IIE Transactions on Healthcare Systems Engineering
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
journal names
IIE Transactions on Healthcare Systems Engineering
Top-3 citing journals

European Journal of Operational Research
(62 citations)

Health Care Management Science
(58 citations)

IISE Transactions on Healthcare Systems Engineering
(54 citations)
Top-3 organizations

Georgia Institute of technology
(8 publications)

Purdue University
(8 publications)

Pennsylvania State University
(6 publications)
Most cited in 5 years
Found
Publications found: 412
Q1

Accepting Appreciation: Partner Perceptions and Major Non-NATO Ally Designations
Parker T.B.
Abstract
A diverse group of governments have accepted “Major Non-NATO Ally” (MNNA) status since the designation's establishment in the late 1980s. This United States (U.S.) designation signals friendship and facilitates cooperation, but it provides no formal security commitments. Why and when have U.S. partners accepted MNNA status? I argue that designees will accept the status when they are ready to acknowledge America's appreciation—a perceptual and relational concept that conveys gratitude absent guarantees. For some designees, untimely embrace of U.S. appreciation could negatively impact their relations with their societies and/or third-party states. For others, accepting appreciation would preclude forming a formal alliance with the U.S. I analyze published sources and incorporate interviews to compare Qatar, which accepted MNNA status in 2022, and the United Arab Emirates, which has not accepted the status as of late 2024. This article contributes to the literature on asymmetric security alignments by centering the Gulf governments and it provides a timely evaluation of an underexplored aspect of global alliance politics.
Q1

At All Costs: How Relative Rebel Strength Affects PGM Sexual Violence in Civil Conflict
Roy C., Sarwari M.
Abstract
Does the military strength of rebel movements affect conflict-related sexual violence by pro-government militias (PGMs)? Existing studies on PGMs show the significant role that PGMs can have in shaping conflict dynamics and outcomes. What remains understudied is how the variation in power capabilities between conflict actors and the sources of support for PGMs influences civilian victimization by militia groups. We argue that strong rebels tip the balance of power against the state, making the state more susceptible to authorizing or allowing sexual violence by PGMs. In addition, the level of autonomy of PGMs from the government is likely to influence their sexual violence, conditional on rebel strength. When rebels are militarily strong, states are likely to order or tolerate sexual violence by PGMs that they train and/or provide resources to, thereby resulting in sexual violence by state-dependent PGMs. Examining all civil conflicts from 1989 to 2009 and using newly collected data on state-dependence of PGMs, our empirical findings provide evidence that PGMs are associated with higher levels of conflict-related sexual violence when the government faces strong rebels. Results also show that the likelihood of sexual violence by state-dependent PGMs increases when rebels exhibit strong military capabilities.
Q1

The MAD Heuristic and the Nuclear Revolution
Kaufman S.J.
Abstract
How, why, and when nuclear deterrence works remains a puzzle. This article argues that a new theory, nuclear heuristics theory, explains the evidence better than existing explanations. An application of poliheuristic decision theory, nuclear heuristics theory posits that the main factor explaining the success of nuclear deterrence is the mutually assured destruction (MAD) heuristic, a decision-making shortcut that assumes that any nuclear war means MAD, even when capabilities fall short of the assured destruction level. Implications of the theory include the expectation that decision-makers never seriously consider nuclear preemption in a crisis, that the conventional military balance is important in determining the outcome of nuclear crises, and that the nuclear balance is not. This theory is tested against two existing theories, nuclear revolution theory and nuclear superiority theory. Evidence comes from a survey of the existing literature and a process-tracing analysis of US decision-making during the Cuban Missile Crisis based on transcripts of tape-recorded deliberations of President Kennedy's advisory executive committee. The evidence strongly supports nuclear heuristics theory: Leaders do speak and act in accordance with the MAD heuristic. Nuclear superiority theory is badly undermined.
Q1

Modes of Securitization and Desecuritization of Transnational Kinship Ties: Overseas Chinese in Southeast Asia amidst Rising Chinese Power
Han E.
Abstract
This paper explores under what context the transnational ethnic kinship ties between the overseas Chinese in Southeast Asia and China have not led to their securitization and in what context they have. As the rising great power with exponential economic growth for the past few decades, China has transformed itself from a dirt-poor backwater state to the second largest economy in the world and is also seemingly on the way to reclaim the historical dominant status in East and Southeast Asia. During this process, overseas Chinese in various home states in Southeast Asia have not experienced a uniform securitization of their kinship ties. This paper investigates some of the dynamic patterns about overseas Chinese in Southeast Asia’s relationship between the changing kin state and their home states in the recent past. Focusing on how states in Southeast Asia maintain different types of relations with China in the context of the latter’s rising, this paper contends that the ways in which overseas Chinese communities in the region manage their political space and negotiate their belonging are a function of a combination of international structural changes and domestic political factors. Empirically, this paper compares three states of Southeast Asia—Thailand, Myanmar, and Indonesia—in the different ways of their treatment of the ethnic Chinese, as well as the responding strategies utilized by the ethnic Chinese in navigating their political space and belonging.
Q1

A Security Conundrum: Kin-State Engagement, Identity Recognition, and the 2012 Dispute between Romania and Serbia
Udrea A.
Abstract
This article examines the relationship between national identity and foreign policy in the context of kin-state engagement in Europe. While the engagement of many European states with their ethnic kin abroad has been long defended as a form of minority protection in so far as it protects and promotes their particular identity and culture, de facto considerations of state security that define its scope have received little attention in the international relations (IR) scholarship. I show here that already in 2012 the dispute between Romania and Serbia over the identity and accommodation of the Vlach minority in Serbia is a conspicuous case in which considerations of (kin-)state security rather than minority protection have overtly justified the engagement of the kin-state. In fact, I argue that this case study calls attention to the multiplying significance of national identity for a kin-state: as a source of obligations, as well as one of (kin-)state ontological security. Yet, in this article, the contextual exploration highlights a tension between the two that originates in a lack of congruity between kin-state identity politics and home-state multiculturalism. While it appears to be unappeasable, in agreement with some constructivist IR scholarship, I contend that it could be reconciled. To this end, this article examines the scope of kin-state engagement at the intersection between justice and security and endorses the necessity to reconceptualize a state’s ontological security as a capability to adapt to a changing normative environment in Europe.
Q1

Secure in Diversity? Transborder Ethnicity, Transnational Minority Activism, and Ontological (In)Security in the European Union
Smith D.J.
Abstract
The liberal vision of the early 1990s envisaged the eastward extension of the Western European security community formed during the Cold War, based on intergovernmental cooperation and integration around the shared norms embodied by the European Union (EU), Council of Europe, and Organisation for Security and Cooperation in Europe (OSCE). Yet, transborder ethnic ties have remained a security concern within the “New Europe.” As well as the external challenges posed by Russia’s aggression against Ukraine, growing transborder nationalism exhibited by Hungary and other states has also become a focus of tensions within the EU. These intra-EU concerns, I argue, should be understood primarily as an issue of ontological security and as part of a multilevel security dilemma implicating states, EU institutions, and national minorities as security-seeking non-state actors. The article focuses on the Federal Union of European Nationalities—a transnational umbrella NGO that in 2013–2021 led an unsuccessful European Citizens’ Initiative named “Minority SafePack” (MSPI) calling upon the European Commission to legislate on firmer guarantees of minority rights within EU member states. Applying the ontological security lens to the study of MSPI, I illustrate how it reflects specific claims voiced by transborder kin-minority activists consistently over the past century, before analyzing the counter-securitizing arguments deployed against it by states. Although MSPI was approved with a large majority within the European Parliament, the Commission ultimately rejected it. I consider why this was the case, as well as the implications of the rejection for the in varietate concordia concept that supposedly undergirds the European project.
Q1

Normative and Security Challenges of Transborder Ethnic Kinship in Africa: The Case of Ethiopia
Dessalegn B.
Abstract
This article extends the study of securitization of cross-border ethnicity beyond its conventional European focus, by analyzing ongoing security challenges surrounding ethnic Somalis in Ethiopia and their relationship to neighboring Somalia. In methodological terms, it looks beyond the irredentist prism through which this case is usually considered, applying newer conceptual and normative frameworks on cross-border ethnicity developed in a European context and assessing their applicability to Africa. Applying Brubaker's “triadic nexus' concept to the Ethiopian case, I discuss how the conclusion of the Ethiopia-Somalia war and Somalia's collapse as an external kin state did not end the securitization of cross-border Somali kinship, but merely repackaged it in new forms. In this regard, the article highlights a continued need to ensure the human security of Somalis in Ethiopia by recognizing and accommodating them as a cross-border ethnic group. From the standpoint of contemporary norms on the regulation of minority issues in interstate relations, the federalization model adopted by Ethiopia after 1991 seems to provide a promising foundation. Thus far, however, the hegemonic nature of the federal project has failed to grant Somalis an appropriate measure of internal self-determination.
Q1

The Securitization of Transborder Ethnic Kinship: Contextual Explorations around the World
Csergő Z., Smith D.J., Udrea A.
Q1
Journal of Global Security Studies
,
2024
,
citations by CoLab: 0

Q1

The Vicious Circle of Securitization Processes in the Former Indian State of Jammu and Kashmir
Constantin S., Carlà A.
Abstract
This article analyzes processes of securitization in India’s former State of Jammu and Kashmir (SJK), a disputed borderland characterized by a three-dimensional conflict: the international conflict over Jammu and Kashmir, the inter-governmental conflict between the autonomous SJK and the Indian government, and the inter-communal conflict within the SJK. Applying the concept of securitization beyond its traditional Eurocentric perspective, we explore the securitization of transborder kinship in a case study outside the Global North. We examine the perceived threats vis-à-vis the SJK and the Kashmiri Muslim in light of ontological insecurities rooted in the main Indian national narratives and show how dysfunctional diversity governance in a complex geopolitical context intersects with processes of securitization, affecting inter-communal, inter-governmental, and inter-state relations. The article shows that ontological insecurities, combined with fear of separatism and short-sighted political strategies, led Indian political elites to erode the autonomy of the SJK, and undermine its democratic political processes. This, in turn, led to an increasing dissatisfaction among various communities and, in time, to civil unrest, strong religious polarization, communal and state violence, human rights abuses, insurgency, and the rise of separatist Islamic militant groups. This vicious circle turned New Delhi’s fears into a self-fulfilling prophecy. We highlight the continuum of securitization processes and argue that the former SJK could escape the vicious circle of securitization only through a combination of self-governance, good governance, and international governance.
Q1

Balance of Power, System Polarity and Irredentism
Mylonas H.
Abstract
When and where are kin-states more likely to engage in militarized territorial expansion against a kin-group's state of residence, i.e., irredentism, rather than merely employing irredentist rhetoric or engaging in non-irredentist kin-state politics that focus on nurturing cultural ties with co-ethnics abroad? For example, Why did Russia pursue an irredentist policy and annex Crimea but a non-irredentist one toward Narva? Why pursue the annexation of Crimea in 2014 but not in the 1990s or the early 2000s? Various valuable domestic explanations have been proposed, including diversionary war theory, shifts in regime type, and socioeconomic changes; but none has centered on balance of power considerations. I emphasize the role of two variables, whether the kin-group’s state of residence is within or outside the core alliance network of a particular pole and the polarity of the international system at any given point in time, operationalized through the number of poles in the system (one, two, or many). I contend that kin-states are unlikely to target any state of residence that is affiliated with the core alliance network of a pole. Furthermore, I argue that variations in polarity shape the nature and location of irredentism. In a bipolar system, irredentism is likely to take the form of proxy warfare outside each bloc. In a unipolar system, irredentism is more likely in areas where the hegemon exercises the least influence—such as areas linked to a former pole. Finally, in a multipolar system, irredentism is more likely to be pursued by rising powers against neighbors not affiliated with alliance networks of a pole in the international system. I evaluate my argument using an existing dataset of both actual and potential irredentist cases from 1946 to 2014, supplemented by illustrative case studies.
Q1

Kin-State Intervention and the Securitization-Minority Policy Nexus: Hungarians and Russian-Speakers in Central and Eastern Europe
Csergő Z., Kallas K., Kiss T.
Abstract
Russia’s full-scale invasion of Ukraine in 2022, launched under the pretext of protecting the rights of Russian kin populations outside of Russia, had a massive impact on security concerns beyond Ukraine. An important consequence was the intensification of insecurities about the presence of large Russian-speaking minorities in Russia’s neighboring states. Scholars have long emphasized that kin-state involvement can lead to the securitization of minority issues, harming the willingness of governments to support collective claims by minorities associated with that kin-state. Yet there is scarce empirical knowledge about whether and under what conditions an assertive kin-state triggers securitization resulting in restrictive minority policy. We assessed this securitization-minority policy nexus comparatively, focusing on the impact of intensifying Hungarian and Russian kin-state activism on policies toward Hungarian and Russophone minorities in five states in Central and Eastern Europe. Our main finding is that intensified kin-state activism does not significantly disrupt previously established paths in minority policy-making, unless a kin-state turns to territorial revisionism. We also found that titular ontological insecurity (faced by actors belonging to a state’s dominant ethnic group) is a helpful heuristic for explaining instances when securitization results in policy restrictions, and we offer conceptual tools for analyzing the salience of both internal and external sources of titular insecurity. Ultimately, our findings highlight the necessity for scholars to distinguish between nonterritorial and territorial types of kin-state intervention in studies about the security dimension of kin-state involvement.
Q1

Law and Order in Counterinsurgency: The Link between Insurgent Group Characteristics and the Use of Domestic Law Enforcement
Alakoc B.P., Asal V.
Abstract
Modern-day insurgencies are adaptive, enduring, and increasingly intertwined with criminal elements, and therefore pose serious threats to regional and global security. In response, counterinsurgency strategies have become more diversified. One of the strategies that states can employ toward insurgencies is the use of domestic law enforcement, which includes operations by police and intelligence agencies. Given the predominant focus on military approaches, however, there is little empirical work that examines the use of domestic law enforcement in counterinsurgencies. To address this, we investigate the underlying reasons behind a government’s decision to deploy domestic law enforcement against insurgencies. We argue that specific attributes of insurgent groups significantly shape this decision. Using the BAADI2 dataset, our analysis shows that insurgent groups that participate in cooperative alliances and engage in criminal activities are most likely to motivate a state’s decision to deploy domestic law enforcement as a counterinsurgency strategy against them.
Q1

The View from (T)Here: Perspectives on Security
Crawford K.F., Andersen-Rodgers D.
Abstract
The field of security studies largely focuses its gaze on the security provider without consideration of how security practice is perceived as legitimate by those it is meant to protect. This article presents a framework for categorizing how security is understood based on two viewpoints: first, the core responsibility of the state for providing protection and, second, the universality of rights beyond one’s core identity group. These two angles shape a person’s worldview, which then informs how different forms of security practice are seen as legitimate by those who constitute the referent object of that practice. In this article, we offer security studies scholars and practitioners a sorting tool that categorizes these worldviews in four ways: statist, federalist, nativist, and cosmopolitan. We examine each of these four categories and discuss how each perspective shapes practice by so-called security providers and the legitimacy of that practice by referent populations. We introduce four illustrative examples that demonstrate how these perspectives operate in practice. Finally, we discuss the implications of varied security perspectives as they relate to the current global security architecture.
Q1

Symbolic Communication and Cross-Domain Deterrence
Gurantz R.
Abstract
New military technologies in space and cyberspace have led to an interest in cross-domain deterrence, the threat of one type of attack to deter an attack of a different type. However, fundamental questions remain unanswered. Previous studies do not explain why threats often default to in-domain or “in-kind” retaliations or why cross-domain threats often lack credibility. In this article, I argue that “in-kind” retaliation is essentially a symbolic act. In its resemblance or relationship to the original attack, it communicates its purpose as a retaliation for that attack. I also argue that cross-domain threats can sometimes be imbued with the same symbolic meaning and be redefined as an “in-kind” response, and I explore mechanisms through which this can be done.
Q1

Between Worlds: Ontological Security among Syrian Refugees in Germany and Turkey
Secen S.
Abstract
Sometimes physical security may come at the cost of ontological security for refugees. They may struggle to develop stable narratives of identity and fail to situate themselves within their new social environments. States often prioritize addressing refugees’ physical security needs to facilitate their integration, but largely overlook the importance of identity security. This study argues that ontological security is crucial to integration processes, and refugees reestablish it by engaging in various forms of identity backlash, lowering their interest in the politics of the host country, and heightening their desire to return home. In other words, identity backlash, political disinterest, and an intensified desire to return home function as ontological security-seeking mechanisms and anxiety responses. The study contributes to ontological security theory (OST) by introducing a novel and nuanced framework that defines a set of indicators for the emotional and narrative-oriented aspects of ontological security among refugees. It takes a micro-level approach examining ontological security at the individual level for Syrian refugees in Turkey and Germany. The specific findings of this study are threefold. First, I find a significantly lower level of narrative-oriented security among Syrian refugees in Turkey than in Germany. Second, the results indicate that narrative-oriented ontological security among Syrian refugees is strongly associated with identity backlash, low political interest, and a willingness to return to the home country. Third, the results show that physical security and ontological security are not always correlated. Overall, this study demonstrates how OST can provide insights into the complex interplay between perceptions of security, identity backlash, political integration, and willingness to return among refugee communities.
Top-100
Citing journals
10
20
30
40
50
60
70
|
|
European Journal of Operational Research
62 citations, 3.03%
|
|
Health Care Management Science
58 citations, 2.84%
|
|
IISE Transactions on Healthcare Systems Engineering
54 citations, 2.64%
|
|
Operations Research for Health Care
52 citations, 2.55%
|
|
IIE Transactions on Healthcare Systems Engineering
44 citations, 2.15%
|
|
Computers and Industrial Engineering
40 citations, 1.96%
|
|
Computers and Operations Research
35 citations, 1.71%
|
|
SSRN Electronic Journal
31 citations, 1.52%
|
|
Omega
29 citations, 1.42%
|
|
Health Systems
28 citations, 1.37%
|
|
Production and Operations Management
24 citations, 1.17%
|
|
International Journal of Environmental Research and Public Health
23 citations, 1.13%
|
|
Journal of the Operational Research Society
23 citations, 1.13%
|
|
Systems Engineering
20 citations, 0.98%
|
|
International Series in Operations Research and Management Science
19 citations, 0.93%
|
|
Manufacturing and Service Operations Management
19 citations, 0.93%
|
|
IISE Transactions
18 citations, 0.88%
|
|
Operations Research
18 citations, 0.88%
|
|
Flexible Services and Manufacturing Journal
15 citations, 0.73%
|
|
Management Science
15 citations, 0.73%
|
|
Annals of Operations Research
14 citations, 0.69%
|
|
IEEE Access
14 citations, 0.69%
|
|
Journal of Medical Systems
13 citations, 0.64%
|
|
INFORMS Journal on Computing
13 citations, 0.64%
|
|
International Journal of Production Research
13 citations, 0.64%
|
|
Applied Ergonomics
13 citations, 0.64%
|
|
Applied Clinical Informatics
13 citations, 0.64%
|
|
Expert Systems with Applications
12 citations, 0.59%
|
|
PLoS ONE
12 citations, 0.59%
|
|
Advances in Intelligent Systems and Computing
11 citations, 0.54%
|
|
Journal of Scheduling
11 citations, 0.54%
|
|
Journal of Healthcare Engineering
10 citations, 0.49%
|
|
International Journal of Production Economics
10 citations, 0.49%
|
|
Lecture Notes in Computer Science
9 citations, 0.44%
|
|
Proceedings of the Human Factors and Ergonomics Society
9 citations, 0.44%
|
|
IIE Transactions
9 citations, 0.44%
|
|
BMJ Open
8 citations, 0.39%
|
|
Socio-Economic Planning Sciences
8 citations, 0.39%
|
|
International Transactions in Operational Research
8 citations, 0.39%
|
|
Journal of Clinical Nursing
8 citations, 0.39%
|
|
BMC Nursing
8 citations, 0.39%
|
|
Artificial Intelligence in Medicine
7 citations, 0.34%
|
|
Ergonomics
7 citations, 0.34%
|
|
Operations Research Perspectives
7 citations, 0.34%
|
|
Sustainability
7 citations, 0.34%
|
|
Naval Research Logistics
6 citations, 0.29%
|
|
Journal of Biomedical Informatics
6 citations, 0.29%
|
|
Mathematics
6 citations, 0.29%
|
|
BMC Health Services Research
6 citations, 0.29%
|
|
Scientific Reports
6 citations, 0.29%
|
|
Journal of Advanced Nursing
6 citations, 0.29%
|
|
Service Science
6 citations, 0.29%
|
|
Central European Journal of Operations Research
6 citations, 0.29%
|
|
International Journal of Medical Informatics
5 citations, 0.24%
|
|
Information Sciences
5 citations, 0.24%
|
|
Intensive and Critical Care Nursing
5 citations, 0.24%
|
|
Decision Sciences
5 citations, 0.24%
|
|
Communications in Computer and Information Science
5 citations, 0.24%
|
|
Healthcare
5 citations, 0.24%
|
|
Work
5 citations, 0.24%
|
|
Optimization Letters
5 citations, 0.24%
|
|
Applied Soft Computing Journal
5 citations, 0.24%
|
|
Human Factors and Ergonomics In Manufacturing
5 citations, 0.24%
|
|
Journal of Oncology Practice
5 citations, 0.24%
|
|
Annals of Emergency Medicine
5 citations, 0.24%
|
|
Joint Commission Journal on Quality and Patient Safety
5 citations, 0.24%
|
|
Operations-Research-Spektrum
5 citations, 0.24%
|
|
TQM Journal
5 citations, 0.24%
|
|
Physics in Medicine and Biology
4 citations, 0.2%
|
|
Springer Proceedings in Mathematics and Statistics
4 citations, 0.2%
|
|
Studies in Computational Intelligence
4 citations, 0.2%
|
|
Frontiers in Psychology
4 citations, 0.2%
|
|
International Journal of Health Care Quality Assurance
4 citations, 0.2%
|
|
EURO Journal on Decision Processes
4 citations, 0.2%
|
|
Simulation
4 citations, 0.2%
|
|
Quality and Reliability Engineering International
4 citations, 0.2%
|
|
Frontiers in Public Health
4 citations, 0.2%
|
|
International Journal of Health Planning and Management
4 citations, 0.2%
|
|
Transportation Research, Part E: Logistics and Transportation Review
4 citations, 0.2%
|
|
Journal of Simulation
4 citations, 0.2%
|
|
Applied Sciences (Switzerland)
4 citations, 0.2%
|
|
Lecture Notes in Networks and Systems
4 citations, 0.2%
|
|
Advanced Engineering Informatics
4 citations, 0.2%
|
|
IEEE Transactions on Automation Science and Engineering
4 citations, 0.2%
|
|
Decision Support Systems
4 citations, 0.2%
|
|
Journal of Optimization Theory and Applications
4 citations, 0.2%
|
|
F1000Research
4 citations, 0.2%
|
|
International Journal of Healthcare Management
4 citations, 0.2%
|
|
INFOR
4 citations, 0.2%
|
|
JMIR Human Factors
4 citations, 0.2%
|
|
International Journal of Systems Assurance Engineering and Management
3 citations, 0.15%
|
|
Journal of Cleaner Production
3 citations, 0.15%
|
|
American Journal of Infection Control
3 citations, 0.15%
|
|
IFAC-PapersOnLine
3 citations, 0.15%
|
|
Journal of Modelling in Management
3 citations, 0.15%
|
|
International Journal of Nursing Practice
3 citations, 0.15%
|
|
Gestao e Producao
3 citations, 0.15%
|
|
Journal of Emergency Medicine
3 citations, 0.15%
|
|
Critical Care Medicine
3 citations, 0.15%
|
|
RAIRO - Operations Research
3 citations, 0.15%
|
|
Show all (70 more) | |
10
20
30
40
50
60
70
|
Citing publishers
50
100
150
200
250
300
350
400
450
|
|
Elsevier
447 citations, 21.88%
|
|
Springer Nature
329 citations, 16.1%
|
|
Taylor & Francis
270 citations, 13.22%
|
|
Wiley
158 citations, 7.73%
|
|
Institute of Electrical and Electronics Engineers (IEEE)
129 citations, 6.31%
|
|
MDPI
93 citations, 4.55%
|
|
Institute for Operations Research and the Management Sciences (INFORMS)
77 citations, 3.77%
|
|
SAGE
47 citations, 2.3%
|
|
Cambridge University Press
39 citations, 1.91%
|
|
Emerald
39 citations, 1.91%
|
|
Social Science Electronic Publishing
30 citations, 1.47%
|
|
Ovid Technologies (Wolters Kluwer Health)
29 citations, 1.42%
|
|
Hindawi Limited
18 citations, 0.88%
|
|
BMJ
17 citations, 0.83%
|
|
Frontiers Media S.A.
15 citations, 0.73%
|
|
Public Library of Science (PLoS)
15 citations, 0.73%
|
|
JMIR Publications
15 citations, 0.73%
|
|
Georg Thieme Verlag KG
14 citations, 0.69%
|
|
Oxford University Press
12 citations, 0.59%
|
|
IGI Global
11 citations, 0.54%
|
|
IOP Publishing
9 citations, 0.44%
|
|
Association for Computing Machinery (ACM)
7 citations, 0.34%
|
|
American Society of Clinical Oncology (ASCO)
6 citations, 0.29%
|
|
IOS Press
5 citations, 0.24%
|
|
F1000 Research
5 citations, 0.24%
|
|
SciELO
4 citations, 0.2%
|
|
University of Toronto Press Inc. (UTPress)
4 citations, 0.2%
|
|
World Scientific
3 citations, 0.15%
|
|
EDP Sciences
3 citations, 0.15%
|
|
American Academy of Pediatrics
3 citations, 0.15%
|
|
AME Publishing Company
3 citations, 0.15%
|
|
American Medical Association (AMA)
3 citations, 0.15%
|
|
Joint Commission Resources Inc.
3 citations, 0.15%
|
|
ASME International
3 citations, 0.15%
|
|
Walter de Gruyter
2 citations, 0.1%
|
|
American Society for Quality
2 citations, 0.1%
|
|
2 citations, 0.1%
|
|
Acoustical Society of America (ASA)
2 citations, 0.1%
|
|
PeerJ
2 citations, 0.1%
|
|
American Thoracic Society
2 citations, 0.1%
|
|
Gazi University Journal of Science
2 citations, 0.1%
|
|
American Society of Health-System Pharmacists
2 citations, 0.1%
|
|
Cold Spring Harbor Laboratory
2 citations, 0.1%
|
|
Mark Allen Group
2 citations, 0.1%
|
|
Maad Rayan Publishing Company
2 citations, 0.1%
|
|
Human Kinetics
2 citations, 0.1%
|
|
Brieflands
2 citations, 0.1%
|
|
AACN Publishing
2 citations, 0.1%
|
|
Royal Society of Chemistry (RSC)
1 citation, 0.05%
|
|
King Faisal Specialist Hospital and Research Centre
1 citation, 0.05%
|
|
AIP Publishing
1 citation, 0.05%
|
|
University of Chicago Press
1 citation, 0.05%
|
|
Springer Publishing Company
1 citation, 0.05%
|
|
American Institute of Mathematical Sciences (AIMS)
1 citation, 0.05%
|
|
Korean Institute of Industrial Engineers
1 citation, 0.05%
|
|
Centers for Disease Control and Prevention (CDC)
1 citation, 0.05%
|
|
MIT Press
1 citation, 0.05%
|
|
Journal of Neurosurgery Publishing Group (JNSPG)
1 citation, 0.05%
|
|
electronic proceedings in theoretical computer science, eptcs
1 citation, 0.05%
|
|
1 citation, 0.05%
|
|
The Heart Failure Association of the European Society of Cardiology
1 citation, 0.05%
|
|
American College of Physicians
1 citation, 0.05%
|
|
Korean Society of Adult Nursing
1 citation, 0.05%
|
|
Association for the Advancement of Medical Instrumentation
1 citation, 0.05%
|
|
Faculty of Mechanical Engineering, Belgrade University
1 citation, 0.05%
|
|
IBM Corp.
1 citation, 0.05%
|
|
Medknow
1 citation, 0.05%
|
|
Thomas Telford
1 citation, 0.05%
|
|
CSIRO Publishing
1 citation, 0.05%
|
|
Jaypee Brothers Medical Publishing
1 citation, 0.05%
|
|
Ubiquity Press
1 citation, 0.05%
|
|
CAIRN
1 citation, 0.05%
|
|
Compuscript, Ltd.
1 citation, 0.05%
|
|
Society of Hospital Medicine
1 citation, 0.05%
|
|
Universidade Federal de São Carlos
1 citation, 0.05%
|
|
Hacettepe University Journal of Economics and Administrative Sciences
1 citation, 0.05%
|
|
Human Factors and Ergonomics Society
1 citation, 0.05%
|
|
Show all (47 more) | |
50
100
150
200
250
300
350
400
450
|
Publishing organizations
1
2
3
4
5
6
7
8
|
|
Georgia Institute of technology
8 publications, 6.78%
|
|
Purdue University
8 publications, 6.78%
|
|
Pennsylvania State University
6 publications, 5.08%
|
|
University of Wisconsin–Madison
6 publications, 5.08%
|
|
University of Arkansas at Fayetteville
6 publications, 5.08%
|
|
Clemson University
5 publications, 4.24%
|
|
University of Michigan
5 publications, 4.24%
|
|
Arizona State University
4 publications, 3.39%
|
|
North Carolina State University
4 publications, 3.39%
|
|
Northeastern University
4 publications, 3.39%
|
|
University of Texas at Austin
4 publications, 3.39%
|
|
University of South Florida
4 publications, 3.39%
|
|
University of Maryland, College Park
4 publications, 3.39%
|
|
Mayo Clinic
4 publications, 3.39%
|
|
Montana State University
4 publications, 3.39%
|
|
Johns Hopkins University
3 publications, 2.54%
|
|
University of Washington
3 publications, 2.54%
|
|
Virginia Commonwealth University
3 publications, 2.54%
|
|
University of Cincinnati
3 publications, 2.54%
|
|
Texas A&M University
3 publications, 2.54%
|
|
University of Nebraska–Lincoln
3 publications, 2.54%
|
|
ORT Braude Academic College of Engineering
2 publications, 1.69%
|
|
Cornell University
2 publications, 1.69%
|
|
Wayne State University
2 publications, 1.69%
|
|
University of British Columbia
2 publications, 1.69%
|
|
University of Toronto
2 publications, 1.69%
|
|
Texas Tech University
2 publications, 1.69%
|
|
University of Texas Health Science Center at San Antonio
2 publications, 1.69%
|
|
University of Nebraska Medical Center
2 publications, 1.69%
|
|
University of Massachusetts Amherst
2 publications, 1.69%
|
|
University of Virginia
2 publications, 1.69%
|
|
Khalifa University
1 publication, 0.85%
|
|
Sharif University of Technology
1 publication, 0.85%
|
|
Zhejiang University
1 publication, 0.85%
|
|
Technion – Israel Institute of Technology
1 publication, 0.85%
|
|
PSG College of Technology
1 publication, 0.85%
|
|
Rambam Health Care Campus
1 publication, 0.85%
|
|
Polytechnic University of Turin
1 publication, 0.85%
|
|
Sorbonne University
1 publication, 0.85%
|
|
Massachusetts Institute of Technology
1 publication, 0.85%
|
|
Tunghai University
1 publication, 0.85%
|
|
Commonwealth Scientific and Industrial Research Organization
1 publication, 0.85%
|
|
Royal Melbourne Institute of Technology
1 publication, 0.85%
|
|
University of Newcastle Australia
1 publication, 0.85%
|
|
University of Johannesburg
1 publication, 0.85%
|
|
George Washington University
1 publication, 0.85%
|
|
American University
1 publication, 0.85%
|
|
Pohang University of Science and Technology
1 publication, 0.85%
|
|
Northwestern University
1 publication, 0.85%
|
|
University of Illinois at Chicago
1 publication, 0.85%
|
|
Virginia Tech
1 publication, 0.85%
|
|
Syracuse University
1 publication, 0.85%
|
|
Harvard University
1 publication, 0.85%
|
|
Massachusetts General Hospital
1 publication, 0.85%
|
|
Hongik University
1 publication, 0.85%
|
|
Tufts University
1 publication, 0.85%
|
|
Loyola University Chicago
1 publication, 0.85%
|
|
New Jersey Institute of Technology
1 publication, 0.85%
|
|
Friedrich Schiller University Jena
1 publication, 0.85%
|
|
Vanderbilt University
1 publication, 0.85%
|
|
University of Puerto Rico at Mayagüez
1 publication, 0.85%
|
|
Vrije Universiteit Amsterdam
1 publication, 0.85%
|
|
Western Michigan University
1 publication, 0.85%
|
|
University of Hagen
1 publication, 0.85%
|
|
University of Wuppertal
1 publication, 0.85%
|
|
Medical College of Wisconsin
1 publication, 0.85%
|
|
University of Maryland, Baltimore
1 publication, 0.85%
|
|
University of Maryland Medical Center
1 publication, 0.85%
|
|
University of Texas MD Anderson Cancer Center
1 publication, 0.85%
|
|
Lehigh University
1 publication, 0.85%
|
|
University of Louisville
1 publication, 0.85%
|
|
Louisiana State University
1 publication, 0.85%
|
|
Mississippi State University
1 publication, 0.85%
|
|
University of Rochester
1 publication, 0.85%
|
|
Indiana University Indianapolis
1 publication, 0.85%
|
|
University of Texas at San Antonio
1 publication, 0.85%
|
|
University of Alabama
1 publication, 0.85%
|
|
Texas State University
1 publication, 0.85%
|
|
Old Dominion University
1 publication, 0.85%
|
|
University of Tennessee
1 publication, 0.85%
|
|
University of Houston
1 publication, 0.85%
|
|
Université du Québec à Trois-Rivières
1 publication, 0.85%
|
|
French Institute of Health and Medical Research
1 publication, 0.85%
|
|
Universidad ICESI
1 publication, 0.85%
|
|
Universidad Autónoma de Nuevo León
1 publication, 0.85%
|
|
Instituto Tecnológico Autónomo de México
1 publication, 0.85%
|
|
University of Missouri
1 publication, 0.85%
|
|
University of Iowa
1 publication, 0.85%
|
|
Concordia University
1 publication, 0.85%
|
|
Show all (59 more) | |
1
2
3
4
5
6
7
8
|
Publishing countries
10
20
30
40
50
60
70
80
90
100
|
|
USA
|
USA, 91, 77.12%
USA
91 publications, 77.12%
|
Canada
|
Canada, 6, 5.08%
Canada
6 publications, 5.08%
|
France
|
France, 4, 3.39%
France
4 publications, 3.39%
|
China
|
China, 3, 2.54%
China
3 publications, 2.54%
|
Australia
|
Australia, 3, 2.54%
Australia
3 publications, 2.54%
|
Israel
|
Israel, 3, 2.54%
Israel
3 publications, 2.54%
|
Germany
|
Germany, 2, 1.69%
Germany
2 publications, 1.69%
|
Italy
|
Italy, 2, 1.69%
Italy
2 publications, 1.69%
|
Mexico
|
Mexico, 2, 1.69%
Mexico
2 publications, 1.69%
|
UAE
|
UAE, 2, 1.69%
UAE
2 publications, 1.69%
|
Puerto Rico
|
Puerto Rico, 2, 1.69%
Puerto Rico
2 publications, 1.69%
|
Republic of Korea
|
Republic of Korea, 2, 1.69%
Republic of Korea
2 publications, 1.69%
|
India
|
India, 1, 0.85%
India
1 publication, 0.85%
|
Iran
|
Iran, 1, 0.85%
Iran
1 publication, 0.85%
|
Colombia
|
Colombia, 1, 0.85%
Colombia
1 publication, 0.85%
|
Netherlands
|
Netherlands, 1, 0.85%
Netherlands
1 publication, 0.85%
|
South Africa
|
South Africa, 1, 0.85%
South Africa
1 publication, 0.85%
|
10
20
30
40
50
60
70
80
90
100
|