default search action
Hwee-Joo Kam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Hwee-Joo Kam, John D'Arcy:
A DevOps Perspective: the Impact of Role Transitions on Software Security Continuity. ECIS 2023 - 2022
- [j11]Hwee-Joo Kam, Dan J. Kim, Wu He:
Should we wear a velvet glove to enforce Information security policies in higher education? Behav. Inf. Technol. 41(10): 2259-2273 (2022) - [j10]Hwee-Joo Kam, Dustin K. Ormond, Philip Menard, Robert E. Crossler:
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training. Inf. Syst. J. 32(4): 888-926 (2022) - 2021
- [j9]Hwee-Joo Kam, Thomas Mattson, Dan J. Kim:
The "Right" recipes for security culture: a competing values model perspective. Inf. Technol. People 34(5): 1490-1512 (2021) - 2020
- [j8]Hwee-Joo Kam, Philip Menard, Dustin Ormond, Robert E. Crossler:
Cultivating cybersecurity learning: An integration of self-determination and flow. Comput. Secur. 96: 101875 (2020) - [j7]Hwee-Joo Kam, Thomas Mattson, Sanjay Goel:
A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. Inf. Syst. Frontiers 22(5): 1241-1264 (2020) - [c20]Philip Menard, Hwee-Joo Kam, Dustin Ormond, Robert E. Crossler:
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance. AMCIS 2020
2010 – 2019
- 2019
- [j6]Hwee-Joo Kam, Pairin Katerattanakul:
Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach. J. Inf. Technol. Educ. Innov. Pract. 18: 29-47 (2019) - [c19]Dustin Ormond, Hwee-Joo Kam, Philip Menard:
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches. AMCIS 2019 - [c18]Hwee-Joo Kam, Yanyan Shang:
Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense. PACIS 2019: 177 - 2018
- [j5]Pairin Katerattanakul, Soongoo Hong, Hyun-Mi Lee, Hwee-Joo Kam:
The effects of web accessibility certification on the perception of companies' corporate social responsibility. Univers. Access Inf. Soc. 17(1): 161-173 (2018) - [c17]Hwee-Joo Kam, Philip Menard, Dustin Ormond, Pairin Katerattanakul:
Ethical Hacking: Addressing the Critical Shortage of Cybersecurity Talent. PACIS 2018: 321 - 2017
- [c16]Hwee-Joo Kam, Vishal Shah, Shuyuan Mary Ho:
Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective. AMCIS 2017 - 2016
- [c15]Hwee-Joo Kam, Pairin Katerattanakul, Soongoo Hong:
It Governance Framework: One Size Fits All? AMCIS 2016 - 2015
- [c14]Hwee-Joo Kam, Pairin Katerattanakul, Soongoo Hong:
A Tale of Two Cities: Information Security Policy Compliance of the Banking Industry in the United States and South Korea. ECIS 2015 - 2014
- [j4]Hwee-Joo Kam, Pairin Katerattanakul:
Structural model of team-based learning using Web 2.0 collaborative software. Comput. Educ. 76: 1-12 (2014) - [j3]Greg Gogolin, Erin Gogolin, Hwee-Joo Kam:
Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices. Int. J. Artif. Life Res. 4(1): 30-42 (2014) - [c13]Hwee-Joo Kam, Pairin Katerattanakul:
Out-Of-Class Learning: A Pedagogical Approach of Promoting Information Security Education. AMCIS 2014 - [c12]Hwee-Joo Kam, Pairin Katerattanakul:
Diversifying cybersecurity education: A non-technical approach to technical studies. FIE 2014: 1-4 - 2013
- [c11]Hwee-Joo Kam, Pairin Katerattanakul, Gerald E. Merick:
Impact of External Pressures on Information Security Policy Compliance in the Banking Industry. CONF-IRM 2013: 39 - [c10]Hwee-Joo Kam, Greg Gogolin, Doug Blakemore, Gerald E. Merick:
Playing online games on Facebook: The conscious and unconscious learning in database design. FIE 2013: 514-516 - [c9]Hwee-Joo Kam, Pairin Katerattanakul, Greg Gogolin:
A Cross Industry Study: Differences in Information Security Policy Compliance between the Banking Industry and Higher Education. ICIS 2013 - [c8]Hwee-Joo Kam, Pairin Katerattanakul, Greg Gogolin, Soongoo Hong:
Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective. PACIS 2013: 106 - 2012
- [c7]Hwee-Joo Kam, Pairin Katerattanakul:
Structural Model of Team-Based Learning using Web 2.0 Collaborative Software. CONF-IRM 2012: 12 - [c6]Hwee-Joo Kam, Greg Gogolin:
Work in progress: Out-of-class learning: Shaping perception of learning and building knowledge of IT professions. FIE 2012: 1-2 - 2011
- [c5]Hwee-Joo Kam, Joshua J. Pauli:
Work in progress - Web penetration testing: Effectiveness of student learning in Web application security. FIE 2011: 3 - 2010
- [c4]Hwee-Joo Kam, Pairin Katerattanakul:
Collaborative Learning with Web 2.0 Technology: Synchronicity Dimension. AMCIS 2010: 132
2000 – 2009
- 2009
- [j2]Pairin Katerattanakul, Hwee-Joo Kam, James J. Lee, Soongoo Hong:
Teaching Case: Migrating Legacy Systems in the Global Merger & Acquisition Environment. J. Inf. Syst. Educ. 20(3): 281-288 (2009) - [c3]Pairin Katerattanakul, James J. Lee, Soongoo Hong, Hwee-Joo Kam:
Effect of Business Characteristics and ERP Implementation Strategies on ERP Outcomes: An Exploratory Study. AMCIS 2009: 581 - 2008
- [c2]Pairin Katerattanakul, Hwee-Joo Kam, James J. Lee, Soongoo Hong:
Migrating Legacy Systems in the Global Merger & Acquisition Environment Teaching Case. AMCIS 2008: 108 - 2006
- [j1]Keng Siau, Hwee-Joo Kam:
e-Healthcare in ABC county health department (ABCCHD): trade-offs analysis and evaluation. J. Inf. Technol. 21(1): 66-71 (2006) - 2003
- [c1]Pairin Katerattanakul, Muhammad A. Razi, Hwee-Joo Kam:
IS Journal Rankings Versus Citation Analysis: Consistency and Concerns. AMCIS 2003: 365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint