Skip to main content

Dan J. Kim

Title: Professor

Department: Information Technology and Decision Sciences

College: College of Business

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, State University of New York (SUNY) at Buffalo, 2003
    Major: Management
    Specialization: Industrial Engineering
    Dissertation: Three Essays on Trust in B-to-C Electronic Commerce
  • MS, State University of New York (SUNY) at Buffalo, 2002
    Major: Computer Science and Engineering
    Dissertation: A Survey of Machine Learning Techniques for Language (Vocabulary) Acquisition
  • MSc, Hankuk University of Foreign Studies, 1991
    Major: Management Science
    Dissertation: A Study of Developing a Prototype Knowledge Base System for Selection of Statistical Techniques
  • BBA, Kookmin University, 1988
    Major: Management Information Systems

Current Scheduled Teaching

BCIS 5740.004Information Security ManagementSpring 2025
BCIS 5740.303Information Security ManagementSpring 2025
BCIS 5740.001Information Security ManagementFall 2024
BCIS 5740.306Information Security ManagementFall 2024
BCIS 6900.708Special ProblemsFall 2024

Previous Scheduled Teaching

BCIS 4740.003Administration and Policy in Information SecuritySummer 5W2 2024 Syllabus SPOT
BCIS 5740.004Information Security ManagementSummer 5W2 2024 SPOT
BCIS 6950.701Doctoral DissertationSpring 2024
BCIS 5740.003Information Security ManagementSpring 2024 SPOT
BCIS 5740.004Information Security ManagementSpring 2024 SPOT
BCIS 6900.711Special ProblemsSpring 2024
BCIS 6950.010Doctoral DissertationFall 2023
BCIS 5740.006Information Security ManagementFall 2023 SPOT
BCIS 6010.001Seminar in Business AdministrationFall 2023 SPOT
BCIS 4740.002Administration and Policy in Information SecuritySummer 5W1 2023 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSummer 5W2 2023
BCIS 5740.002Information Security ManagementSummer 5W1 2023 SPOT
BCIS 5740.003Information Security ManagementSummer 5W2 2023 SPOT
BCIS 6950.701Doctoral DissertationSpring 2023
BCIS 5740.003Information Security ManagementSpring 2023 SPOT
BCIS 4740.002Administration and Policy in Information SecurityFall 2022 Syllabus SPOT
BCIS 6950.010Doctoral DissertationFall 2022
BCIS 5740.002Information Security ManagementFall 2022 SPOT
BCIS 5740.003Information Security ManagementFall 2022 SPOT
BCIS 6900.708Special ProblemsFall 2022
BCIS 4740.002Administration and Policy in Information SecuritySummer 5W1 2022 Syllabus SPOT
BCIS 4740.003Administration and Policy in Information SecuritySummer 5W2 2022 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSummer 5W2 2022
BCIS 5740.002Information Security ManagementSummer 5W1 2022 SPOT
BCIS 5740.003Information Security ManagementSummer 5W2 2022 SPOT
BCIS 6900.710Special ProblemsSummer 10W 2022
BCIS 4740.002Administration and Policy in Information SecuritySpring 2022 Syllabus SPOT
BCIS 4740.004Administration and Policy in Information SecuritySpring 2022 Syllabus SPOT
BCIS 6950.701Doctoral DissertationSpring 2022
BCIS 5740.001Information Security ManagementSpring 2022 SPOT
BCIS 5740.002Information Security ManagementSpring 2022 SPOT
BCIS 5630.001Information Technology SecuritySpring 2022 SPOT
INFO 6660.017Readings in Information ScienceSpring 2022
BCIS 6900.711Special ProblemsSpring 2022
BCIS 4740.001Administration and Policy in Information SecurityFall 2021 Syllabus SPOT
BCIS 6950.010Doctoral DissertationFall 2021
BCIS 5740.001Information Security ManagementFall 2021 SPOT
BCIS 6010.001Seminar in Business AdministrationFall 2021 SPOT
BCIS 6900.708Special ProblemsFall 2021
BCIS 4740.001Administration and Policy in Information SecuritySummer 3W1 2021 Syllabus SPOT
BCIS 3610.004Basic Information SystemsSummer 5W2 2021 Syllabus SPOT
BCIS 5740.001Information Security ManagementSummer 3W1 2021 SPOT
BCIS 6900.710Special ProblemsSummer 10W 2021
BCIS 4740.001Administration and Policy in Information SecuritySpring 2021 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSpring 2021
BCIS 5630.001Information Technology SecuritySpring 2021 SPOT
BCIS 6900.710Special ProblemsSpring 2021
BCIS 4740.001Administration and Policy in Information SecurityFall 2020 Syllabus SPOT
BCIS 6950.010Doctoral DissertationFall 2020
BCIS 6940.710Individual ResearchFall 2020
BCIS 5740.001Information Security ManagementFall 2020 SPOT
BCIS 3610.001Basic Information SystemsSummer 3W1 2020 Syllabus SPOT
BCIS 4740.001Administration and Policy in Information SecuritySpring 2020 Syllabus
BCIS 6940.710Individual ResearchSpring 2020
BCIS 5630.001Information Technology SecuritySpring 2020
BCIS 6900.710Special ProblemsSpring 2020
BCIS 4740.001Administration and Policy in Information SecurityFall 2019 Syllabus SPOT
BCIS 5740.001Information Security ManagementFall 2019 SPOT
BCIS 6010.001Seminar in Business AdministrationFall 2019 SPOT
BCIS 5900.710Special ProblemsSpring 2019
BCIS 4740.001Administration and Policy in Information SecurityFall 2018 Syllabus SPOT
BCIS 5740.001Information Security ManagementFall 2018 SPOT
BCIS 2610.002Introduction to Computers in BusinessFall 2018 Syllabus SPOT
BCIS 5900.710Special ProblemsFall 2018
BCIS 6940.710Individual ResearchSummer SUM 2018
BCIS 2610.002Introduction to Computers in BusinessSummer 3W1 2018 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSpring 2018
BCIS 5630.001Information Technology SecuritySpring 2018
BCIS 2610.002Introduction to Computers in BusinessSpring 2018 Syllabus SPOT
BCIS 6950.010Doctoral DissertationFall 2017
BCIS 6010.001Seminar in Business AdministrationFall 2017 SPOT
BCIS 3610.001Basic Information SystemsSummer 3W1 2017 Syllabus SPOT
BCIS 4740.001Administration and Policy in Information SecuritySpring 2017 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSpring 2017
BCIS 5630.001Information Technology SecuritySpring 2017 SPOT
BCIS 4740.001Administration and Policy in Information SecurityFall 2016 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2016 Syllabus SPOT
BCIS 5740.001Information Security ManagementFall 2016 SPOT
BCIS 3610.001Basic Information SystemsSummer 3W1 2016 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSummer 10W 2016
BCIS 6940.756Individual ResearchSummer 5W1 2016
BCIS 4740.001Administration and Policy in Information SecuritySpring 2016 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSpring 2016
BCIS 5630.001Information Technology SecuritySpring 2016 SPOT
BCIS 4740.001Administration and Policy in Information SecurityFall 2015 Syllabus SPOT
BCIS 6950.010Doctoral DissertationFall 2015
BCIS 6940.710Individual ResearchFall 2015
BCIS 6010.001Seminar in Business AdministrationFall 2015 SPOT
BCIS 3610.001Basic Information SystemsSummer 3W1 2015 Syllabus SPOT
BCIS 6950.710Doctoral DissertationSummer 10W 2015
BCIS 6940.710Individual ResearchSummer SUM 2015
BCIS 6900.710Special ProblemsSummer 10W 2015
BCIS 4740.001Administration and Policy in Information SecuritySpring 2015 Syllabus
BCIS 6950.710Doctoral DissertationSpring 2015
BCIS 6940.710Individual ResearchSpring 2015
BCIS 5630.001Information Technology SecuritySpring 2015
BCIS 4740.001Administration and Policy in Information SecurityFall 2014 Syllabus
BCIS 6950.010Doctoral DissertationFall 2014
BCIS 6940.710Individual ResearchFall 2014
BCIS 5740.001Information Security ManagementFall 2014
BCIS 2610.050Introduction to Computers in BusinessFall 2014 Syllabus
BCIS 5900.710Special ProblemsFall 2014
BCIS 6950.710Doctoral DissertationSummer 5W2 2014
BCIS 6910.710Special ProblemsSummer 10W 2014
BCIS 4740.001Administration and Policy in Information SecuritySpring 2014
BCIS 6950.710Doctoral DissertationSpring 2014
BCIS 5630.001Information Technology SecuritySpring 2014
BCIS 4740.001Administration and Policy in Information SecurityFall 2013
BCIS 6940.710Individual ResearchFall 2013
BCIS 6010.001Seminar in Business AdministrationFall 2013
BCIS 6900.710Special ProblemsSummer 10W 2013
BCIS 4740.001Administration and Policy in Information SecuritySpring 2013
BCIS 3610.050Basic Information SystemsSpring 2013
BCIS 5900.710Special ProblemsSpring 2013
BCIS 6900.710Special ProblemsSpring 2013
BCIS 4740.001Administration and Policy in Information SecurityFall 2012
BCIS 6900.760Special ProblemsSummer SUM 2012
BCIS 4740.001Administration and Policy in Information SecuritySpring 2012
BCIS 5900.710Special ProblemsSpring 2012
BCIS 4740.001Administration and Policy in Information SecurityFall 2011

Published Intellectual Contributions

    Abstracts and Proceedings

  • Bernot, J., Kim, D. (2022). Discovering New Cybersecurity Knowledge, Skills, and Abilities, Pre-ICIS Workshop.
  • Bernot, J., Kim, D. (2022). Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions. https://aisel.aisnet.org/amcis2022/sig_sec/sig_sec/5
  • Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. https://aisel.aisnet.org/amcis2022/sig_sec/sig_sec/6
  • Prateek, P., Srivastava, S., Kim, D. (2022). The Role of Technological Advancement, and Social Justice in Alleviating the Negative Consequences of COVID-19 Pandemic.
  • Srivastava, S., Prateek, P., Kim, D. (2022). When Social Media Foretells a Shooting. https://aisel.aisnet.org/treos_icis2022/16
  • Mamun, M., Mai, B., Shin, B., Kulkarni, S., Kim, D. (2017). Anonymity of a Network System. Bright Internet Global Summit (BIG Summit) -2017.
  • Book Chapter

  • Srivastava, S., Kim, D. (2022). A Study Investigating Factors Affecting User Ratings in Mobile Games. Workshop on e-Business. 57-66. Springer, Cham.
  • Bera, D., Kim, D. (2022). An Insight into Social Media Continuance Use: Through Systematic Literature Review. Workshop on e-Business. 67-75. Springer, Cham.
  • Kim, D., Love, B., Kim, S. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. Advances in Intelligent Systems and Computing. 85-96. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31239-8_8
  • Kim, D., Love, B. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. Springer International Publishing. 85-96. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31239-8_8
  • Koohikamali, M., Kim, D. (2016). Rumor and Truth Spreading Patterns on Social Network Sites During Social Crisis: Big Data Analytics Approach. Lecture Notes in Business Information Processing. 166-170. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-45408-5_15
  • Hanus, B., Kim, D. (2015). e-Commerce and Online Security. The International Encyclopedia of Digital Communication and Society. 1-9. John Wiley & Sons, Inc.. http://dx.doi.org/10.1002/9781118767771.wbiedcs030
  • Kim, Y.H., Kim, D.J. (2011). Does Self-Efficacy Matter? Examining Online Transaction Self-Efficacy and General Self-Efficacy in B2C E-commerce. Organizational and End-User Interactions: New Explorations. Information Science Reference.
  • Kim, D., Zhang, D. (2011). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual World. Exploring the Grand Challenges for Next Generation E-Business. 52 30-43. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-17449-0_4!!!
  • Yang, T., Kim, D.J. (2010). A Comparative Analysis of Online Social Networking Sites and Their Business Models. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
  • Kim, D.J. (2010). An Information Communication Technology Adoption Model for Small and Medium Sized Enterprises. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development. Information Science Reference.
  • Yang, T., Kim, D.J., Vu, T.K., Dhalwani, V. (2010). Capturing Online Collaboration in the Design Elements Model for Web 2.0 and Beyond. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
  • Kim, D.J., Yang, T., Naik, N. (2010). Online Human Activity Networks (OnHANs): An Analysis Based on Activity Theory. Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business, and Social Applications. Idea Group Global.
  • Kim, D.J., Zhang, D. (2010). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual World. Exploring the Grand Challenges for Next Generation E-Business. Springer Berlin Heidelberg.
  • Kim, D.J. (2008). Antecedents of Consumer Trust in B2C Electronic Commerce and Mobile Commerce. Computer-Mediated Relationships and Trust: Managerial and Organizational Effects. Information Science Reference.
  • Lee, S., Park, M., Kim, D.J. (2008). Mobile Number Portability in an Asymmetric Telecommunications Market: Korea Case. Handbook of Research on Information Management and the Global Landscape. Idea Group Global.
  • Kim, D. (2007). Antecedents of Consumer Trust in B2C Electronic Commerce and Mobile Commerce. Computer-Mediated Relationships and Trust: Managerial and Organizational Effects. 158-175. Hershey, NY, Information Science Reference.
  • Jeong, E.J., Kim, D.J. (2007). Definitions, Key Characteristics, and Generations of Mobile Games. Encyclopedia of Mobile Computing and Commerce. Idea Group Reference.
  • Yang, T., Kim, D.J., Dhalwani, V. (2007). Social Networking as a New Trend in E-Marketing. Research and Practical Issues of Enterprise Information Systems II. Springer.
  • Jeong, E.J., Kim, D.J. (2007). Taxonomies, Applications, and Trends of Mobile Games. Encyclopedia of Mobile Computing and Commerce. Idea Group Reference.
  • Kim, D.J. (1994). A Case Study on the KIEP Information Systems Implementation: From a Down-sizing Information Systems. Management and Computer. Seoul, Korea, Management and Computer.
  • Conference Proceeding

  • Kim, S., Zhenya, T., Kim, D., Ahn, H. (2024). Exploring the Impact of Perceived Convenience, Autonomy, and Satisfaction on Citizens' Continuance with Government Chatbots. HICSS-57.
  • Kim, D., Yoon, V., Yang, K., ThomasM. (2024). Introduction to the Minitrack on Conversational AI and Ethical Issues. HICSS-57.
  • Majumder, A., Kim, D. (2023). An Empirical Study of the User Behavioral Pattern and the Browser Vulnerability. Pre-ICIS Workshop: BIGS 2023.
  • Bernot, J., Kim, D. (2023). Discovering New Cybersecurity Knowledge Through Text. ICIS 2023.
  • Khoshkheslat, N., Kim, D. (2023). The Role of Perceived Security and Information Security literacy on Individuals’ Intention for Sharing Information to Conversational Agents. Pre-ICIS Workshop: BIGS 2023.
  • Bera, D., Kim, D. (2023). The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. ICIS 2023.
  • Memarian Esfahani, S., Kim, D. (2023). From Paradox to Perspective: A Comprehensive Framework for Privacy Choices in the Digital. Pre-ICIS Workshop: BIGS 2023.
  • Memarian Esfahani, S., Kim, D. (2023). Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus. AMCIS 2023.
  • Bernot, J., Kim, D. (2022). Discovering New Cybersecurity Knowledge, Skills, and Abilities. Pre-ICIS Workshop: BIGS 2022.
  • Srivastava, S., Prateek, P., Kim, D. (2022). When Social Media Foretells a Shooting. ICIS 2022 TREOs.
  • Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. AMCIS.
  • Prateek, P., Srivastava, S., Kim, D. (2022). The Role of Technological Advancement, and Social Justice in Alleviating the Negative Consequences of COVID-19 Pandemic. Pre-ICIS Workshop: BIGS 2022.
  • Bernot, J., Kim, D. (2022). Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions. AMCIS 2022.
  • Memarian Esfahani, S., Kim, D. (2022). The collective information privacy on social networking sites. AMCIS 2022.
  • Bera, D., Kim, D. (2022). The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. AMCIS 2022.
  • Memarian Esfahani, S., Kim, D. (2022). Uncovering Others on Social Networking Sites: The Perspective of Impulsive and Reflective Users. PACIS 2022.
  • Bera, D., Kim, D. (2021). An Insight into Social Media Continuance Use through Systematic Literature Review.
  • Bera, D., Kim, D. (2021). Chronological evolution of social media: through Feature Push Utility Pull Framework.
  • Prateek, P., Kim, D., Ge, L. (2021). Detection of Fraudulent Campaigns on Donation-Based Crowdfunding Platforms using a Combination of Machine Learning and Rule-Based Classifier.
  • Bera, D., Kim, D. (2021). DIGITAL RESILIENCE FORMATION BEFORE AND DURING PANDEMIC - A THEMATIC ANALYSIS IN HIGHER EDUCATION CONTEXT.
  • Bera, D., Sidorova, A., Kim, D., Pravin, D.P. (2021). Reviewing the Success of Blockchain Technology in Realms of Socio-Technical Cohesion.
  • Srivastava, S., Kim, D. (2021). Study Investigating Factors Affecting User Ratings in Mobile Games.
  • Bera, D., Kim, D. (2021). Uncovering Dimensions of Cyber Attacks Using Content Analysis on Fraudulent Emails.
  • Memarian Esfahani, S., Kim, D. (2021). The State of Business Internet of Things Adoption: Literature Review.
  • Koohikamali, M., Kim, D. (2021). US Census Block Groups and Location Sharing Behavior: Case of IoT Adoption.
  • Son, J., Kim, D.J., Koh, C. (2021). Effectiveness of Online Consumer Product Review: The Role of Experiential Information.
  • Douglas, M., Bernot, J., Kim, D. (2021). Analyzing Cybersecurity TKSs through Text Analysis.
  • Bera, D., Kim, D. (2021). Uncovering Thematic Dimensions of Fraudulent Emails using Topic Modelling.
  • Amin, M., Kim, D. (2020). An Analysis of Characteristics Affecting Trust Formation in Human Versus Machine Interactions from a Systematic Literature Review Perspective. Workshop on E-Business. 129-136. Springer, Cham.
  • Bhagat, S., Kim, D., Parrish, J.L. (2020). Disinformation in Social Media: Role of Dark Triad Personality Traits and Self Regulation. AMCIS 2020 Proceedings.
  • Guerra, K., Kim, D. (2020). Cybersecurity: A definition across Europe and North America. 26th Americas Conference on Information Systems, AMCIS 2020. https://api.elsevier.com/content/abstract/scopus_id/85097713402
  • Kim, D., Love, B. (2019). A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. National Cyber Summit (NCS) Research Track.
  • Kim, D.J., Smith, J.T., Tarakci, Y. (2019). A New Approach to Understand Cybersecurity Workforce Career Path and Its Knowledge, Skills, and Abilities.
  • Lim, S., Kim, D.J. (2019). Does Information Security Knowledge of Logistics Services Users Affect the Behavioral Control for Privacy Protection.
  • Bhagat, S., Kim, D. (2018). Examining the Role of Individuals’ Need for Online Social Interactions and Interpersonal Incompetence in Game Addiction. Americas Conference on Information Systems (AMCIS) 2018.
  • Bhagat, S., Kim, D. (2018). Self-Esteem, Need for Online Affiliation, Privacy Calculus and Geo-Tagging Behavior. International Conference on Information Systems (ICIS) 2018.
  • Mamun, M., Kim, D. (2018). The Effect of Perceived Innovativeness of Student Response Systems (SRSs) on Classroom Engagement.. AMCIS-2018.
  • Mamun, M., David, A., Mai, B., Kim, D., Parsons, T. (2018). The First 10 Years of NeuroIS: A Systematic Literature Review of NeuroIS Publications (2007-2017). HICSS-2017.
  • Bhagat, S., Kim, D. (2018). Why do people geo-tag themselves on social media? Role of Self-esteem, Need for Online Affiliation and Privacy Calculus. International Conference on Information Systems 2018, ICIS 2018. https://api.elsevier.com/content/abstract/scopus_id/85062518347
  • Aldossari, M., Kim, D. (2017). Does More IT Utilization Improve Police Performance?. Americas Conference on Information Systems 2017.
  • Nguyen, Q., Kim, D. (2017). Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives. Proceedings of the 50th Hawaii International Conference on System Sciences (2017). Hawaii International Conference on System Sciences. http://dx.doi.org/10.24251/hicss.2017.601
  • Ogbanufe, O., Kim, D. (2017). Hackers Delight: Knowledge Sharing Motives. Americas Conference on Information Systems (AMCIS) 2017.
  • Ogbanufe, O., Kim, D. (2017). “Thanks for Sharing”: Using Hacker Forum Data for Prediction of Knowledge Sharing and Withholding Behaviors. International Conference on Information Systems 2017.
  • Ogbanufe, O., Kim, D., Takabi, H. (2016). Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. 22nd Americas Conference on Information Systems (AMCIS 2016).
  • Koohikamali, M., Kim, D. (2016). Factors Influencing Emotional Attachment to Social Network Apps. Americas Conference on Information Systems (AMCIS).
  • Lai, I.H., Kim, D., Jeong, E.J. (2016). Online Digital Game Addiction: How Does Social Relationship Impact Game Addiction. Americas Conference on Information Systems (AMCIS).
  • Ogbanufe, O., Kim, D., Takabi, H. (2016). Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. Americas Conference on Information Systems (AMCIS).
  • Kwon, J., Kim, D., Koh, C.E. (2016). A Comparative Study of National Culture and Innovation: Effects of Cultural Dimensions on Traditional Innovation and Online Innovation. 2016 49th Hawaii International Conference on System Sciences (HICSS). 3615-3624. IEEE.
  • Jeong, E.J., Kim, D., Lee, D.M., Lee, H.R. (2016). A Study of Digital Game Addiction from Aggression, Loneliness and Depression Perspectives. 2016 49th Hawaii International Conference on System Sciences (HICSS). 3769-3780. IEEE.
  • Mousavizadeh, M., Kim, D. (2015). A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. International Conference on Information Systems (ICIS) 2015.
  • Ham, J., Lee, J., Kim, D., Choi, B. (2015). Open Innovation Maturity Model for the Government: An Open System Perspective. International Conference on Information Systems (ICIS) 2015.
  • Koohikamali, M., Kim, D. (2015). Rumor and Truth Spreading Patterns on Social Network Sites during Social Crisis: Big Data Analytics Approach. Pre-ICIS SIG WeB 2015.
  • Ogbanufe, O., Kim, D. (2015). The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context. Pre-ICIS SIGSEC WISP Workshop.
  • Kim, D., Mousavizadeh, M. (2015). A Study of Antecedents of Sense of Presence in Virtual World: Virtual Presence vs. Social Presence. Americas Conference on Information Systems (AMCIS) 2015.
  • Mousavizadeh, M., Kim, D. (2015). A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory. Americas Conference on Information Systems (AMCIS) 2015.
  • Kim, D., Ogbanufe, O. (2015). Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change. Americas Conference on Information Systems (AMCIS) 2015.
  • Koohikamali, M., Kim, D. (2015). Does Information Sensitivity Make A Difference? Mobile Applications’ Privacy Statements: A Text Mining Approach. Americas Conference on Information Systems.
  • Jeong, E.J., Kim, D., Lee, D.M. (2015). Game Addiction from Psychosocial Health Perspective. Proceedings of the 17th International Conference on Electronic Commerce 2015. 21. ACM.
  • Yun, H., Lee, G., Kim, D.J. (2014). A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators. International Conference on Information Systems.
  • Yun, H., Lee, G., Kim, D. (2014). A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators. International Conference on Information Systems (ICIS) 2014.
  • Salehan, M., Kim, D. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference on Information Systems (ICIS) 2014.
  • Koohikamali, M., Kim, D.J. (2014). A Study of the Lag Effect of Information Technology Investment on the Hospital Profitability: A Longitudinal Perspective. Southwest Decision Sciences Institute's annual meeting.
  • Salehan, M., Kim, D.J. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference of Information Systems.
  • Kim, D.J. (2014). Predicting the Performance of Online Consumer Reviews: A Sentiment Mining Approach. International Conference of Information Systems.
  • Wati, Y., Kim, D.J. (2014). Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce. Annual Security Conference in Las Vegas, Nevada.
  • Mousavizadeh, M., Kim, D.J. (2014). Virtual vs. Social Presence in Virtual World: Antecedents and Consequences. Southwest Decision Sciences Institute's annual meeting.
  • Lee, J., Lee, J., Kim, D. (2014). Why Do People Believe Social Media Will Benefit Their Careers? The Attitudinal Difference towards Supervisors and Peers. Korea Society of Management Information System Conference. 133-138.
  • Lee, J., Lee, J., Kim, D.J. (2014). Why Do People Believe Social Media will Benefit Their Careers? The Attitudinal Difference towards Supervisors and Peers. Korea Society of Management Information System Conference.
  • Koohikamali, M., Kim, D. (2014). A Study of the Lag Effects of Information Technology Investment on the Hospital Profitability: A Longitudinal Perspective. Korea Society of Management Information System Conference. 139-157.
  • Kim, D., Ryu, Y., Kwark, Y. (2013). A Cross-Cultural Perspective of Information Security Collective Efficacy. International Conference on Information Systems (ICIS) 2013.
  • Goo, J., Yim, M., Kim, D.J. (2013). A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate. Hawaii International Conference on System Sciences.
  • Xu, C., Visinescu, L., Kim, D.J. (2013). Disclose Intimately, Honesty, Heavily, Positively and Intentionally: An Exploration of Self-Disclosure in Social Networking Sites. ICIS (International Conference on Information Systems).
  • Kim, D.J., Ryu, Y., Kwark, Y. (2013). Do Eastern Managers Overestimate Collective Efficacy More Than Westerners When Predicting Future Information Security Vulnerability. ICIS (International Conference on Information Systems).
  • Salehan, M., Kim, D.J. (2013). Information and Communication Technologies (ICT): Driver of Cultural Change and Technological Advancement. Pacific Asia Conference on Information Systems.
  • Salehan, M., Kim, D.J. (2013). Using Social Networking Services at Work and at Home: Motivation, Participation, and Performance. Post-ICIS LG CNS/KrAIS Workshop.
  • Goo, J., Yim, M., Kim, D. (2013). A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate. 2013 46th Hawaii International Conference on System Sciences. IEEE. http://dx.doi.org/10.1109/hicss.2013.51
  • Negahban, A., Kim, D.J., Kim, C. (2012). A Study of Enhancing Business Performance by mCRM from Resource-based View. Post-ICIS LG CNS/KrAIS Workshop.
  • Negahban, A., Kim, D.J. (2012). How Organizational Resources Influence Benefits of mobile CRM in Organizations?. Pre-ICIS Workshop on HCI.
  • Kim, Y., Kim, D.J., Kim, C. (2012). Smartphones: User Engagement Motivations Effect on their Value, Satisfaction, and Future Engagement Intention. Americas Conference on Information Systems.
  • Salehan, M., Kim, D.J. (2012). The Effect of Attitude, Social Trust and Trust in Social Networking Sites on Two Dimensions of Sharing Behavior. Americas Conference on Information Systems.
  • Kim, D.J., Ryu, Y.U., Kwark, Y. (2012). The Effect of Collective Efficacy and Network Dependence on Managers' Information Security Risk Perception. Post-ICIS LG CNS/KrAIS Workshop.
  • Durbhakula, V., Kim, D.J. (2011). A Mashed-Up Approach for Quick Response in Mobile Devices. Southwest Decision Sciences Institute's annual meeting.
  • Kim, H.J., Kim, D.J. (2011). Assessing Security Risks of Airport Information Systems: The Analytic Hierarchy Process (AHP) Approach. POST-International Conference on Information Systems (ICIS) 2011, LG CNS/KrAIS Workshop.
  • Kim, Y.H., Kim, D.J. (2011). Does Self-efficacy Matters: Examining General Self-efficacy and Online Transaction Self-efficacy in B2C E-commerce. International Communication Association (ICA).
  • Durbhakula, V., Kim, D.J. (2011). E-business for Nations: A Study of National Level E-Business Adoption. Southwest Decision Sciences Institute's annual meeting.
  • Yim, M., Goo, J., Kim, Y., Jeong, T., Kim, D.J. (2011). Effect of Organizational Security Climate on Individual's Opportunistic Security Behavior: An Empirical Study. POST-International Conference on Information Systems (ICIS) 2011, LG CNS/KrAIS Workshop.
  • Monchak, A., Kim, D.J. (2011). Examining Trends of Technology Diffusion Theories in Information Systems. International Conference on Information Systems.
  • Monchak, A., Jeong, K., Kim, D.J., Helm, J. (2011). Toward an Initial Business Analysis Framework for Public-oriented Human Space Commercialization. Southwest Decision Sciences Institute's annual meeting.
  • Kim, D.J. (2010). A New Approach for Collaborative Knowledge Management: A Unified Conceptual Model for Collaborative Knowledge Management. AMCIS.
  • Naik, N., Kim, D.J. (2010). An Extended Adaptive Structuration Theory for the Determinants of Virtual Team Success. International Conference of Information Systems.
  • Al-Mubaid, H., Kim, D.J., Yue, K., Perkins-Hall, S., Abeysekera, K. (2010). Assessment Model and Practices for Computing and Information Systems Programs. Information Systems Educators (ISECON) Conference.
  • Kim, D.J. (2010). Virtual Team Success: Towards a Theory of Performance in Virtual Teams. AMCIS.
  • Kim, D.J. (2009). A Study of National Level E-business Adoption Factors using CBTG (Country Characteristics- Business- Technology-Government) Framework. SIG Glob Dev Workshop – A Pre-ICIS workshop.
  • Kim, D.J. (2009). Critical Factors Influencing the Service Quality of Information Systems: An Organizational View. AMCIS.
  • Kim, D.J. (2009). The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty Toward an Immersive 3D Virtual World: From a First-Time Second Life User's Perspective. The Workshop on E-Business (WEB).
  • Kim, D.J. (2008). A Study of the Dynamic Nature of Trust from a Longitudinal Perspective. HCI-Research in MIS – A Pre-ICIS workshop.
  • Kim, D.J. (2008). An OBTG (Organizational – Business – Technological - Governmental) E-business Adoption Model for Small and Medium Sized Enterprises. AMCIS.
  • Naik, N., Kim, D.J., Yang, T. (2008). How to Improve IT Service Quality: A Conceptual Framework and A Case Analysis Using the Framework. HCI-Research in MIS – A Pre-ICIS workshop.
  • Yang, T., Kim, D.J., Dhalwani, V., Vu, T.K. (2008). The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. HICSS.
  • Yang, T., Kim, D., Dhalwani, V., Vu, T.K. (2008). The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. Hawaii International Conference on System Sciences (HICSS).
  • Kim, D., Gates, T., Perkins-Hall, S., Yue, K. (2007). Web 2.0 Paradigm: A Conceptual Framework and Comparison Analysis of Web 2.0 Applications Using the Framework. WEB 2007 - A Pre-ICIS workshop.
  • Jeong, E.J., Kim, D.J. (2007). A Longitudinal Study of Game Perceptions from the Yin-Yang Theory Perspective. HICSS.
  • Coursaris, C.K., Kim, D.J. (2007). A Research Agenda for Mobile Usability. Computer Human Interaction (CHI).
  • Kim, D.J. (2007). Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic Networks. AMCIS.
  • Kim, D.J. (2007). Knowledge Discovery on Consumer Trust in B2C Electronic Commerce. AMCIS.
  • Kim, D.J. (2007). Web 2.0 Paradigm: A Conceptual Framework and Comparison Analysis of Web 2.0 Applications Using the Framework. Pre-ICIS Workshop on e-Business (WEB).
  • Coursaris, C.K., Kim, D.J. (2006). A Qualitative Review of Empirical Mobile Usability Studies. AMCIS.
  • Kim, D.J., Hwang, Y. (2006). A Study of Mobile Internet Usage from Utilitarian and Hedonic User Tendency Perspectives. AMCIS.
  • Kim, D.J. (2006). A Study of Online Game User Loyalty from Satisfaction and Switching Barrier Perspectives. Pre-ICIS Workshop on e-Business (WEB).
  • Choi, N., Kim, D.J., Goo, J. (2006). Managerial Information Security Awareness' Impact on an Organization's Information Security Performance. AMCIS.
  • Goo, J., Kim, D.J., Cho, B. (2006). Structure of Service Level Agreements (SLA) in IT Outsourcing: The Construct and Its Measurement. AMCIS.
  • Kim, D.J., Steinfield, C., Whitten, P. (2006). The Effects of Different Presentation Modalities: A Study of Wireless Multimedia PDA Use in a Security Context. SIG on Network and Internet Security (SIG-SEC).
  • Coursaris, C.K., Kim, D. (2006). A Qualitative Review of Empirical Mobile Usability Studies. 2006 Americas Conference on Information Systems (AMCIS).
  • Kim, Y.H., Kim, D.J. (2005). A Study of Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction. Hawaii International Conference on System Sciences.
  • Kim, D.J. (2005). A Study of the Impact of Culture on Trust Determinants in E-Commerce: A Cross-culture Comparison Study. AMCIS.
  • Lee, J., Kim, D.J., Rao, H. (2005). An Examination of Trust Effects and Pre-existing Relational Risks in e-Government Services. AMCIS.
  • Kim, D.J. (2005). An Investigation on the New Mobile Service/Technology Adoption. AMCIS.
  • Kim, D.J. (2005). Cognition-based versus Affect-based Trust Determinants: A Cross-culture Comparison Study. International Conference on Information Systems.
  • Kim, D.J., Steinfield, C. (2005). The Satisfaction Paradox: Are Satisfied Customers More or Less Willing to Adopt New Generation Mobile Internet Services. Global Information Technology management (GITM).
  • Yun, H., Kim, D.J. (2005). Trust and its Effects in Virtual Community: Building a Multi-Level Model. Global Information Technology management (GITM).
  • Kim, D.J. (2004). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce.
  • Kim, D.J. (2004). Association Rules on Trust in B-to-C Electronic Commerce: an Application of the Apriori Algorithm. Korea Society of Management Information System Conference.
  • Kim, D.J., Steinfield, C. (2004). Consumers Mobile Internet Service Satisfaction and their Continuance Intentions. AMCIS.
  • Lee, S., Kim, D.J., Park, M. (2004). Demand for Number Portability in Korean Mobile Telecommunication Market. HICSS.
  • Kim, D.J. (2004). Personal Information Disclosure Behavior of Internet Use. Korea Society of Management Information System Conference.
  • Kim, D.J., Steinfield, C., Lai, Y. (2004). Revisiting the Role of Web Assurance Seals in Consumer Trust. International Conference on Electronic Commerce.
  • Kim, D.J. (2004). The Effects of Mobile Video Image Delivery on a Person Identification Task: A Study of Wireless Multimedia PDA Use in a Security Context. International Communication Association (ICA) Conference.
  • Kim, D.J. (2004). The Effects of Perceptional Factors on Personal Information Disclosure on the Web. AMCIS.
  • Kim, Y.H., Kim, D.J. (2004). The Impact of Cultural Differences on Trust in E-Commerce. IADIS International Conference of e-Society.
  • Kim, D.J. (2004). Value-based User Tendency and Usage of Wireless Internet: A Survey Analysis of Applications, Satisfaction and Use Amount. International Communication Association (ICA) Conference.
  • Steinfield, C., Whitten, P., Kim, D. (2004). The effects of mobile video image delivery on a person identification task: A study of wireless multimedia PDA use in a security context. 54th Annual ICA Conference.
  • Chae, Z., Kim, D. (2004). Value-based User Tendency and Usage of Wireless Internet: A Survey Analysis of Applications, Satisfaction and Use Amount. 54th Annual ICA Conference.
  • Lee, S., Kim, D., Park, M. (2004). Demand for number portability in the Korean mobile telecommunications market: contingent valuation approach. System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. 10 pp.. IEEE.
  • Kim, D., Ferrin, D.L., Rao, H.R. (2003). An Investigation of Consumer Online Trust and Purchase, Re-purchase Intentions. 2003 International Conference on Information Systems.
  • Yoon, J.W., Hwang, S.H., Kim, D.J., Yoon, J.S. (2003). A Balanced View for Customer Segmentation in CRM. AMCIS.
  • Kim, D.J. (2003). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce.
  • Kim, D.J., Ferrin, D.L., Rao, H. (2003). An Investigation of Consumer Online Trust and Purchase, Re-Purchasing Intentions. ICIS (International Conference on Information Systems).
  • Kim, D.J. (2003). Antecedents of Consumer Trust in B-to-C Electronic Commerce. AMCIS.
  • Lee, Y., Kim, D.J. (2003). Mobil Commerce and Agent Theory. IADIS International Conference.
  • Chae, Z., Kim, D.J., Steinfield, C. (2003). Primary Motives of Wireless Internet Use: A Survey Study of Users. INFORMS Conference on Information Systems and Technology.
  • Kim, D.J. (2003). Trust, Risk and Benefit in Electronic Commerce: What Are the Relationships. AMCIS.
  • Chae, Z., Kim, D., Steinfield, C. (2003). Primary Motives of Wireless Internet Use: A Survey Study of Users. INFORMS Conference on Information Systems and Technology.
  • Kim, D., Ferrin, D.L., Rao, H.R. (2003). Antecedents of Consumer Trust in B-to-C Electronic Commerce. Americas Conference on Information Systems (AMCIS).
  • Kim, D., Ferrin, D.L., Rao, H.R. (2003). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: the Korean Experience. International Conference on Electronic Commerce (ICEC 2003).
  • Lee, Y., Kim, D. (2003). Mobile Commerce and Agent Theory. 2003 IADIS International Conference.
  • Kim, D.J. (2001). Framework for the Comparison of Business-to-Business E-Service Solutions. INFORMS Conference on Information Systems and Technology.
  • Zhang, H., Kim, D.J., Ramesh, R. (2001). Multiagent Systems: An Ontological Meta-model. AMCIS.
  • Zhang, H., Kim, D.J., Ramesh, R. (2001). Ontological Foundations for the Design of Integrated Multiagent Architectures. International Bi-Conference Workshop on AGENT-ORIENTED INFORMATION SYSTEMS.
  • Kim, D., Song, Y.I., Braynov, S.B., Rao, H.R. (2001). A B-to-C Trust Model for On-line Exchange. Americas Conference on Information Systems (AMCIS). 784-787.
  • Zhang, H., Kim, D., Ramesh, R. (2001). Multi-agent Systems: An Ontological Meta-model. 2001 Americas Conference on Information Systems (AMCIS).
  • Zhang, H., Kim, D., Ramesh, R. (2001). Ontological Foundations for the Design of Integrated Multiagent Architectures. Third International Bi-Conference Workshop on AGENT-ORIENTED INFORMATION SYSTEMS (AOIS-2001).
  • Kim, D., Cho, B.S., Rao, H.R. (2000). Effects of Consumer Lifestyles on Purchasing Behavior on the Internet; A Conceptual Framework and Empirical Validation. International Conference on Information Systems. 688-695.
  • Kim, D.J., Cho, B., Rao, H. (2000). Effects of Consumer Lifestyles on Purchasing Behavior on the Internet; Conceptual Framework and Empirical Validation. International Conference on Information Systems.
  • Kim, D.J., Ramesh, M., Rao, H. (2000). Web Ads Selection for One-to-One Advertising Using Neuro-Fuzzy Systems. AMCIS.
  • Kim, D., Ramesh, M., Rao, H.R. (2000). Web Ads Selection for One-to-One Advertising Using Neuro-Fuzzy Systems. Americas Conference on Information Systems. 26-32.
  • Journal Article

  • Ogbanufe, O., Benjamin, V., Kim, D. (2024). Adversarial Knowledge-Sharing in a Coopetitive Environment: A Darknet Hacker Context. European Journal of Information Systems.
  • Kim, D., Salvacion, M., Salehan, M., Kim, D.W. (2023). An empirical study of community cohesiveness, community attachment, and their roles in virtual community participation. European Journal of Information Systems. 32 (3) 573–600.
  • Lim, S., Kim, D., Yoo, H. (2023). An Empirical Study on the Courier Services Users’ Privacy Infringement Experience, Privacy Concerns, and Privacy Protective Action. 25 (3) 99-120. https://www.earticle.net/Article/A434765
  • Kim, D., Bose, I., Mukhopadhyay, A. (2023). Special Issue on Bright Information and Communication Technologies in the 21st Century. Information Systems Frontiers. 25 1661-1665.
  • Lee, S., Jeong, E.J., Kim, D., Kong, J. (2023). The Influence of Psychological Needs and Motivation on Game Cheating: Insights from Self-Determination Theory. Frontiers in Psychology. 14 (1278738)
  • Bhagat, S., Kim, D. (2023). Examining users’ news sharing behaviour on social media: role of perception of online civic engagement and dual social influences. Behaviour & Information Technology. 42 (8) 1194–1215.
  • Bera, D., Ogbanufe, O., Kim, D. (2023). Towards a Thematic Dimensional Framework of Online Fraud: An Exploration of Fraudulent Email Attack Tactics and Intentions. Decision Support Systems. 171
  • Bera, D., Kim, D., Ogbanufe, O. (2023). Towards a Thematic Dimensional Framework of Online Fraud: An Exploration of Fraudulent Email Attack Tactics and Intentions. Decision Support Systems.
  • Kam, H., Kim, D., He, W. (2022). Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology. 41 (10) 2259-2273.
  • Lim, S.H., Kim, D. (2022). The effect of unmindfulness on impulse purchasing behaviours in the context of online shopping from a classical attitude theory perspective. Other. 41 (16) 3432–3449. Informa UK Limited. http://dx.doi.org/10.1080/0144929x.2021.1996630
  • Mousavizadeh, M., Koohikamali, M., Salehan, M., Kim, D. (2022). An Investigation of Peripheral and Central Cues of Online Customer Review Voting and Helpfulness through the Lens of Elaboration Likelihood Model. Information Systems Frontiers. 24 (1) 211-231. Springer Science and Business Media LLC. http://dx.doi.org/10.1007/s10796-020-10069-6
  • Chen, R., Kim, D., Rao, H.R. (2021). A study of social networking site use from a three-pronged security and privacy threat assessment perspective. Information & Management. 58 (5) 103486.
  • Maurer, C., Kim, K., Kim, D.J., Kappelman, L.A. (2021). Cybersecurity: Is it Worse than We Think?. Communications of the ACM. 64 (2) 28-30.
  • Ogbanufe, O., Kim, D.J., Jones, M. (2021). Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures. Information & Management. 58 (7)
  • Kam, H.J., Mattson, T., Kim, D. (2021). The “Right” recipes for security culture: a competing values model perspective. Information Technology & People. 34 (5) 1490-1512. https://api.elsevier.com/content/abstract/scopus_id/85091004626
  • Lim, S., Kim, D.J. (2020). An Empirical Study of B2C Logistics Services Users’ Privacy Risk, Trust, Concern and Behavioral Willingness of Compliance: Cognitive Valence Theory Approach. 22 (2) 105-125.
  • Bhagat, S., Kim, D. (2020). Higher Education Amidst COVID-19: Challenges and Silver Lining. Information Systems Management. 37 (4) 366-371. https://api.elsevier.com/content/abstract/scopus_id/85092609410
  • Lim, S.H., Kim, D. (2020). Does Emotional Intelligence of Online Shoppers Affect Their Shopping Behavior? From a Cognitive-Affective-Conative Framework Perspective. International Journal of Human-Computer Interaction. 36 (14) 1304-1313. https://api.elsevier.com/content/abstract/scopus_id/85082602305
  • Mousavi, R., Chen, R., Kim, D., Chen, K. (2020). Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory. Decision Support Systems. 135 (August) https://api.elsevier.com/content/abstract/scopus_id/85085332632
  • Li, K., Kim, D.J., Lang, K., Kauffman, R., Naldi, M. (2020). How Should We Understand the Digital Economy in Asia? Critical Assessment and Research Agenda. Electronic Commerce Research and Applications.
  • Kim, Y., Kim, D., Suveatwatanakul, C. (2020). A study of sport event restaurant quality (SeRQ): A case of collegiate football games. Other. 21 (5) 365-386. https://api.elsevier.com/content/abstract/scopus_id/85087120624
  • Bhagat, S., Jeong, E.J., Kim, D. (2020). The Role of Individuals’ Need for Online Social Interactions and Interpersonal Incompetence in Digital Game Addiction. International Journal of Human-Computer Interaction. 36 (5) 449-463. https://api.elsevier.com/content/abstract/scopus_id/85071328322
  • Yun, H., Lee, G., Kim, D. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management. 56 (4) 570-601. https://www.sciencedirect.com/science/article/pii/S0378720617301210
  • Kim, D. (2019). An Empirical Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use Mobile Fintech Payment Services. International Journal of Human-Computer Interaction. 35 (10) 886-898.
  • Kim, C., Kim, J., Kim, D.J. (2019). Effects of Personal Motivation and Computing Characteristics on Ubiquitous Mobile Device Usages. International Journal of Mobile Communications. 17 (2) 127-156. Inderscience Publishers. http://dx.doi.org/10.1504/ijmc.2019.10011658
  • Koohikamali, M., French, A.M., Kim, D. (2019). An investigation of a dynamic model of privacy trade-off in use of mobile social network applications: A longitudinal perspective. Decision Support Systems. 119 (1) 46-59. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2019.02.007
  • Ogbanufe, O., Kim, D. (2018). "Just how risky is it anyway?" The role of risk perception and trust on click-through intention. Information Systems Management. 35 (3) 182-200.
  • Salehan, M., Kim, D., Koo, C. (2018). A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. Journal of Supercomputing. 74 (8) 3596-3619.
  • Salehan, M., Kim, D., Lee, J. (2018). Are there any relationships between technology and cultural values? A country-level trend study of the association between information communication technology and cultural values. Information & Management. 55 (6) 725-745.
  • Ogbanufe, O., Kim, D. (2018). Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. 106 1-14.
  • Ogbanufe, O., Kim, D. (2018). Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems.
  • Kim, D., Hebeler, J., Yoon, V., Davis, F. (2018). Exploring Determinants of Semantic Web Technology Adoption from IT Professionals' Perspective: Industry Competition, Organization Innovativeness, and Data Management Capability. Computers in Human Behavior. 86 18-33.
  • Ogbanufe, O., Kim, D. (2018). Just How Risky is it Anyway? The Role of Risk Perception and Trust on Click-through Intention. Information Systems Management.
  • Sullivan, Y., Kim, D. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-commerce environments. International Journal of Information Management. 39 (2) 199-219. https://api.elsevier.com/content/abstract/scopus_id/85039703364
  • Kim, C., Kim, D. (2017). Uncovering the value stream of digital content business from users’ viewpoint. International Journal of Information Management. 37 (6) 553-565. Elsevier BV. http://dx.doi.org/10.1016/j.ijinfomgt.2017.05.004
  • Lim, S.H., Sung, J., Kim, D., Kim, D. (2017). A Study of Consumers’ Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems. 27 (3) 156-175.
  • Salehan, M., Kim, D., Kim, C. (2017). Use of Online Social Networking Services from a Theoretical Perspective of the Motivation-Participation-Performance Framework. Journal of the Association for Information Systems. 18 (2) 141-172.
  • Jeong, E.J., Kim, D., Lee, D.M. (2017). Why Do Some People Become Addicted to Digital Games More Easily? A Study of Digital Game Addiction from a Psychosocial Health Perspective. International Journal of Human-Computer Interaction. 33 (3) 199-214. Informa UK Limited. http://dx.doi.org/10.1080/10447318.2016.1232908
  • Yim, S., Lee, S., Kim, D.J. (2017). Is Online Consumers’ Impulsive Buying Beneficial for E-Commerce Companies? An Empirical Investigation of Online Consumers’ Past Impulsive Buying Behaviors. Information Systems Management. 34 (1) 85-100.
  • Mousavizadeh, M., Kim, D., Chen, R. (2016). Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study. Decision Support Systems. 92 79-90. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2016.09.011
  • Negahban, A., Kim, D., Kim, C. (2016). Unleashing the Power of mCRM: Investigating Antecedents of Mobile CRM Values from Managers’ Viewpoint. International Journal of Human-Computer Interaction. 32 (10) 747-764. http://dx.doi.org/10.1080/10447318.2016.1189653
  • Kim, D., Yim, M., Sugumaran, V., Rao, H.R. (2016). Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations. European Journal of Information Systems. 25 (3) 252-273.
  • Kim, Y. H., Kim, D. J., & Jai, T.. (2016). A destination and two festivals: A comparison study using Structural Equation Modeling (SEM). Event Management. 20 (3) 327-339. Cognizant Communication Corporation.
  • Kim, Y.H., Kim, D., Jai, T.C. (2016). One Destination and Two Events: A Comparative Analysis on Perceived Value, Satisfaction, and Intention to Revisit. Event Management. 20 (3) 327-339. Cognizant Electronic Publishing. http://dx.doi.org/10.3727/152599516x14682560744596
  • Visinescu, L.L., Azogu, O., Ryan, S., Wu, Y., Kim, D. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as cloud computing service. International Journal of Human-Computer Interaction. 32 (11) 885-900.
  • Koo, C., Chung, N., Kim, D., Hlee, S. (2016). The impact of destination websites and cultural exposure: a comparison study of experienced and inexperienced travelers. International Journal of Tourism Cities. 2 (1) 1-16. Emerald. http://dx.doi.org/10.1108/ijtc-04-2015-0009
  • Salehan, M., Kim, D. (2016). Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics. Decision Support Systems. 81 30-40. Elsevier BV. http://dx.doi.org/10.1016/j.dss.2015.10.006
  • Kim, D., Jeong, E.J., Hwang, Y. (2015). A Study of Online Portal Users’ Loyalty From Core Service, Additional Value-added Service and Switching Barriers Perspectives. Information Systems Management. 32 (2) 136-152.
  • Koo, C., Chung, N., Kim, D. (2015). How do social media transform politics? The role of a podcast,‘Naneun Ggomsuda’in South Korea. Information Development. 31 (5) 421-434.
  • Kim, D., Yim, M., Sugumaran, V., Rao, H.R. (2015). Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations. European Journal of Information Systems.
  • Ham, J., Kim, D., Choi, B., Lee, J. (2015). What Makes Open Innovation Processes Better? A Focus on IT Professionals’ Attitudes. Asia Pacific Journal of Information Systems. 25 (2) 306-328.
  • Kim, C., Li, W., Kim, D. (2015). An Empirical Analysis of Factors Influencing M-Shopping Use. International Journal of Human-Computer Interaction. 31 (12) 974-994. Informa UK Limited. http://dx.doi.org/10.1080/10447318.2015.1085717
  • Koo, C., Chung, N., Kim, D. (2015). How do social media transform politics? The role of a podcast, ‘Naneun Ggomsuda’ in South Korea. Information Development. 31 (5) 421-434. SAGE Publications. http://dx.doi.org/10.1177/0266666913516883
  • Fukuzumi, S., Ohkubo, K., Ishida, M., Preihs, C., Chen, B., Borden, W.T., Kim, D., Sessler, J.L. (2015). Formation of Ground State Triplet Diradicals from Annulated Rosarin Derivatives by Triprotonation.. Journal of the American Chemical Society. 137 (31) 9780-3.
  • Kim, D., Jeong, E.J., Hwang, Y. (2015). A Study of Online Portal Users’ Loyalty From Core Service, Additional Value-added Service and Switching Barriers Perspectives. Information Systems Management. 32 (2) 136-152. Informa UK Limited. http://dx.doi.org/10.1080/10580530.2015.1018774
  • Goo, J., Yim, M., Kim, D. (2014). A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. Other. 57 (4) 286-308. Institute of Electrical and Electronics Engineers (IEEE). http://dx.doi.org/10.1109/tpc.2014.2374011
  • Goo, J., Yim, M., Kim, D.J. (2014). A Path Way to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. IEEE Transactions on Professional Communication. 57 (4) 286-308.
  • Kim, D.J. (2014). A Study of Multilevel and Dynamic Nature of Trust in E-commerce: A Longitudinal Perspective. International Journal of Electronic Commerce. 19 (1) 11-64.
  • Kim, D. (2014). A Study of the Multilevel and Dynamic Nature of Trust in E-Commerce from a Cross-Stage Perspective. International Journal of Electronic Commerce. 19 (1) 11-64. Informa UK Limited. http://dx.doi.org/10.2753/jec1086-4415190101
  • Kim, Y.H., Kim, D., Wachter, K. (2013). A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention. Decision Support Systems. 54 (4) 361-370. http://dx.doi.org/10.1016/j.dss.2013.07.002
  • Kim, D. (2012). An investigation of the effect of online consumer trust on expectation, satisfaction, and post-expectation. Information Systems and e-Business Management. 10 (2) 219-240.
  • Kim, D., Yue, K., Al-Mubaid, H., Hall, S.P., Abeysekera, K. (2012). Assessing information systems and computer information systems programs from a balanced scorecard perspective. Journal of Information Systems Education. 23 (2) 177-192.
  • Kim, D.J., Yue, K., Al-Mubaid, H., Perkins-Hall, S., Abeysekera, K. (2012). Models of Practices for Computing and Information Systems Program Assessment from a Balanced Scorecard Perspective. Journal of Information Systems Education. 23 (2) 177-192. http://jise.org/Volume23/23-2/Contents-23-2.html
  • Kim, D.J. (2012). An Investigation of the Effect of Online Consumer Trust on Expectations, Satisfaction, and Post-expectation. Information Systems and e-Business Management. 10 (2) 219-249. https://springerlink3.metapress.com/content/p54246441g181748/resource-secured/?target=fulltext.pdf&sid=zsuhr5t2hbqsegnegpvrsuyd&sh=www.springerlink.com
  • Kim, D.J., Hwang, Y. (2012). A Study of Mobile Internet Consumer's Service Quality Perceptions from Utilitarian and Hedonic User Value Tendency Perspectives. Information Systems Frontiers. 14 (2) 409-421. https://springerlink3.metapress.com/content/x944174127475g76/resource-secured/?target=fulltext.pdf&sid=zsuhr5t2hbqsegnegpvrsuyd&sh=www.springerlink.com
  • Coursaris, C.K., Kim, D. (2011). A meta-analytical review of empirical mobile usability studies. Journal of Usability Studies. 6 (3) 117-171.
  • Al-Mubaid, H., Abeysekera, K., Kim, D.J., Perkins-Hall, S., Yue, K. (2011). A Model for Long Term Assessment of Computing and Information Systems Programs. Information Systems Education Journal. 9 (3) 59-67. http://isedj.org/2011-9/N3/ISEDJv9n3p59.html
  • Durbhakula, V.V., Kim, D. (2011). E-business for nations: a study of national level e-business adoption factors using country characteristics-business-technology-government framework. Journal of Theoretical and Applied Electronic Commerce Research. 6 (3) 1-12.
  • Kim, D.J., Yue, K., Hall, S.P., Gates, T. (2010). Global Diffusion of the Internet XV: Web 2.0 Technologies, Principles, and Applications: A Conceptual Framework from Technology Push and Demand Pull Perspective. Communications of the Association for Information Systems. 24 (38) http://aisel.aisnet.org/cais/vol24/iss1/38
  • Yue, K., De Silva, D., Kim, D., Aktepe, M., Nagle, S., Boerger, C., Jain, A., Verma, S. (2009). Building real world domain-specific social network websites as a capstone project. Journal of Information Systems Education. 20 (1) 67-76.
  • Kim, Y.H., Kim, D., Hwang, Y. (2009). Exploring online transaction self-efficacy in trust building in B2C e-commerce. Journal of Organizational and End User Computing. 21 (1) 37.
  • Kim, Y.H., Kim, D.J., Hwang, Y. (2009). Online Transaction Self-Efficacy, Consumer Trust, and Uncertainty Reduction in Electronic Commerce Transaction. Journal of Organizational and End User Computing.
  • Kim, D., Steinfield, C., Whitten, P. (2009). The effects of different presentation modalities on a person identification task: a study of wireless multimedia PDA use in a security context. International Journal of Human-Computer Interaction. 25 (2) 134-154.
  • Kim, D., Ferrin, D.L., Rao, H.R. (2009). Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration. Information Systems Research. 20 (2) 237-257. http://isr.journal.informs.org/cgi/content/abstract/isre.1080.0188v1
  • Kim, D.J., Ferrin, D.L., Rao, H. (2008). A Trust-Based Consumer Decision Making Model in Electronic Commerce: The Role of Trust, Risk, and their Antecedents. Decision Support Systems.
  • Choi, N., Kim, D., Goo, J., Whitmore, A. (2008). Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security. 16 (5) 484-501.
  • Kim, D.J., Steinfield, C., Lai, Y. (2008). Revisiting the Role of Web Assurance Seals in Business-to-Consumer Electronic Commerce. Decision Support Systems.
  • Kim, D. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems. 24 (4) 13-45.
  • Yoon, J., Kim, D., Yoon, J., Kim, Y. (2007). A balanced framework for customer segmentation in CRM: A case study. Other. 10 (1) 49-68.
  • Hwang, Y., Kim, D. (2007). Customer self-service systems: The effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust. Decision Support Systems. 43 (3) 746-760.
  • Park, M., Kim, D., Sang-Woo, L. (2007). Demand for number portability in the Korean telecommunications market: Contingent valuation approach. Journal of Global Information Management. 15 (1) 43-64.
  • Hwang, Y., Kim, D.J. (2007). Understanding Affective Commitment, Collectivist Culture, and Social Influence in Relation to Knowledge Sharing in Tech Mediated Learning. IEEE Transactions on Professional Communication. 50 (3) 232-248.
  • Patil, A.P., Kim, D., Ni, L.M. (2006). A study of frequency interference and indoor location sensing with 802.11 b and Bluetooth technologies. International Journal of Mobile Communications. 4 (6) 621-644.
  • Kim, D., Song, Y.I., Braynov, S.B., Rao, H.R. (2005). A Multi-dimensional Trust Formation Model in B-to-C E-Commerce: A conceptual Framework and Content Analyses of Academia/Practitioner Perspective. Decision Support Systems. 40 (2) 143-165.
  • Lee, S.W., Kim, D. (2004). Driving factors and barriers of information and communication technology for ebusiness in SMEs: A case study in Korea. IADIS International Journal of WWW/Internet. 2 (2) 16-28.
  • Kim, D., Sivasailam, N., Rao, H.R. (2004). Information Assurance in B2C Websites for Information Goods/Services. Electronic Markets. 14 (4) 344-359.
  • Kim, D., Agrawal, M., Jayaraman, B., Rao, H.R. (2003). A comparison of B2B e-service solutions. Communications of the ACM. 46 (12) 317-324.
  • Sivasailam, N., Kim, D.J., Rao, H. (2002). What Companies Are(n't ) Doing about Web Site Assurance. IT Professional Magazine. 4 (3) 33-40.

Contracts, Grants and Sponsored Research

    Grant - Research

  • Kim, D.J. (Principal), "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach: DHS SRT Follow-on Funding (2024-25)," sponsored by Department of Homeland Security, Federal, $115990 Funded. (2024 - 2025).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2023)," sponsored by Ryan College of Business, Local, $10000 Funded. (2023 - 2024).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2022)," sponsored by Ryan College of Business, Local, $10000 Funded. (2022 - 2023).
  • Kim, D.J. (Principal), "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach of Handling Phishing Attacks: DHS Summer Research Team (SRT) Program (2023)," sponsored by Department of Homeland Security, Federal, $37000 Funded. (2023 - 2023).
  • Kim, D. (Principal), Bernot, J. (Supporting), "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development," Federal, $91368 Funded. (2022 - 2023).
  • Kim, D.J. (Principal), "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development (2022-23): DHS SRT Follow-on Funding," sponsored by Department of Homeland Security, Federal, $91368 Funded. (2022 - 2023).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2021)," sponsored by Ryan College of Business, Local, $10000 Funded. (2021 - 2022).
  • Kim, D. (Principal), Bernot, J. (Supporting), "Enhancing Cybersecurity Education and Workforce Development through Extraction of KSA (Knowledge, Skills, and Abilities) from Cybersecurity Job Listing Sites," Federal, $26000 Funded. (2021 - 2021).
  • Kim, D.J. (Principal), "Enhancing Cybersecurity Education and Workforce Development through Extraction of KSA (Knowledge, Skills, and Abilities) from Cybersecurity Job Listing Sites: DHS Summer Research Team (SRT) Program," sponsored by Department of Homeland Security, Federal, $26000 Funded. (2021 - 2021).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2020)," sponsored by Ryan College of Business, Local, $10000 Funded. (2020 - 2020).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2019)," sponsored by Ryan College of Business, Local, $10000 Funded. (2019 - 2019).
  • Kim, D.J. (Principal), "Ryan College of Business Summer Research Grant (2018)," sponsored by Ryan College of Business, Local, $10000 Funded. (2018 - 2018).
  • Kim, D.J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," sponsored by GOV-National Science Foundation (NSF), University of North Texas, $47600.00 Funded. (2016 - 2018).
  • Kim, D.J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," sponsored by GOV-National Science Foundation (NSF), University of North Texas, $218960.00 Funded. (2015 - 2018).
  • Kim, D.J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," sponsored by GOV-National Science Foundation (NSF), University of North Texas, $306544.00 Funded. (2014 - 2018).
  • Kim, D.J. (Principal), Yang, A.T. (Co-Principal), "Relationship Mapping between Cybersecurity Certifications, Certification Courses, Government-sponsored Cybersecurity Designation Programs, the CAE-C KUs, and Cybersecurity Focus Areas," sponsored by National Security Agency, Federal, $245912 Funded. (2017 - 2018).
  • Kim, D.J. (Principal), "Developing and Evaluating an Open Innovation Maturity Model for the Government: A Focus on Open Data Usage," sponsored by National Research Foundation of Korea (NRF), Federal, $147200 Funded. (2014 - 2015).
  • Kim, D.J. (Co-Principal), "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," sponsored by GOV-National Science Foundation (NSF), University of North Texas, $336388 Funded. (2013 - 2013).
  • Kim, D.J., "What Dimensional Factors Influence the Level of Trust? - A Multi-dimensional Trust Model in Online Exchanges," $7500 Funded. (2013 - 2013).
  • Kim, D.J., "SFS Scholarships for Enhancing Multidisciplinary IA Education in UNT," sponsored by GOV-National Science Foundation (NSF), $251000 Funded. (2012 - 2012).
  • Kim, D.J., "Faculty Development Fund (UHCL)," $2000 Funded. (2011 - 2011).
  • Kim, D.J., "Faculty Research and Support Fund (UHCL)," $4800 Funded. (2011 - 2011).
  • Kim, D.J., "Faculty Development Fund (UHCL)," $2000 Funded. (2010 - 2010).
  • Kim, D.J., "Faculty Research and Support Fund (UHCL)," $5000 Funded. (2010 - 2010).
  • Chang, M., Kim, D.J., "Strategy of Mobile Applications in Logistic and Shipping Industries," sponsored by Institute of Northeast Asia Economic Cooperation and Logistic Strategy, South Korea, $31000 Funded. (2010 - 2010).
  • Kim, D.J., "Faculty Development Fund (UHCL)," $2000 Funded. (2009 - 2009).
  • Kim, D.J., "Faculty Research and Support Fund (UHCL)," $5000 Funded. (2009 - 2009).
  • Kim, D.J., "Faculty Development Fund (UHCL)," $2400 Funded. (2008 - 2008).
  • Kim, D.J., "Faculty Research and Support Fund (UHCL)," $4620 Funded. (2008 - 2008).
  • Kim, D.J., "Faculty Development Fund (UHCL)," $2000 Funded. (2007 - 2007).
  • Kim, D.J., "Faculty Research and Support Fund (UHCL)," $4620 Funded. (2007 - 2007).
  • Kim, D.J., "Faculty Development Fund (University of Houston-Clear Lake)," $2000 Funded. (2006 - 2006).
  • Kim, D.J., "Summer Research Grants (Michigan State University)," $19500 Funded. (2004 - 2004).
  • Kim, D.J., "Summer Research Grants (Michigan State University)," $19500 Funded. (2003 - 2003).
  • Grant - Teaching

  • Kim, D.J. (Principal), "Traditional Innovation versus Online Innovation: A Comparative Study of the Relationships Between National Culture and Innovation," sponsored by Core Fulbright Scholar Program sponsored by the U.S. Department of State's Bureau of Educational and Cultural Affairs, International, $52084 Funded. (2018 - 2019).
  • Kim, D. (Principal), Dantu, R. (Principal), Hawamdeh, S.M. (Principal), "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," sponsored by National Science Foundation, FED, Funded. (2012 - 2021).
  • Kim, D.J. (Principal), "Traditional Innovation versus Online Innovation: A Comparative Study of the Relationships Between National Culture and Innovation," sponsored by Core Fulbright Scholar Program sponsored by the U.S. Department of State's Bureau of Educational and Cultural Affairs, International, Funded. (2018 - 2019).
  • Kim, D. (Principal), "Export Controlled, title removed," sponsored by National Security Agency, FED, Funded. (2017 - 2019).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE