default search action
Mathews Z. Nkhoma
Person information
- affiliation: RMIT University Vietnam
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Kolawole Ewedairo, Mathews Nkhoma:
Revolutionising Business Education Through Strategic Industry Partnerships: A Stakeholders Perspective. ECIS 2024 - 2023
- [j26]Pedro Antunes, José A. Pino, Mathews Nkhoma, Nguyen Hoang Thuan:
The composite approach as a hybrid approach to business process modeling: proposition and empirical evaluation. Bus. Process. Manag. J. 29(6): 1633-1654 (2023) - [c9]Duy Dang-Pham, Karlheinz Kautz, Mathews Nkhoma, Mai Do Thi Hoang, Phuong Do, Bac Nguyen:
Resource orchestration and digitalisation at a public hospital in Vietnam. ACIS 2023 - 2022
- [j25]Nguyen Hoang Thuan, Ai-Phuong Hoang, Mathews Nkhoma, Pedro Antunes:
Using Process Stories to Foster Process Flexibility: The Experts' Viewpoint. Australas. J. Inf. Syst. 26 (2022) - 2021
- [j24]Cong Hiep Pham, Irfan Ulhaq, Minh Nhat Nguyen, Mathews Nkhoma:
An Exploratory Study of the Effects of Knowledge Sharing Methods on Cyber Security Practice. Australas. J. Inf. Syst. 25 (2021) - [j23]Duy Pham Thien Dang, Long Nguyen, Ai-Phuong Hoang, Siddhi Pittayachawan, Mohammadreza Akbari, Mathews Zanda Nkhoma:
Categorizing Young Facebook Users Based On Their Differential Preference of Social Media Heuristics: A Q-Methodology Approach. Pac. Asia J. Assoc. Inf. Syst. 13(1): 3 (2021) - 2020
- [j22]Clara Nkhoma, Duy Dang-Pham, Ai-Phuong Hoang, Mathews Nkhoma, Tram Le-Hoai, Susan Thomas:
Learning analytics techniques and visualisation with textual data for determining causes of academic failure. Behav. Inf. Technol. 39(7): 808-823 (2020) - [j21]Cong Hiep Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen:
Enhancing cyber security behavior: an internal social marketing approach. Inf. Comput. Secur. 28(2): 133-159 (2020) - [c8]Nguyen Hoang Thuan, Ai-Phuong Hoang, Majo George, Mathews Nkhoma, Pedro Antunes:
Toward an Ontology for Improving Process Flexibility. FDSE 2020: 411-428 - [c7]Vinh Nguyen Xuan Truong, Mathews Nkhoma, Wanniwat Pansuwong:
Enhancing the effectiveness of mobile in-app programmatic advertising using publishers-controlled factors. ICCMB 2020: 146-150 - [c6]Minh Hoang T. B, Duy Dang-Pham, Ai-Phuong Hoang, Bao Le Gia, Mathews Nkhoma:
Network Analytics for Improving Students' Cybersecurity Awareness in Online Learning Systems. RIVF 2020: 1-7
2010 – 2019
- 2019
- [j20]Vinh Nguyen Xuan Truong, Mathews Nkhoma, Wanniwat Pansuwong:
An Integrated Effectiveness Framework of Mobile In-App Advertising. Australas. J. Inf. Syst. 23 (2019) - 2018
- [j19]Kwok Hung Lau, Tri Khai Lam, Booi Hon Kam, Mathews Nkhoma, Joan Richardson, Susan Thomas:
The role of textbook learning resources in e-learning: A taxonomic study. Comput. Educ. 118: 10-24 (2018) - [c5]Hiep Cong Pham, Irfan Ulhaq, Mathews Nkhoma, Minh Nhat Nguyen, Linda Brennan:
Exploring Knowledge Sharing Practices for Raising Security Awareness. ACIS 2018: 85 - 2017
- [j18]Narumon Cherry Sriratanaviriyakul, Mathews Z. Nkhoma, Anna Lyza Felipe, Thanh Kim Cao, Quyen Ha Tran, Roger Epworth, Avinash Shankaranarayanan, Huy Le Quang:
ASEAN users' privacy concerns and security in using online social networks. Int. J. Electron. Secur. Digit. Forensics 9(1): 84-99 (2017) - [j17]Duy Dang-Pham, Mathews Z. Nkhoma:
Effects of Team Collaboration on Sharing Information Security Advice: Insights from Network Analysis. Inf. Resour. Manag. J. 30(3): 58-72 (2017) - 2015
- [j16]Duy Dang-Pham, Siddhi Pittayachawan, Mathews Nkhoma:
Demystifying online personas of Vietnamese young adults on Facebook: A Q-methodology approach. Australas. J. Inf. Syst. 19 (2015) - [c4]Ali G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma:
Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework. ICGS3 2015: 263-274 - 2014
- [j15]Narumon Cherry Sriratanaviriyakul, Mathews Zanda Nkhoma, Anna Lyza Felipe, Thanh Kim Cao, Quyen Ha Tran:
Vietnamese privacy concerns and security in using online social networks. Int. J. Electron. Secur. Digit. Forensics 6(4): 306-318 (2014) - [j14]Mathews Zanda Nkhoma, Jaime Calbeto, Narumon Cherry Sriratanaviriyakul, Thu Muang, Quyen Ha Tran, Thanh Kim Cao:
Towards an understanding of real-time continuous feedback from simulation games. Interact. Technol. Smart Educ. 11(1): 45-62 (2014) - [j13]Huan Khoa Le, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hung Xuan Vo:
Ho Chi Minh City Open University: IT Governance in Vietnamese Higher Education. J. Inf. Technol. Educ. Discuss. Cases 3: 3 (2014) - [j12]Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hung Xuan Vo:
Mox Deals Vietnam: The Fight of Daily Deal Sites. J. Inf. Technol. Educ. Discuss. Cases 3: 4 (2014) - 2013
- [j11]Mathews Z. Nkhoma, Duy Pham Thien Dang:
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach. Int. J. Inf. Secur. Priv. 7(1): 30-44 (2013) - [j10]Hiep Cong Pham, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma:
IT Investment in ABC Textile and Dyeing: Asia Pacific Perspective. J. Inf. Technol. Educ. Discuss. Cases 2: 2 (2013) - [j9]Hiep Pham, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma:
Business Critical Application: An IT Investment Dilemma at a Securities Company. J. Inf. Technol. Educ. Discuss. Cases 2: 3 (2013) - [j8]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Tran Trong Minh Khoa: The Transition Process from a New Graduate Computer Engineer to an IT Professional. J. Inf. Technol. Educ. Discuss. Cases 2: 4 (2013) - [j7]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
PATSOFT: The Vietnamese ERP Solutions Provider. J. Inf. Technol. Educ. Discuss. Cases 2: 5 (2013) - [j6]Vo Thi Trung Trinh, Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Quang Trung Software City - The Largest Vietnamese Software Park. J. Inf. Technol. Educ. Discuss. Cases 2: 6 (2013) - [j5]Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Kinik-Thai: Material Requirement Planning System. J. Inf. Technol. Educ. Discuss. Cases 2: 7 (2013) - [j4]Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Osaka Flower Coffee Shop: Transaction Processing Systems. J. Inf. Technol. Educ. Discuss. Cases 2: 8 (2013) - [j3]Narumon Cherry Sriratanaviriyakul, Mathews Nkhoma, Hiep Cong Pham:
Tiki.VN: E-commerce & Entrepreneurship in Vietnam. J. Inf. Technol. Educ. Discuss. Cases 2: 9 (2013) - [c3]Duy Pham Thien Dang, Siddhi Pittayachawan, Mathews Zanda Nkhoma:
Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach. ACIS 2013: 49 - [c2]Nkhoma Zanda Nkhoma, Narumon Cherry Sriratanaviriyakul, Hiep Cong Pham, Tri Khai Lam:
Understanding the Paradox of Information Systems (IS) Case Studies. AMCIS 2013
2000 – 2009
- 2008
- [j2]Haralambos Mouratidis, Hamid Jahankhani, Mathews Z. Nkhoma:
Management versus security specialists: an empirical study on security related perceptions. Inf. Manag. Comput. Secur. 16(2): 187-205 (2008) - 2007
- [j1]Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma, Haralambos Mouratidis:
Information Systems Security: Cases of Network Administrator Threats. Int. J. Inf. Secur. Priv. 1(3): 13-25 (2007) - 2006
- [c1]Mathews Z. Nkhoma:
Aligning Network Security to Corporate Goals: Investing on Network Security. ICEIS Doctoral Consortium 2006: 130-134
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint