M. Eric Johnson
#34,834
Most Influential Person Now
Digital strategies and operations researcher
M. Eric Johnson's AcademicInfluence.com Rankings
M. Eric Johnsoncomputer-science Degrees
Computer Science
#4201
World Rank
#4421
Historical Rank
Information Technology
#47
World Rank
#48
Historical Rank
Database
#8685
World Rank
#9109
Historical Rank

Download Badge
Computer Science Communications
M. Eric Johnson's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is M. Eric Johnson Influential?
(Suggest an Edit or Addition)According to Wikipedia, M. Eric Johnson is Dean of the Owen Graduate School of Management, Vanderbilt University. Formerly, he was Associate Dean and the Benjamin Ames Kimball Professor at the Tuck School of Business at Dartmouth College in Hanover, New Hampshire, United States. He was also Director of the Glassmeyer/McNamee Center for Digital Strategies. Prior to Tuck, he was a professor at management at Vanderbilt University and a development engineer at Hewlett-Packard.
M. Eric Johnson's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Information security and privacy in healthcare: current state of research (2010) (393)
- E-Business and Supply Chain Management: An Overview and Framework (2009) (317)
- Learning from Toys: Lessons in Managing Supply Chain Risk from the Toy Industry (2001) (276)
- Going Spear Phishing: Exploring Embedded Training and Awareness (2014) (199)
- The Supply-Chain Management Effect (2003) (171)
- Embedding Information Security into the Organization (2007) (145)
- Proactive Versus Reactive Security Investments in the Healthcare Sector (2014) (98)
- A FRAMEWORK FOR TEACHING SUPPLY CHAIN MANAGEMENT (2009) (90)
- Managing Information Risk and the Economics of Security (2008) (89)
- Postponement Strategies for Channel Derivatives (2000) (77)
- Focus on health information technology, electronic health records and their financial impact: Medication administration quality and health information technology: a national study of US hospitals (2012) (73)
- Data Hemorrhages in the Health-Care Sector (2009) (67)
- When Should a Process Be Art (2009) (66)
- Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain (2008) (58)
- Expressions for item fill rates in periodic inventory systems (1995) (55)
- Stochastic Modeling for Automated Material Handling System Design and Control (1996) (55)
- An Analytic Model for Design of a Multivehicle Automated Guided Vehicle System (1993) (55)
- Security Practices and Regulatory Compliance in the Healthcare Industry (2012) (52)
- The impact of sorting strategies on automated sortation system performance (1997) (48)
- Improuing supply chain performance by using order fulfillment metrics (1998) (48)
- Health-Care Security Strategies for Data Protection and Regulatory Compliance (2013) (46)
- Supply Chain Management: Technology, Globalization, and Policy at a Crossroads (2006) (44)
- Implementing Setup Optimization on the Shop Floor (1996) (43)
- A brief chronology of medical device security (2016) (43)
- Performance Analysis of Split-Case Sorting Systems (2002) (41)
- Economic costs of firm‐level information infrastructure failures: Estimates from field studies in manufacturing supply chains (2007) (37)
- HIPAA Compliance: An Institutional Theory Perspective (2009) (36)
- Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm (2005) (36)
- The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users (2008) (36)
- Sourcing Strategy and Supplier Relationships : Alliances vs . eProcurement April 8 , 2002 (2002) (35)
- Modelling empty vehicle traffic in AGVS design (2001) (34)
- Information Risk in Financial Institutions: Field Study and Research Roadmap (2007) (32)
- Clinic Capacity Management: Planning Treatment Programs that Incorporate Adherence (2014) (32)
- The Market Effect of Healthcare Security: Do Patients Care about Data Breaches? (2015) (32)
- Usability Failures and Healthcare Data Hemorrhages (2011) (30)
- Security through Information Risk Management (2009) (30)
- Model Decomposition Speeds Distribution Center Design (1994) (29)
- Spear phishing in a barrel: Insights from a targeted phishing campaign (2019) (29)
- Data breach remediation efforts and their implications for hospital quality. (2019) (27)
- Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance? (2014) (25)
- Why file sharing networks are dangerous? (2009) (25)
- Inadvertent Disclosure - Information Leaks in the Extended Enterprise (2007) (25)
- An Analytic Model for Design and Analysis of Single-Vehicle Asynchronous Material Handling Systems (1994) (24)
- Protecting Critical Information Infrastructure: Developing Cybersecurity Policy (2010) (24)
- Supporting Quick Response Through Scheduling of Make‐to‐Stock Production/Inventory Systems* (1999) (24)
- Securing Health Information (2015) (24)
- Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data (2006) (20)
- Access Governance: Flexibility with Escalation and Audit (2010) (19)
- Institutionalizing HIPAA Compliance (2014) (19)
- Protecting Patient Data-The Economic Perspective of Healthcare Security (2015) (18)
- Maintaining Secure and Reliable Distributed Control Systems (2015) (16)
- Designing Multiple-Load Automated Guided Vehicle Systems for Delivering Material from a Central Depot (1995) (16)
- Sourcing Strategy and Supplier Relationships: Alliances Versus eProcurement (2004) (14)
- Product Design Collaboration: Capturing Lost Supply Chain Value in the Apparel Industry (2002) (13)
- Information Governance: Flexibility and Control through Escalation and Incentives (2008) (13)
- An In-Class Competition Introducing Inventory Management Concepts (2010) (13)
- Quality Risk Ratings in Global Supply Chains (2014) (12)
- Managing Information Access in Data-Rich Enterprises with Escalation and Incentives (2010) (12)
- HIPAA Compliance: An Examination of Institutional and Market Forces (2009) (12)
- Do Hospital Data Breaches Reduce Patient Care Quality (2019) (11)
- The Economics of Financial and Medical Identity Theft (2012) (11)
- An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security (2011) (10)
- Horizontal well drilled into deep, hot Austin chalk (1995) (10)
- The Evolving Cyberthreat to Privacy (2018) (10)
- INTRODUCTION TO THE SPECIAL ISSUE ON TEACHING SUPPLY CHAIN MANAGEMENT (2009) (9)
- HIPAA compliance in home health: a neo-institutional theoretic perspective (2009) (8)
- Product/Service Design Collaboration: Managing the Product Life Cycle (2011) (8)
- The Value of Escalation and Incentives in Managing Information Access (2009) (8)
- REBUILDING CONFIDENCE: TRUST, CONTROL AND INFORMATION TECHNOLOGY IN HUMANITARIAN SUPPLY CHAINS (2007) (8)
- Securing Information Technology in Healthcare (2013) (7)
- Design of an Automated Shop Floor Material Handling System with Inventory Considerations (1999) (7)
- Ubiquitous Communication: Tracking Technologies within the Supply Chain (2006) (7)
- Supply Chain Management: Integration and Globalization in the Age of Ebusiness (2001) (6)
- Healthcare Security Strategies for Regulatory Compliance and Data Security (2013) (6)
- Will HITECH Heal Patient Data Hemorrhages? (2011) (6)
- Health IT and inappropriate utilization of outpatient imaging: A cross-sectional study of U.S. hospitals (2018) (6)
- Supply Chain Synchronizing Through Web-Centric Product Content Management (6)
- Understanding the relationship between data breaches and hospital advertising expenditures. (2019) (5)
- Addressing Information Risk in Turbulent Times (2011) (5)
- Robustness of order reliability models with applications to order ageing (1996) (5)
- Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance (2012) (5)
- Aiming at a Moving Target: IT Alignment in Toy Companies (2010) (4)
- Dual Sourcing Strategies (2007) (4)
- The relationship between cybersecurity ratings and the risk of hospital data breaches (2021) (4)
- Principles for Better Information Security through More Accurate, Transparent Risk Scoring (2010) (4)
- Channel management : breaking the destructive growth cycle (2009) (3)
- An event study of data breaches and hospital IT spending (2020) (3)
- Subsystem Decomposition in Simulation of a Pcb Assembly Line (1993) (2)
- Artificial Lift Performance Enhancements by applying Root Cause Failure Analysis (2014) (2)
- Policy Brief (2014) (2)
- INTRODUCTION TO THE SPECIAL ISSUE ON E‐BUSINESS AND SUPPLY CHAIN MANAGEMENT (2009) (1)
- Defeating the Greatest Masquerade (2012) (1)
- Interval Coverage in Multiclass Queues Using Batch Mean Estimates (1996) (1)
- The Impact of Professional Information Security Ratings on Vendor Competition 1 (2009) (1)
- Compliance: Organizations and Competing Logics in U.S. Health Care (2014) (1)
- Which Hospitals Are Complying with HIPAA : An Empirical Investigation of US Hospitals 1 , 2 (2008) (0)
- Ready for the digital future? : an interview with M. Eric Johnson (2006) (0)
- Which Hospitals Are Complying with HIPAA : An Empirical Investigation of US Hospitals 1 , 2 (2008) (0)
- Secrecy, Privacy, Identity (2012) (0)
- Ionization gauge circuits (1943) (0)
- Modern Technological and Traditional Social Identities (2012) (0)
- Security and Privacy as Market Failures (2012) (0)
- ANALYTIC MODELS FOR DESIGN AND ANALYSIS OF AUTOMATED GUIDED VEHICLE SYSTEMS (1991) (0)
- United {States} {Patent} {Application}: 0170195790 (2014) (0)
- Management of financial and economic security of critical infrastructure objects in the conditions of risks of quarantine restrictions: strategic and personnel aspects (2021) (0)
- M. Eric Johnson (2019) (0)
- Communicating Security - The Role of Media: A Journalistic Perspective (2008) (0)
- Identity Theft in Healthcare (2012) (0)
- Eric Johnson Think Tank put people Before processes (2007) (0)
- Groupon 1 the Groupon Model (0)
- Healthcare Data: Protections and Hemorrhages (2012) (0)
- Delight or Despair (2007) (0)
- Technologies of Identity (2012) (0)
- Identity in Economics, and in Context (2012) (0)
- MISQ Archivist Meaningful Healthcare Security : (2018) (0)
- Arc-flash hazard analysis of power systems with overdutied or series rated equipment (2012) (0)
- Building a Distribution System in Eastern Europe (2007) (0)
- Introduction to the Special Section on Supply Chain Management: Globalization in the Auto Industry (2007) (0)
This paper list is powered by the following services:
Other Resources About M. Eric Johnson
What Schools Are Affiliated With M. Eric Johnson?
M. Eric Johnson is affiliated with the following schools: