Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model NK Malhotra, SS Kim, J Agarwal Information systems research 15 (4), 336-355, 2004 | 4464 | 2004 |
Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research NK Malhotra, SS Kim, A Patil Management science 52 (12), 1865-1883, 2006 | 3769 | 2006 |
A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena SS Kim, NK Malhotra Management science 51 (5), 741-755, 2005 | 1498 | 2005 |
Internet users' information privacy-protective responses: A taxonomy and a nomological model JY Son, SS Kim MIS quarterly, 503-529, 2008 | 846 | 2008 |
Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services SS Kim, JY Son MIS quarterly, 49-70, 2009 | 705 | 2009 |
Research note—two competing perspectives on automatic use: A theoretical and empirical comparison SS Kim, NK Malhotra, S Narasimhan Information systems research 16 (4), 418-432, 2005 | 665 | 2005 |
The central role of engagement in online communities S Ray, SS Kim, JG Morris Information Systems Research 25 (3), 528-546, 2014 | 425 | 2014 |
The integrative framework of technology use: An extension and test SS Kim Mis Quarterly, 513-537, 2009 | 317 | 2009 |
Understanding members’ active participation in online question-and-answer communities: A theory and empirical analysis L Khansa, X Ma, D Liginlal, SS Kim Journal of Management Information Systems 32 (2), 162-203, 2015 | 205 | 2015 |
Impact of prior reviews on the subsequent review process in reputation systems X Ma, L Khansa, Y Deng, SS Kim Journal of Management Information Systems 30 (3), 279-310, 2013 | 200 | 2013 |
Research Note—Online Users' Switching Costs: Their Nature and Formation S Ray, SS Kim, JG Morris Information systems research 23 (1), 197-213, 2012 | 164 | 2012 |
To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls L Khansa, J Kuem, M Siponen, SS Kim Journal of Management Information Systems 34 (1), 141-176, 2017 | 158 | 2017 |
Security assurance: How online service providers can influence security control perceptions and gain trust S Ray, T Ow, SS Kim Decision Sciences 42 (2), 391-412, 2011 | 153 | 2011 |
Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding BCF Choi, Z Jiang, B Xiao, SS Kim Information Systems Research 26 (4), 675-694, 2015 | 150 | 2015 |
Influence of firm’s recovery endeavors upon privacy breach on online customer behavior BCF Choi, SS Kim, Z Jiang Journal of management information systems 33 (3), 904-933, 2016 | 134 | 2016 |
Predicting system usage from intention and past use: scale issues in the predictors SS Kim, NK Malhotra Decision sciences 36 (1), 187-196, 2005 | 132 | 2005 |
Measuring and controlling social desirability bias: Applications in information systems research DH Kwak, P Holtkamp, SS Kim Journal of the Association for Information Systems 20 (4), 5, 2019 | 87 | 2019 |
What leads to prosocial behaviors on social networking services: A tripartite model J Kuem, S Ray, M Siponen, SS Kim Journal of Management Information Systems 34 (1), 40-70, 2017 | 84 | 2017 |
Prominence and engagement: Different mechanisms regulating continuance and contribution in online communities J Kuem, L Khansa, SS Kim Journal of Management Information Systems 37 (1), 162-190, 2020 | 83 | 2020 |
Online gambling behavior: The impacts of cumulative outcomes, recent outcomes, and prior use X Ma, SH Kim, SS Kim Information Systems Research 25 (3), 511-527, 2014 | 83 | 2014 |