Jongwoo Kim
Jongwoo Kim
Verified email at
TitleCited byYear
Incident-centered information security: Managing a strategic balance between prevention and response
R Baskerville, P Spagnoletti, J Kim
Information & management 51 (1), 138-151, 2014
The effect of IT failure impact and personal morality on IT project reporting behavior
CW Park, M Keil, JW Kim
IEEE Transactions on Engineering Management 56 (1), 45-60, 2008
Achieving dynamic capabilities with cloud computing: an empirical investigation
DA Battleson, BC West, J Kim, B Ramesh, PS Robinson
European Journal of Information Systems 25 (3), 209-230, 2016
Web services composition with traceability centered on dependency
JW Kim, R Jain
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
An emote opportunity model of computer abuse
R Baskerville, E Hee Park, J Kim
Information Technology & People 27 (2), 155-181, 2014
A model of emotion and computer abuse
JJ Kim, EHE Park, RL Baskerville
Information & Management 53 (1), 91-108, 2016
Design for an interactive television advertising system
JW Kim, S Du
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
Construction of domain ontologies: Sourcing the world wide web
J Kim, VC Storey
International Journal of Intelligent Information Technologies (IJIIT) 7 (2 …, 2011
Achieving Dynamic Capabilities with Business Intelligence.
P Xu, Jongwoo (Jonathan) Kim
PACIS, 330, 2014
Pruning bio-ontologies
JW Kim, JC Caralt, JK Hilliard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
The role of information security learning and individual factors in disclosing patients' health information
EH Park, J Kim, YS Park
Computers & Security 65, 64-76, 2017
Conflicts and complements between eastern cultures and agile methods: an empirical investigation
B Ramesh, L Cao, J Kim, K Mohan, TL James
European Journal of Information Systems 26 (2), 206-235, 2017
Software process re‐engineering: a model and its application to an industrial case study
NP Napier, J Kim, L Mathiassen
Software Process: Improvement and Practice 13 (5), 451-471, 2008
Cultural effects on offshore-outsourced systems development
JW Kim, P Meso, DG Kim
13th Annual Cross-Cultural Meeting in Information Systems, Las Vegas, December, 2005
Functional and Nonfunctional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation
J Kim, K Mohan, B Ramesh
IEEE Transactions on Professional Communication 57 (3), 182-203, 2014
Achieving dynamic capabilities with cloud computing
BC West, DA Battleson, J Kim, B Ramesh
IT Professional 16 (6), 18-24, 2014
The use of ontology in knowledge intensive tasks: ontology driven retrieval of use cases
J Kim, J Conesa, B Ramesh
Asia Pacific Journal of Information Systems 25 (1), 25-60, 2015
Toward a framework of cultural effects on software development
JW Kim, P Meso
AMCIS 2005 Proceedings, 410, 2005
To Tell or Not to Tell: Nursing Students’ Attitudes Toward Disclosing Patients’ Protected Health Information
LL Wiles, EHE Park, JJ Kim
CIN: Computers, Informatics, Nursing 36 (3), 115-117, 2018
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
R Baskerville, J Kim, C Stucke, R Sainsbury
Proceedings of 2013 IFIP 8.11/11.13 Dewald Roode Information Security …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20