Faculty Profile

Dan Kim

Title
Professor
Department
Information Technology and Decision Sciences
College
College of Business

    

Education

PhD, State University of New York (SUNY) at Buffalo, 2003.
Major: Management
Degree Specialization: Industrial Engineering
Dissertation Title: Three Essays on Trust in B-to-C Electronic Commerce
MS, State University of New York (SUNY) at Buffalo, 2002.
Major: Computer Science and Engineering
Dissertation Title: A Survey of Machine Learning Techniques for Language (Vocabulary) Acquisition
MSc, Hankuk University of Foreign Studies, 1991.
Major: Management Science
Dissertation Title: A Study of Developing a Prototype Knowledge Base System for Selection of Statistical Techniques
BBA, Kookmin University, 1988.
Major: Management Information Systems

Current Scheduled Teaching*

BCIS 4740.003, Administration and Policy in Information Security, Summer 2024
BCIS 5740.004, Information Security Management, Summer 2024
BCIS 6950.701, Doctoral Dissertation, Spring 2024
BCIS 5740.003, Information Security Management, Spring 2024 Syllabus
BCIS 5740.004, Information Security Management, Spring 2024 Syllabus
BCIS 6900.711, Special Problems, Spring 2024

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Previous Scheduled Teaching*

BCIS 6950.010, Doctoral Dissertation, Fall 2023
BCIS 5740.006, Information Security Management, Fall 2023 Syllabus SPOT
BCIS 6010.001, Seminar in Business Administration, Fall 2023 Syllabus SPOT
BCIS 4740.002, Administration and Policy in Information Security, Summer 5W1 2023 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Summer 5W2 2023
BCIS 5740.002, Information Security Management, Summer 5W1 2023 Syllabus SPOT
BCIS 5740.003, Information Security Management, Summer 5W2 2023 Syllabus SPOT
BCIS 6950.701, Doctoral Dissertation, Spring 2023
BCIS 5740.003, Information Security Management, Spring 2023 SPOT
BCIS 4740.002, Administration and Policy in Information Security, Fall 2022 Syllabus SPOT
BCIS 6950.010, Doctoral Dissertation, Fall 2022
BCIS 5740.002, Information Security Management, Fall 2022 Syllabus SPOT
BCIS 5740.003, Information Security Management, Fall 2022 Syllabus SPOT
BCIS 6900.708, Special Problems, Fall 2022
BCIS 4740.002, Administration and Policy in Information Security, Summer 5W1 2022 Syllabus SPOT
BCIS 4740.003, Administration and Policy in Information Security, Summer 5W2 2022 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Summer 5W2 2022
BCIS 5740.002, Information Security Management, Summer 5W1 2022 Syllabus SPOT
BCIS 5740.003, Information Security Management, Summer 5W2 2022 Syllabus SPOT
BCIS 6900.710, Special Problems, Summer 10W 2022
BCIS 4740.002, Administration and Policy in Information Security, Spring 2022 Syllabus SPOT
BCIS 4740.004, Administration and Policy in Information Security, Spring 2022 Syllabus SPOT
BCIS 6950.701, Doctoral Dissertation, Spring 2022
BCIS 5740.001, Information Security Management, Spring 2022 Syllabus SPOT
BCIS 5740.002, Information Security Management, Spring 2022 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Spring 2022 Syllabus SPOT
INFO 6660.017, Readings in Information Science, Spring 2022
BCIS 6900.711, Special Problems, Spring 2022
BCIS 4740.001, Administration and Policy in Information Security, Fall 2021 Syllabus SPOT
BCIS 6950.010, Doctoral Dissertation, Fall 2021
BCIS 5740.001, Information Security Management, Fall 2021 Syllabus SPOT
BCIS 6010.001, Seminar in Business Administration, Fall 2021 Syllabus SPOT
BCIS 6900.708, Special Problems, Fall 2021
BCIS 4740.001, Administration and Policy in Information Security, Summer 3W1 2021 Syllabus SPOT
BCIS 3610.004, Basic Information Systems, Summer 5W2 2021 Syllabus SPOT
BCIS 5740.001, Information Security Management, Summer 3W1 2021 Syllabus SPOT
BCIS 6900.710, Special Problems, Summer 10W 2021
BCIS 4740.001, Administration and Policy in Information Security, Spring 2021 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Spring 2021
BCIS 5630.001, Information Technology Security, Spring 2021 Syllabus SPOT
BCIS 6900.710, Special Problems, Spring 2021
BCIS 4740.001, Administration and Policy in Information Security, Fall 2020 Syllabus SPOT
BCIS 6950.010, Doctoral Dissertation, Fall 2020
BCIS 6940.710, Individual Research, Fall 2020
BCIS 5740.001, Information Security Management, Fall 2020 Syllabus SPOT
BCIS 3610.001, Basic Information Systems, Summer 3W1 2020 Syllabus SPOT
BCIS 4740.001, Administration and Policy in Information Security, Spring 2020 Syllabus
BCIS 6940.710, Individual Research, Spring 2020
BCIS 5630.001, Information Technology Security, Spring 2020 Syllabus
BCIS 6900.710, Special Problems, Spring 2020
BCIS 4740.001, Administration and Policy in Information Security, Fall 2019 Syllabus SPOT
BCIS 5740.001, Information Security Management, Fall 2019 Syllabus SPOT
BCIS 6010.001, Seminar in Business Administration, Fall 2019 Syllabus SPOT
BCIS 5900.710, Special Problems, Spring 2019
BCIS 4740.001, Administration and Policy in Information Security, Fall 2018 Syllabus SPOT
BCIS 5740.001, Information Security Management, Fall 2018 SPOT
BCIS 2610.002, Introduction to Computers in Business, Fall 2018 Syllabus SPOT
BCIS 5900.710, Special Problems, Fall 2018
BCIS 6940.710, Individual Research, Summer 2018
BCIS 2610.002, Introduction to Computers in Business, Summer 3W1 2018 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Spring 2018
BCIS 5630.001, Information Technology Security, Spring 2018
BCIS 2610.002, Introduction to Computers in Business, Spring 2018 Syllabus SPOT
BCIS 6950.010, Doctoral Dissertation, Fall 2017
BCIS 6010.001, Seminar in Business Administration, Fall 2017 SPOT
BCIS 3610.001, Basic Information Systems, Summer 3W1 2017 Syllabus SPOT
BCIS 4740.001, Administration and Policy in Information Security, Spring 2017 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Spring 2017
BCIS 5630.001, Information Technology Security, Spring 2017 SPOT
BCIS 4740.001, Administration and Policy in Information Security, Fall 2016 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2016 Syllabus SPOT
BCIS 5740.001, Information Security Management, Fall 2016 SPOT
BCIS 3610.001, Basic Information Systems, Summer 3W1 2016 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Summer 10W 2016
BCIS 6940.756, Individual Research, Summer 5W1 2016
BCIS 4740.001, Administration and Policy in Information Security, Spring 2016 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Spring 2016
BCIS 5630.001, Information Technology Security, Spring 2016 SPOT
BCIS 4740.001, Administration and Policy in Information Security, Fall 2015 Syllabus SPOT
BCIS 6950.010, Doctoral Dissertation, Fall 2015
BCIS 6940.710, Individual Research, Fall 2015
BCIS 6010.001, Seminar in Business Administration, Fall 2015 SPOT
BCIS 3610.001, Basic Information Systems, Summer 3W1 2015 Syllabus SPOT
BCIS 6950.710, Doctoral Dissertation, Summer 10W 2015
BCIS 6940.710, Individual Research, Summer 2015
BCIS 6900.710, Special Problems, Summer 10W 2015
BCIS 4740.001, Administration and Policy in Information Security, Spring 2015 Syllabus
BCIS 6950.710, Doctoral Dissertation, Spring 2015
BCIS 6940.710, Individual Research, Spring 2015
BCIS 5630.001, Information Technology Security, Spring 2015
BCIS 4740.001, Administration and Policy in Information Security, Fall 2014 Syllabus
BCIS 6950.010, Doctoral Dissertation, Fall 2014
BCIS 6940.710, Individual Research, Fall 2014
BCIS 5740.001, Information Security Management, Fall 2014
BCIS 2610.050, Introduction to Computers in Business, Fall 2014 Syllabus
BCIS 5900.710, Special Problems, Fall 2014
BCIS 6950.710, Doctoral Dissertation, Summer 5W2 2014
BCIS 6910.710, Special Problems, Summer 10W 2014
BCIS 4740.001, Administration and Policy in Information Security, Spring 2014
BCIS 6950.710, Doctoral Dissertation, Spring 2014
BCIS 5630.001, Information Technology Security, Spring 2014
BCIS 4740.001, Administration and Policy in Information Security, Fall 2013
BCIS 6940.710, Individual Research, Fall 2013
BCIS 6010.001, Seminar in Business Administration, Fall 2013
BCIS 6900.710, Special Problems, Summer 10W 2013
BCIS 4740.001, Administration and Policy in Information Security, Spring 2013
BCIS 3610.050, Basic Information Systems, Spring 2013
BCIS 5900.710, Special Problems, Spring 2013
BCIS 6900.710, Special Problems, Spring 2013
BCIS 4740.001, Administration and Policy in Information Security, Fall 2012
BCIS 6900.760, Special Problems, Summer 2012
BCIS 4740.001, Administration and Policy in Information Security, Spring 2012
BCIS 5900.710, Special Problems, Spring 2012
BCIS 4740.001, Administration and Policy in Information Security, Fall 2011

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Published Publications

Published Intellectual Contributions

Abstracts and Proceedings
Bernot, J., Kim, D. (2022). Discovering New Cybersecurity Knowledge, Skills, and Abilities, Pre-ICIS Workshop.
Bernot, J., Kim, D. (2022). Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions. https://aisel.aisnet.org/amcis2022/sig_sec/sig_sec/5
Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. https://aisel.aisnet.org/amcis2022/sig_sec/sig_sec/6
Prateek, P., Srivastava, S., Kim, D. (2022). The Role of Technological Advancement, and Social Justice in Alleviating the Negative Consequences of COVID-19 Pandemic.
Srivastava, S., Prateek, P., Kim, D. (2022). When Social Media Foretells a Shooting. https://aisel.aisnet.org/treos_icis2022/16
Mamun, M., Mai, B., Shin, B., Kulkarni, S., Kim, D. (2017). Anonymity of a Network System. Bright Internet Global Summit (BIG Summit) -2017.
Book Chapter
Srivastava, S., Kim, D. (2022). A Study Investigating Factors Affecting User Ratings in Mobile Games. Workshop on e-Business. 57-66. Springer, Cham.
Bera, D., Kim, D. (2022). An Insight into Social Media Continuance Use: Through Systematic Literature Review. Workshop on e-Business. 67-75. Springer, Cham.
Kim, D., Love, B., Kim, S. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. Advances in Intelligent Systems and Computing. 85-96. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31239-8_8
Kim, D., Love, B. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. Springer International Publishing. 85-96. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31239-8_8
Koohikamali, M., Kim, D. (2016). Rumor and Truth Spreading Patterns on Social Network Sites During Social Crisis: Big Data Analytics Approach. Lecture Notes in Business Information Processing. 166-170. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-45408-5_15
Hanus, B., Kim, D. (2015). e-Commerce and Online Security. The International Encyclopedia of Digital Communication and Society. 1-9. John Wiley & Sons, Inc.. http://dx.doi.org/10.1002/9781118767771.wbiedcs030
Kim, Y. H., Kim, D. J. (2011). Does Self-Efficacy Matter? Examining Online Transaction Self-Efficacy and General Self-Efficacy in B2C E-commerce. Organizational and End-User Interactions: New Explorations. Information Science Reference.
Kim, D., Zhang, D. (2011). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual World. Exploring the Grand Challenges for Next Generation E-Business. 52, 30-43. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-17449-0_4!!!
Yang, T., Kim, D. J. (2010). A Comparative Analysis of Online Social Networking Sites and Their Business Models. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
Kim, D. J. (2010). An Information Communication Technology Adoption Model for Small and Medium Sized Enterprises. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development. Information Science Reference.
Yang, T., Kim, D. J., Vu, T. K., Dhalwani, V. (2010). Capturing Online Collaboration in the Design Elements Model for Web 2.0 and Beyond. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
Kim, D. J., Yang, T., Naik, N. (2010). Online Human Activity Networks (OnHANs): An Analysis Based on Activity Theory. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
Kim, D. J., Zhang, D. (2010). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual World. Exploring the Grand Challenges for Next Generation E-Business. Springer Berlin Heidelberg.
Kim, D. J. (2008). Antecedents of Consumer Trust in B2C Electronic Commerce and Mobile Commerce. Computer-Mediated Relationships and Trust: Managerial and Organizational Effects. Information Science Reference.
Lee, S., Park, M., Kim, D. J. (2008). Mobile Number Portability in an Asymmetric Telecommunications Market: Korea Case. Handbook of Research on Information Management and the Global Landscape. Idea Group Global.
Kim, D. (2007). Antecedents of Consumer Trust in B2C Electronic Commerce and Mobile Commerce. Computer-Mediated Relationships and Trust: Managerial and Organizational Effects. 158-175. Hershey, NY: Information Science Reference.
Jeong, E. J., Kim, D. J. (2007). Definitions, Key Characteristics, and Generations of Mobile Games. Encyclopedia of Mobile Computing and Commerce. Idea Group Reference.
Yang, T., Kim, D. J., Dhalwani, V. (2007). Social Networking as a New Trend in E-Marketing. Research and Practical Issues of Enterprise Information Systems II. Springer.
Jeong, E. J., Kim, D. J. (2007). Taxonomies, Applications, and Trends of Mobile Games. Encyclopedia of Mobile Computing and Commerce. Idea Group Reference.
Kim, D. J. (1994). A Case Study on the KIEP Information Systems Implementation: From a Down-sizing Information Systems. Management and Computer. Seoul, Korea: Management and Computer.
Conference Proceeding
Kim, S., Zhenya, T., Kim, D., Ahn, H. (2024). Exploring the Impact of Perceived Convenience, Autonomy, and Satisfaction on Citizens' Continuance with Government Chatbots. HICSS-57.
Kim, D., Yoon, V., Yang, K., Thomas, M. (2024). Introduction to the Minitrack on Conversational AI and Ethical Issues. HICSS-57.
Majumder, A., Kim, D. (2023). An Empirical Study of the User Behavioral Pattern and the Browser Vulnerability. Pre-ICIS Workshop: BIGS 2023.
Bernot, J., Kim, D. (2023). Discovering New Cybersecurity Knowledge Through Text. ICIS 2023.
Khoshkheslat, N., Kim, D. (2023). The Role of Perceived Security and Information Security literacy on Individuals’ Intention for Sharing Information to Conversational Agents. Pre-ICIS Workshop: BIGS 2023.
Bera, D., Kim, D. (2023). The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. ICIS 2023.
Memarian Esfahani, S., Kim, D. (2023). From Paradox to Perspective: A Comprehensive Framework for Privacy Choices in the Digital. Pre-ICIS Workshop: BIGS 2023.
Memarian Esfahani, S., Kim, D. (2023). Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus. AMCIS 2023.
Bernot, J., Kim, D. (2022). Discovering New Cybersecurity Knowledge, Skills, and Abilities. Pre-ICIS Workshop: BIGS 2022.
Srivastava, S., Prateek, P., Kim, D. (2022). When Social Media Foretells a Shooting. ICIS 2022 TREOs.
Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. AMCIS.
Prateek, P., Srivastava, S., Kim, D. (2022). The Role of Technological Advancement, and Social Justice in Alleviating the Negative Consequences of COVID-19 Pandemic. Pre-ICIS Workshop: BIGS 2022.
Bernot, J., Kim, D. (2022). Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions. AMCIS 2022.
Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. AMCIS 2022.
Bera, D., Kim, D. (2022). The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. AMCIS 2022.
Memarian Esfahani, S., Kim, D. (2022). Uncovering Others on Social Networking Sites: The Perspective of Impulsive and Reflective Users. PACIS 2022.
Bera, D., Kim, D. (2021). An Insight into Social Media Continuance Use through Systematic Literature Review.
Bera, D., Kim, D. (2021). Chronological evolution of social media: through Feature Push Utility Pull Framework.
Prateek, P., Kim, D., Ge, L. (2021). Detection of Fraudulent Campaigns on Donation-Based Crowdfunding Platforms using a Combination of Machine Learning and Rule-Based Classifier.
Bera, D., Kim, D. (2021). DIGITAL RESILIENCE FORMATION BEFORE AND DURING PANDEMIC - A THEMATIC ANALYSIS IN HIGHER EDUCATION CONTEXT.
Bera, D., Sidorova, A., Kim, D., Pravin, D. P. (2021). Reviewing the Success of Blockchain Technology in Realms of Socio-Technical Cohesion.
Srivastava, S., Kim, D. (2021). Study Investigating Factors Affecting User Ratings in Mobile Games.
Bera, D., Kim, D. (2021). Uncovering Dimensions of Cyber Attacks Using Content Analysis on Fraudulent Emails.
Memarian Esfahani, S., Kim, D. (2021). The State of Business Internet of Things Adoption: Literature Review.
Koohikamali, M., Kim, D. (2021). US Census Block Groups and Location Sharing Behavior: Case of IoT Adoption.
Son, J., Kim, D. J., Koh, C. (2021). Effectiveness of Online Consumer Product Review: The Role of Experiential Information.
Douglas, M., Bernot, J., Kim, D. (2021). Analyzing Cybersecurity TKSs through Text Analysis.
Bera, D., Kim, D. (2021). Uncovering Thematic Dimensions of Fraudulent Emails using Topic Modelling.
Amin, M., Kim, D. (2020). An Analysis of Characteristics Affecting Trust Formation in Human Versus Machine Interactions from a Systematic Literature Review Perspective. Workshop on E-Business. 129-136. Springer, Cham.
Bhagat, S., Kim, D., Parrish, J. L. (2020). Disinformation in Social Media: Role of Dark Triad Personality Traits and Self Regulation. AMCIS 2020 Proceedings.
Guerra, K., Kim, D. (2020). Cybersecurity: A definition across Europe and North America. 26th Americas Conference on Information Systems, AMCIS 2020. https://api.elsevier.com/content/abstract/scopus_id/85097713402
Kim, D., Love, B. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. National Cyber Summit (NCS) Research Track.
Kim, D. J., Smith, J. T., Tarakci, Y. (2019). A New Approach to Understand Cybersecurity Workforce Career Path and Its Knowledge, Skills, and Abilities.
Lim, S., Kim, D. J. (2019). Does Information Security Knowledge of Logistics Services Users Affect the Behavioral Control for Privacy Protection.
Bhagat, S., Kim, D. (2018). Examining the Role of Individuals’ Need for Online Social Interactions and Interpersonal Incompetence in Game Addiction. Americas Conference on Information Systems (AMCIS) 2018.
Bhagat, S., Kim, D. (2018). Self-Esteem, Need for Online Affiliation, Privacy Calculus and Geo-Tagging Behavior. International Conference on Information Systems (ICIS) 2018.
Mamun, M., Kim, D. (2018). The Effect of Perceived Innovativeness of Student Response Systems (SRSs) on Classroom Engagement.. AMCIS-2018.
Mamun, M., David, A., Mai, B., Kim, D., Parsons, T. (2018). The First 10 Years of NeuroIS: A Systematic Literature Review of NeuroIS Publications (2007-2017). HICSS-2017.
Bhagat, S., Kim, D. (2018). Why do people geo-tag themselves on social media? Role of Self-esteem, Need for Online Affiliation and Privacy Calculus. International Conference on Information Systems 2018, ICIS 2018. https://api.elsevier.com/content/abstract/scopus_id/85062518347
Aldossari, M., Kim, D. (2017). Does More IT Utilization Improve Police Performance?. Americas Conference on Information Systems 2017.
Nguyen, Q., Kim, D. (2017). Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives. Proceedings of the 50th Hawaii International Conference on System Sciences (2017). Hawaii International Conference on System Sciences. http://dx.doi.org/10.24251/hicss.2017.601
Ogbanufe, O., Kim, D. (2017). Hackers Delight: Knowledge Sharing Motives. Americas Conference on Information Systems (AMCIS) 2017.
Ogbanufe, O., Kim, D. (2017). “Thanks for Sharing”: Using Hacker Forum Data for Prediction of Knowledge Sharing and Withholding Behaviors. International Conference on Information Systems 2017.
Ogbanufe, O., Kim, D., Takabi, H. (2016). Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. 22nd Americas Conference on Information Systems (AMCIS 2016).
Koohikamali, M., Kim, D. (2016). Factors Influencing Emotional Attachment to Social Network Apps. Americas Conference on Information Systems (AMCIS).
Lai, I. H., Kim, D., Jeong, E. J. (2016). Online Digital Game Addiction: How Does Social Relationship Impact Game Addiction. Americas Conference on Information Systems (AMCIS).
Ogbanufe, O., Kim, D., Takabi, H. (2016). Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. Americas Conference on Information Systems (AMCIS).
Kwon, J., Kim, D., Koh, C. E. (2016). A Comparative Study of National Culture and Innovation: Effects of Cultural Dimensions on Traditional Innovation and Online Innovation. 2016 49th Hawaii International Conference on System Sciences (HICSS). 3615-3624. IEEE.
Jeong, E. J., Kim, D., Lee, D. M., Lee, H. R. (2016). A Study of Digital Game Addiction from Aggression, Loneliness and Depression Perspectives. 2016 49th Hawaii International Conference on System Sciences (HICSS). 3769-3780. IEEE.
Mousavizadeh, M., Kim, D. (2015). A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. International Conference on Information Systems (ICIS) 2015.
Ham, J., Lee, J., Kim, D., Choi, B. (2015). Open Innovation Maturity Model for the Government: An Open System Perspective. International Conference on Information Systems (ICIS) 2015.
Koohikamali, M., Kim, D. (2015). Rumor and Truth Spreading Patterns on Social Network Sites during Social Crisis: Big Data Analytics Approach. Pre-ICIS SIG WeB 2015.
Ogbanufe, O., Kim, D. (2015). The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context. Pre-ICIS SIGSEC WISP Workshop.
Kim, D., Mousavizadeh, M. (2015). A Study of Antecedents of Sense of Presence in Virtual World: Virtual Presence vs. Social Presence. Americas Conference on Information Systems (AMCIS) 2015.
Mousavizadeh, M., Kim, D. (2015). A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. Americas Conference on Information Systems (AMCIS) 2015.
Kim, D., Ogbanufe, O. (2015). Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change. Americas Conference on Information Systems (AMCIS) 2015.
Koohikamali, M., Kim, D. (2015). Does Information Sensitivity Make A Difference? Mobile Applications’ Privacy Statements: A Text Mining Approach. Americas Conference on Information Systems.
Jeong, E. J., Kim, D., Lee, D. M. (2015). Game Addiction from Psychosocial Health Perspective. Proceedings of the 17th International Conference on Electronic Commerce 2015. 21. ACM.
Yun, H., Lee, G., Kim, D. J. (2014). A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators. International Conference on Information Systems.
Yun, H., Lee, G., Kim, D. (2014). A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators. International Conference on Information Systems (ICIS) 2014.
Salehan, M., Kim, D. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference on Information Systems (ICIS) 2014.
Koohikamali, M., Kim, D. J. (2014). A Study of the Lag Effect of Information Technology Investment on the Hospital Profitability: A Longitudinal Perspective. Southwest Decision Sciences Institute's annual meeting.
Salehan, M., Kim, D. J. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference of Information Systems.
Kim, D. J. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference of Information Systems.
Wati, Y., Kim, D. J. (2014). Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce. Annual Security Conference in Las Vegas, Nevada.
Mousavizadeh, M., Kim, D. J. (2014). Virtual vs. Social Presence in Virtual World: Antecedents and Consequences. Southwest Decision Sciences Institute's annual meeting.
Lee, J., Lee, J., Kim, D. (2014). Why Do People Believe Social Media Will Benefit Their Careers? The Attitudinal Difference towards Supervisors and Peers. Korea Society of Management Information System Conference. 133-138.
Lee, J., Lee, J., Kim, D. J. (2014). Why Do People Believe Social Media will Benefit Their Careers? The Attitudinal Difference towards Supervisors and Peers. Korea Society of Management Information System Conference.
Koohikamali, M., Kim, D. (2014). A Study of the Lag Effects of Information Technology Investment on the Hospital Profitability: A Longitudinal Perspective. Korea Society of Management Information System Conference. 139-157.
Kim, D., Ryu, Y., Kwark, Y. (2013). A Cross-Cultural Perspective of Information Security Collective Efficacy. International Conference on Information Systems (ICIS) 2013.
Goo, J., Yim, M., Kim, D. J. (2013). A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate. Hawaii International Conference on System Sciences.
Xu, C., Visinescu, L., Kim, D. J. (2013). Disclose Intimately, Honesty, Heavily, Positively and Intentionally: An Exploration of Self-Disclosure in Social Networking Sites. ICIS (International Conference on Information Systems).
Kim, D. J., Ryu, Y., Kwark, Y. (2013). Do Eastern Managers Overestimate Collective Efficacy More Than Westerners When Predicting Future Information Security Vulnerability. ICIS (International Conference on Information Systems).
Salehan, M., Kim, D. J. (2013). Information and Communication Technologies (ICT): Driver of Cultural Change and Technological Advancement. Pacific Asia Conference on Information Systems.
Salehan, M., Kim, D. J. (2013). Using Social Networking Services at Work and at Home: Motivation, Participation, and Performance. Post-ICIS LG CNS/KrAIS Workshop.
Goo, J., Yim, M., Kim, D. (2013). A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate. 2013 46th Hawaii International Conference on System Sciences. IEEE. http://dx.doi.org/10.1109/hicss.2013.51
Negahban, A., Kim, D. J., Kim, C. (2012). A Study of Enhancing Business Performance by mCRM from Resource-based View. Post-ICIS LG CNS/KrAIS Workshop.
Negahban, A., Kim, D. J. (2012). How Organizational Resources Influence Benefits of mobile CRM in Organizations?. Pre-ICIS Workshop on HCI.
Kim, Y., Kim, D. J., Kim, C. (2012). Smartphones: User Engagement Motivations Effect on their Value, Satisfaction, and Future Engagement Intention. Americas Conference on Information Systems.
Salehan, M., Kim, D. J. (2012). The Effect of Attitude, Social Trust and Trust in Social Networking Sites on Two Dimensions of Sharing Behavior. Americas Conference on Information Systems.
Kim, D. J., Ryu, Y. U., Kwark, Y. (2012). The Effect of Collective Efficacy and Network Dependence on Managers' Information Security Risk Perception. Post-ICIS LG CNS/KrAIS Workshop.
Durbhakula, V., Kim, D. J. (2011). A Mashed-Up Approach for Quick Response in Mobile Devices. Southwest Decision Sciences Institute's annual meeting.
Kim, H. J., Kim, D. J. (2011). Assessing Security Risks of Airport Information Systems: The Analytic Hierarchy Process (AHP) Approach. POST-International Conference on Information Systems (ICIS) 2011, LG CNS/KrAIS Workshop.
Kim, Y. H., Kim, D. J. (2011). Does Self-efficacy Matters: Examining General Self-efficacy and Online Transaction Self-efficacy in B2C E-commerce. International Communication Association (ICA).
Durbhakula, V., Kim, D. J. (2011). E-business for Nations: A Study of National Level E-Business Adoption. Southwest Decision Sciences Institute's annual meeting.
Yim, M., Goo, J., Kim, Y., Jeong, T., Kim, D. J. (2011). Effect of Organizational Security Climate on Individual's Opportunistic Security Behavior: An Empirical Study. POST-International Conference on Information Systems (ICIS) 2011, LG CNS/KrAIS Workshop.
Monchak, A., Kim, D. J. (2011). Examining Trends of Technology Diffusion Theories in Information Systems. International Conference on Information Systems.
Monchak, A., Jeong, K., Kim, D. J., Helm, J. (2011). Toward an Initial Business Analysis Framework for Public-oriented Human Space Commercialization. Southwest Decision Sciences Institute's annual meeting.
Kim, D. J. (2010). A New Approach for Collaborative Knowledge Management: A Unified Conceptual Model for Collaborative Knowledge Management. AMCIS.
Naik, N., Kim, D. J. (2010). An Extended Adaptive Structuration Theory for the Determinants of Virtual Team Success. International Conference of Information Systems.
Al-Mubaid, H., Kim, D. J., Yue, K., Perkins-Hall, S., Abeysekera, K. (2010). Assessment Model and Practices for Computing and Information Systems Programs. Information Systems Educators (ISECON) Conference.
Kim, D. J. (2010). Virtual Team Success: Towards a Theory of Performance in Virtual Teams. AMCIS.
Kim, D. J. (2009). A Study of National Level E-business Adoption Factors using CBTG (Country Characteristics- Business- Technology-Government) Framework. SIG Glob Dev Workshop – A Pre-ICIS workshop.
Kim, D. J. (2009). Critical Factors Influencing the Service Quality of Information Systems: An Organizational View. AMCIS.
Kim, D. J. (2009). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty Toward an Immersive 3D Virtual World: From a First-Time Second Life User's Perspective. The Workshop on E-Business (WEB).
Kim, D. J. (2008). A Study of the Dynamic Nature of Trust from a Longitudinal Perspective. HCI-Research in MIS – A Pre-ICIS workshop.
Kim, D. J. (2008). An OBTG (Organizational – Business – Technological - Governmental) E-business Adoption Model for Small and Medium Sized Enterprises. AMCIS.
Naik, N., Kim, D. J., Yang, T. (2008). How to Improve IT Service Quality: A Conceptual Framework and A Case Analysis Using the Framework. HCI-Research in MIS – A Pre-ICIS workshop.
Yang, T., Kim, D. J., Dhalwani, V., Vu, T. K. (2008). The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. HICSS.
Yang, T., Kim, D., Dhalwani, V., Vu, T. K. (2008). The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. Hawaii International Conference on System Sciences (HICSS).
Kim, D., Gates, T., Perkins-Hall, S., Yue, K. (2007). Web 2.0 Paradigm: A Conceptual Framework and Comparison Analysis of Web 2.0 Applications Using the Framework. WEB 2007 - A Pre-ICIS workshop.
Jeong, E. J., Kim, D. J. (2007). A Longitudinal Study of Game Perceptions from the Yin-Yang Theory Perspective. HICSS.
Coursaris, C. K., Kim, D. J. (2007). A Research Agenda for Mobile Usability. Computer Human Interaction (CHI).
Kim, D. J. (2007). Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic Networks. AMCIS.
Kim, D. J. (2007). Knowledge Discovery on Consumer Trust in B2C Electronic Commerce. AMCIS.
Kim, D. J. (2007). Web 2.0 Paradigm: A Conceptual Framework and Comparison Analysis of Web 2.0 Applications Using the Framework. Pre-ICIS Workshop on e-Business (WEB).
Coursaris, C. K., Kim, D. J. (2006). A Qualitative Review of Empirical Mobile Usability Studies. AMCIS.
Kim, D. J., Hwang, Y. (2006). A Study of Mobile Internet Usage from Utilitarian and Hedonic User Tendency Perspectives. AMCIS.
Kim, D. J. (2006). A Study of Online Game User Loyalty from Satisfaction and Switching Barrier Perspectives. Pre-ICIS Workshop on e-Business (WEB).
Choi, N., Kim, D. J., Goo, J. (2006). Managerial Information Security Awareness' Impact on an Organization's Information Security Performance. AMCIS.
Goo, J., Kim, D. J., Cho, B. (2006). Structure of Service Level Agreements (SLA) in IT Outsourcing: The Construct and Its Measurement. AMCIS.
Kim, D. J., Steinfield, C., Whitten, P. (2006). The Effects of Different Presentation Modalities: A Study of Wireless Multimedia PDA Use in a Security Context. SIG on Network and Internet Security (SIG-SEC).
Coursaris, C. K., Kim, D. (2006). A Qualitative Review of Empirical Mobile Usability Studies. 2006 Americas Conference on Information Systems (AMCIS).
Kim, Y. H., Kim, D. J. (2005). A Study of Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction. Hawaii International Conference on System Sciences.
Kim, D. J. (2005). A Study of the Impact of Culture on Trust Determinants in E-Commerce: A Cross-culture Comparison Study. AMCIS.
Lee, J., Kim, D. J., Rao, H. (2005). An Examination of Trust Effects and Pre-existing Relational Risks in e-Government Services. AMCIS.
Kim, D. J. (2005). An Investigation on the New Mobile Service/Technology Adoption. AMCIS.
Kim, D. J. (2005). Cognition-based versus Affect-based Trust Determinants: A Cross-culture Comparison Study. International Conference on Information Systems.
Kim, D. J., Steinfield, C. (2005). The Satisfaction Paradox: Are Satisfied Customers More or Less Willing to Adopt New Generation Mobile Internet Services. Global Information Technology management (GITM).
Yun, H., Kim, D. J. (2005). Trust and its Effects in Virtual Community: Building a Multi-Level Model. Global Information Technology management (GITM).
Kim, D. J. (2004). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce.
Kim, D. J. (2004). Association Rules on Trust in B-to-C Electronic Commerce: an Application of the Apriori Algorithm. Korea Society of Management Information System Conference.
Kim, D. J., Steinfield, C. (2004). Consumers Mobile Internet Service Satisfaction and their Continuance Intentions. AMCIS.
Lee, S., Kim, D. J., Park, M. (2004). Demand for Number Portability in Korean Mobile Telecommunication Market. HICSS.
Kim, D. J. (2004). Personal Information Disclosure Behavior of Internet Use. Korea Society of Management Information System Conference.
Kim, D. J., Steinfield, C., Lai, Y. (2004). Revisiting the Role of Web Assurance Seals in Consumer Trust. International Conference on Electronic Commerce.
Kim, D. J. (2004). The Effects of Mobile Video Image Delivery on a Person Identification Task: A Study of Wireless Multimedia PDA Use in a Security Context. International Communication Association (ICA) Conference.
Kim, D. J. (2004). The Effects of Perceptional Factors on Personal Information Disclosure on the Web. AMCIS.
Kim, Y. H., Kim, D. J. (2004). The Impact of Cultural Differences on Trust in E-Commerce. IADIS International Conference of e-Society.
Kim, D. J. (2004). Value-based User Tendency and Usage of Wireless Internet: A Survey Analysis of Applications, Satisfaction and Use Amount. International Communication Association (ICA) Conference.
Steinfield, C., Whitten, P., Kim, D. (2004). The effects of mobile video image delivery on a person identification task: A study of wireless multimedia PDA use in a security context. 54th Annual ICA Conference.
Chae, Z., Kim, D. (2004). Value-based User Tendency and Usage of Wireless Internet: A Survey Analysis of Applications, Satisfaction and Use Amount. 54th Annual ICA Conference.
Lee, S., Kim, D., Park, M. (2004). Demand for number portability in the Korean mobile telecommunications market: contingent valuation approach. System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. 10 pp.. IEEE.
Kim, D., Ferrin, D. L., Rao, H. R. (2003). An Investigation of Consumer Online Trust and Purchase, Re-purchase Intentions. 2003 International Conference on Information Systems.
Yoon, J. W., Hwang, S. H., Kim, D. J., Yoon, J. S. (2003). A Balanced View for Customer Segmentation in CRM. AMCIS.
Kim, D. J. (2003). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce.
Kim, D. J., Ferrin, D. L., Rao, H. (2003). An Investigation of Consumer Online Trust and Purchase, Re-Purchasing Intentions. ICIS (International Conference on Information Systems).
Kim, D. J. (2003). Antecedents of Consumer Trust in B-to-C Electronic Commerce. AMCIS.
Lee, Y., Kim, D. J. (2003). Mobil Commerce and Agent Theory. IADIS International Conference.
Chae, Z., Kim, D. J., Steinfield, C. (2003). Primary Motives of Wireless Internet Use: A Survey Study of Users. INFORMS Conference on Information Systems and Technology.
Kim, D. J. (2003). Trust, Risk and Benefit in Electronic Commerce: What Are the Relationships. AMCIS.
Chae, Z., Kim, D., Steinfield, C. (2003). Primary Motives of Wireless Internet Use: A Survey Study of Users. INFORMS Conference on Information Systems and Technology.
Kim, D., Ferrin, D. L., Rao, H. R. (2003). Antecedents of Consumer Trust in B-to-C Electronic Commerce. Americas Conference on Information Systems (AMCIS).
Kim, D., Ferrin, D. L., Rao, H. R. (2003). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce (ICEC 2003).
Lee, Y., Kim, D. (2003). Mobile Commerce and Agent Theory. 2003 IADIS International Conference.
Kim, D. J. (2001). Framework for the Comparison of Business-to-Business E-Service Solutions. INFORMS Conference on Information Systems and Technology.
Zhang, H., Kim, D. J., Ramesh, R. (2001). Multiagent Systems: An Ontological Meta-model. AMCIS.
Zhang, H., Kim, D. J., Ramesh, R. (2001). Ontological Foundations for the Design of Integrated Multiagent Architectures. International Bi-Conference Workshop on AGENT-ORIENTED INFORMATION SYSTEMS.
Kim, D., Song, Y. I., Braynov, S. B., Rao, H. R. (2001). A B-to-C Trust Model for On-line Exchange. Americas Conference on Information Systems (AMCIS). 784-787.
Zhang, H., Kim, D., Ramesh, R. (2001). Multi-agent Systems: An Ontological Meta-model. 2001 Americas Conference on Information Systems (AMCIS).
Zhang, H., Kim, D., Ramesh, R. (2001). Ontological Foundations for the Design of Integrated Multiagent Architectures. Third International Bi-Conference Workshop on AGENT-ORIENTED INFORMATION SYSTEMS (AOIS-2001).
Kim, D., Cho, B. S., Rao, H. R. (2000). Effects of Consumer Lifestyles on Purchasing Behavior on the Internet; A Conceptual Framework and Empirical Validation. International Conference on Information Systems. 688-695.
Kim, D. J., Cho, B., Rao, H. (2000). Effects of Consumer Lifestyles on Purchasing Behavior on the Internet; Conceptual Framework and Empirical Validation. International Conference on Information Systems.
Kim, D. J., Ramesh, M., Rao, H. (2000). Web Ads Selection for One-to-One Advertising Using Neuro-Fuzzy Systems. AMCIS.
Kim, D., Ramesh, M., Rao, H. R. (2000). Web Ads Selection for One-to-One Advertising Using Neuro-Fuzzy Systems. Americas Conference on Information Systems. 26-32.
Journal Article
Kim, D., Salvacion, M., Salehan, M., Kim, D. W. (2023). An empirical study of community cohesiveness, community attachment, and their roles in virtual community participation. European Journal of Information Systems. 32(3), 573–600.
Lim, S., Kim, D., Yoo, H. (2023). An Empirical Study on the Courier Services Users’ Privacy Infringement Experience, Privacy Concerns, and Privacy Protective Action. 25(3), 99-120. https://www.earticle.net/Article/A434765
Kim, D., Bose, I., Mukhopadhyay, A. (2023). Special Issue on Bright Information and Communication Technologies in the 21st Century. Information Systems Frontiers. 25, 1661-1665.
Lee, S., Jeong, E. J., Kim, D., Kong, J. (2023). The Influence of Psychological Needs and Motivation on Game Cheating: Insights from Self-Determination Theory. Frontiers in Psychology. 14(1278738), .
Bhagat, S., Kim, D. (2023). Examining users’ news sharing behaviour on social media: role of perception of online civic engagement and dual social influences. Behaviour & Information Technology. 42(8), 1194–1215.
Bera, D., Ogbanufe, O., Kim, D. (2023). Towards a Thematic Dimensional Framework of Online Fraud: An Exploration of Fraudulent Email Attack Tactics and Intentions. Decision Support Systems. 171, .
Bera, D., Kim, D., Ogbanufe, O. (2023). Towards a Thematic Dimensional Framework of Online Fraud: An Exploration of Fraudulent Email Attack Tactics and Intentions. Decision Support Systems.
Kam, H., Kim, D., He, W. (2022). Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology. 41(10), 2259-2273.
Lim, S. H., Kim, D. (2022). The effect of unmindfulness on impulse purchasing behaviours in the context of online shopping from a classical attitude theory perspective. Other. 41(16), 3432–3449. Informa UK Limited. http://dx.doi.org/10.1080/0144929x.2021.1996630
Mousavizadeh, M., Koohikamali, M., Salehan, M., Kim, D. (2022). An Investigation of Peripheral and Central Cues of Online Customer Review Voting and Helpfulness through the Lens of Elaboration Likelihood Model. Information Systems Frontiers. 24(1), 211-231. Springer Science and Business Media LLC. http://dx.doi.org/10.1007/s10796-020-10069-6
Chen, R., Kim, D., Rao, H. R. (2021). A study of social networking site use from a three-pronged security and privacy threat assessment perspective. Information & Management. 58(5), 103486.
Maurer, C., Kim, K., Kim, D. J., Kappelman, L. A. (2021). Cybersecurity: Is it Worse than We Think?. Communications of the ACM. 64(2), 28-30.
Ogbanufe, O., Kim, D. J., Jones, M. (2021). Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures. Information & Management. 58(7), .
Kam, H. J., Mattson, T., Kim, D. (2021). The “Right” recipes for security culture: a competing values model perspective. Information Technology & People. 34(5), 1490-1512. https://api.elsevier.com/content/abstract/scopus_id/85091004626
Lim, S., Kim, D. J. (2020). An Empirical Study of B2C Logistics Services Users’ Privacy Risk, Trust, Concern and Behavioral Willingness of Compliance: Cognitive Valence Theory Approach. 22(2), 105-125.
Bhagat, S., Kim, D. (2020). Higher Education Amidst COVID-19: Challenges and Silver Lining. Information Systems Management. 37(4), 366-371. https://api.elsevier.com/content/abstract/scopus_id/85092609410
Lim, S. H., Kim, D. (2020). Does Emotional Intelligence of Online Shoppers Affect Their Shopping Behavior? From a Cognitive-Affective-Conative Framework Perspective. International Journal of Human-Computer Interaction. 36(14), 1304-1313. https://api.elsevier.com/content/abstract/scopus_id/85082602305
Mousavi, R., Chen, R., Kim, D., Chen, K. (2020). Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory. Decision Support Systems. 135(August), . https://api.elsevier.com/content/abstract/scopus_id/85085332632
Li, K., Kim, D. J., Lang, K., Kauffman, R., Naldi, M. (2020). How Should We Understand the Digital Economy in Asia? Critical Assessment and Research Agenda. Electronic Commerce Research and Applications.
Kim, Y., Kim, D., Suveatwatanakul, C. (2020). A study of sport event restaurant quality (SeRQ): A case of collegiate football games. Other. 21(5), 365-386. https://api.elsevier.com/content/abstract/scopus_id/85087120624
Bhagat, S., Jeong, E. J., Kim, D. (2020). The Role of Individuals’ Need for Online Social Interactions and Interpersonal Incompetence in Digital Game Addiction. International Journal of Human-Computer Interaction. 36(5), 449-463. https://api.elsevier.com/content/abstract/scopus_id/85071328322
Yun, H., Lee, G., Kim, D. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management. 56(4), 570-601. https://www.sciencedirect.com/science/article/pii/S0378720617301210
Kim, D. (2019). An Empirical Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use Mobile Fintech Payment Services. International Journal of Human-Computer Interaction. 35(10), 886-898.
Kim, C., Kim, J., Kim, D. J. (2019). Effects of Personal Motivation and Computing Characteristics on Ubiquitous Mobile Device Usages. International Journal of Mobile Communications. 17(2), 127-156. Inderscience Publishers. http://dx.doi.org/10.1504/ijmc.2019.10011658
Koohikamali, M., French, A. M., Kim, D. (2019). An investigation of a dynamic model of privacy trade-off in use of mobile social network applications: A longitudinal perspective. Decision Support Systems. 119(1), 46-59. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2019.02.007
Ogbanufe, O., Kim, D. (2018). "Just how risky is it anyway?" The role of risk perception and trust on click-through intention. Information Systems Management. 35(3), 182-200.
Salehan, M., Kim, D., Koo, C. (2018). A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. Journal of Supercomputing. 74(8), 3596-3619.
Salehan, M., Kim, D., Lee, J. (2018). Are there any relationships between technology and cultural values? A country-level trend study of the association between information communication technology and cultural values. Information & Management. 55(6), 725-745.
Ogbanufe, O., Kim, D. (2018). Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. 106, 1-14.
Ogbanufe, O., Kim, D. (2018). Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems.
Kim, D., Hebeler, J., Yoon, V., Davis, F. (2018). Exploring Determinants of Semantic Web Technology Adoption from IT Professionals' Perspective: Industry Competition, Organization Innovativeness, and Data Management Capability. Computers in Human Behavior. 86, 18-33.
Ogbanufe, O., Kim, D. (2018). Just How Risky is it Anyway? The Role of Risk Perception and Trust on Click-through Intention. Information Systems Management.
Sullivan, Y., Kim, D. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-commerce environments. International Journal of Information Management. 39(2), 199-219. https://api.elsevier.com/content/abstract/scopus_id/85039703364
Kim, C., Kim, D. (2017). Uncovering the value stream of digital content business from users’ viewpoint. International Journal of Information Management. 37(6), 553-565. Elsevier BV. http://dx.doi.org/10.1016/j.ijinfomgt.2017.05.004
Lim, S. H., Sung, J., Kim, D., Kim, D. (2017). A Study of Consumers’ Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems. 27(3), 156-175.
Salehan, M., Kim, D., Kim, C. (2017). Use of Online Social Networking Services from a Theoretical Perspective of the Motivation-Participation-Performance Framework. Journal of the Association for Information Systems. 18(2), 141-172.
Jeong, E. J., Kim, D., Lee, D. M. (2017). Why Do Some People Become Addicted to Digital Games More Easily? A Study of Digital Game Addiction from a Psychosocial Health Perspective. International Journal of Human-Computer Interaction. 33(3), 199-214. Informa UK Limited. http://dx.doi.org/10.1080/10447318.2016.1232908
Yim, S., Lee, S., Kim, D. J. (2017). Is Online Consumers’ Impulsive Buying Beneficial for E-Commerce Companies? An Empirical Investigation of Online Consumers’ Past Impulsive Buying Behaviors. Information Systems Management. 34(1), 85-100.
Mousavizadeh, M., Kim, D., Chen, R. (2016). Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study. Decision Support Systems. 92, 79-90. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2016.09.011
Negahban, A., Kim, D., Kim, C. (2016). Unleashing the Power of mCRM: Investigating Antecedents of Mobile CRM Values from Managers’ Viewpoint. International Journal of Human-Computer Interaction. 32(10), 747-764. http://dx.doi.org/10.1080/10447318.2016.1189653
Kim, D., Yim, M., Sugumaran, V., Rao, H. R. (2016). Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations. European Journal of Information Systems. 25(3), 252-273.
Kim, Y., Kim, D. J., Jai, T. (2016). A destination and two festivals: A comparison study using Structural Equation Modeling (SEM). Event Management. 20(3), 327-339. Cognizant Communication Corporation.
Kim, Y. H., Kim, D., Jai, T. C. (2016). One Destination and Two Events: A Comparative Analysis on Perceived Value, Satisfaction, and Intention to Revisit. Event Management. 20(3), 327-339. Cognizant Electronic Publishing. http://dx.doi.org/10.3727/152599516x14682560744596
Visinescu, L. L., Azogu, O., Ryan, S., Wu, Y., Kim, D. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as cloud computing service. International Journal of Human-Computer Interaction. 32(11), 885-900.
Koo, C., Chung, N., Kim, D., Hlee, S. (2016). The impact of destination websites and cultural exposure: a comparison study of experienced and inexperienced travelers. International Journal of Tourism Cities. 2(1), 1-16. Emerald. http://dx.doi.org/10.1108/ijtc-04-2015-0009
Salehan, M., Kim, D. (2016). Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics. Decision Support Systems. 81, 30-40. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2015.10.006
Kim, D., Jeong, E. J., Hwang, Y. (2015). A Study of Online Portal Users’ Loyalty From Core Service, Additional Value-added Service and Switching Barriers Perspectives. Information Systems Management. 32(2), 136-152.
Koo, C., Chung, N., Kim, D. (2015). How do social media transform politics? The role of a podcast,‘Naneun Ggomsuda’in South Korea. Information Development. 31(5), 421-434.
Kim, D., Yim, M., Sugumaran, V., Rao, H. R. (2015). Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations. European Journal of Information Systems.
Ham, J., Kim, D., Choi, B., Lee, J. (2015). What Makes Open Innovation Processes Better? A Focus on IT Professionals’ Attitudes. Asia Pacific Journal of Information Systems. 25(2), 306-328.
Kim, C., Li, W., Kim, D. (2015). An Empirical Analysis of Factors Influencing M-Shopping Use. International Journal of Human-Computer Interaction. 31(12), 974-994. Informa UK Limited. http://dx.doi.org/10.1080/10447318.2015.1085717
Koo, C., Chung, N., Kim, D. (2015). How do social media transform politics? The role of a podcast, ‘Naneun Ggomsuda’ in South Korea. Information Development. 31(5), 421-434. SAGE Publications. http://dx.doi.org/10.1177/0266666913516883
Fukuzumi, S., Ohkubo, K., Ishida, M., Preihs, C., Chen, B., Borden, W. T., Kim, D., Sessler, J. L. (2015). Formation of Ground State Triplet Diradicals from Annulated Rosarin Derivatives by Triprotonation.. Journal of the American Chemical Society. 137(31), 9780-3.
Kim, D., Jeong, E. J., Hwang, Y. (2015). A Study of Online Portal Users’ Loyalty From Core Service, Additional Value-added Service and Switching Barriers Perspectives. Information Systems Management. 32(2), 136-152. Informa UK Limited. http://dx.doi.org/10.1080/10580530.2015.1018774
Goo, J., Yim, M., Kim, D. (2014). A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. Other. 57(4), 286-308. Institute of Electrical and Electronics Engineers (IEEE). http://dx.doi.org/10.1109/tpc.2014.2374011
Goo, J., Yim, M., Kim, D. J. (2014). A Path Way to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. IEEE Transactions on Professional Communication. 57(4), 286-308.
Kim, D. J. (2014). A Study of Multilevel and Dynamic Nature of Trust in E-commerce: A Longitudinal Perspective. International Journal of Electronic Commerce. 19(1), 11-64.
Kim, D. (2014). A Study of the Multilevel and Dynamic Nature of Trust in E-Commerce from a Cross-Stage Perspective. International Journal of Electronic Commerce. 19(1), 11-64. Informa UK Limited. http://dx.doi.org/10.2753/jec1086-4415190101
Kim, Y. H., Kim, D., Wachter, K. (2013). A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention. Decision Support Systems. 54(4), 361-370. http://dx.doi.org/10.1016/j.dss.2013.07.002
Kim, D. (2012). An investigation of the effect of online consumer trust on expectation, satisfaction, and post-expectation. Information Systems and e-Business Management. 10(2), 219-240.
Kim, D., Yue, K., Al-Mubaid, H., Hall, S. P., Abeysekera, K. (2012). Assessing information systems and computer information systems programs from a balanced scorecard perspective. Journal of Information Systems Education. 23(2), 177-192.
Kim, D. J., Yue, K., Al-Mubaid, H., Perkins-Hall, S., Abeysekera, K. (2012). Models of Practices for Computing and Information Systems Program Assessment from a Balanced Scorecard Perspective. Journal of Information Systems Education. 23(2), 177-192. http://jise.org/Volume23/23-2/Contents-23-2.html
Kim, D. J. (2012). An Investigation of the Effect of Online Consumer Trust on Expectations, Satisfaction, and Post-expectation. Information Systems and e-Business Management. 10(2), 219-249. https://springerlink3.metapress.com/content/p54246441g181748/resource-secured/?target=fulltext.pdf&sid=zsuhr5t2hbqsegnegpvrsuyd&sh=www.springerlink.com
Kim, D. J., Hwang, Y. (2012). A Study of Mobile Internet Consumer's Service Quality Perceptions from Utilitarian and Hedonic User Value Tendency Perspectives. Information Systems Frontiers. 14(2), 409-421. https://springerlink3.metapress.com/content/x944174127475g76/resource-secured/?target=fulltext.pdf&sid=zsuhr5t2hbqsegnegpvrsuyd&sh=www.springerlink.com
Coursaris, C. K., Kim, D. (2011). A meta-analytical review of empirical mobile usability studies. Journal of Usability Studies. 6(3), 117-171.
Al-Mubaid, H., Abeysekera, K., Kim, D. J., Perkins-Hall, S., Yue, K. (2011). A Model for Long Term Assessment of Computing and Information Systems Programs. Information Systems Education Journal. 9(3), 59-67. http://isedj.org/2011-9/N3/ISEDJv9n3p59.html
Durbhakula, V. V., Kim, D. (2011). E-business for nations: a study of national level e-business adoption factors using country characteristics-business-technology-government framework. Journal of Theoretical and Applied Electronic Commerce Research. 6(3), 1-12.
Kim, D. J., Yue, K., Hall, S. P., Gates, T. (2010). Global Diffusion of the Internet XV: Web 2.0 Technologies, Principles, and Applications: A Conceptual Framework from Technology Push and Demand Pull Perspective. Communications of the Association for Information Systems. 24(38), . http://aisel.aisnet.org/cais/vol24/iss1/38
Yue, K., De Silva, D., Kim, D., Aktepe, M., Nagle, S., Boerger, C., Jain, A., Verma, S. (2009). Building real world domain-specific social network websites as a capstone project. Journal of Information Systems Education. 20(1), 67-76.
Kim, Y. H., Kim, D., Hwang, Y. (2009). Exploring online transaction self-efficacy in trust building in B2C e-commerce. Journal of Organizational and End User Computing. 21(1), 37.
Kim, Y. H., Kim, D. J., Hwang, Y. (2009). Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction. Journal of Organizational and End User Computing.
Kim, D., Steinfield, C., Whitten, P. (2009). The effects of different presentation modalities on a person identification task: a study of wireless multimedia PDA use in a security context. International Journal of Human-Computer Interaction. 25(2), 134-154.
Kim, D., Ferrin, D. L., Rao, H. R. (2009). Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration. Information Systems Research. 20(2), 237-257. http://isr.journal.informs.org/cgi/content/abstract/isre.1080.0188v1
Kim, D. J., Ferrin, D. L., Rao, H. (2008). A Trust-Based Consumer Decision Making Model in Electronic Commerce: The Role of Trust, Risk, and their Antecedents. Decision Support Systems.
Choi, N., Kim, D., Goo, J., Whitmore, A. (2008). Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security. 16(5), 484-501.
Kim, D. J., Steinfield, C., Lai, Y. (2008). Revisiting the Role of Web Assurance Seals in Business-to-Consumer Electronic Commerce. Decision Support Systems.
Kim, D. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems. 24(4), 13-45.
Yoon, J., Kim, D., Yoon, J., Kim, Y. (2007). A balanced framework for customer segmentation in CRM: A case study. Other. 10(1), 49-68.
Hwang, Y., Kim, D. (2007). Customer self-service systems: The effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust. Decision Support Systems. 43(3), 746-760.
Park, M., Kim, D., Sang-Woo, L. (2007). Demand for number portability in the Korean telecommunications market: Contingent valuation approach. Journal of Global Information Management. 15(1), 43-64.
Hwang, Y., Kim, D. J. (2007). Understanding Affective Commitment, Collectivist Culture, and Social Influence in Relation to Knowledge Sharing in Tech Mediated Learning. IEEE Transactions on Professional Communication. 50(3), 232-248.
Patil, A. P., Kim, D., Ni, L. M. (2006). A study of frequency interference and indoor location sensing with 802.11 b and Bluetooth technologies. International Journal of Mobile Communications. 4(6), 621-644.
Kim, D., Song, Y. I., Braynov, S. B., Rao, H. R. (2005). A Multi-dimensional Trust Formation Model in B-to-C E-Commerce: A conceptual Framework and Content Analyses of Academia/Practitioner Perspective. Decision Support Systems. 40(2), 143-165.
Lee, S. W., Kim, D. (2004). Driving factors and barriers of information and communication technology for ebusiness in SMEs: A case study in Korea. IADIS International Journal of WWW/Internet. 2(2), 16-28.
Kim, D., Sivasailam, N., Rao, H. R. (2004). Information Assurance in B2C Websites for Information Goods/Services. Electronic Markets. 14(4), 344-359.
Kim, D., Agrawal, M., Jayaraman, B., Rao, H. R. (2003). A comparison of B2B e-service solutions. Communications of the ACM. 46(12), 317-324.
Sivasailam, N., Kim, D. J., Rao, H. (2002). What Companies Are(n't ) Doing about Web Site Assurance. IT Professional Magazine. 4(3), 33-40.

Awarded Grants

Contracts, Grants and Sponsored Research

Grant - Research
Kim, D. J. (Principal), "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach: DHS SRT Follow-on Funding (2024-25)," Sponsored by Department of Homeland Security, Federal, $115990 Funded. (March 2024March 2025).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2023)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2023December 2024).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2022)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2022December 2023).
Kim, D. J. (Principal), "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach of Handling Phishing Attacks: DHS Summer Research Team (SRT) Program (2023)," Sponsored by Department of Homeland Security, Federal, $37000 Funded. (May 2023July 2023).
Kim, D. (Principal), Bernot, J. (Supporting), "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development," Federal, $91368 Funded. (March 2022February 2023).
Kim, D. J. (Principal), "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development (2022-23): DHS SRT Follow-on Funding," Sponsored by Department of Homeland Security, Federal, $91368 Funded. (March 2022February 2023).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2021)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2021December 2022).
Kim, D. (Principal), Bernot, J. (Supporting), "Enhancing Cybersecurity Education and Workforce Development through Extraction of KSA (Knowledge, Skills, and Abilities) from Cybersecurity Job Listing Sites," Federal, $26000 Funded. (May 2021July 2021).
Kim, D. J. (Principal), "Enhancing Cybersecurity Education and Workforce Development through Extraction of KSA (Knowledge, Skills, and Abilities) from Cybersecurity Job Listing Sites: DHS Summer Research Team (SRT) Program," Sponsored by Department of Homeland Security, Federal, $26000 Funded. (May 2021July 2021).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2020)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2020December 2020).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2019)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2019December 2019).
Kim, D. J. (Principal), "Ryan College of Business Summer Research Grant (2018)," Sponsored by Ryan College of Business, Local, $10000 Funded. (May 2018December 2018).
Kim, D. J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," Sponsored by GOV-National Science Foundation (NSF), University of North Texas, $47600.00 Funded. (20162018).
Kim, D. J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," Sponsored by GOV-National Science Foundation (NSF), University of North Texas, $218960.00 Funded. (20152018).
Kim, D. J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," Sponsored by GOV-National Science Foundation (NSF), University of North Texas, $306544.00 Funded. (20142018).
Kim, D. J. (Principal), Yang, A. T. (Co-Principal), "Relationship Mapping between Cybersecurity Certifications, Certification Courses, Government-sponsored Cybersecurity Designation Programs, the CAE-C KUs, and Cybersecurity Focus Areas," Sponsored by National Security Agency, Federal, $245912 Funded. (September 01, 2017August 30, 2018).
Kim, D. J. (Principal), "Developing and Evaluating an Open Innovation Maturity Model for the Government: A Focus on Open Data Usage," Sponsored by National Research Foundation of Korea (NRF), Federal, $147200 Funded. (January 01, 2014December 30, 2015).
Kim, D. J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," Sponsored by GOV-National Science Foundation (NSF), University of North Texas, $336388 Funded. (20132013).
Kim, D. J., "What Dimensional Factors Influence the Level of Trust? - A Multi-dimensional Trust Model in Online Exchanges," $7500 Funded. (20132013).
Kim, D. J., "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," Sponsored by GOV-National Science Foundation (NSF), $251000 Funded. (20122012).
Kim, D. J., "Faculty Development Fund (UHCL)," $2000 Funded. (20112011).
Kim, D. J., "Faculty Research and Support Fund (UHCL)," $4800 Funded. (20112011).
Kim, D. J., "Faculty Development Fund (UHCL)," $2000 Funded. (20102010).
Kim, D. J., "Faculty Research and Support Fund (UHCL)," $5000 Funded. (20102010).
Chang, M., Kim, D. J., "Strategy of Mobile Applications in Logistic and Shipping Industries," Sponsored by Institute of Northeast Asia Economic Cooperation and Logistic Strategy, South Korea, $31000 Funded. (20102010).
Kim, D. J., "Faculty Development Fund (UHCL)," $2000 Funded. (20092009).
Kim, D. J., "Faculty Research and Support Fund (UHCL)," $5000 Funded. (20092009).
Kim, D. J., "Faculty Development Fund (UHCL)," $2400 Funded. (20082008).
Kim, D. J., "Faculty Research and Support Fund (UHCL)," $4620 Funded. (20082008).
Kim, D. J., "Faculty Development Fund (UHCL)," $2000 Funded. (20072007).
Kim, D. J., "Faculty Research and Support Fund (UHCL)," $4620 Funded. (20072007).
Kim, D. J., "Faculty Development Fund (University of Houston-Clear Lake)," $2000 Funded. (20062006).
Kim, D. J., "Summer Research Grants (Michigan State University)," $19500 Funded. (20042004).
Kim, D. J., "Summer Research Grants (Michigan State University)," $19500 Funded. (20032003).
Grant - Teaching
Kim, D. J. (Principal), "Traditional Innovation versus Online Innovation: A Comparative Study of the Relationships Between National Culture and Innovation," Sponsored by Core Fulbright Scholar Program sponsored by the U.S. Department of State's Bureau of Educational and Cultural Affairs, International, $52084 Funded. (20182019).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE