Juhee Kwon

604 total citations
20 papers, 412 citations indexed

About

Juhee Kwon is a scholar working on Information Systems, Management Information Systems and Strategy and Management. According to data from OpenAlex, Juhee Kwon has authored 20 papers receiving a total of 412 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Information Systems, 5 papers in Management Information Systems and 4 papers in Strategy and Management. Recurrent topics in Juhee Kwon's work include Information and Cyber Security (14 papers), Cybercrime and Law Enforcement Studies (9 papers) and Supply Chain Resilience and Risk Management (4 papers). Juhee Kwon is often cited by papers focused on Information and Cyber Security (14 papers), Cybercrime and Law Enforcement Studies (9 papers) and Supply Chain Resilience and Risk Management (4 papers). Juhee Kwon collaborates with scholars based in United States, Hong Kong and United Kingdom. Juhee Kwon's co-authors include M. Eric Johnson, M. Eric Johnson, Seung Hyun Kim, Tawei Wang, Jackie Rees Ulmer, Youngsok Bang, Ghiyoung Im, Hüseyi̇n Tanriverdi̇, Wenjie Huang and Kyo‐Sun Sunny Lim and has published in prestigious journals such as MIS Quarterly, Information Systems Research and Journal of Management Information Systems.

In The Last Decade

Juhee Kwon

19 papers receiving 376 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Juhee Kwon United States 9 273 94 85 64 38 20 412
M. Eric Johnson United States 10 378 1.4× 119 1.3× 49 0.6× 126 2.0× 28 0.7× 18 510
Jonathan J. M. Seddon France 11 73 0.3× 38 0.4× 89 1.0× 24 0.4× 34 0.9× 20 302
Humayun Zafar United States 9 175 0.6× 58 0.6× 60 0.7× 54 0.8× 31 0.8× 32 309
Humphrey M. Sabi Canada 7 150 0.5× 40 0.4× 62 0.7× 63 1.0× 32 0.8× 10 384
Surendra Sarnikar United States 13 111 0.4× 68 0.7× 157 1.8× 30 0.5× 63 1.7× 57 459
Renato Iannella Australia 11 192 0.7× 113 1.2× 31 0.4× 61 1.0× 11 0.3× 39 377
Farkhondeh Hassandoust New Zealand 10 118 0.4× 128 1.4× 28 0.3× 23 0.4× 27 0.7× 25 314
Diane Lending United States 11 88 0.3× 60 0.6× 60 0.7× 11 0.2× 17 0.4× 37 285
Beth Kewell United Kingdom 8 186 0.7× 61 0.6× 77 0.9× 32 0.5× 65 1.7× 17 316
Khalil Khoumbati Pakistan 11 72 0.3× 65 0.7× 127 1.5× 23 0.4× 46 1.2× 40 447

Countries citing papers authored by Juhee Kwon

Since Specialization
Citations

This map shows the geographic impact of Juhee Kwon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Juhee Kwon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Juhee Kwon more than expected).

Fields of papers citing papers by Juhee Kwon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Juhee Kwon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Juhee Kwon. The network helps show where Juhee Kwon may publish in the future.

Co-authorship network of co-authors of Juhee Kwon

This figure shows the co-authorship network connecting the top 25 collaborators of Juhee Kwon. A scholar is included among the top collaborators of Juhee Kwon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Juhee Kwon. Juhee Kwon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tanriverdi̇, Hüseyi̇n, Juhee Kwon, & Ghiyoung Im. (2024). Taming Complexity in the Cybersecurity of Multihospital Systems: The Role of Enterprise-wide Data Analytics Platforms. MIS Quarterly. 49(1). 243–274. 1 indexed citations
2.
Li, Xin, Juhee Kwon, Balaji Padmanabhan, & Pengzhu Zhang. (2023). Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era. ACM Transactions on Management Information Systems. 14(4). 1–2. 1 indexed citations
3.
Kwon, Juhee, Kyo‐Sun Sunny Lim, Sunyoung Park, Kwonil Kim, & GyuWon Lee. (2023). Effects of Prognostic Number Concentrations of Snow and Graupel on the Simulated Precipitation over the Korean Peninsula. Weather and Forecasting. 38(12). 2591–2612.
4.
Bang, Youngsok, et al.. (2022). Clinical decision support system and hospital readmission reduction: Evidence from U.S. panel data. Decision Support Systems. 159. 113816–113816. 8 indexed citations
5.
Tanriverdi̇, Hüseyi̇n, Juhee Kwon, & Ghiyoung Im. (2020). Data Breaches in Multihospital Systems: Antecedents and Mitigation Mechanisms. Journal of the Association for Information Systems. 2 indexed citations
6.
Kim, Seung Hyun & Juhee Kwon. (2019). How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?. Information Systems Research. 30(4). 1184–1202. 47 indexed citations
7.
Huang, Wenjie, et al.. (2018). The Impact of Gamification Design on the Success of Health and Fitness Apps. Journal of the Association for Information Systems. 4 indexed citations
8.
Kwon, Juhee & M. Eric Johnson. (2018). Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?1. MIS Quarterly. 42(4). 1043–1067. 10 indexed citations
9.
Kwon, Juhee, et al.. (2016). A study of the effect of regulations on different types of information security breaches across different business sectors. Pacific Asia Conference on Information Systems. 73. 1 indexed citations
10.
Kwon, Juhee & M. Eric Johnson. (2015). The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?. 16 indexed citations
11.
Kwon, Juhee & M. Eric Johnson. (2015). Protecting Patient Data-The Economic Perspective of Healthcare Security. IEEE Security & Privacy. 13(5). 90–95. 14 indexed citations
12.
Kwon, Juhee & M. Eric Johnson. (2014). Proactive Versus Reactive Security Investments in the Healthcare Sector1. MIS Quarterly. 38(2). 451–472. 112 indexed citations
13.
Kwon, Juhee & M. Eric Johnson. (2013). Healthcare Security Strategies for Regulatory Compliance and Data Security. 3972–3981. 4 indexed citations
14.
Kwon, Juhee & M. Eric Johnson. (2013). Health-Care Security Strategies for Data Protection and Regulatory Compliance. Journal of Management Information Systems. 30(2). 41–66. 57 indexed citations
15.
Kwon, Juhee & M. Eric Johnson. (2012). Security practices and regulatory compliance in the healthcare industry. Journal of the Association for Information Systems. 2440–2449. 3 indexed citations
16.
Kwon, Juhee & M. Eric Johnson. (2012). Security practices and regulatory compliance in the healthcare industry. Journal of the American Medical Informatics Association. 20(1). 44–51. 48 indexed citations
17.
Kwon, Juhee, Jackie Rees Ulmer, & Tawei Wang. (2012). The Association between Top Management Involvement and Compensation and Information Security Breaches. Journal of Information Systems. 27(1). 219–236. 70 indexed citations
18.
Kwon, Juhee, et al.. (2011). The impact of security practices on regulatory compliance and security performance. Journal of the Association for Information Systems. 2204–2212. 9 indexed citations
19.
Kwon, Juhee & M. Eric Johnson. (2011). An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security.. 4 indexed citations
20.
Kwon, Juhee. (2010). Essays on information risk management in electronic markets. Purdue e-Pubs (Purdue University System). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026