Skip to main content

Sung S Kim

Sung Kim
Professor | Operations and Information Management
Peter T. Allen Professor
608-262-3481
4108 Grainger Hall

Biography

Sung S. Kim is the Peter T. Allen Professor in the Department of Operations and Information Management at the Wisconsin School of Business.

His research covers broad issues related to online user behavior including habit, addiction, loyalty, switching costs, information privacy and security, gaming, community participation, and social networking. His research has appeared in Information Systems Research, MIS Quarterly, Management Science, Journal of Management Information Systems, Journal of the Association for Information Systems, and Decision Sciences.

He holds a B.S. in electronic engineering from Yonsei University, Seoul, Korea, an M.S. in information systems from the University of Wisconsin–Madison, and a Ph.D. in information technology management with a minor in industrial and systems engineering from the Georgia Institute of Technology.

Research

Selected Accepted Journal Articles

Kim, S. (2023). Roles of Feedback and Phishing Characteristics in Antiphishing Training Performance: Perspectives of Goal-Setting and Skill Acquisition

Selected Published Journal Articles

Kim, S. & Kwak, D. & KUEM, J. & Deng, S. (2022). How to Achieve Goals in Digital Games? An Empirical Test of a Goal-Oriented Model in Pokémon GO Journal of the Association for Information Systems

KUEM, J. & Khansa, L. & Kim, S. (2020). Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities Journal of Management Information Systems

Hou, J. & Kim, K. & Kim, S. & Ma, X. (2019). Disrupting Unwanted Habits in Online Gambling Through Information Technology Journal of Management Information Systems

Kwak, D. & Holtkamp, P. & Kim, S. (2019). Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research Journal of the Association for Information Systems

Ma, X. & Khansa, L. & Kim, S. (2018). Active Community Participation and Crowdworking Turnover: A Longitudinal Study Journal of Management Information Systems

Khansa, L. & Kuem, J. & Siponen, M. & Kim, S. (2017). To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls Journal of Management Information Systems

Kuem, J. & Ray, S. & Siponen, M. & Kim, S. (2017). What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model Journal of Management Information Systems

Choi, C. & Kim, S. & Jiang, Z. (2016). Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior Journal of Management Information Systems

Choi, C. & Jiang, Z. & Xiao, B. & Kim, S. (2015). Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding Information Systems Research

Khansa, L. & Ma, X. & Liginlal, D. & Kim, S. (2015). Understanding Members’ Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis Journal of Management Information Systems

Ray, S. & Kim, S. & Morris, J. (2014). The Central Role of Engagement in Online Communities Information Systems Research

Ma, X. & Kim, S. & Kim, S. (2014). Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use Information Systems Research

Ma, X. & Khansa, L. & Deng, Y. & Kim, S. (2013). Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems Journal of Management Information Systems

Ray, S. & Kim, S. & Morris, J. (2012). Online Users’ Switching Costs: Their Nature and Formation Information Systems Research

Ray, S. & Ow, T. & Kim, S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust Decision Sciences

Kim, S. (2009). The Integrative Framework of Technology Use: An Extension and Test MIS Quarterly

Kim, S. & Son, J. (2009). Out of Dedication or Constraint? A Dual Model of Postadoption Phenomena and Its Empirical Test in the Context of Online Services MIS Quarterly

Son, J. & Kim, S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model MIS Quarterly

Malhotra, N. & Kim, S. & Patil, A. (2006). Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research Management Science

Son, J. & Kim, S. & Riggins, F. (2006). Consumer Adoption of Net-Enabled Infomediaries: Theoretical Explanations and an Empirical Test Journal of the Association for Information Systems

Kim, S. & Malhotra, N. & Narasimhan, S. (2005). Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison Information Systems Research

Kim, S. & Malhotra, N. (2005). A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena Management Science

Kim, S. & Malhotra, N. (2005). Predicting System Usage from Intention and Past Use: Scale Issues in the Predictors Decision Sciences

Malhotra, N. & Kim, S. & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model Information Systems Research

Teaching

Undergraduate Courses

Analysis and Design of Computer-Based Systems (INS 424), Fall 2006.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Analysis and Design of Computer-Based Systems (INS 424), Fall 2007.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Computer-Based Data Management (INS 422), Fall 2001.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (MIS 422), Fall 2002.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Contemporary Topics (OIM 365), Spring 2002.

Contemporary Topics (OIM 365), Spring 2003.

Contemporary Topics (I S 365), Fall 2010.

Graduate Courses

Seminar-Data Processing (INS 872), Spring 2005.
Independent reading and systems designs emphasizing computers, analytic methods, and research techniques applied to current business problems.

Contemporary Topics (OTM 765), Fall 2010.

Hybrid Courses

Contemporary Topics (OIM/OIM 765/365), Fall 2004.

Contemporary Topics (OIM/OIM 765/365), Spring 2006.

Contemporary Topics (INS/INS 765/365), Fall 2009.

Analysis and Design of Computer-Based Systems (INS/INS 724/424), Spring 2006.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Analysis and Design of Computer-Based Systems (INS/INS 724/424), Spring 2007.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Anal&Dsgn:Comptr-Based Sys (INS/INS 724/424), Spring 2009.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Anal&Dsgn:Comptr-Based Sys (INS/INS 724/424), Spring 2008.
Analysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.

Computer-Based Data Mgt (INS/INS 722/422), Spring 2009.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Mgt (INS/INS 722/422), Spring 2008.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (INS/INS 722/422), Spring 2006.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (INS/INS 722/422), Spring 2007.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Mgt (INS/INS 722/422), Fall 2009.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (INS/INS 422/722), Spring 2003.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (INS/INS 422/722), Spring 2002.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Computer-Based Data Management (INS/INS 422/722), Spring 2004.
Use, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.

Contemporary Topics (OIM/OIM 365/765), Spring 2004.

Contemporary Topics (OIM/OIM 365/765), Spring 2005.

Contemporary Topics (OIM/OIM 365/765), Fall 2003.

Contemporary Topics (INS/INS 365/765), Spring 2010.