![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Cong Hiep Pham 0001
Person information
- affiliation: RMIT University Vietnam, Ho Chi Minh City, Vietnam
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Abebe Abeshu Diro, Lu Zhou
, Akanksha Saini
, Shahriar Kaisar
, Cong Hiep Pham:
Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities. J. Inf. Secur. Appl. 80: 103678 (2024) - 2023
- [j15]Long Hoang Le
, Ai-Phuong Hoang, Cong Hiep Pham
:
Factors affecting prosocial sharing health-related information on social media during a health crisis: A dual exchanging-protecting model. Australas. J. Inf. Syst. 27 (2023) - [j14]Truong Van Nguyen
, Cong Hiep Pham
, Minh Nhat Nguyen
, Li Zhou
, Mohammadreza Akbari
:
Data-driven review of blockchain applications in supply chain management: key research themes and future directions. Int. J. Prod. Res. 61(23): 8213-8235 (2023) - 2021
- [j13]Tuan Anh Nguyen
, Cong Hiep Pham, Martin Dick, Joan Richardson:
Trust Types and Mediating Effect of Consumer Trust in m-payment Adoption: An empirical Examination of Vietnamese Consumers. Australas. J. Inf. Syst. 25 (2021) - [j12]Cong Hiep Pham
, Irfan Ulhaq, Minh Nhat Nguyen, Mathews Nkhoma:
An Exploratory Study of the Effects of Knowledge Sharing Methods on Cyber Security Practice. Australas. J. Inf. Syst. 25 (2021) - 2020
- [j11]Cong Hiep Pham
, Linda Brennan, Lukas Parker
, Nhat Tram Phan-Le
, Irfan Ulhaq
, Mathews Zanda Nkhoma, Minh Nhat Nguyen:
Enhancing cyber security behavior: an internal social marketing approach. Inf. Comput. Secur. 28(2): 133-159 (2020) - 2019
- [j10]Hiep Cong Pham
, Linda Brennan, Steven Furnell:
Information security burnout: Identification of sources and mitigating factors from security demands and resources. J. Inf. Secur. Appl. 46: 96-107 (2019) - 2017
- [j9]Cong Hiep Pham, Duy Dang Pham, Linda Brennan, Joan Richardson:
Information Security and People: A Conundrum for Compliance. Australas. J. Inf. Syst. 21 (2017) - 2016
- [j8]Cong Hiep Pham
, Jamal El-Den
, Joan Richardson:
Stress-based security compliance model - an exploratory study. Inf. Comput. Secur. 24(4): 326-347 (2016) - 2013
- [j7]Hiep Cong Pham, Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma:
IT Investment in ABC Textile and Dyeing: Asia Pacific Perspective. J. Inf. Technol. Educ. Discuss. Cases 2: 2 (2013) - [j6]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma, Hiep Cong Pham:
Tran Trong Minh Khoa: The Transition Process from a New Graduate Computer Engineer to an IT Professional. J. Inf. Technol. Educ. Discuss. Cases 2: 4 (2013) - [j5]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma, Hiep Cong Pham:
PATSOFT: The Vietnamese ERP Solutions Provider. J. Inf. Technol. Educ. Discuss. Cases 2: 5 (2013) - [j4]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma, Hiep Cong Pham:
Quang Trung Software City - The Largest Vietnamese Software Park. J. Inf. Technol. Educ. Discuss. Cases 2: 6 (2013) - [j3]Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma, Hiep Cong Pham:
Kinik-Thai: Material Requirement Planning System. J. Inf. Technol. Educ. Discuss. Cases 2: 7 (2013) - [j2]Narumon Cherry Sriratanaviriyakul
, Mathews Nkhoma, Hiep Cong Pham:
Osaka Flower Coffee Shop: Transaction Processing Systems. J. Inf. Technol. Educ. Discuss. Cases 2: 8 (2013) - [j1]Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Tiki.VN: E-commerce & Entrepreneurship in Vietnam. J. Inf. Technol. Educ. Discuss. Cases 2: 9 (2013)
Conference and Workshop Papers
- 2021
- [c8]Duong Giang, Ai-Phuong Hoang, Hiep Cong Pham:
Remote Working Burnout: Empirical Study from TOE and Technostress Model. ACIS 2021: 41 - [c7]Long Hoang Le, Ai-Phuong Hoang, Hiep Cong Pham:
Factors Affecting Prosocial Sharing Health-related Information on Social Media During a Health Crisis. ACIS 2021: 42 - 2020
- [c6]Long Hoang Le
, Ai-Phuong Hoang
, Hiep Cong Pham:
Privacy behavior in cyberspace: an overview of current research on health information disclosure. RIVF 2020: 1-3 - 2018
- [c5]Hiep Cong Pham, Irfan Ulhaq, Mathews Nkhoma, Minh Nhat Nguyen, Linda Brennan:
Exploring Knowledge Sharing Practices for Raising Security Awareness. ACIS 2018: 85 - 2016
- [c4]Hiep Cong Pham, Linda Brennan, Joan Richardson:
Stress-Based IS Security Compliance: Towards a Conceptual Model. ACIS 2016: 19 - 2015
- [c3]Thao Phuong Trinh, Cong Hiep Pham, Dieu Tran:
An Adoption Model of Software as a Service (SaaS) in SMEs. PACIS 2015: 18 - [c2]Cong Hiep Pham, Jamal El-Den, Joan Richardson:
Influence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam. PACIS 2015: 49 - 2013
- [c1]Nkhoma Zanda Nkhoma, Narumon Cherry Sriratanaviriyakul, Hiep Cong Pham, Tri Khai Lam:
Understanding the Paradox of Information Systems (IS) Case Studies. AMCIS 2013
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint