Siddhi Pittayachawan
Orcid: 0000-0003-3904-7546
According to our database1,
Siddhi Pittayachawan
authored at least 36 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis.
Comput. Secur., 2022
2021
Categorizing Young Facebook Users Based On Their Differential Preference of Social Media Heuristics: A Q-Methodology Approach.
Pac. Asia J. Assoc. Inf. Syst., 2021
2020
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives.
Inf. Syst. Frontiers, 2020
2019
Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis.
Inf. Syst. Frontiers, 2019
Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis.
Australas. J. Inf. Syst., 2019
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
Factors that Impact Customers' Loyalty for Mobile Telecommunication Products and Services in Australia.
Proceedings of the 2019 International Conference on Information Resources Management, 2019
2017
Exploring behavioral information security networks in an organizational context: An empirical case study.
J. Inf. Secur. Appl., 2017
Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace.
Inf. Manag., 2017
Investigation into the formation of information security influence: Network analysis of an emerging organisation.
Comput. Secur., 2017
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis.
Comput. Secur., 2017
Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace.
Comput. Hum. Behav., 2017
The Analysis of Antecedents of Customer Loyalty in the Australian Mobile Telecommunication Market.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis.
Proceedings of the Australasian Conference on Information Systems, 2017
2016
Factors of people-centric security climate: conceptual model and exploratory study in Vietnam.
CoRR, 2016
An Empirical Examination of Customer Retention in Mobile Telecommunication Services in Australia.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach.
Proceedings of the Australasian Conference on Information Systems, 2016
2015
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach.
Comput. Secur., 2015
Demystifying online personas of Vietnamese young adults on Facebook: A Q-methodology approach.
Australas. J. Inf. Syst., 2015
Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
2013
Barriers and motivations affecting Information Systems usage by Hajj-Umrah religious tourism operators in Saudi Arabia.
Australas. J. Inf. Syst., 2013
Using IS/IT to Support the Delivery of Chinese Medicine: The Design of a Chinese Medicine Clinic System.
Proceedings of the Australasian Conference on Information Systems, 2013
Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach.
Proceedings of the Australasian Conference on Information Systems, 2013
2011
The Green IT Readiness (G-Readiness) of Organizations: An Exploratory Analysis of a Construct and Instrument.
Commun. Assoc. Inf. Syst., 2011
Technology for Business - Supporting Industries as a Main Driving Force for e-Commerce Adoption in Saudi Arabia.
Proceedings of the ICE-B 2011, 2011
2010
Proceedings of the Pacific Asia Conference on Information Systems, 2010
Antecedents to Greening Data Centres: A Conceptual Framework and Exploratory Case Study.
Proceedings of the Australasian Conference on Information Systems, 2010
2009
Proceedings of the International Conference on Information Systems, 2009
2008
Int. J. Netw. Virtual Organisations, 2008
Proceedings of the 16th European Conference on Information Systems, 2008
E-Readiness to G-Readiness: Developing a Green Information Technology Readiness Framework.
Proceedings of the Australasian Conference on Information Systems, 2008
Proceedings of the Australasian Conference on Information Systems, 2008
2004
Trust Models in the E-Commerce Environment.
Proceedings of the Fourth International Conference on Electronic Business, 2004