Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nan Xiao is active.

Publication


Featured researches published by Nan Xiao.


acm transactions on management information systems | 2010

Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures

Jingguo Wang; Nan Xiao; H. Raghav Rao

More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses empirically. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed.


Information Systems Management | 2014

Successful Implementation of eRx Systems: Creating Technology–Organization Alignment using the Strategy-Map Approach

Nan Xiao; Supriya D. Mahajan; Rajiv Kishore; Vishwanath Muthyam Venkata; Nishath Ahmed Shaik; Edwin J. Anand; Ranjit Singh

The adoption rates of eRx systems continue to be low and their implementation remains uneven. Rooted in the theories of technology–organization alignment and strategy maps, this article develops a framework for successful implementation of eRx systems. The proposed strategy map outlines the key strategic processes that would make implementation of eRx systems not only feasible and successful, but also a profitable venture for healthcare organizations.


workshop on e-business | 2009

An Exploration of the Search for Information Security

Jingguo Wang; Nan Xiao; H.R. Rao

People use search engines to seek information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network attacks and vulnerability disclosures on the frequency of search for information security knowledge. . We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search.


design science research in information systems and technology | 2009

Security enhanced integrative modeling language (SEIML): a conceptual modeling grammar for agile business information systems

Kirti Sudumbrekar; Nan Xiao; Raj Sharman; Sanjukta Das-smith

In this paper, we present a grammar SEIML for semi-autonomous multi-agent system specifically catering to the area of integrative business information systems (IBIS) environments. SEIML is intended to provide the necessary constructs to model a dynamic business organization that is adaptive to fast-changing business needs.


decision support systems | 2014

Factors influencing online health information search: An empirical analysis of a national cancer-related survey

Nan Xiao; Raj Sharman; H.R. Rao; Shambhu J. Upadhyaya


International Journal of Business Excellence | 2012

A simulation-based study for managing hospital emergency department’s capacity in extreme events

Nan Xiao; Raj Sharman; H.R. Rao; Sumant Dutta


Health policy and technology | 2012

“Meaningful Use” of ambulatory EMR: Does it improve the quality and efficiency of health care?

Nan Xiao; Raj Sharman; Ranjit Singh; Gurdev Singh; Andrew Danzo; H.R. Rao


decision support systems | 2012

An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security

Jingguo Wang; Nan Xiao; H. Raghav Rao


americas conference on information systems | 2009

A Simulation Based Study in a Hospital Emergency Department: Capacity and Workflow Issues

Nan Xiao; Sumnat Dutta; Raj Sharman; H.R. Rao


americas conference on information systems | 2008

Infastructure Interdependencies Modeling and Analysis - A Review and Synthesis

Nan Xiao; Raj Sharman; H. Raghav Rao; Shambhu J. Upadhyaya

Collaboration


Dive into the Nan Xiao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

H.R. Rao

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar

H. Raghav Rao

University of Texas at San Antonio

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jingguo Wang

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge