Meaningful Use of EHR Systems and Process Quality of Care: Evidence from a Panel Data Analysis of US Acute-Care Hospitals, Health Services Research, forthcoming 2012.
Medication administration quality and health information technology: a national study of US hospitals, Journal of the American Medical Informatics Association, Vol. 19, No. 3, 360-367, 2012.
Usability Failures and Healthcare Data Hemorrhages, IEEE Security & Privacy, April, 2011.
Addressing Information Risk in Turbulent Times, IEEE Security & Privacy, January, 2011.
Managing Information Access in Data-Rich Enterprises with Escalation and Incentives, International Journal of Electronic Commerce, 2010.
Information Security and Privacy in Healthcare, International Journal of Internet and Enterprise Management, Vol 6, Iss 4, 2010.
Principles for Better Information Security through More Accurate, Transparent Risk Scoring, Journal of Homeland Security and Emergency Management, Vol 7, Iss 1, 2010.
Protecting Critical Information Infrastructure: Developing Cyber Security Policy, Journal of Information Technology for Development, January 2010.
Information Risk Rating and Vendor Competition, WISE, December 2009.
Data Hemorrhages in the Health-Care Sector, Lecture Notes in Computer Science (Financial Crypto 09), LNCS 5628, 2009.
Channel Management: Breaking the Destructive Growth Cycle, Supply Chain Management Review,, July-August, 2009.
Security through Information Risk Management, IEEE Security and Privacy, No. 3, 2009.
When Should a Process Be Art, Not Science? Harvard Business Review, March 2009.
Why File Sharing Networks Are Dangerous? Communications of the ACM, February 2009.
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain, Journal of Management Information Systems, Fall 2008.
Information Governance: Flexibility and Control through Escalation and Incentives, WEIS 08
Information Risk in Financial Institutions: Field Study and Research Roadmap, SLN 2008 (FinCom 2007)
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users, HICSS08
Ubiquitous Communication: Tracking Technologies within the Supply Chain - Logistics Handbook 08
Costs of Supply Chain Information Failures - IJLM 07
Inadvertent Disclosure - WEIS 07
Managing Organizational Security – IEEE Security and Privacy
Top Tech Toys
Senate Cyber Security Forum - October 15, 2008
Dirksen Senate Building, Washington DC
Final Report - Released by Senators Lieberman and Collins
Financial and Medical Identity Theft
Managing Information Risk