Incident-centered information security: Managing a strategic balance between prevention and response R Baskerville, P Spagnoletti, J Kim Information & Management 51 (1), 138-151, 2014 | 323 | 2014 |
Achieving dynamic capabilities with cloud computing: An empirical investigation DA Battleson, BC West, J Kim, B Ramesh, PS Robinson European Journal of Information Systems 25 (3), 209-230, 2016 | 174 | 2016 |
The role of information security learning and individual factors in disclosing patients' health information EH Park, J Kim, YS Park Computers & Security 65, 64-76, 2017 | 70 | 2017 |
A model of emotion and computer abuse JJ Kim, EHE Park, RL Baskerville Information & Management 53 (1), 91-108, 2016 | 55 | 2016 |
The effect of IT failure impact and personal morality on IT project reporting behavior CW Park, M Keil, JW Kim IEEE Transactions on Engineering Management 56 (1), 45-60, 2008 | 52 | 2008 |
Achieving dynamic capabilities with business intelligence P Xu, J Kim | 42 | 2014 |
Conflicts and complements between eastern cultures and agile methods: an empirical investigation B Ramesh, L Cao, J Kim, K Mohan, TL James European Journal of Information Systems 26 (2), 206-235, 2017 | 35 | 2017 |
An emote opportunity model of computer abuse R Baskerville, E Hee Park, J Kim Information Technology & People 27 (2), 155-181, 2014 | 34 | 2014 |
Design for an interactive television advertising system JW Kim, S Du Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 27 | 2006 |
Ontology driven requirements query JC Caralt, JW Kim 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 25 | 2007 |
Web services composition with traceability centered on dependency JW Kim, R Jain Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 25 | 2005 |
Factors affecting intention to disclose patients’ health information EH Park, J Kim, LL Wiles, YS Park Computers & Security 87, 101340, 2019 | 22 | 2019 |
Benefits of blockchain initiatives for value-based care: proposed framework R Zhang, A George, J Kim, V Johnson, B Ramesh Journal of medical Internet research 21 (9), e13595, 2019 | 22 | 2019 |
Pruning bio-ontologies JW Kim, JC Caralt, JK Hilliard 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 22 | 2007 |
Breaking the privacy kill chain: Protecting individual and group privacy online J Kim, RL Baskerville, Y Ding Information Systems Frontiers 22, 171-185, 2020 | 18 | 2020 |
Construction of domain ontologies: Sourcing the world wide web J Kim, VC Storey International Journal of Intelligent Information Technologies (IJIIT) 7 (2 …, 2011 | 18 | 2011 |
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation J Kim, K Mohan, B Ramesh IEEE Transactions on Professional Communication 57 (3), 182-203, 2014 | 15 | 2014 |
Prosocial rule breaking on health information security at healthcare organisations in South Korea J Kim, EH Park, YS Park, KH Chun, LL Wiles Information Systems Journal, 2021 | 13 | 2021 |
Software process re‐engineering: a model and its application to an industrial case study NP Napier, J Kim, L Mathiassen Software Process: Improvement and Practice 13 (5), 451-471, 2008 | 12 | 2008 |
Achieving dynamic capabilities with cloud computing BC West, DA Battleson, J Kim, B Ramesh IT Professional 16 (6), 18-24, 2014 | 10 | 2014 |