Vendor-managed inventory in the retail supply chain M Waller, ME Johnson, T Davis Journal of business logistics 20 (1), 183, 1999 | 1309 | 1999 |
Information security and privacy in healthcare: current state of research A Appari, ME Johnson International journal of Internet and enterprise management 6 (4), 279-314, 2010 | 626 | 2010 |
Learning from toys: Lessons in managing supply chain risk from the toy industry ME Johnson California management review 43 (3), 106-124, 2001 | 505 | 2001 |
E‐business and supply chain management: an overview and framework ME Johnson, S Whang Production and Operations management 11 (4), 413-423, 2002 | 493 | 2002 |
Going spear phishing: Exploring embedded training and awareness DD Caputo, SL Pfleeger, JD Freeman, ME Johnson IEEE security & privacy 12 (1), 28-38, 2013 | 370 | 2013 |
The supply-chain management effect LR Kopczak, ME Johnson MIT Sloan Management Review, 2003 | 297 | 2003 |
When should a process be art, not science? JM Hall, ME Johnson Harvard business review 87 (3), 58-65, 2009 | 260 | 2009 |
Embedding information security into the organization ME Johnson, E Goetz IEEE Security & Privacy 5 (3), 16-24, 2007 | 232 | 2007 |
Proactive versus reactive security investments in the healthcare sector J Kwon, ME Johnson Mis Quarterly 38 (2), 451-A3, 2014 | 213 | 2014 |
A framework for teaching supply chain management ME Johnson, DF Pyke Production and Operations Management 9 (1), 2-18, 2000 | 159 | 2000 |
Meaningful use of electronic health record systems and process quality of care: Evidence from a panel data analysis of US acute‐care hospitals A Appari, M Eric Johnson, DL Anthony Health services research 48 (2pt1), 354-375, 2013 | 142 | 2013 |
Postponement strategies for channel derivatives ME Johnson, E Anderson The International Journal of Logistics Management 11 (1), 19-36, 2000 | 113 | 2000 |
Health-care security strategies for data protection and regulatory compliance J Kwon, ME Johnson Journal of Management Information Systems 30 (2), 41-66, 2013 | 109 | 2013 |
E-fulfillment DF Pyke, ME Johnson, P Desmond Supply Chain Management Review 27 (5), 50-62, 2001 | 108 | 2001 |
Spear phishing in a barrel: Insights from a targeted phishing campaign AJ Burns, ME Johnson, DD Caputo Journal of Organizational Computing and Electronic Commerce 29 (1), 24-39, 2019 | 98 | 2019 |
Medication administration quality and health information technology: a national study of US hospitals A Appari, EK Carian, ME Johnson, DL Anthony Journal of the American Medical Informatics Association 19 (3), 360-367, 2012 | 94 | 2012 |
Data hemorrhages in the health-care sector ME Johnson Financial Cryptography and Data Security: 13th International Conference, FC …, 2009 | 94 | 2009 |
Improuing supply chain performance by using order fulfillment metrics ME Johnson, T Davis National Productivity Review 17 (3), 3-16, 1998 | 93 | 1998 |
Stochastic modeling for automated material handling system design and control ME Johnson, ML Brandeau Transportation science 30 (4), 330-350, 1996 | 93 | 1996 |
Security practices and regulatory compliance in the healthcare industry J Kwon, ME Johnson Journal of the American Medical Informatics Association 20 (1), 44-51, 2013 | 86 | 2013 |