Supporting Industries as a Main Driving Force for e-Commerce Adoption in Saudi Arabia. ICE-B 2011: 175-180 - 2010
- [c7]Stan Karanasios, Vanessa A. Cooper, Hepu Deng, Alemayehu Molla, Siddhi Pittayachawan:
Antecedents to Greening Data Centres: A Conceptual Framework and Exploratory Case Study. ACIS 2010 - [c6]Siridech Kumsuprom, Brian J. Corbitt, Siddhi Pittayachawan, Phoommhiphat Mingmalairaks:
Determinants of Successful ICT Risk Management in Thai Organisations. PACIS 2010: 107
2000 – 2009
- 2009
- [c5]Alemayehu Molla, Vanessa A. Cooper, Siddhi Pittayachawan:
IT and Eco-sustainability: Developing and Validating a Green IT Readiness Model. ICIS 2009: 141 - 2008
- [j1]Siddhi Pittayachawan, Mohini Singh, Brian J. Corbitt:
A multitheoretical approach for solving trust problems in B2C e-commerce. Int. J. Netw. Virtual Organisations 5(3/4): 369-395 (2008) - [c4]Siridech Kumsuprom, Brian J. Corbitt, Siddhi Pittayachawan:
ICT Risk Management in Organizations: Case studies in Thai Business. ACIS 2008 - [c3]Alemayehu Molla, Vanessa A. Cooper, Brian J. Corbitt, Hepu Deng, Konrad J. Peszynski, Siddhi Pittayachawan, Say Yen Teoh:
E-Readiness to G-Readiness: Developing a Green Information Technology Readiness Framework. ACIS 2008 - [c2]Mohini Singh, Praditpa Sarkar, Dushantha Dissanayake, Siddhi Pittayachawan:
Diffusion of E-Government Services in Australia: Citizens' Perspectives. ECIS 2008: 1227-1238 - 2004
- [c1]Siddhi Pittayachawan, Mohini Singh:
Trust Models in the E-Commerce Environment. ICEB 2004: 901-907
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-23 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint