default search action
Sang-Yong Tom Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Chae-Lin Lim, Woo-Jin Jung, Yea Eun Kim, Chanyoung Eom, Sang-Yong Tom Lee:
The differential impact of IT investments in the long term: a long-horizon event study. Ind. Manag. Data Syst. 124(9): 2711-2735 (2024) - 2023
- [j21]Kwansoo Kim, Sang-Yong Tom Lee, Robert J. Kauffman:
Social informedness and investor sentiment in the GameStop short squeeze. Electron. Mark. 33(1): 23 (2023) - 2022
- [j20]Kwansoo Kim, Sang-Yong Tom Lee, Saïd Assar:
The dynamics of cryptocurrency market behavior: sentiment analysis using Markov chains. Ind. Manag. Data Syst. 122(2): 365-395 (2022) - 2020
- [j19]Agnes Yang, Young-Jin Kwon, Sang-Yong Tom Lee:
The impact of information sharing legislation on cybersecurity industry. Ind. Manag. Data Syst. 120(9): 1777-1794 (2020)
2010 – 2019
- 2019
- [j18]Christina Yong Jeong, Sang-Yong Tom Lee, Jee-Hae Lim:
Information security breaches and IT security investments: Impacts on competitors. Inf. Manag. 56(5): 681-695 (2019) - [c18]Kwansoo Kim, Sang-Yong Tom Lee, Saïd Assar:
Coin Market Behavior using Social Sentiment Markov Chains. PACIS 2019: 218 - 2018
- [j17]Woojin Jung, Sang-Yong Tom Lee:
ICT R&D and Technology Knowledge Flows in Korea. J. Database Manag. 29(4): 51-69 (2018) - [c17]Sun-Kyung Yang, Young-Jin Kwon, Sang-Yong Tom Lee:
The Impact of Information Sharing Legislation on Cybersecurity Industry. ICIS 2018 - 2017
- [c16]Robert J. Kauffman, Kwansoo Kim, Sang-Yong Tom Lee:
Computational Social Science Fusion Analytics: Combining Machine-Based Methods with Explanatory Empiricism. HICSS 2017: 1-10 - [c15]Christina Yong Jeong, Sang-Yong Tom Lee, Jee-Hae Lim:
The Impact of Information Security Breaches and IT Security Investments on a Firm's Competitors. ICIS 2017 - [c14]Kwansoo Kim, Sang-Yong Tom Lee, Morad Benyoucef:
The Impact of Social Sentiment on Firm Performance Similarity. ICIS 2017 - 2016
- [c13]Kwansoo Kim, Sang-Yong Tom Lee, Robert J. Kauffman:
Social Sentiment and Stock Trading via Mobile Phones. AMCIS 2016 - [c12]Woojin Jung, Sang-Yong Tom Lee, Hee-Woong Kim:
The Relationship between IT Investment and Employment: are they Substitutes or complements? PACIS 2016: 372 - 2015
- [j16]Sang-Yong Tom Lee, Chee Wei David Phang, Robert J. Kauffman:
Special section on new e-commerce research from the Asian region. Electron. Commer. Res. Appl. 14(3): 143-144 (2015) - [j15]Sang-Yong Tom Lee, Chee Wei David Phang:
Leveraging social media for electronic commerce in Asia: Research areas and opportunities. Electron. Commer. Res. Appl. 14(3): 145-149 (2015) - 2014
- [j14]SeonJun Kang, Sang-Yong Tom Lee:
Korean Online Game's Platform Competition under Two-Sided Market Characteristic. J. Glob. Inf. Manag. 22(4): 21-33 (2014) - 2013
- [c11]SeonJun Kang, Sang-Yong Tom Lee:
Platform Market Share of Korean Online Game under Two-Sided Market with Low Switching Costs. PACIS 2013: 4 - 2012
- [j13]Jae-Seung Han, Sang-Yong Tom Lee:
Impact of Vendor Selection on Firms' IT Outsourcing: The Korea Experience. J. Glob. Inf. Manag. 20(2): 25-43 (2012)
2000 – 2009
- 2009
- [j12]Roya Gholami, Xiaojia Guo, Dolores Añón Higón, Sang-Yong Tom Lee:
Information and Communications Technology (ICT) International Spillovers. IEEE Trans. Engineering Management 56(2): 329-340 (2009) - 2008
- [j11]Yong Jin Kim, Hyunjeong Kang, G. Lawrence Sanders, Sang-Yong Tom Lee:
Differential effects of IT investments: Complementarity and effect of GDP level. Int. J. Inf. Manag. 28(6): 508-516 (2008) - [j10]Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png:
Consumer Privacy and Marketing Avoidance: A Static Model. Manag. Sci. 54(6): 1094-1103 (2008) - 2007
- [j9]Zhaoli Meng, Sang-Yong Tom Lee:
The value of IT to firms in a developing country in the catch-up process: An empirical comparison of China and the United States. Decis. Support Syst. 43(3): 737-745 (2007) - [j8]Gee-Woo Bock, Sang-Yong Tom Lee, Haiying Li:
Price Comparison and Price Dispersion: Products and Retailers at Different Internet Maturity Stages. Int. J. Electron. Commer. 11(4): 101-124 (2007) - [j7]Juan Juan Zhang, Sang-Yong Tom Lee:
A Time Series Analysis of International ICT Spillover. J. Glob. Inf. Manag. 15(4): 64-78 (2007) - [j6]Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png:
Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. J. Manag. Inf. Syst. 24(2): 13-42 (2007) - [j5]Kai Lung Hui, Hock-Hai Teo, Sang-Yong Tom Lee:
The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Q. 31(1): 19-33 (2007) - [c10]Zhaoli Meng, Sang-Yong Tom Lee:
Competition and Compatibility with Open Source Software. ECIS 2007: 1147-1154 - [c9]Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png:
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach. HICSS 2007: 210 - [c8]Seung-Jae Han, Sang-Yong Tom Lee:
The impact of IT vendor to firm's IT outsourcing. PACIS 2007: 127 - 2006
- [j4]Il-Horn Hann, Kai Lung Hui, Yee-Lin Lai, Sang-Yong Tom Lee, Ivan P. L. Png:
Who gets spammed? Commun. ACM 49(10): 83-87 (2006) - 2005
- [j3]Sang-Yong Tom Lee, Roghieh Gholami, Tan Yit Tong:
Time series analysis in the assessment of ICT impact at the aggregate level - lessons and implications for the new economy. Inf. Manag. 42(7): 1009-1022 (2005) - 2004
- [j2]Roghieh Gholami, Saeed Moshiri, Sang-Yong Tom Lee:
ICT and Productivity of the Manufacturing Industries in Iran. Electron. J. Inf. Syst. Dev. Ctries. 19(1): 1-19 (2004) - [c7]Sang-Yong Tom Lee, Zhaoli Meng:
Calculative-based trust and social welfare. ECIS 2004: 1007-1016 - 2003
- [c6]Roghieh Gholami, Sang-Yong Tom Lee, Almas Heshmati:
The causal relationship between information and communication technology (ICT) and foreign direct investment (FDI). ECIS 2003: 708-729 - 2002
- [c5]Hong Ge, Hock-Hai Teo, Sang-Yong Tom Lee:
Additional Listing Options On eBAY : Are They Worth The Money. ECIS 2002: 759-767 - [c4]Xiaohua Zeng, Sang-Yong Tom Lee, Hock-Hai Teo:
Impact Of Online Renting On Software Piracy. ECIS 2002: 1320-1329 - [c3]Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png:
Online Information Privacy: Measuring the Cost-Benefit Trade-Off. ICIS 2002: 1 - 2001
- [c2]Sang-Yong Tom Lee:
How much should my software differ from yours. ECIS 2001: 818-824 - 2000
- [j1]Sang-Yong Tom Lee:
Bundling strategy in base-supplemental goods markets: the case of Microsoft. Eur. J. Inf. Syst. 9(4): 217-225 (2000) - [c1]Sang-Yong Tom Lee:
Bundling Strategy in Base-Supplemental Goods Markets: The Case of Microsoft. ECIS 2000: 453-460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint