Sung S. Kim

According to our database1, Sung S. Kim authored at least 25 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities.
J. Manag. Inf. Syst., 2020

Disrupting Unwanted Habits in Online Gambling Through Information Technology.
J. Manag. Inf. Syst., 2019

Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research.
J. Assoc. Inf. Syst., 2019

Active Community Participation and Crowdworking Turnover: A Longitudinal Model and Empirical Test of Three Mechanisms.
J. Manag. Inf. Syst., 2018

What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model.
J. Manag. Inf. Syst., 2017

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls.
J. Manag. Inf. Syst., 2017

Influence of Firm's Recovery Endeavors upon Privacy Breach on Online Customer Behavior.
J. Manag. Inf. Syst., 2016

Understanding Members' Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis.
J. Manag. Inf. Syst., 2015

Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding.
Inf. Syst. Res., 2015

Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems.
J. Manag. Inf. Syst., 2014

The Central Role of Engagement in Online Communities.
Inf. Syst. Res., 2014

Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use.
Inf. Syst. Res., 2014

Moderating Roles of Review Credibility and Author Popularity on Book Sales.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Research Note - Online Users' Switching Costs: Their Nature and Formation.
Inf. Syst. Res., 2012

Security Assurance: How Online Service Providers Can Influence Security Control Perceptions and Gain Trust.
Decis. Sci., 2011

Revisiting Self-Selection Biases in E-Word-of-Mouth: An Integrated Model and Bayesian Estimation of Multivariate Review Behaviors.
Proceedings of the International Conference on Information Systems, 2011

Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services.
MIS Q., 2009

Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model.
MIS Q., 2006

Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research.
Manag. Sci., 2006

Consumer Adoption of Net-Enabled Infomediaries: Theoretical Explanations and an Empirical Test.
J. Assoc. Inf. Syst., 2006

A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena.
Manag. Sci., 2005

Research Note - Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison.
Inf. Syst. Res., 2005

Predicting System Usage from Intention and Past Use: Scale Issues in the Predictors.
Decis. Sci., 2005

Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.
Inf. Syst. Res., 2004

Smooth (C<sup>∞</sup>) but Nowhere Analytic Functions.
Am. Math. Mon., 2000