Jongwoo Kim

Orcid: 0000-0001-5656-4436

Affiliations:
  • University of Massachusetts Boston, MSIS Department, MA, USA


According to our database1, Jongwoo Kim authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Facilitating and impeding factors to insiders' prosocial rule breaking in South Korea.
Comput. Secur., January, 2024

2023
The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information.
Inf. Technol. Manag., June, 2023

2022
Prosocial rule breaking on health information security at healthcare organisations in South Korea.
Inf. Syst. J., 2022

The cybersecurity risk estimation engine: A tool for possibility based risk analysis.
Comput. Secur., 2022

2020
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online.
Inf. Syst. Frontiers, 2020

2019
IT-leveraged network value cocreation: a case study of the value cocreation process and value capture in the South Korean broadcast advertising industry.
Eur. J. Inf. Syst., 2019

Factors affecting intention to disclose patients' health information.
Comput. Secur., 2019

2017
Conflicts and complements between eastern cultures and agile methods: an empirical investigation.
Eur. J. Inf. Syst., 2017

The role of information security learning and individual factors in disclosing patients' health information.
Comput. Secur., 2017

2016
A model of emotion and computer abuse.
Inf. Manag., 2016

Achieving dynamic capabilities with cloud computing: an empirical investigation.
Eur. J. Inf. Syst., 2016

2015
The Ethics of Online Social Network Forensics.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

2014
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation.
IEEE Trans. Prof. Commun., 2014

Achieving Dynamic Capabilities with Cloud Computing.
IT Prof., 2014

An emote opportunity model of computer abuse.
Inf. Technol. People, 2014

Incident-centered information security: Managing a strategic balance between prevention and response.
Inf. Manag., 2014

Achieving Dynamic Capabilities with Business Intelligence.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2011
Construction of Domain Ontologies: Sourcing the World Wide Web.
Int. J. Intell. Inf. Technol., 2011


  Loading...