default search action
Kevin Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Kevin Kim, Sarbottam Bhagat, Emrah Ekici:
Unraveling the Nexus: Exploring the Relationship Between IT Investments and Firm Performance. AMCIS 2024 - 2023
- [c14]Kevin Kim, David Money Harris, Kip Macsai-Goren:
Design and Synthesis of RISC-V Bit Manipulation Extensions. ACSSC 2023: 1559-1563 - [i3]Kentaro Nojima-Schmunk, David Turzak, Kevin Kim, Andrew Vu, James Yang, Sreeauditya Motukuri, Ningshi Yao, Daigo Shishika:
Manta Ray Inspired Flapping-Wing Blimp. CoRR abs/2310.10853 (2023) - 2022
- [j10]J. Philipp Klaus, Kevin Kim, Adi Masli, Katia Guerra, Leon A. Kappelman:
Prioritizing IT Management Issues and Business Performance. J. Inf. Syst. 36(2): 83-99 (2022) - [j9]Kevin Kim, Saea Kim, Anthony Choi:
Ultrasonic Sound Guide System with Eyeglass Device for the Visually Impaired. Sensors 22(8): 3077 (2022) - [c13]Kevin Kim, Sarbottam Bhagat:
Care to Share Your Personal Information? AMCIS 2022 - [c12]Arno Hartholt, Ed Fast, Andrew Leeds, Kevin Kim, Andrew Gordon, Kyle McCullough, Volkan Ustun, Sharon Mozgai:
Demonstrating the Rapid Integration & Development Environment (RIDE): Embodied Conversational Agent (ECA) and Multiagent Capabilities. AAMAS 2022: 1902-1904 - [c11]Arno Hartholt, Ed Fast, Zongjian Li, Kevin Kim, Andrew Leeds, Sharon Mozgai:
Re-architecting the virtual human toolkit: towards an interoperable platform for embodied conversational agent research and development. IVA 2022: 16:1-16:8 - [i2]Alyssa Blackburn, Christoph Huber, Yossi Eliaz, Muhammad Saad Shamim, David Weisz, Goutham Seshadri, Kevin Kim, Shengqi Hang, Erez Lieberman Aiden:
Cooperation among an anonymous group protected Bitcoin during failures of decentralization. CoRR abs/2206.02871 (2022) - 2021
- [j8]Chris Maurer, Kevin Kim, Dan J. Kim, Leon A. Kappelman:
Cybersecurity: is it worse than we think? Commun. ACM 64(2): 28-30 (2021) - [j7]Leon A. Kappelman, Ephraim R. McLean, Vess L. Johnson, Russell Torres, Chris Maurer, Kevin Kim, Katia Guerra, Mark Snyder:
The 2020 SIM IT Issues and Trends Study. MIS Q. Executive 20(1): 8 (2021) - [c10]Vikas Shilimkar, Kevin Kim:
RF LDMOS Transistor Plastic Immunity Enhancement in Power Amplifier Module for 5G Applications. BCICTS 2021: 1-4 - [c9]Dan Kilper, Hongying Dong, Aaron T. Knife, Jiakai Yu, Qi Liu, Kevin Kim, Bruce Lincoln, Clayton Banks, Sheila Foster, Olivier Sylvain, Rider W. Foley, Ronald D. Williams:
Using the Capacity and Low Latency of Mobile Edge Clouds for Community Applications. OFC 2021: 1-3 - [i1]Kevin Kim, Alex Gittens:
Learning Fair Canonical Polyadical Decompositions using a Kernel Independence Criterion. CoRR abs/2104.13504 (2021) - 2020
- [j6]Leon A. Kappelman, Vess L. Johnson, Chris Maurer, Katie Guerra, Ephraim R. McLean, Russell Torres, Mark Snyder, Kevin Kim:
The 2019 SIM IT Issues and Trends Study. MIS Q. Executive 19(1): 7 (2020) - [j5]Leon A. Kappelman, Russell Torres, Ephraim R. McLean, Katia Guerra, Vess Johnson, Chris Maurer, Kevin Kim, Smriti Srivastava:
A Preview of the 2020 SIM IT Trends Study. MIS Q. Executive 19(4): 3 (2020) - [c8]Sarbottam Bhagat, Kevin Kim, Katia Guerra:
BYOD Security Policy Compliance: Role of Policy Awareness, Organizational Culture and Social Controls. AMCIS 2020 - [c7]Kevin Kim, Russell Torres:
The Role of AI in Perceptions of Distributive, Procedural, and Interactional Justice. AMCIS 2020
2010 – 2019
- 2019
- [j4]Leon A. Kappelman, Russell Torres, Ephraim R. McLean, Chris Maurer, Vess Johnson, Kevin Kim:
The 2018 SIM IT Issues and Trends Study. MIS Q. Executive 18(1): 7 (2019) - [j3]Leon A. Kappelman, Russell Torres, Ephraim R. McLean, Katia Guerra, Vess Johnson, Chris Maurer, Kevin Kim, Mark Snyder:
A Preview of the 2019 SIM IT TrendsStudy. MIS Q. Executive 18(4): 4 (2019) - [j2]Jonas Urbonas, Kevin Kim, Peter H. Aaen:
Direct E-Field Measurement and Imaging of Oscillations Within Power Amplifiers. IEEE Trans. Instrum. Meas. 68(8): 2971-2978 (2019) - [c6]Sarbottam Bhagat, Kevin Kim:
Towards Integrating Blockchain and Digital Governance Structure in Supply Chain Collaboration (SCC). AMCIS 2019 - [c5]Kevin Kim, Sarbottam Bhagat, Katia Guerra:
When Do Users Begin to Worry About Privacy? AMCIS 2019 - [c4]Kevin Kim, Katia Guerra, Sarbottam Bhagat:
What IT Factors Increase Productivity? AMCIS 2019 - [c3]Frederik Vanaverbeke, Michael Satinu, Kevin Kim:
Characterization of the Self-Enhanced Class J PA Operating Mode in LDMOS and GaN Transistors. BCICTS 2019: 1-7 - 2018
- [j1]Leon A. Kappelman, Ephraim R. McLean, Vess Johnson, Russell Torres, Chris Maurer, Kevin Kim:
Guest Editorial. MIS Q. Executive 17(4): 3 (2018) - [c2]Kevin Kim, Justin Smith, T. Andrew Yang, Dan J. Kim:
An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. NCS 2018: 1-7 - 2011
- [c1]Kevin Kim:
NCsoft special session: NCsoft, connecting the world with entertainment. CIG 2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint