M. Eric Johnson

According to our database1, M. Eric Johnson authored at least 55 papers between 1988 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The relationship between cybersecurity ratings and the risk of hospital data breaches.
J. Am. Medical Informatics Assoc., 2021

2019
Spear phishing in a barrel: Insights from a targeted phishing campaign.
J. Organ. Comput. Electron. Commer., 2019

2018
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?
MIS Q., 2018

The Evolving Cyberthreat to Privacy.
IT Prof., 2018

Health IT and inappropriate utilization of outpatient imaging: A cross-sectional study of U.S. hospitals.
Int. J. Medical Informatics, 2018

2016
A brief chronology of medical device security.
Commun. ACM, 2016

2015
Securing Health Information.
IT Prof., 2015

Maintaining Secure and Reliable Distributed Control Systems.
INFORMS J. Comput., 2015

Protecting Patient Data-The Economic Perspective of Healthcare Security.
IEEE Secur. Priv., 2015

The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

2014
Proactive Versus Reactive Security Investments in the Healthcare Sector.
MIS Q., 2014

Going Spear Phishing: Exploring Embedded Training and Awareness.
IEEE Secur. Priv., 2014

2013
Health-Care Security Strategies for Data Protection and Regulatory Compliance.
J. Manag. Inf. Syst., 2013

Security practices and regulatory compliance in the healthcare industry.
J. Am. Medical Informatics Assoc., 2013

Securing Information Technology in Healthcare.
IEEE Secur. Priv., 2013

Healthcare Security Strategies for Regulatory Compliance and Data Security.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Focus on health information technology, electronic health records and their financial impact: Medication administration quality and health information technology: a national study of US hospitals.
J. Am. Medical Informatics Assoc., 2012

Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

The Economics of Financial and Medical Identity Theft.
Springer, ISBN: 978-1-4614-1917-4, 2012

2011
Usability Failures and Healthcare Data Hemorrhages.
IEEE Secur. Priv., 2011

Addressing Information Risk in Turbulent Times.
IEEE Secur. Priv., 2011

An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Will HITECH Heal Patient Data Hemorrhages?
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
An In-Class Competition Introducing Inventory Management Concepts.
INFORMS Trans. Educ., 2010

Protecting Critical Information Infrastructure: Developing Cybersecurity Policy.
Inf. Technol. Dev., 2010

Information security and privacy in healthcare: current state of research.
Int. J. Internet Enterp. Manag., 2010

Managing Information Access in Data-Rich Enterprises with Escalation and Incentives.
Int. J. Electron. Commer., 2010

Access Governance: Flexibility with Escalation and Audit.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Aiming at a Moving Target: IT Alignment in Toy Companies.
Proceedings of the 18th European Conference on Information Systems, 2010

2009
Security through Information Risk Management.
IEEE Secur. Priv., 2009

Why file sharing networks are dangerous?
Commun. ACM, 2009

The Impact of Information Security Ratings on Vendor Competition.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

HIPAA Compliance: An Examination of Institutional and Market Forces.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Data Hemorrhages in the Health-Care Sector.
Proceedings of the Financial Cryptography and Data Security, 2009

HIPAA Compliance: An Institutional Theory Perspective.
Proceedings of the 15th Americas Conference on Information Systems, 2009

The Value of Escalation and Incentives in Managing Information Access.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

Managing Information Risk and the Economics of Security.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain.
J. Manag. Inf. Syst., 2008

Information Governance: Flexibility and Control through Escalation and Incentives.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Communicating Security - The Role of Media: A Journalistic Perspective.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Introduction to the Special Section on Supply Chain Management: Globalization in the Auto Industry.
Interfaces, 2007

Embedding Information Security into the Organization.
IEEE Secur. Priv., 2007

Inadvertent Disclosure - Information Leaks in the Extended Enterprise.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Information Risk in Financial Institutions: Field Study and Research Roadmap.
Proceedings of the Enterprise Applications and Services in the Finance Industry, 2007

2006
Supply Chain Management: Technology, Globalization, and Policy at a Crossroads.
Interfaces, 2006

Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2005
Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2002
Performance Analysis of Split-Case Sorting Systems.
Manuf. Serv. Oper. Manag., 2002

1999
Design of an Automated Shop Floor Material Handling System with Inventory Considerations.
Oper. Res., 1999

1996
Stochastic Modeling for Automated Material Handling System Design and Control.
Transp. Sci., 1996

Implementing Setup Optimization on the Shop Floor.
Oper. Res., 1996

1994
An Analytic Model for Design and Analysis of Single-Vehicle Asynchronous Material Handling Systems.
Transp. Sci., 1994

1993
Subsystem decomposition in simulation of a PCB assembly line.
Proceedings of the 25th Winter Simulation Conference, 1993

1988
A hierarchical approach to computer animation in simulation modeling.
Simul., 1988


  Loading...