Associate Dean for Graduate Programs and Research
Union Pacific Professor in Information Systems
College of Business
Iowa State University
2211 Gerdin Business Building
Ames, IA 50011-1350
Tel: (515) 294-8925
Fax: (515) 294-2534
Google Scholar Profile
Qing Hu earned his B.S. in Mechanical Engineering from Lanzhou University of Science & Technology, China, in 1982, M.S. in Mechanical Engineering from the Chinese Academy of Machinery Science, China, in 1985, M.S. in Computer Information Systems from the University of Miami, Florida, in 1991, and Ph.D. in Computer Information Systems from the University of Miami, Florida in 1994. He started his academic career as Assistant Professor of Information Systems at Florida Atlantic University in August, 1994, and was promoted to Associate Professor and granted tenure in May, 1999 and Professor in May 2006. In May, 2001, He was appointed as the Adams Professor of Information Technology of the InternetCoast Institute at Florida Atlantic University. In October, 2007, he was appointed Chair of the Department of Information Technology & Operations Management. In July 2009, he joined Iowa State University to become Dean's Professor and Chair of the Department of Supply Chain and Information Systems in the College of Business. In July 2011, he was named the Union Pacific Professor in Information Systems, and in July 2012, he was promoted to Associate Dean for Graduate Programs in the Collge of Business at Iowa State University.
Qing Hu teaches information technology strategy, electronic commerce, and business applications development at undergraduate and graduate levels. He is a Microsoft Certified Systems Engineer (MCSE) and Solution Developer (MCSD) and a Charter Member of the MCSD Program. His research interests include strategic IT management, IT value, information security, and cross culture issues in information technology. He has published over 100 research papers in refereed journals, academics conferences, and scholarly books. His work has appeared in some of the top journals in the information systems discipline such as MIS Quarterly, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems, California Management Review, IEEE Transactions on Software Engineering, and Communications of the ACM. He has been invited to speak at research seminars and conferences at some of the leading universities in the world, including the University of Oulu, Helsinki School of Economics, Fudan University, Harbin Institute of Technology, Dalian University of Technology, Sun Yat-Sen University, and Nanjing University. He was the Scott Adams Professor of Interne Technology from 2003-2006 at Florida Atlantic University, and a leading researcher for a Defense Information Systems Agency (DISA) funded research project on secure communications network from 2005 to 2007. He currently serves as on editorial board of the Journal of the Association for Information Systems and an associate editor of the Journal of Information System Security.
On Information Security
Xu. Z. C., Hu, Q., and Zhang, C. H. (2013) "Why Computer Talents Become Computer Hackers." Communications of the ACM, 56(4), 64-74.(12,679 full-text downloads as of November 17, 2013 from ACM Digital Library)
Hu, Q., Dinev, T., Hart, P., and Cooke, D. (2012) "Managing Employee Compliance with Information Security Policies:
The Role of Top Management and Organizational Culture." Decision Sciences, 43(4), 615-660.
Hu. Q., Xu, Z. C., Dinev, T., and Ling, H. (2011) "Does Deterrence Work in
Reducing Information Security Policy Abuse by Employees?"
Communications of the ACM, 54(6), 34-40.
Yayla, A. and Hu, Q. (2011) "The Impact of Information Security Events on
the Stock Value of Firms: The Effect of Contingency Factors,"
Journal of Information Technology, 26(2), 60-77.
Dinev, T., Goo, J., Hu, Q., and Nam, K. (2009) "User Behavior
towards Protective Technologies -The Role of National Cultural Differences,"
Information Systems Journal. 19(4), 391-412.
Huang, C. D., Hu, Q., and Behara, R. (2008) "An Economic Analysis
of the Optimal Information Security Investment in the Case of a Risk-Averse
Firm," International Journal of Production Economics, 114(2), 793-804.
Dinev, T. and Hu, Q. (2007) "The Centrality of Awareness in the
Formation of User Behavioral Intentions towards Preventive Technologies in the
Context of Voluntary Use," Journal of the Association for Information Systems,
Hu, Q., Hart, P., and Cooke, D. (2007) "The Role of External
Influences on Organizational Information Security Practices: An Institutional
Perspective," Journal of Strategic Information Systems, 16(2), 153-172.
Hu, Q. and Dinev, T. (2005) "Is Spyware an Internet-Age Nuisance or
Public Menace?" Communications of the ACM, 48(8), 61-66.
On Information Technology Strategy
Yayla, A. and Hu, Q. (2014) "The Effect of Board of Directors' IT Awareness on CIO Compensation and Firm Performance."
Decision Sciences. Forthcoming.
Xiao, J. H., Xie, K., and Hu, Q. (2013) "Inter-Firm IT Governance in Power Imbalanced Buyer-Supplier Dyads:
Exploring How It Works and Why It Lasts," European Journal of Information Systems, 22(5) 512-528.
Yayla, A. and Hu, Q. (2012) "The Impact of IT-Business Strategic Alignment on Firm Performance in a
Developing Country Setting: Exploring Moderating Roles of Environmental Uncertainty and Strategic Orientation,"
European Journal of Information Systems, 21(4), 373-387.
Quan, J, Hu, Q. and Hart, P. (2003) "IT Investments and Firms'
Performance - A Duopoly Perspective," Journal of Management Information Systems,
Hu, Q., Saunders, C. S., and Gebelt, M. (1997) "Information Systems
Outsourcing: A Reevaluation of Influence Sources," Information Systems Research,
Saunders, C. S., Gebelt, M., and Hu, Q. (1997) "Achieving Success
in Information Systems Outsourcing," California Management Review, 39(2), 63-79.
On Enterprise Information Systems
Saraf, N., Liang, H., Xue, Y., and Hu, Q. (2013) "How Does Organizational Absorptive Capacity Matter in the Assimilation of Enterprise Information Systems?"
Information Systems Journal, 23(3), 245-267.
Liu, L. N., Feng, Y. Q., Hu, Q., and Huang, X. J. (2011) "From Transactional User
to VIP: How Organizational and Cognitive Factors Affect ERP Assimilation at Individual Level,"
European Journal of Information Systems, 20(2), 186-200.
Liang, H., Saraf, H., Hu, Q., and Xue, Y. (2007) "Assimilation of
Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role
of Top Management," MIS Quarterly, 31(1), 59-87. Emerald Citations of Excellence Award for 2011
On Software Development
Hu, Q., Plant, R. T., and Hertz, D. (1998) "Software Cost
Estimation Using Economic Production Models," Journal of Management Information
Systems, 15(2), 143-163.
Hu, Q. (1997) "Evaluating Alternative Software Production
Functions," IEEE Transactions on Software Engineering, 23(6), 379-387.
- MIS434: Electronic Commerce Strategy
- MIS539: Information Security Management
- MIS598: Research Seminar on Management
- MIS603: Doctoral Seminar on IT Strategy
- College of Business
- Google Scholar:
- Total Citations: 2904
H-Index: 25; i10-Index: 37
As of January 25, 2014
- Ranked 59th in the Top 100 IS Scholars
based on research publications in the
AIS Top Six Journals in 2007-2011
- Media Mentions:
- Iowa State students to travel to China
to study Target’s supply chain."
Iowa State University News, October 23, 2013.
- "Hackers: From innocent curiosity to illegal activity." Tech Republic, May 6, 2013.
- "CIBER Supports Regional Faculty in Spring
Education Abroad Programs." University of
Minnesota Carlson School of Management MBA
International Live Case Study in Central Europe.
- "Identity theft is ‘easy’ and on the rise." Des Moines Register, June 23, 2012.
- Emerald Citations of Excellence Award
for an article published in MISQ 2007
selected as one of the top 50 articles
for 2011 from 300 management journals
worldwide based on proven impact.
- "New technology won't prevent information
security breaches, say ISU experts."
Physorg.com, February 11, 2010.
- "Inquire sought in data breach,"
Des Moines Register, February 3, 2010.
- "Internal hacking poses silent threat for
Business Record, December 5, 2009.
- "Researcher says internal security breaches
pose a bigger threat than hackers,"
Physorg.com, August 3, 2009.
- "Research paper shows holes in security
Computerworld, May 22, 2006.