Jongwoo (Jonathan) Kim
Cited by
Cited by
Incident-centered information security: Managing a strategic balance between prevention and response
R Baskerville, P Spagnoletti, J Kim
Information & Management 51 (1), 138-151, 2014
Achieving dynamic capabilities with cloud computing: An empirical investigation
DA Battleson, BC West, J Kim, B Ramesh, PS Robinson
European Journal of Information Systems 25, 209-230, 2016
The role of information security learning and individual factors in disclosing patients' health information
EH Park, J Kim, YS Park
Computers & Security 65, 64-76, 2017
A model of emotion and computer abuse
JJ Kim, EHE Park, RL Baskerville
Information & Management 53 (1), 91-108, 2016
The effect of IT failure impact and personal morality on IT project reporting behavior
CW Park, M Keil, JW Kim
IEEE Transactions on Engineering Management 56 (1), 45-60, 2008
Achieving dynamic capabilities with business intelligence
P Xu, J Kim
Conflicts and complements between eastern cultures and agile methods: an empirical investigation
B Ramesh, L Cao, J Kim, K Mohan, TL James
European Journal of Information Systems 26 (2), 206-235, 2017
An emote opportunity model of computer abuse
R Baskerville, E Hee Park, J Kim
Information Technology & People 27 (2), 155-181, 2014
Design for an interactive television advertising system
JW Kim, S Du
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
Web services composition with traceability centered on dependency
JW Kim, R Jain
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
Ontology driven requirements query
JC Caralt, JW Kim
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Factors affecting intention to disclose patients’ health information
EH Park, J Kim, LL Wiles, YS Park
Computers & Security 87, 101340, 2019
Pruning bio-ontologies
JW Kim, JC Caralt, JK Hilliard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Benefits of blockchain initiatives for value-based care: proposed framework
R Zhang, A George, J Kim, V Johnson, B Ramesh
Journal of medical Internet research 21 (9), e13595, 2019
Breaking the privacy kill chain: Protecting individual and group privacy online
J Kim, RL Baskerville, Y Ding
Information Systems Frontiers 22, 171-185, 2020
Construction of domain ontologies: Sourcing the world wide web
J Kim, VC Storey
International Journal of Intelligent Information Technologies (IJIIT) 7 (2 …, 2011
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation
J Kim, K Mohan, B Ramesh
IEEE Transactions on Professional Communication 57 (3), 182-203, 2014
Software process re‐engineering: a model and its application to an industrial case study
NP Napier, J Kim, L Mathiassen
Software Process: Improvement and Practice 13 (5), 451-471, 2008
Prosocial rule breaking on health information security at healthcare organisations in South Korea
J Kim, EH Park, YS Park, KH Chun, LL Wiles
Information Systems Journal, 2021
Achieving dynamic capabilities with cloud computing
BC West, DA Battleson, J Kim, B Ramesh
IT Professional 16 (6), 18-24, 2014
The system can't perform the operation now. Try again later.
Articles 1–20