Sung S. Kim
Sung S. Kim
Verified email at - Homepage
Cited by
Cited by
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
NK Malhotra, SS Kim, J Agarwal
Information systems research 15 (4), 336-355, 2004
Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research
NK Malhotra, SS Kim, A Patil
Management science 52 (12), 1865-1883, 2006
A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena
SS Kim, NK Malhotra
Management science 51 (5), 741-755, 2005
Internet users' information privacy-protective responses: A taxonomy and a nomological model
JY Son, SS Kim
MIS quarterly, 503-529, 2008
Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services
SS Kim, JY Son
MIS quarterly, 49-70, 2009
Research note—two competing perspectives on automatic use: A theoretical and empirical comparison
SS Kim, NK Malhotra, S Narasimhan
Information systems research 16 (4), 418-432, 2005
The integrative framework of technology use: An extension and test
SS Kim
Mis Quarterly, 513-537, 2009
The central role of engagement in online communities
S Ray, SS Kim, JG Morris
Information Systems Research 25 (3), 528-546, 2014
Impact of prior reviews on the subsequent review process in reputation systems
X Ma, L Khansa, Y Deng, SS Kim
Journal of Management Information Systems 30 (3), 279-310, 2013
Understanding members’ active participation in online question-and-answer communities: A theory and empirical analysis
L Khansa, X Ma, D Liginlal, SS Kim
Journal of Management Information Systems 32 (2), 162-203, 2015
Research Note—Online Users' Switching Costs: Their Nature and Formation
S Ray, SS Kim, JG Morris
Information systems research 23 (1), 197-213, 2012
Predicting system usage from intention and past use: scale issues in the predictors
SS Kim, NK Malhotra
Decision Sciences 36 (1), 187-196, 2005
Security assurance: How online service providers can influence security control perceptions and gain trust
S Ray, T Ow, SS Kim
Decision Sciences 42 (2), 391-412, 2011
Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding
BCF Choi, Z Jiang, B Xiao, SS Kim
Information Systems Research 26 (4), 675-694, 2015
To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls
L Khansa, J Kuem, M Siponen, SS Kim
Journal of Management Information Systems 34 (1), 141-176, 2017
Influence of firm’s recovery endeavors upon privacy breach on online customer behavior
BCF Choi, SS Kim, Z Jiang
Journal of Management Information Systems 33 (3), 904-933, 2016
Bias breakdown.
NK Malhotra, A Patil, SS Kim
Marketing Research 19 (1), 2007
Online gambling behavior: The impacts of cumulative outcomes, recent outcomes, and prior use
X Ma, SH Kim, SS Kim
Information Systems Research 25 (3), 511-527, 2014
Consumer adoption of net-enabled infomediaries: Theoretical explanations and an empirical test
JY Son, SS Kim, FJ Riggins
Journal of the Association for Information Systems 7 (7), 18, 2006
What leads to prosocial behaviors on social networking services: A tripartite model
J Kuem, S Ray, M Siponen, SS Kim
Journal of Management Information Systems 34 (1), 40-70, 2017
The system can't perform the operation now. Try again later.
Articles 1–20