Follow
Jongwoo (Jonathan) Kim
Title
Cited by
Cited by
Year
Incident-centered information security: Managing a strategic balance between prevention and response
R Baskerville, P Spagnoletti, J Kim
Information & Management 51 (1), 138-151, 2014
3112014
Achieving dynamic capabilities with cloud computing: An empirical investigation
DA Battleson, BC West, J Kim, B Ramesh, PS Robinson
European Journal of Information Systems 25 (3), 209-230, 2016
1622016
The role of information security learning and individual factors in disclosing patients' health information
EH Park, J Kim, YS Park
Computers & Security 65, 64-76, 2017
652017
A model of emotion and computer abuse
JJ Kim, EHE Park, RL Baskerville
Information & Management 53 (1), 91-108, 2016
542016
The effect of IT failure impact and personal morality on IT project reporting behavior
CW Park, M Keil, JW Kim
IEEE Transactions on Engineering Management 56 (1), 45-60, 2008
512008
Achieving dynamic capabilities with business intelligence
P Xu, J Kim
412014
Conflicts and complements between eastern cultures and agile methods: an empirical investigation
B Ramesh, L Cao, J Kim, K Mohan, TL James
European Journal of Information Systems 26 (2), 206-235, 2017
342017
An emote opportunity model of computer abuse
R Baskerville, E Hee Park, J Kim
Information Technology & People 27 (2), 155-181, 2014
332014
Design for an interactive television advertising system
JW Kim, S Du
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
262006
Ontology driven requirements query
JC Caralt, JW Kim
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
252007
Web services composition with traceability centered on dependency
JW Kim, R Jain
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
252005
Factors affecting intention to disclose patients’ health information
EH Park, J Kim, LL Wiles, YS Park
Computers & Security 87, 101340, 2019
232019
Pruning bio-ontologies
JW Kim, JC Caralt, JK Hilliard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
222007
Benefits of blockchain initiatives for value-based care: proposed framework
R Zhang, A George, J Kim, V Johnson, B Ramesh
Journal of medical Internet research 21 (9), e13595, 2019
212019
Breaking the privacy kill chain: Protecting individual and group privacy online
J Kim, RL Baskerville, Y Ding
Information Systems Frontiers 22, 171-185, 2020
182020
Construction of domain ontologies: Sourcing the world wide web
J Kim, VC Storey
International Journal of Intelligent Information Technologies (IJIIT) 7 (2 …, 2011
182011
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation
J Kim, K Mohan, B Ramesh
IEEE Transactions on Professional Communication 57 (3), 182-203, 2014
142014
Software process re‐engineering: a model and its application to an industrial case study
NP Napier, J Kim, L Mathiassen
Software Process: Improvement and Practice 13 (5), 451-471, 2008
112008
Prosocial rule breaking on health information security at healthcare organisations in South Korea
J Kim, EH Park, YS Park, KH Chun, LL Wiles
Information Systems Journal, 2021
102021
Achieving dynamic capabilities with cloud computing
BC West, DA Battleson, J Kim, B Ramesh
IT Professional 16 (6), 18-24, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20