Dan J. Kim
University of North Texas
H-index: 49
North America-United States
Top articles of Dan J. Kim
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Explicating Geo-Tagging Behavior on Social Media: Role of Interpersonal Competence, Self-Regulation, Online Affiliation, and Privacy Calculus | ACM SIGMIS Database: the DATABASE for Advances in Information Systems | Sarbottam Bhagat Dan J Kim | 2024/2/6 |
Adversarial knowledge-sharing in a coopetitive environment: a darknet hacker context | Obi Ogbanufe Victor Benjamin Dan J Kim | 2024/1/24 | |
Examining users’ news sharing behaviour on social media: role of perception of online civic engagement and dual social influences | Behaviour & Information Technology | Sarbottam Bhagat Dan J Kim | 2023/6/11 |
An empirical study of community cohesiveness, community attachment, and their roles in virtual community participation | European Journal of Information Systems | Dan J Kim Mark Salvacion Mohammad Salehan Dae Wan Kim | 2023/5/4 |
Discovering New Cybersecurity Knowledge Through Text | Jordan EF Bernot Dan J Kim | 2023 | |
Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus | Sara Memarian Esfahani Dan J Kim | 2023 | |
Special Issue on Bright Information and Communication Technologies in the 21st Century | Information Systems Frontiers | Dan J Kim Indranil Bose Arunabha Mukhopadhyay | 2023/10 |
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection | Debalina Bera Dan J Kim | 2023 | |
Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions | Decision Support Systems | Debalina Bera Obi Ogbanufe Dan J Kim | 2023/8/1 |
The effect of unmindfulness on impulse purchasing behaviours in the context of online shopping from a classical attitude theory perspective | Behaviour & Information Technology | Se Hun Lim Dan J Kim | 2022/12/10 |
Uncovering Others on Social Networking Sites: The Perspective of Impulsive and Reflective Users. | Sara Memarian Esfahani Dan J Kim | 2022 | |
Should we wear a velvet glove to enforce Information security policies in higher education? | Behaviour & Information Technology | Hwee-Joo Kam Dan J Kim Wu He | 2022/7/27 |
An investigation of peripheral and central cues of online customer review voting and helpfulness through the lens of elaboration likelihood model | Information Systems Frontiers | Mohammadreza Mousavizadeh Mehrdad Koohikamali Mohammad Salehan Dam J Kim | 2022/2/1 |
When Social Media Foretells a Shooting | Smriti Srivastava Pranay Prateek Dan J Kim | 2022 | |
Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions | Jordan EF Bernot Dan J Kim | 2022 | |
The collective information privacy on social networking sites | Sara Memarian Esfahani Dan J Kim | 2022 | |
The State of Business Internet of Things Adoption: Literature Review | Sara Memarian Esfahani Dan J Kim | 2021 | |
A study of social networking site use from a three-pronged security and privacy threat assessment perspective | Information & Management | Rui Chen Dan J Kim H Raghav Rao | 2021/7/1 |
US Census Block Groups and Location Sharing Behavior: Case of IoT Adoption | Mehrdad Koohikamali Dan J Kim | 2021 | |
Cybersecurity: is it worse than we think? | Communications of the ACM | Chris Maurer Kevin Kim Dan Kim Leon A Kappelman | 2021/1/25 |