About Sung
His research covers broad issues related to online user behavior including habit, addiction, loyalty, switching costs, information privacy and security, gaming, community participation, and social networking. His research has appeared in Information Systems Research, MIS Quarterly, Management Science, Journal of Management Information Systems, Journal of the Association for Information Systems, and Decision Sciences.
He holds a B.S. in electronic engineering from Yonsei University, Seoul, Korea, an M.S. in information systems from the University of Wisconsin–Madison, and a Ph.D. in information technology management with a minor in industrial and systems engineering from the Georgia Institute of Technology.
Selected Accepted Journal Articles
Kim, S. (2023). Roles of Feedback and Phishing Characteristics in Antiphishing Training Performance: Perspectives of Goal-Setting and Skill Acquisition
Selected Published Journal Articles
Kim, S. & Kwak, D. & KUEM, J. & Deng, S. (2022). How to Achieve Goals in Digital Games? An Empirical Test of a Goal-Oriented Model in Pokémon GO Journal of the Association for Information Systems
KUEM, J. & Khansa, L. & Kim, S. (2020). Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities Journal of Management Information Systems
Hou, J. & Kim, K. & Kim, S. & Ma, X. (2019). Disrupting Unwanted Habits in Online Gambling Through Information Technology Journal of Management Information Systems
Kwak, D. & Holtkamp, P. & Kim, S. (2019). Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research Journal of the Association for Information Systems
Ma, X. & Khansa, L. & Kim, S. (2018). Active Community Participation and Crowdworking Turnover: A Longitudinal Study Journal of Management Information Systems
Khansa, L. & Kuem, J. & Siponen, M. & Kim, S. (2017). To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls Journal of Management Information Systems
Kuem, J. & Ray, S. & Siponen, M. & Kim, S. (2017). What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model Journal of Management Information Systems
Choi, C. & Kim, S. & Jiang, Z. (2016). Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior Journal of Management Information Systems
Choi, C. & Jiang, Z. & Xiao, B. & Kim, S. (2015). Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding Information Systems Research
Khansa, L. & Ma, X. & Liginlal, D. & Kim, S. (2015). Understanding Members’ Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis Journal of Management Information Systems
Ray, S. & Kim, S. & Morris, J. (2014). The Central Role of Engagement in Online Communities Information Systems Research
Ma, X. & Kim, S. & Kim, S. (2014). Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use Information Systems Research
Ma, X. & Khansa, L. & Deng, Y. & Kim, S. (2013). Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems Journal of Management Information Systems
Ray, S. & Kim, S. & Morris, J. (2012). Online Users’ Switching Costs: Their Nature and Formation Information Systems Research
Ray, S. & Ow, T. & Kim, S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust Decision Sciences
Kim, S. (2009). The Integrative Framework of Technology Use: An Extension and Test MIS Quarterly
Kim, S. & Son, J. (2009). Out of Dedication or Constraint? A Dual Model of Postadoption Phenomena and Its Empirical Test in the Context of Online Services MIS Quarterly
Son, J. & Kim, S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model MIS Quarterly
Malhotra, N. & Kim, S. & Patil, A. (2006). Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research Management Science
Son, J. & Kim, S. & Riggins, F. (2006). Consumer Adoption of Net-Enabled Infomediaries: Theoretical Explanations and an Empirical Test Journal of the Association for Information Systems
Kim, S. & Malhotra, N. & Narasimhan, S. (2005). Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison Information Systems Research
Kim, S. & Malhotra, N. (2005). A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena Management Science
Kim, S. & Malhotra, N. (2005). Predicting System Usage from Intention and Past Use: Scale Issues in the Predictors Decision Sciences
Malhotra, N. & Kim, S. & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model Information Systems Research
Undergraduate Courses
Analysis and Design of Computer-Based Systems (INS 424), Fall 2006.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Analysis and Design of Computer-Based Systems (INS 424), Fall 2007.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Computer-Based Data Management (INS 422), Fall 2001.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (MIS 422), Fall 2002.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Contemporary Topics (OIM 365), Spring 2002.
Contemporary Topics (OIM 365), Spring 2003.
Contemporary Topics (I S 365), Fall 2010.
Graduate Courses
Seminar-Data Processing (INS 872), Spring 2005.
Independent reading and systems designs emphasizing computers, analytic methods, and research techniques applied to current business problems.
Contemporary Topics (OTM 765), Fall 2010.
Hybrid Courses
Contemporary Topics (OIM/OIM 765/365), Fall 2004.
Contemporary Topics (OIM/OIM 765/365), Spring 2006.
Contemporary Topics (INS/INS 765/365), Fall 2009.
Analysis and Design of Computer-Based Systems (INS/INS 724/424), Spring 2006.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Analysis and Design of Computer-Based Systems (INS/INS 724/424), Spring 2007.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Anal&Dsgn:Comptr-Based Sys (INS/INS 724/424), Spring 2009.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Anal&Dsgn:Comptr-Based Sys (INS/INS 724/424), Spring 2008.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
Computer-Based Data Mgt (INS/INS 722/422), Spring 2009.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Mgt (INS/INS 722/422), Spring 2008.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (INS/INS 722/422), Spring 2006.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (INS/INS 722/422), Spring 2007.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Mgt (INS/INS 722/422), Fall 2009.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (INS/INS 422/722), Spring 2003.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (INS/INS 422/722), Spring 2002.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Computer-Based Data Management (INS/INS 422/722), Spring 2004.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
Contemporary Topics (OIM/OIM 365/765), Spring 2004.
Contemporary Topics (OIM/OIM 365/765), Spring 2005.
Contemporary Topics (OIM/OIM 365/765), Fall 2003.
Contemporary Topics (INS/INS 365/765), Spring 2010.