default search action
Dan J. Kim 0001
Person information
- affiliation: University of North Texas, Information Technology and Decision Sciences, G. Brint Ryan College of Business, Denton, USA
Other persons with a similar name
- Dan Kim
- Dan Bee Kim
- Dan Bi Kim
- Daniel Seung Kim (aka: Dan Seung Kim) — Stanford University, Cardiovascular Medicine, Stanford, CA, USA (and 1 more)
- Dong Seong Kim 0001 (aka: Dan Dongseong Kim) — University of Queensland, Brisbane, Australia (and 2 more)
- Thi Dan Linh Nguyen-Kim
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Sajani Thapa, Swati Panda, Ashish Ghimire, Dan J. Kim:
From engagement to retention: Unveiling factors driving user engagement and continued usage of mobile trading apps. Decis. Support Syst. 183: 114265 (2024) - [c67]Neda Khosh Kheslat, Dan J. Kim:
Securing the Dialogue: "Perceived Security Threats and Information Security Literacy in the Age of Social Conversational Agents". AMCIS 2024 - [c66]Arindam Majumder, Debalina Bera, Dan J. Kim:
Effect of Computer Usage Pattern and its Interaction with Personal Characteristics on User-Induced System Vulnerability. AMCIS 2024 - 2023
- [j59]Sarbottam Bhagat, Dan J. Kim:
Examining users' news sharing behaviour on social media: role of perception of online civic engagement and dual social influences. Behav. Inf. Technol. 42(8): 1194-1215 (2023) - [j58]Debalina Bera, Obi Ogbanufe, Dan J. Kim:
Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions. Decis. Support Syst. 171: 113977 (2023) - [j57]Dan J. Kim, Mark Salvacion, Mohammad Salehan, Dae Wan Kim:
An empirical study of community cohesiveness, community attachment, and their roles in virtual community participation. Eur. J. Inf. Syst. 32(3): 573-600 (2023) - [j56]Dan J. Kim, Indranil Bose, Arunabha Mukhopadhyay:
Special Issue on Bright Information and Communication Technologies in the 21st Century. Inf. Syst. Frontiers 25(5): 1661-1665 (2023) - [c65]Sara Memarian Esfahani, Dan J. Kim:
Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus. AMCIS 2023 - [c64]Debalina Bera, Dan J. Kim:
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. ICIS 2023 - 2022
- [j55]Hwee-Joo Kam, Dan J. Kim, Wu He:
Should we wear a velvet glove to enforce Information security policies in higher education? Behav. Inf. Technol. 41(10): 2259-2273 (2022) - [j54]Se Hun Lim, Dan J. Kim:
The effect of unmindfulness on impulse purchasing behaviours in the context of online shopping from a classical attitude theory perspective. Behav. Inf. Technol. 41(16): 3432-3449 (2022) - [j53]Mohammadreza Mousavizadeh, Mehrdad Koohikamali, Mohammad Salehan, Dan J. Kim:
An Investigation of Peripheral and Central Cues of Online Customer Review Voting and Helpfulness through the Lens of Elaboration Likelihood Model. Inf. Syst. Frontiers 24(1): 211-231 (2022) - [c63]Debalina Bera, Dan J. Kim:
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. AMCIS 2022 - [c62]Jordan E. F. Bernot, Dan J. Kim:
Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions. AMCIS 2022 - [c61]Sara Memarian Esfahani, Dan J. Kim:
The collective information privacy on social networking sites. AMCIS 2022 - [c60]Sara Memarian Esfahani, Dan J. Kim:
Uncovering Others on Social Networking Sites: The Perspective of Impulsive and Reflective Users. PACIS 2022: 337 - 2021
- [j52]Chris Maurer, Kevin Kim, Dan J. Kim, Leon A. Kappelman:
Cybersecurity: is it worse than we think? Commun. ACM 64(2): 28-30 (2021) - [j51]Rui Chen, Dan J. Kim, H. Raghav Rao:
A study of social networking site use from a three-pronged security and privacy threat assessment perspective. Inf. Manag. 58(5): 103486 (2021) - [j50]Obi Ogbanufe, Dan J. Kim, Mary C. Jones:
Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures. Inf. Manag. 58(7): 103507 (2021) - [j49]Hwee-Joo Kam, Thomas Mattson, Dan J. Kim:
The "Right" recipes for security culture: a competing values model perspective. Inf. Technol. People 34(5): 1490-1512 (2021) - [c59]Debalina Bera, Dan J. Kim:
Uncovering Thematic Dimensions of Fraudulent Emails using Topic Modelling. AMCIS 2021 - [c58]Mehrdad Koohikamali, Dan J. Kim:
US Census Block Groups and Location Sharing Behavior: Case of IoT Adoption. AMCIS 2021 - [c57]Smriti Srivastava, Dan J. Kim:
A Study Investigating Factors Affecting User Ratings in Mobile Games. WEB 2021: 57-66 - [c56]Debalina Bera, Dan J. Kim:
An Insight into Social Media Continuance Use: Through Systematic Literature Review. WEB 2021: 67-75 - 2020
- [j48]Reza Mousavi, Rui Chen, Dan J. Kim, Kuanchin Chen:
Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory. Decis. Support Syst. 135: 113323 (2020) - [j47]Kai Li, Dan J. Kim, Karl Reiner Lang, Robert J. Kauffman, Maurizio Naldi:
How should we understand the digital economy in Asia? Critical assessment and research agenda. Electron. Commer. Res. Appl. 44: 101004 (2020) - [j46]Sarbottam Bhagat, Eui Jun Jeong, Dan J. Kim:
The Role of Individuals' Need for Online Social Interactions and Interpersonal Incompetence in Digital Game Addiction. Int. J. Hum. Comput. Interact. 36(5): 449-463 (2020) - [j45]Se Hun Lim, Dan J. Kim:
Does Emotional Intelligence of Online Shoppers Affect Their Shopping Behavior? From a Cognitive-Affective-Conative Framework Perspective. Int. J. Hum. Comput. Interact. 36(14): 1304-1313 (2020) - [j44]Sarbottam Bhagat, Dan J. Kim:
Higher Education Amidst COVID-19: Challenges and Silver Lining. Inf. Syst. Manag. 37(4): 366-371 (2020) - [c55]Sarbottam Bhagat, Dan J. Kim, James L. Parrish:
Disinformation in Social Media: Role of Dark Triad Personality Traits and Self Regulation. AMCIS 2020 - [c54]Katia Guerra, Dan J. Kim:
Cybersecurity: A Definition across Europe and North America. AMCIS 2020 - [c53]Mohammad Salehan, Dan J. Kim:
An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages. HICSS 2020: 1-10 - [c52]M. A. Shariful Amin, Dan J. Kim:
An Analysis of Characteristics Affecting Trust Formation in Human Versus Machine Interactions from a Systematic Literature Review Perspective. WEB 2020: 129-136
2010 – 2019
- 2019
- [j43]Mehrdad Koohikamali, Aaron M. French, Dan J. Kim:
An investigation of a dynamic model of privacy trade-off in use of mobile social network applications: A longitudinal perspective. Decis. Support Syst. 119: 46-59 (2019) - [j42]Haejung Yun, Gwanhoo Lee, Dan J. Kim:
A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Inf. Manag. 56(4): 570-601 (2019) - [j41]Se Hun Lim, Dan J. Kim, Yeon Hur, Kunsu Park:
An Empirical Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use Mobile Fintech Payment Services. Int. J. Hum. Comput. Interact. 35(10): 886-898 (2019) - [j40]Changsu Kim, Jongheon Kim, Dan J. Kim:
Effects of personal motivation and computing characteristics on ubiquitous mobile device usages. Int. J. Mob. Commun. 17(2): 127-156 (2019) - [c51]Dan J. Kim, Bradford Love, Sanghun Kim:
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. NCS 2019: 85-96 - 2018
- [j39]Dan J. Kim, John Hebeler, Victoria Y. Yoon, Fred D. Davis:
Exploring Determinants of Semantic Web Technology Adoption from IT Professionals' Perspective: Industry Competition, Organization Innovativeness, and Data Management Capability. Comput. Hum. Behav. 86: 18-33 (2018) - [j38]Obi Ogbanufe, Dan J. Kim:
Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decis. Support Syst. 106: 1-14 (2018) - [j37]Mohammad Salehan, Dan Jong Kim, Jae-Nam Lee:
Are there any relationships between technology and cultural values? A country-level trend study of the association between information communication technology and cultural values. Inf. Manag. 55(6): 725-745 (2018) - [j36]Yulia W. Sullivan, Dan J. Kim:
Assessing the effects of consumers' product evaluations and trust on repurchase intention in e-commerce environments. Int. J. Inf. Manag. 39: 199-219 (2018) - [j35]Obi Ogbanufe, Dan J. Kim:
"Just how risky is it anyway?" The role of risk perception and trust on click-through intention. Inf. Syst. Manag. 35(3): 182-200 (2018) - [j34]Mohammad Salehan, Dan J. Kim, Chulmo Koo:
A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J. Supercomput. 74(8): 3596-3619 (2018) - [c50]Sarbottam Bhagat, Dan J. Kim:
Examining the Role of Individuals' Need for Online Social Interactions and Interpersonal Incompetence in Game Addiction. AMCIS 2018 - [c49]Md Rasel Al Mamun, Alsius David, Bin Mai, Dan J. Kim, Thomas D. Parsons:
The First 10 Years of NeuroIS: A Systematic Literature Review of NeuroIS Publications (2007 - 2017). HICSS 2018: 1-9 - [c48]Sarbottam Bhagat, Dan J. Kim:
Self-Esteem, Need for Online Affiliation, Privacy Calculus and Geo-Tagging Behavior. ICIS 2018 - [c47]Kevin Kim, Justin Smith, T. Andrew Yang, Dan J. Kim:
An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. NCS 2018: 1-7 - [c46]Dan J. Kim, Brandon Phillps, Young U. Ryu:
Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective. NCS 2018: 58-63 - 2017
- [j33]Eui Jun Jeong, Dan Jong Kim, Dong Min Lee:
Why Do Some People Become Addicted to Digital Games More Easily? A Study of Digital Game Addiction from a Psychosocial Health Perspective. Int. J. Hum. Comput. Interact. 33(3): 199-214 (2017) - [j32]Changsu Kim, Dan J. Kim:
Uncovering the value stream of digital content business from users' viewpoint. Int. J. Inf. Manag. 37(6): 553-565 (2017) - [j31]Se Hun Lim, Sukho Lee, Dan J. Kim:
Is Online Consumers' Impulsive Buying Beneficial for E-Commerce Companies? An Empirical Investigation of Online Consumers' Past Impulsive Buying Behaviors. Inf. Syst. Manag. 34(1): 85-100 (2017) - [j30]Mohammad Salehan, Dan Jong Kim, Changsu Kim:
Use of Online Social Networking Services from a Theoretical Perspective of the Motivation-Participation-Performance Framework. J. Assoc. Inf. Syst. 18(2): 1 (2017) - [c45]Mobark Q. Aldossari, Dan J. Kim:
Does More IT Utilization Improve Police Performance? AMCIS 2017 - [c44]Obi Ogbanufe, Dan J. Kim:
Hackers Delight: Knowledge Sharing Motives. AMCIS 2017 - [c43]Quynh N. Nguyen, Dan J. Kim:
Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives. HICSS 2017: 1-10 - [c42]Obi Ogbanufe, Dan J. Kim:
"Thanks for Sharing": Using Hacker Forum Data for Prediction of Knowledge Sharing and Withholding Behaviors. ICIS 2017 - 2016
- [j29]Mohammad Salehan, Dan Jong Kim:
Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics. Decis. Support Syst. 81: 30-40 (2016) - [j28]Mohammadreza Mousavizadeh, Dan J. Kim, Rui Chen:
Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study. Decis. Support Syst. 92: 79-90 (2016) - [j27]Dan Jong Kim, Myung-Seong Yim, Vijayan Sugumaran, H. Raghav Rao:
Web assurance seal services, trust and consumers' concerns: an investigation of e-commerce transaction intentions across two nations. Eur. J. Inf. Syst. 25(3): 252-273 (2016) - [j26]Arash Negahban, Dan Jong Kim, Changsu Kim:
Unleashing the Power of mCRM: Investigating Antecedents of Mobile CRM Values from Managers' Viewpoint. Int. J. Hum. Comput. Interact. 32(10): 747-764 (2016) - [j25]Lucian L. Visinescu, Olajumoke Azogu, Sherry D. Ryan, Yu Andy Wu, Dan J. Kim:
Better Safe than Sorry: A Study of Investigating Individuals' Protection of Privacy in the Use of Storage as a Cloud Computing Service. Int. J. Hum. Comput. Interact. 32(11): 885-900 (2016) - [c41]Mehrdad Koohikamali, Dan J. Kim:
Factors Influencing Emotional Attachment to Social Network Apps. AMCIS 2016 - [c40]Eui Jun Jeong, Dan Jong Kim, Dong Min Lee, Hye Rim Lee:
A Study of Digital Game Addiction from Aggression, Loneliness and Depression Perspectives. HICSS 2016: 3769-3780 - 2015
- [j24]Changsu Kim, Wen Li, Dan Jong Kim:
An Empirical Analysis of Factors Influencing M-Shopping Use. Int. J. Hum. Comput. Interact. 31(12): 974-994 (2015) - [j23]Dan Jong Kim, Eui Jun Jeong, Yujong Hwang:
A Study of Online Portal Users' Loyalty From Core Service, Additional Value-added Service and Switching Barriers Perspectives. Inf. Syst. Manag. 32(2): 136-152 (2015) - [c39]Eui Jun Jeong, Dan Jong Kim, Dong Min Lee:
Game Addiction from Psychosocial Health Perspective. ICEC 2015: 21:1-21:9 - [c38]Dan J. Kim, Mehrdad Koohikamali:
Does Information Sensitivity Make A Difference? Mobile Applications' Privacy Statements: A Text Mining Approach. AMCIS 2015 - [c37]Dan J. Kim, Mohammadreza Mousavizadeh:
A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. AMCIS 2015 - [c36]Dan J. Kim, Mohammadreza Mousavizadeh:
A Study of Antecedents of Sense of Presence in Virtual World: Virtual Presence vs. Social Presence. AMCIS 2015 - [c35]Dan Jong Kim, Mohammad Salehan:
The Effect of Sentiment on Information Diffusion in Social Media. AMCIS 2015 - [c34]Mohammadreza Mousavizadeh, Dan J. Kim:
A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. ICIS 2015 - [c33]Mohammad Salehan, Dan Jong Kim, Jae-Nam Lee:
Antecedents, Processes and Consequences of Web Assurance Seals: A Meta-Analysis Approach. PACIS 2015: 199 - [c32]Mehrdad Koohikamali, Dan J. Kim:
Rumor and Truth Spreading Patterns on Social Network Sites During Social Crisis: Big Data Analytics Approach. WEB 2015: 166-170 - 2014
- [j22]Dan J. Kim:
A Study of the Multilevel and Dynamic Nature of Trust in E-Commerce from a Cross-Stage Perspective. Int. J. Electron. Commer. 19(1): 11-64 (2014) - [j21]Jahyun Goo, Myung-Seong Yim, Dan Jong Kim:
A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. IEEE Trans. Prof. Commun. 57(4): 286-308 (2014) - [c31]Mohammad Salehan, Dan Jong Kim:
Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. ICIS 2014 - 2013
- [j20]Young Hoon Kim, Dan Jong Kim, Kathy Wachter:
A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention. Decis. Support Syst. 56: 361-370 (2013) - [c30]Jahyun Goo, Myung-Seong Yim, Dan Jong Kim:
A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate. HICSS 2013: 2959-2968 - [c29]Chenyan Xu, Lucian L. Visinescu, Dan J. Kim:
Disclose Intimately, Honesty, Heavily, Positively and Intentionally: An Exploration of Self-Disclosure in Social Networking Sites. ICIS 2013 - [c28]Mohammad Salehan, Dan Jong Kim:
Information and Communication Technologies (ICT): Driver of Cultural Change and Technological Advancement. PACIS 2013: 35 - 2012
- [j19]Dan J. Kim:
An investigation of the effect of online consumer trust on expectation, satisfaction, and post-expectation. Inf. Syst. E Bus. Manag. 10(2): 219-240 (2012) - [j18]Dan Jong Kim, Yujong Hwang:
A study of mobile internet user's service quality perceptions from a user's utilitarian and hedonic value tendency perspectives. Inf. Syst. Frontiers 14(2): 409-421 (2012) - [j17]Dan J. Kim, Kwok-Bun Yue, Hisham Al-Mubaid, Sharon Perkins Hall, Krishani Abeysekera:
Assessing Information Systems and Computer Information Systems Programs from a Balanced Scorecard Perspective. J. Inf. Syst. Educ. 23(2): 177-192 (2012) - [c27]Mohammad Salehan, Dan Jong Kim:
The Effect of Attitude, Social Trust and Trust in Social Networking Sites on Two Dimensions of Sharing Behavior. AMCIS 2012 - 2011
- [j16]Venkata Vijay K. Durbhakula, Dan J. Kim:
E-business for Nations: A Study of National Level E-business Adoption Factors Using Country Characteristics-Business-Technology-Government Framework. J. Theor. Appl. Electron. Commer. Res. 6(3): 1-12 (2011) - [c26]Dan J. Kim, Hisham Al-Mubaid, Kwok-Bun Yue, Nouhad Rizk:
From Expectation to Actual Perception after Experience: A Longitudinal Study of the Perceptions of Student Response Systems. AMCIS 2011 - 2010
- [c25]Dan J. Kim, T. Andrew Yang:
A New Approach for Collaborative Knowledge Management: A Unified Conceptual Model for Collaborative Knowledg Management. AMCIS 2010: 131 - [c24]Ninad Naik, Dan J. Kim:
Virtual Team Success: Towards a Theory of Performance in Virtual Teams. AMCIS 2010: 429 - [c23]Ninad Naik, Dan J. Kim:
An Extended Adaptive Structuration Theory for the determinants and Consequences of Virtual Team Success. ICIS 2010: 232
2000 – 2009
- 2009
- [j15]Dan J. Kim, Kwok-Bun Yue, Sharon Perkins Hall, Tracy Gates:
Global Diffusion of the Internet XV: Web 2.0 Technologies, Principles, and Applications: A Conceptual Framework from Technology Push and Demand Pull Perspective. Commun. Assoc. Inf. Syst. 24: 38 (2009) - [j14]Dan Jong Kim, Charles Steinfield, Pamela Whitten:
The Effects of Different Presentation Modalities on a Person Identification Task: A Study of Wireless Multimedia PDA Use in a Security Context. Int. J. Hum. Comput. Interact. 25(2): 134-154 (2009) - [j13]Dan Jong Kim, Donald L. Ferrin, H. Raghav Rao:
Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration. Inf. Syst. Res. 20(2): 237-257 (2009) - [j12]Kwok-Bun Yue, Dilhar De Silva, Dan J. Kim, Mirac Aktepe, Stewart Nagle, Chris Boerger, Anubha Jain, Sunny Verma:
Building Real World Domain-Specific Social Network Websites as a Capstone Project. J. Inf. Syst. Educ. 20(1): 67-76 (2009) - [j11]Young Hoon Kim, Dan Jong Kim, Yujong Hwang:
Exploring Online Transaction Self-Efficacy in Trust Building in B2C E-Commerce. J. Organ. End User Comput. 21(1): 37-59 (2009) - [c22]Ninad Naik, Dan J. Kim, T. Andrew Yang, Kwok-Bun Yue, Hisham Al-Mubaid:
Critical Factors Influencing the Service Quality of Information Systems: An Organizational View. AMCIS 2009: 416 - [c21]Dan J. Kim, Dongsong Zhang:
The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual World. WEB 2009: 30-43 - 2008
- [j10]Dan Jong Kim, Donald L. Ferrin, H. Raghav Rao:
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decis. Support Syst. 44(2): 544-564 (2008) - [j9]Dan Jong Kim, Charles Steinfield, Ying-ju Lai:
Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decis. Support Syst. 44(4): 1000-1015 (2008) - [j8]Namjoo Choi, Dan Jong Kim, Jahyun Goo, Andrew Whitmore:
Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. Inf. Manag. Comput. Secur. 16(5): 484-501 (2008) - [j7]Dan J. Kim:
Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study. J. Manag. Inf. Syst. 24(4): 13-45 (2008) - [c20]Dan J. Kim:
An OBTG (Organizational - Business - Technological - Governmental) E-business Adoption Model for Small and Medium Sized Enterprises. AMCIS 2008: 243 - [c19]T. Andrew Yang, Dan J. Kim, Vishal Dhalwani, Tri K. Vu:
The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. HICSS 2008: 319 - 2007
- [j6]Yujong Hwang, Dan Jong Kim:
Customer self-service systems: The effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust. Decis. Support Syst. 43(3): 746-760 (2007) - [j5]Myeong-Cheol Park, Dan Jong Kim, Sang-Woo Lee:
Demand for Number Portability in the Korean Telecommunications Market: Contingent Valuation Approach. J. Glob. Inf. Manag. 15(1): 43-67 (2007) - [c18]Dan J. Kim, Kwok-Bun Yue, T. Andrew Yang:
Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic Networks. AMCIS 2007: 175 - [c17]Eui Jun Jeong, Dan Jong Kim:
A Longitudinal Study of Game Perceptions from the Perspective of Yin-Yang Theory. HICSS 2007: 160 - [c16]T. Andrew Yang, Dan J. Kim, Vishal Dhalwani:
Social Networking as a New Trend in E-Marketing. CONFENIS (2) 2007: 847-856 - 2006
- [j4]Abhishek P. Patil, Dan J. Kim, Lionel M. Ni:
A study of frequency interference and indoor location sensing with 802.11b and Bluetooth technologies. Int. J. Mob. Commun. 4(6): 621-644 (2006) - [c15]Dan Jong Kim, Yujong Hwang:
A Study of Mobile Internet Usage from Utilitarian and Hedonic User Tendency Perspectives. AMCIS 2006: 251 - [c14]Jahyun Goo, Dan Jong Kim, Bongsoon Cho:
Structure of Service Level Agreements (SLA) in IT Outsourcing: The Construct and Its Measurement. AMCIS 2006: 391 - [c13]Namjoo Choi, Dan Jong Kim, Jahyun Goo:
Managerial Information Security Awareness' Impact on an Organization's Information Security Performance. AMCIS 2006: 406 - 2005
- [j3]Dan Jong Kim, Yong I. Song, Sviatoslav B. Braynov, H. Raghav Rao:
A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives. Decis. Support Syst. 40(2): 143-165 (2005) - [c12]Dan J. Kim:
A Study of the Impact of Culture on Trust Determinants in eCommerce: A Cross-culture Comparison Study. AMCIS 2005: 42 - [c11]JinKyu Lee, Dan Jong Kim, H. Raghav Rao:
An Examination of Trust Effects and Pre-Existing Relational Risks in eGovernment Services. AMCIS 2005: 143 - [c10]Dan J. Kim:
An Investigation on the New Mobile Service/Technology Adoption. AMCIS 2005: 326 - [c9]Young Hoon Kim, Dan Jong Kim:
A Study of Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction. HICSS 2005 - 2004
- [j2]Dan Jong Kim, Natarajan Sivasailam, H. Raghav Rao:
Information Assurance in B2C Websites for Information Goods/Services. Electron. Mark. 14(4): 344-359 (2004) - [c8]Dan Jong Kim, Charles Steinfield, Ying-ju Lai:
Revisiting the role of web assurance seals in consumer trust. ICEC 2004: 280-287 - [c7]Dan Jong Kim, Charles Steinfield:
Consumers Mobile Internet Service Satisfaction and their Continuance Intentions. AMCIS 2004: 332 - [c6]Sang-Woo Lee, Dan Jong Kim, Myeong-Cheol Park:
Demand for Number Portability in the Korean Mobile Telecommunications Market: Contingent Valuation Approach. HICSS 2004 - 2003
- [j1]Dan Jong Kim, Manish Agrawal, Bharat Jayaraman, H. Raghav Rao:
A comparison of B2B e-service solutions. Commun. ACM 46(12): 317-324 (2003) - [c5]Dan Jong Kim, Donald L. Ferrin, H. Raghav Rao:
A study of the effect of consumer trust on consumer expectations and satisfaction: the Korean experience. ICEC 2003: 310-315 - [c4]Dan Jong Kim, Donald L. Ferrin, H. Raghav Rao:
Antecedents of Consumer Trust in B-to-C Electronic Commerce. AMCIS 2003: 21 - [c3]Dan Jong Kim, Ki-Young Lee, Doohwang Lee, Donald L. Ferrin, H. Raghav Rao:
Trust, Risk and Benefit in Electronic Commerce: What Are the Relationships? AMCIS 2003: 22 - [c2]Dan Jong Kim, Donald L. Ferrin, H. Raghav Rao:
An Investigation of Consumer Online Trust and Purchase-Repurchase Intentions. ICIS 2003: 353-365 - 2000
- [c1]Dan Jong Kim, Bongsoon Cho, H. Raghav Rao:
Effects of consumer lifestyles on purchasing behavior on the Internet: a conceptual framework and empirical validation. ICIS 2000: 688-695
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint