default search action
Myung S. Ko 0001
Person information
- affiliation: University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Hoon Seok Choi, Darrell Carpenter, Myung S. Ko:
Risk Taking Behaviors Using Public Wi-Fi™. Inf. Syst. Frontiers 24(3): 965-982 (2022) - 2020
- [j15]Mohsen M. Jozani, Emmanuel Ayaburi, Myung Ko, Kim-Kwang Raymond Choo:
Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Comput. Hum. Behav. 107: 106260 (2020) - [c17]Paras Bhatt, Smriti Bhatt, Myung Ko:
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In Organizations. SACMAT 2020: 223-225
2010 – 2019
- 2019
- [c16]Oluwafemi Akanfe, Myung Ko:
Big Data Analytics: Predicting Obesity Epidemic through Socioeconomic Data Analysis. AMCIS 2019 - 2018
- [j14]Hoon Seok Choi, Myung S. Ko, Dawn Medlin, Charlie Chen:
The effect of intrinsic and extrinsic quality cues of digital video games on sales: An empirical investigation. Decis. Support Syst. 106: 86-96 (2018) - [c15]Mohsen M. Jozani, Emmanuel Ayaburi, Myung Ko, Kim-Kwang Raymond Choo:
A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App. AMCIS 2018 - 2016
- [j13]Xiao (Jerry) Zhang, Myung S. Ko, Darrell Carpenter:
Development of a scale to measure skepticism toward electronic word-of-mouth. Comput. Hum. Behav. 56: 198-208 (2016) - [j12]Mohammed Sajedur Rahman, Myung Ko, John Warren, Darrell Carpenter:
Healthcare Technology Self-Efficacy (HTSE) and its influence on individual attitude: An empirical study. Comput. Hum. Behav. 58: 12-24 (2016) - [j11]Humayun Zafar, Myung S. Ko, Kweku-Muata Osei-Bryson:
The value of the CIO in the top management team on performance in the case of information security breaches. Inf. Syst. Frontiers 18(6): 1205-1215 (2016) - [c14]Emmanuel Ayaburi, Myung Ko, Diane B. Walz:
Understanding Antecedents and Consequence of Knowledge Sharing in Software Testing Teams: A Conceptual Model. AMCIS 2016 - [c13]Michele Maasberg, Myung Ko, Nicole Lang Beebe:
Exploring a Systematic Approach to Malware Threat Assessment. HICSS 2016: 5517-5526 - 2014
- [j10]Humayun Zafar, Myung S. Ko, Jan Guynes Clark:
Security Risk Management in Healthcare: A Case Study. Commun. Assoc. Inf. Syst. 34: 37 (2014) - 2013
- [c12]Mohammed Sajedur Rahman, Myung Ko:
Toward Systematic Identification of Stakeholders for Healthcare Information Systems: A Feature-Based Method. AMCIS 2013 - [c11]Jerry Zhang, Darrell Carpenter, Myung Ko:
Online Astroturfing: A Theoretical Perspective. AMCIS 2013 - [c10]Jerry Zhang, Myung Ko:
Current State of the Digital Deception Studies in IS. AMCIS 2013 - 2012
- [j9]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors. Inf. Resour. Manag. J. 25(1): 21-37 (2012) - [c9]Mohammed Sajedur Rahman, Myung S. Ko:
Factors Influencing Patients' Perceptions toward Electronic Medical Record (EMR) Use: A Conceptual Model. AMCIS 2012 - [c8]Humayun Zafar, Jan Guynes Clark, Myung S. Ko:
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. AMCIS 2012 - 2011
- [j8]Nicole Lang Beebe, Jan Guynes Clark, Glenn B. Dietrich, Myung S. Ko, Daijin Ko:
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies. Decis. Support Syst. 51(4): 732-744 (2011) - [c7]Humayun Zafar, Jan Guynes Clark, Myung S. Ko, Yoris A. Au:
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm. AMCIS 2011 - [c6]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Does a CIO Matter? Investigating the Impact of IT Security Breaches on Firm Performance Using Tobin's q. HICSS 2011: 1-7 - 2010
- [c5]Yong Seog Kim, Myung Ko:
Identifying Green IT Leaders with Financial and Environmental Performance Indicators. AMCIS 2010: 54
2000 – 2009
- 2009
- [j7]Myung Ko, Kweku-Muata Osei-Bryson, Carlos Alberto Dorantes:
Investigating the Impact of Publicly Announced Information Security Breaches on Three Performance Indicators of the Breached Firms. Inf. Resour. Manag. J. 22(2): 1-21 (2009) - [c4]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Intra-Industry Effects of Information Security Breaches on Firm Performance. AMCIS 2009: 590 - 2008
- [j6]Myung S. Ko, Jan Guynes Clark, Daijin Ko:
Revisiting the Impact of Information Technology Investments on Productivity: An Empirical Investigation Using Multivariate Adaptive Regression Splines (MARS). Inf. Resour. Manag. J. 21(3): 1-23 (2008) - [j5]Myung Ko, Kweku-Muata Osei-Bryson:
Reexamining the impact of information technology investment on productivity using regression tree and multivariate adaptive regression splines (MARS). Inf. Technol. Manag. 9(4): 285-299 (2008) - [c3]Myung S. Ko, Jan Guynes Clark:
Understanding the Information Technology Innovation Impact on Firm Performance: An Empirical Investigation. AMCIS 2008: 249 - 2006
- [j4]Myung Ko, Kweku-Muata Osei-Bryson:
Analyzing the impact of information technology investments using regression and data mining techniques. J. Enterp. Inf. Manag. 19(4): 403-417 (2006) - 2004
- [j3]Kweku-Muata Osei-Bryson, Myung Ko:
Exploring the relationship between information technology investments and firm performance using regression splines analysis. Inf. Manag. 42(1): 1-13 (2004) - [j2]Myung Ko, Kweku-Muata Osei-Bryson:
The productivity impact of information technology in the healthcare industry: an empirical study using a regression spline-based approach. Inf. Softw. Technol. 46(1): 65-73 (2004) - [j1]Myung Ko, Kweku-Muata Osei-Bryson:
Using regression splines to assess the impact of information technology investments on productivity in the health care industry. Inf. Syst. J. 14(1): 43-64 (2004) - [c2]Kweku-Muata Osei-Bryson, Myung Ko:
Applying Data Mining Techniques to Understand the Impact of Information Technology on Organizational Productivity. AMCIS 2004: 101 - 2002
- [c1]Myung Ko, Kweku-Muata Bryson:
A Regression Tree Based Exploration Of The Impact Of Information Technology Investments On Firm Level Productivity. ECIS 2002: 506-517
Coauthor Index
aka: Kweku-Muata Bryson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint