Jongwoo Kim
Jongwoo Kim
Verified email at
Cited by
Cited by
Incident-centered information security: Managing a strategic balance between prevention and response
R Baskerville, P Spagnoletti, J Kim
Information & management 51 (1), 138-151, 2014
Achieving dynamic capabilities with cloud computing: An empirical investigation
DA Battleson, BC West, J Kim, B Ramesh, PS Robinson
European Journal of Information Systems 25 (3), 209-230, 2016
The effect of IT failure impact and personal morality on IT project reporting behavior
CW Park, M Keil, JW Kim
IEEE Transactions on Engineering Management 56 (1), 45-60, 2008
A model of emotion and computer abuse
JJ Kim, EHE Park, RL Baskerville
Information & Management 53 (1), 91-108, 2016
An emote opportunity model of computer abuse
R Baskerville, EH Park, J Kim
Information Technology & People, 2014
Web services composition with traceability centered on dependency
JW Kim, R Jain
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
The role of information security learning and individual factors in disclosing patients' health information
EH Park, J Kim, YS Park
Computers & Security 65, 64-76, 2017
Construction of domain ontologies: Sourcing the world wide web
J Kim, VC Storey
International Journal of Intelligent Information Technologies (IJIIT) 7 (2 …, 2011
Pruning bio-ontologies
JW Kim, JC Caralt, JK Hilliard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Design for an interactive television advertising system
JW Kim, S Du
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
Conflicts and complements between eastern cultures and agile methods: an empirical investigation
B Ramesh, L Cao, J Kim, K Mohan, TL James
European Journal of Information Systems 26 (2), 206-235, 2017
Achieving Dynamic Capabilities with Business Intelligence.
P Xu, Jongwoo (Jonathan) Kim
PACIS, 330, 2014
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation
J Kim, K Mohan, B Ramesh
IEEE Transactions on Professional Communication 57 (3), 182-203, 2014
Software process re‐engineering: a model and its application to an industrial case study
NP Napier, J Kim, L Mathiassen
Software Process: Improvement and Practice 13 (5), 451-471, 2008
Cultural effects on offshore-outsourced systems development
JW Kim, P Meso, DG Kim
13th Annual Cross-Cultural Meeting in Information Systems, Las Vegas, December, 2005
Achieving dynamic capabilities with cloud computing
BC West, DA Battleson, J Kim, B Ramesh
IT Professional 16 (6), 18-24, 2014
Factors affecting intention to disclose patients’ health information
EH Park, J Kim, LL Wiles, YS Park
Computers & Security 87, 101340, 2019
Breaking the privacy kill chain: Protecting individual and group privacy online
J Kim, RL Baskerville, Y Ding
Information Systems Frontiers, 1-15, 2018
The use of ontology in knowledge intensive tasks: ontology driven retrieval of use cases
J Kim, J Conesa, B Ramesh
Asia Pacific Journal of Information Systems 25 (1), 25-60, 2015
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
R Baskerville, J Kim, C Stucke, R Sainsbury
Proceedings of 2013 IFIP 8.11/11.13 Dewald Roode Information Security …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20