Wisconsin School of Business

Sung Kim

Professor - Operations & Information Management
Peter T. Allen Professor

Sung S. Kim is the Peter T. Allen Professor in the Department of Operations and Information Management at the Wisconsin School of Business.

His research covers broad issues related to online user behavior including habit, addiction, loyalty, switching costs, information privacy and security, gaming, community participation, and social networking. His research has appeared in Information Systems Research, MIS Quarterly, Management Science, Journal of Management Information Systems, Journal of the Association for Information Systems, and Decision Sciences. He served as an associate editor of Information Systems Research.

He holds a B.S. in electronic engineering from Yonsei University, Seoul, Korea, an M.S. in information systems from the University of Wisconsin–Madison, and a Ph.D. in information technology management with a minor in industrial and systems engineering from the Georgia Institute of Technology.
 

Selected Published Journal Articles


Kwak, D. & Holtkamp, P. & Kim, S. (2019). Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research. Journal of the Association for Information Systems (20), 317-345.
Ma, X. & Khansa, L. & Kim, S. (2018). Active Community Participation and Crowdworking Turnover: A Longitudinal Study. Journal of Management Information Systems (35), 1154-1187.
Khansa, L. & Kuem, J. & Siponen, M. & Kim, S. (2017). To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. Journal of Management Information Systems (34), 141-176.
Kuem, J. & Ray, S. & Siponen, M. & Kim, S. (2017). What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. Journal of Management Information Systems (34), 40-70.
Choi, C. & Kim, S. & Jiang, Z. (2016). Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior. Journal of Management Information Systems (33), 904-933.
Choi, C. & Jiang, Z. & Xiao, B. & Kim, S. (2015). Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding. Information Systems Research (26), 675-694.
Khansa, L. & Ma, X. & Liginlal, D. & Kim, S. (2015). Understanding Members’ Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis. Journal of Management Information Systems (32), 162-203.
Ray, S. & Kim, S. & Morris, J. (2014). The Central Role of Engagement in Online Communities. Information Systems Research (25), 528-546.
Ma, X. & Kim, S. & Kim, S. (2014). Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use. Information Systems Research (25), 511-527.
Ma, X. & Khansa, L. & Deng, Y. & Kim, S. (2013). Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems. Journal of Management Information Systems (30), 279-310.
Ray, S. & Kim, S. & Morris, J. (2012). Online Users' Switching Costs: Their Nature and Formation. Information Systems Research (23), 197-213. doi: 10.1287/isre.1100.0340.
Ray, S. & Ow, T. & Kim, S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences (42), 391-412.
Kim, S. (2009). The Integrative Framework of Technology Use: An Extension and Test. MIS Quarterly (33), 513-537.
Kim, S. & Son, J. (2009). Out of Dedication or Constraint? A Dual Model of Postadoption Phenomena and Its Empirical Test in the Context of Online Services. MIS Quarterly (33), 49-70.
Son, J. & Kim, S. (2008). Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly (32), 503-529.
Malhotra, N. & Kim, S. & Patil, A. (2006). Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research. Management Science (52), 1865-1883.
Son, J. & Kim, S. & Riggins, F. (2006). Consumer Adoption of Net-Enabled Infomediaries: Theoretical Explanations and an Empirical Test. Journal of the Association for Information Systems (7), 473-508.
Kim, S. & Malhotra, N. & Narasimhan, S. (2005). Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison. Information Systems Research (16)
Kim, S. & Malhotra, N. (2005). A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena. Management Science (51), 741-755.
Kim, S. & Malhotra, N. (2005). Predicting System Usage from Intention and Past Use: Scale Issues in the Predictors. Decision Sciences (36), 187-196.
Malhotra, N. & Kim, S. & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research (15), 336-355.

Undergraduate Courses


Analysis and Design of Computer-Based Systems
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS 424), Fall 2006.

Analysis and Design of Computer-Based Systems
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS 424 Section 1), Fall 2007.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS 422), Fall 2001.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(MIS 422), Fall 2002.

Contemporary Topics (OIM 365), Spring 2002.

Contemporary Topics (OIM 365), Spring 2003.

Contemporary Topics (I S 365), Fall 2010.



Graduate Courses


Seminar-Data Processing
Course DescriptionIndependent reading and systems designs emphasizing computers, analytic methods, and research techniques applied to current business problems.
(INS 872), Spring 2005.

Contemporary Topics (OTM 765 Section 1), Fall 2010.



Combined Undergraduate & Graduate Courses


Computer-Based Data Mgt
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 722/422 Section 1), Spring 2009.

Anal&Dsgn:Comptr-Based Sys
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS/INS 724/424 Section 1), Spring 2009.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 422/722), Spring 2002.

Contemporary Topics (OIM/OIM 365/765), Fall 2003.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 422/722), Spring 2003.

Contemporary Topics (OIM/OIM 765/365), Fall 2004.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 422/722), Spring 2004.

Contemporary Topics (OIM/OIM 365/765), Spring 2004.

Contemporary Topics (OIM/OIM 365/765), Spring 2005.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 722/422), Spring 2006.

Contemporary Topics (OIM/OIM 765/365), Spring 2006.

Analysis and Design of Computer-Based Systems
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS/INS 724/424), Spring 2006.

Computer-Based Data Mgt
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 722/422 Section 2), Fall 2009.

Contemporary Topics (INS/INS 765/365 Section 1), Fall 2009.

Contemporary Topics (INS/INS 365/765 Section 1), Spring 2010.

Computer-Based Data Management
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 722/422 Section 1), Spring 2007.

Analysis and Design of Computer-Based Systems
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS/INS 724/424 Section 1), Spring 2007.

Computer-Based Data Mgt
Course DescriptionUse, control and administration of centralized and distributed data bases. Topics include the definition, design, creation, revision, interrogation, update, security and integrity of data bases.
(INS/INS 722/422 Section 1), Spring 2008.

Anal&Dsgn:Comptr-Based Sys
Course DescriptionAnalysis of business systems to identify possible need for new or improved computer-based systems and the design of systems to meet those needs.
(INS/INS 724/424 Section 1), Spring 2008.



Photograph of Sung Kim

Sung Kim

 
Professor | Operations & Information Management
Peter T. Allen Professor
(608) 262-3481
3120 Grainger Hall