Folgen
Sung S. Kim
Sung S. Kim
Bestätigte E-Mail-Adresse bei bus.wisc.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
NK Malhotra, SS Kim, J Agarwal
Information systems research 15 (4), 336-355, 2004
41032004
Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research
NK Malhotra, SS Kim, A Patil
Management science 52 (12), 1865-1883, 2006
34732006
A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena
SS Kim, NK Malhotra
Management science 51 (5), 741-755, 2005
14122005
Internet users' information privacy-protective responses: A taxonomy and a nomological model
JY Son, SS Kim
MIS quarterly, 503-529, 2008
7912008
Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services
SS Kim, JY Son
MIS quarterly, 49-70, 2009
6632009
Research note—two competing perspectives on automatic use: A theoretical and empirical comparison
SS Kim, NK Malhotra, S Narasimhan
Information systems research 16 (4), 418-432, 2005
6192005
The central role of engagement in online communities
S Ray, SS Kim, JG Morris
Information Systems Research 25 (3), 528-546, 2014
3802014
The integrative framework of technology use: An extension and test
SS Kim
Mis Quarterly, 513-537, 2009
3062009
Understanding members’ active participation in online question-and-answer communities: A theory and empirical analysis
L Khansa, X Ma, D Liginlal, SS Kim
Journal of Management Information Systems 32 (2), 162-203, 2015
1882015
Impact of prior reviews on the subsequent review process in reputation systems
X Ma, L Khansa, Y Deng, SS Kim
Journal of Management Information Systems 30 (3), 279-310, 2013
1882013
Research Note—Online Users' Switching Costs: Their Nature and Formation
S Ray, SS Kim, JG Morris
Information systems research 23 (1), 197-213, 2012
1522012
Security assurance: How online service providers can influence security control perceptions and gain trust
S Ray, T Ow, SS Kim
Decision Sciences 42 (2), 391-412, 2011
1432011
To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls
L Khansa, J Kuem, M Siponen, SS Kim
Journal of Management Information Systems 34 (1), 141-176, 2017
1372017
Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding
BCF Choi, Z Jiang, B Xiao, SS Kim
Information Systems Research 26 (4), 675-694, 2015
1332015
Predicting system usage from intention and past use: scale issues in the predictors
SS Kim, NK Malhotra
Decision sciences 36 (1), 187-196, 2005
1272005
Influence of firm’s recovery endeavors upon privacy breach on online customer behavior
BCF Choi, SS Kim, Z Jiang
Journal of management information systems 33 (3), 904-933, 2016
1082016
Bias breakdown.
NK Malhotra, A Patil, SS Kim
Marketing Research 19 (1), 2007
732007
Measuring and controlling social desirability bias: Applications in information systems research
DH Kwak, P Holtkamp, SS Kim
Journal of the Association for Information Systems 20 (4), 5, 2019
722019
What leads to prosocial behaviors on social networking services: A tripartite model
J Kuem, S Ray, M Siponen, SS Kim
Journal of Management Information Systems 34 (1), 40-70, 2017
702017
Online gambling behavior: The impacts of cumulative outcomes, recent outcomes, and prior use
X Ma, SH Kim, SS Kim
Information Systems Research 25 (3), 511-527, 2014
692014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20