Sang Soo Kim

ORCID: 0000-0002-0352-2838
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Technology Adoption and User Behaviour
  • Education and Learning Interventions
  • Orbital Angular Momentum in Optics
  • Diverse Topics in Contemporary Research
  • Diverse Approaches in Healthcare and Education Studies
  • Network Security and Intrusion Detection
  • Digital Marketing and Social Media
  • Consumer Perception and Purchasing Behavior
  • Educational Research and Pedagogy
  • Microfluidic and Bio-sensing Technologies
  • Healthcare Education and Workforce Issues
  • Educational Systems and Policies
  • Customer Service Quality and Loyalty
  • Conflict of Laws and Jurisdiction
  • Corporate Finance and Governance
  • Internet of Things and Social Network Interactions
  • Innovation in Digital Healthcare Systems
  • Particle Dynamics in Fluid Flows
  • Natural Language Processing Techniques
  • Technology and Data Analysis
  • Education, Safety, and Science Studies
  • Local Government Finance and Decentralization
  • Text and Document Classification Technologies
  • Image and Video Quality Assessment
  • Corporate Social Responsibility Reporting

Yong In University
2018-2025

Keimyung University
2022-2024

Korea Railroad Research Institute
2022-2024

Hankuk University of Foreign Studies
2020-2023

Tongmyong University
2020-2022

Agency for Defense Development
2021

National Assembly
2018

Chonnam National University
1982-2017

Gwangju National University of Education
2017

Sogang University
2017

In recent years, attacks on network environments continue to rapidly advance and are increasingly intelligent. Accordingly, it is evident that there limitations in existing signature-based intrusion detection systems. particular, for novel such as Advanced Persistent Threat (APT), signature patterns have problems with poor generalization performance. Furthermore, a environment, attack samples rarely collected compared normal samples, creating the problem of imbalanced data. Anomaly using an...

10.1109/access.2021.3100087 article EN cc-by IEEE Access 2021-01-01

Purpose The purpose of this paper is to understand from the knowledge management perspective how mechanism different voluntary compliance behaviors works and information technology used for in corporate settings where privacy security issues are getting critical due advancement big data artificial intelligence. Design/methodology/approach In study, authors propose a structural model based on theory planned behavior IT relatedness that behavioral belief about social pressure affect intention,...

10.1108/jkm-08-2016-0353 article EN Journal of Knowledge Management 2017-06-08

This study uses information processing and stakeholder theories as its conceptual foundation to explore the effect of authenticity on relationship between corporate social responsibility (CSR) activities three key customer responses: evaluation, product association, purchase intention. We conducted a survey in South Korea test hypotheses. The results analysis our sample consisting 417 individuals showed that perceived CSR was positively associated with In addition, mediating indicated...

10.3390/su13042224 article EN Sustainability 2021-02-19

This study tried to understand the use of smart-work based on concept “appropriation” and examined antecedents consequences from a structuration individual aspects simultaneously. A conceptual framework proposed in this illustrates appropriation explore how they influence task performance job satisfaction. Most factors, drawn adaptive theory technology acceptance model, were found accelerate appropriation, which consequently raising The usefulness lies its comprehensive approach that...

10.1016/j.techfore.2021.120994 article EN cc-by Technological Forecasting and Social Change 2021-06-30

This study aims to investigate motivational factors and motivation hindering of online shopping via open market platforms. For a comprehensive exploration, the response data were collected from total 417 Korean consumers before conducting hierarchical regression analysis. The results showed that effects on purchasing intention all supported. As for moderating concerns e-commerce, privacy by time saving, perceived ease use, security cost saving found be statistically significant. Privacy...

10.3390/su12030773 article EN Sustainability 2020-01-21

As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary explore motivators barriers comprehensively. Given nature of an online learning environment, this study specifically focused on security privacy concerns as major issues that may be restricting engagement. Based data collected from 296 students studying at Y University, South Korea, reported results structural model...

10.1080/10494820.2020.1863232 article EN Interactive Learning Environments 2021-01-17

In sports, virtual spaces are sometimes utilized to enhance performance or user experience. this study, we conducted a frequency analysis, semantic network and topic modeling using 134 abstracts obtained through keyword searches focusing on "Sport(s)" in combination with "Metaverse," "Augmented Reality," "Virtual "Lifelogging," "Mixed Reality." First, the top 20 words were extracted then each type of word was retained select seven words. The analysis revealed emergence key themes such as...

10.1016/j.dsm.2024.01.002 article EN cc-by-nc-nd Data Science and Management 2024-01-19

Samsung has announced the development of a full high definition (1920 × 1080) 82″ TFT- LCD panel using Super-PVA (S-PVA) technology, world's largest TFT-LCD. In addition to size breakthrough, this product achieves 600nits brightness, over 1200:1 contrast ratio, 180-degree angle view, 92% color gamut, and 8 msec response time. Several key enabling technologies were developed achieve these specifications, including two transistor direct driven independently controlled S-PVA sub-pixels, non...

10.1889/1.2036378 article EN SID Symposium Digest of Technical Papers 2005-01-01

As cyberattacks become more intelligent, the difficulty increases for traditional intrusion detection systems to detect advanced attacks that deviate from previously stored patterns. To solve this problem, a deep learning-based system model has emerged analyzes intelligent attack patterns through data learning. However, learning models have disadvantage of having re-learn each time new cyberattack method emerges. The required learn large amount is not efficient. In paper, an experiment was...

10.1109/access.2021.3082160 article EN cc-by IEEE Access 2021-01-01

Purpose This study aims to examine how exploitation of shared knowledge is related creative behavior by focusing on the roles social contextual factors – perceived co-worker support and relationship conflict. Design/methodology/approach The proposed research model in this posits following: mediates between conflict moderate behavior. For an empirical examination, was tested PLS-SEM using 457 responses gathered from workers different companies Korea. Findings It turned out that fully Also,...

10.1108/jkm-10-2018-0611 article EN Journal of Knowledge Management 2020-01-16

ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTReactions of the thiocarbyne [HB(pz)3](CO)2W(.tplbond.CSMe) and thiocarbene [HB(pz)3](CO)2W[.eta.2-CH(SMe)]+ complexes with phosphinesHeesook P. Kim, Sangsoo Robert A. Jacobson, J. AngeliciCite this: Organometallics 1986, 5, 12, 2481–2488Publication Date (Print):December 1, 1986Publication History Published online1 May 2002Published inissue 1 December...

10.1021/om00143a013 article EN Organometallics 1986-12-01

Purpose This study aims to pay attention the role of social contexts, including perceived relationship conflict and coworker support in creating an individualistic or collectivistic disposition, how organization members differently behave share knowledge depending on their personal dispositions. Design/methodology/approach The research model was set PLS-SEM used validate proposed eight hypotheses. A total 462 survey data were collected from workers Korea test model. Findings findings...

10.1108/jkm-06-2019-0284 article EN Journal of Knowledge Management 2019-12-16

Abstract This study investigates whether a target firm's corporate social responsibility (CSR) performance creates value for shareholders. Our results indicate that CSR is stronger than of the acquirer firm yields higher premiums In addition, positive valuation effect more pronounced when well‐governed acquirers conduct takeover. evidence robust to several sensitivity tests. These imply favorable market reactions target's are due expectation reward shareholders with fair in merger and...

10.1002/csr.2055 article EN Corporate Social Responsibility and Environmental Management 2020-10-02

The network intrusion detection system is a core technology of security that detects packets for malicious activities occurring in the and an essential element stable services extended environments such as big data IoT. These systems have been studied together with machine learning deep learning, but performance not guaranteed actual environment or class balance problem has solved. Therefore, this study, we investigate discretization preprocessing method CNN-based classifier on imbalance...

10.1109/access.2021.3120839 article EN cc-by IEEE Access 2021-01-01

article Share on A quality-based cost estimation model for the product line life cycle Authors: Hoh Peter In Korea University, Seoul, KoreaView Profile , Jongmoon Baik Information and Communications University (ICU), Daejeon, Sangsoo Kim Ye Yang of Southern California, Los Angeles AngelesView Barry Boehm Authors Info & Claims ACMVolume 49Issue 12December 2006pp 85–88https://doi.org/10.1145/1183236.1183273Published:01 December 2006Publication History 23citation2,238DownloadsMetricsTotal...

10.1145/1183236.1183273 article EN Communications of the ACM 2006-12-01

Analytic expressions for radiation force on a sphere in loosely focused Gaussian beam are derived suitable form applications by the photon stream method ray-optics regime. For perfect reflecting spheres, an analytic solution scattering and simplified expression gradient obtained. The computation results presented consistent with those of previous theoretical studies reported experimental results.

10.1364/josab.23.000897 article EN Journal of the Optical Society of America B 2006-04-27

Abstract— Samsung has developed a high‐resolution full‐HD (1920 × 1080) 120‐Hz LCD‐TV panel using novel pixel structure and motion‐compensated frame‐interpolation (McFi) single‐chip solution. Our latest work includes launch of 70‐in. panel, the world's largest LCD TV in mass production, with frame rate. A serious problem involving charging time margin been completely overcome through use new alternative 1G‐2D driving scheme. Compared conventional dot‐inversion driving, our method, which is...

10.1889/1.2896317 article EN Journal of the Society for Information Display 2008-02-27

Purpose Among a wide array of information and communication technologies (ICTs) used to directly or indirectly support the mega events are reality boosting smart tourism technologies. Building upon halo effect, this study aims explain connection between satisfaction with ICTs in event, national image event participants’ future behavior. Design/methodology/approach The analyzed data included survey responses from 246 foreigners who visited PyeongChang as visitor for 2018 Winter Olympics....

10.1108/jhtt-09-2020-0212 article EN Journal of Hospitality and Tourism Technology 2022-01-08

In this study, we identify and forecast promising railway static inverter technologies the technology taxonomy using patent data analytics. To end, topics through LDA topic modeling interpret them N-gram analysis. We then derive detailed time series analysis mapping. Finally, leading companies research institutes in field of bibliography social network applicants. Our study identified six topics, fields related to converter were as technologies. Japanese represented by Mitsubishi, Hitachi,...

10.1109/access.2024.3360138 article EN cc-by-nc-nd IEEE Access 2024-01-01

An excellent method for the selective oxidation of sulfides to sulfoxides with periodic acid (H5IO6) catalyzed by FeCl3 in MeCN has been devised. The reported procedure is fast, simple and yields are (>98%) most cases reaction time less than 2 minutes.

10.1055/s-2002-35623 article EN Synthesis 2002-01-01
Coming Soon ...