Juhee Kwon

Orcid: 0000-0002-3097-0185

According to our database1, Juhee Kwon authored at least 20 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era.
ACM Trans. Manag. Inf. Syst., December, 2023

The Quest for National Digital Agility: Digital Responses to Covid-19 in Five Countries.
Commun. Assoc. Inf. Syst., 2023

Spillover in Sharing Economies: Network Effect of Bike-sharing Services on Home-sharing Performance.
Proceedings of the 44th International Conference on Information Systems, 2023

2022
Clinical decision support system and hospital readmission reduction: Evidence from U.S. panel data.
Decis. Support Syst., 2022

2020
Data Breaches in Multihospital Systems: Antecedents and Mitigation Mechanisms.
Proceedings of the 41st International Conference on Information Systems, 2020

2019
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?
Inf. Syst. Res., 2019

The Effects of Health IT Adoption on Hospital Readmission Reduction: Evidence from U.S. Panel Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?
MIS Q., 2018

The Impact of Gamification Design on the Success of Health and Fitness Apps.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2016
A Study of the effect of Regulations on Different Types of Information Security Breaches across Different Business Sectors.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

2015
Protecting Patient Data-The Economic Perspective of Healthcare Security.
IEEE Secur. Priv., 2015

The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

2014
Proactive Versus Reactive Security Investments in the Healthcare Sector.
MIS Q., 2014

2013
Health-Care Security Strategies for Data Protection and Regulatory Compliance.
J. Manag. Inf. Syst., 2013

The Association between Top Management Involvement and Compensation and Information Security Breaches.
J. Inf. Syst., 2013

Security practices and regulatory compliance in the healthcare industry.
J. Am. Medical Informatics Assoc., 2013

Healthcare Security Strategies for Regulatory Compliance and Data Security.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

2011
An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

The Impact of Security Practices on Regulatory Compliance and Security Performance.
Proceedings of the International Conference on Information Systems, 2011


  Loading...