Siddhi Pittayachawan

Orcid: 0000-0003-3904-7546

According to our database1, Siddhi Pittayachawan authored at least 33 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis.
Comput. Secur., 2022

2021
Categorizing Young Facebook Users Based On Their Differential Preference of Social Media Heuristics: A Q-Methodology Approach.
Pac. Asia J. Assoc. Inf. Syst., 2021

2020
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives.
Inf. Syst. Frontiers, 2020

2019
Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis.
Inf. Syst. Frontiers, 2019

Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis.
Australas. J. Inf. Syst., 2019

Development of a Theoretical Framework for Customer Loyalty in Australia.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

Factors that Impact Customers' Loyalty for Mobile Telecommunication Products and Services in Australia.
Proceedings of the 2019 International Conference on Information Resources Management, 2019

2017
Exploring behavioral information security networks in an organizational context: An empirical case study.
J. Inf. Secur. Appl., 2017

Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace.
Inf. Manag., 2017

Investigation into the formation of information security influence: Network analysis of an emerging organisation.
Comput. Secur., 2017

Applications of social network analysis in behavioural information security research: Concepts and empirical analysis.
Comput. Secur., 2017

Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace.
Comput. Hum. Behav., 2017

Millennials' attitudes toward IT consumerization in the workplace.
Commun. ACM, 2017

The Analysis of Antecedents of Customer Loyalty in the Australian Mobile Telecommunication Market.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis.
Proceedings of the Australasian Conference on Information Systems, 2017

2016
Factors of people-centric security climate: conceptual model and exploratory study in Vietnam.
CoRR, 2016

An Empirical Examination of Customer Retention in Mobile Telecommunication Services in Australia.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach.
Comput. Secur., 2015

Demystifying online personas of Vietnamese young adults on Facebook: A Q-methodology approach.
Australas. J. Inf. Syst., 2015

Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Inquiring Knowledge Management Systems - A Chinese Medicine Perspective.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Investigating the Possibility for is/IT to Support the Delivery of Chinese Medicine.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
Barriers and motivations affecting Information Systems usage by Hajj-Umrah religious tourism operators in Saudi Arabia.
Australas. J. Inf. Syst., 2013

Using IS/IT to Support the Delivery of Chinese Medicine: The Design of a Chinese Medicine Clinic System.
Proceedings of the Australasian Conference on Information Systems, 2013

Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach.
Proceedings of the Australasian Conference on Information Systems, 2013

2011
The Green IT Readiness (G-Readiness) of Organizations: An Exploratory Analysis of a Construct and Instrument.
Commun. Assoc. Inf. Syst., 2011

Technology for Business - Supporting Industries as a Main Driving Force for e-Commerce Adoption in Saudi Arabia.
Proceedings of the ICE-B 2011, 2011

2010
Determinants of Successful ICT Risk Management in Thai Organisations.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

2009
IT and Eco-sustainability: Developing and Validating a Green IT Readiness Model.
Proceedings of the International Conference on Information Systems, 2009

2008
A multitheoretical approach for solving trust problems in B2C e-commerce.
Int. J. Netw. Virtual Organisations, 2008

Diffusion of E-Government Services in Australia: Citizens' Perspectives.
Proceedings of the 16th European Conference on Information Systems, 2008

2004
Trust Models in the E-Commerce Environment.
Proceedings of the Fourth International Conference on Electronic Business, 2004


  Loading...