default search action
JinKyu Lee 0003
Person information
- affiliation: Oklahoma State University, Department of Management Science and Information Systems, Stillwater, OK, USA
Other persons with the same name
- Jinkyu Lee (aka: JinKyu Lee, Jin-Kyu Lee, Jin Kyu Lee) — disambiguation page
- Jinkyu Lee 0001 — Sungkyunkwan University, Department of Computer Science and Engineering, Suwon, South Korea (and 2 more)
- Jinkyu Lee 0002 — Yonsei University, Department of Electrical and Electronic Engineering, Seoul, Korea
- Jinkyu Lee 0004 — Qualcomm AI Research, Korea
- Jinkyu Lee 0005 — Samsung Austin Research Center, Austin, TX, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j15]Supavich (Fone) Pengnate, Rathindra Sarathy, JinKyu Lee:
The Engagement of Website Initial Aesthetic Impressions: An Experimental Investigation. Int. J. Hum. Comput. Interact. 35(16): 1517-1531 (2019) - 2016
- [j14]Jing Yang, Rathindra Sarathy, JinKyu Lee:
The effect of product review balance and volume on online Shoppers' risk perception and purchase intention. Decis. Support Syst. 89: 66-76 (2016) - 2013
- [j13]Sungjune Park, JinKyu Lee, Min-Jae Lee:
Sustaining Web 2.0 services: A survival analysis of a live crowd-casting service. Decis. Support Syst. 54(3): 1256-1268 (2013) - [j12]Jessica Pu Li, Rui Chen, JinKyu Lee, H. Raghav Rao:
A case study of private-public collaboration for humanitarian free and open source disaster management software deployment. Decis. Support Syst. 55(1): 1-11 (2013) - 2012
- [j11]Min-Jae Lee, JinKyu Lee:
The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Inf. Syst. Frontiers 14(2): 375-393 (2012) - [j10]JinKyu Lee, H. Raghav Rao:
Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain. Inf. Syst. J. 22(4): 313-341 (2012) - [j9]Hyunjeong Kang, Min-Jae Lee, Jin-Kyu Lee:
Are You Still with Us? A Study of the Post-Adoption Determinants of Sustained Use of Mobile-Banking Services. J. Organ. Comput. Electron. Commer. 22(2): 132-159 (2012) - [j8]Nitesh Bharosa, JinKyu Lee, Marijn Janssen, H. Raghav Rao:
An activity theory analysis of boundary objects in cross-border information systems development for disaster management. Secur. Informatics 1(1): 15 (2012) - 2011
- [j7]JinKyu Lee, Nitesh Bharosa, Jing Yang, Marijn Janssen, H. Raghav Rao:
Group value and intention to use - A study of multi-agency disaster management information systems for public safety. Decis. Support Syst. 50(2): 404-414 (2011) - [c13]Jing Yang, Rathindra Sarathy, JinKyu Lee, Xiang Fang:
Investigating the Influence of Product Reviews on Perceived Uncertainty in Online Transactions. AMCIS 2011 - 2010
- [j6]Marijn Janssen, JinKyu Lee, Nitesh Bharosa, Anthony M. Cresswell:
Advances in multi-agency disaster management: Key elements in disaster research. Inf. Syst. Frontiers 12(1): 1-7 (2010) - [j5]Nitesh Bharosa, JinKyu Lee, Marijn Janssen:
Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises. Inf. Syst. Frontiers 12(1): 49-65 (2010) - [j4]JinKyu Lee, Sharmistha Bagchi-Sen, H. Raghav Rao, Shambhu J. Upadhyaya:
Anatomy of the Information Security Workforce. IT Prof. 12(1): 14-23 (2010) - [c12]Rui Chen, Thirumurugan Thiyagarajan, H. Raghav Rao, Jin Kyu Lee:
Design of a FOSS system for flood disaster management. ISCRAM 2010
2000 – 2009
- 2009
- [j3]JinKyu Lee, H. Raghav Rao:
Task complexity and different decision criteria for online service acceptance: A comparison of two e-government compliance service domains. Decis. Support Syst. 47(4): 424-435 (2009) - [c11]Nitesh Bharosa, JinKyu Lee, Marijn Janssen, H. Raghav Rao:
A case study of information flows in multi-agency emergency response exercises. D.GO 2009: 277-282 - [c10]Rui Chen, John Coles, Jinkyu Lee, Hejamadi Raghav Rao:
Emergency communication and system design: The case of Indian Ocean Tsunami. ICTD 2009: 300-309 - 2008
- [c9]JinKyu Lee, H. Raghav Rao:
Complexity of compliance tasks and user acceptance of G2C online compliance services. DG.O 2008: 363-364 - 2007
- [j2]JinKyu Lee, H. Raghav Rao:
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment. Decis. Support Syst. 43(4): 1431-1449 (2007) - [c8]JinKyu Lee, H. Raghav Rao:
Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. DG.O 2007: 155-163 - [c7]JinKyu Lee, H. Raghav Rao:
Citizen centric analysis of anti/counter-terrorism e-government services. DG.O 2007: 258-259 - [c6]JinKyu Lee, H. Raghav Rao:
Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. HICSS 2007: 98 - 2006
- [c5]H. Raghav Rao, JinKyu Lee:
Citizen centric analysis of anti/counter-terrorism e-government services. DG.O 2006: 425-426 - 2005
- [j1]JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman:
Secure knowledge management and the semantic web. Commun. ACM 48(12): 48-54 (2005) - [c4]JinKyu Lee, Dan Jong Kim, H. Raghav Rao:
An Examination of Trust Effects and Pre-Existing Relational Risks in eGovernment Services. AMCIS 2005: 143 - [c3]Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . ICISS 2005: 317-321 - 2004
- [c2]Insu Park, JinKyu Lee, H. Raghav Rao:
Digital Democracy: The Influence of the Internet on Voting Intention. AMCIS 2004: 136 - 2003
- [c1]JinKyu Lee, H. Raghav Rao:
A Study of Customers' Trusting Beliefs in Government-to-Customer Online Services. AMCIS 2003: 102
Coauthor Index
aka: Hejamadi Raghav Rao
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 02:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint