Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Business

Antecedents And Consequences Of Trust In Supply Chain: The Role Of Information Technology, Qing Hu, Jinghua Xiao, Kang Xie, Nilesh Saraf Jan 2014

Antecedents And Consequences Of Trust In Supply Chain: The Role Of Information Technology, Qing Hu, Jinghua Xiao, Kang Xie, Nilesh Saraf

Qing Hu

Trust has been a central construct in studies of inter-firm relationships. Many operational, organizational, social, and cultural factors have been identified to have significant impact on inter-firm trust. In this study, we investigate the role of information technology in generating inter-firm trust and the consequences of this trust in the context of supply networks. Using structural equation modeling techniques, our data show that the level of information systems integration among the partner firms in a supply network significantly impacts the trust among the firms which, together with the integrated information systems, explains more than half of the variances in information …


The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu Jan 2014

The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu

Qing Hu

Transformational leadership has been identified as one of the most critical factors in ERP success. However, few studies have explored how transformational leadership impacts ERP success, especially in the assimilation phase. Drawing from organizational learning and leadership theories, we submit that transformational leadership is positively related to exploitative and exploratory learning, mediated by three types of organizational learning culture. We developed a theoretical model and collected data from top and middle managers of 101 organizations in China that have used ERP systems for at least one year. Our results suggest that (1) transformational leadership is positively related with psychological safety, …


Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma Oct 2013

Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma

Qing Hu

In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …


The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu Oct 2013

The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu

Qing Hu

Transformational leadership has been identified as one of the most critical factors in ERP success. However, few studies have explored how transformational leadership impacts ERP success, especially in the assimilation phase. Drawing from organizational learning and leadership theories, we submit that transformational leadership is positively related to exploitative and exploratory learning, mediated by three types of organizational learning culture. We developed a theoretical model and collected data from top and middle managers of 101 organizations in China that have used ERP systems for at least one year. Our results suggest that (1) transformational leadership is positively related with psychological safety, …


The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie Oct 2013

The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie

Qing Hu

Firms in China, and in Asia-Pacific countries to a certain degree, cannot escape from two institutional characteristics of modern organizations: the uniquely Eastern practice of guanxi and the uniquely Western artifact of information technology. While both constructs have been extensively studied in organizational contexts, few have examined how these two constructs interact with each other and how such interaction impact organizational processes, norms, and other institutional properties. From the lens of structuration theory, we attempt to understand this interesting and important phenomenon. We submit that guanxi is neither a cultural artifact of the Chinese society, nor a product of weak …


Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla Oct 2013

Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla

Qing Hu

Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent …


Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling Oct 2013

Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling

Qing Hu

Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using …


Antecedents And Drivers Of It-Business Strategic Alignment: Empirical Validation Of A Theoretical Model, Ali Yayla, Qing Hu May 2009

Antecedents And Drivers Of It-Business Strategic Alignment: Empirical Validation Of A Theoretical Model, Ali Yayla, Qing Hu

Qing Hu

Aligning information technology (IT) strategy with business strategy has been one of the top concerns of practitioners and scholars for decades. Despite the documented positive effects of strategic alignment on organizational success, only a few organizations consider themselves in alignment. Although numerous studies exist about how to accomplish IT-business alignment, empirical studies based on strong theories have been rare in the literature. This study attempts to fulfill this gap by proposing and empirically validating a comprehensive strategic alignment model. Drawing on prior literature, we identified five antecedents of alignment; centralization, formalization, shared domain knowledge, successful IT history and relationship management. …


User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu Jun 2007

User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu

Qing Hu

The Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) are widely used in the information systems (IS) literature to explain and predict user technology acceptance behavior. Although these models have been utilized separately in the earlier studies, to increase the richness and predictive power of their studies, scholars have combined both theories in more recent studies. However, few studies have compared these models directly using the same empirical data. The justification for using various hybrid models is mostly anecdotal and convenient rather than based on strong theoretical arguments. Thus the question remains: when studying user technology acceptance behavior, …


Assimilation Of Enterprise Systems: The Effect Of Institutional Pressures And The Mediating Role Of Top Management, Huigang Liang, Nilesh Saraf, Qing Hu, Yajiong Xue Mar 2007

Assimilation Of Enterprise Systems: The Effect Of Institutional Pressures And The Mediating Role Of Top Management, Huigang Liang, Nilesh Saraf, Qing Hu, Yajiong Xue

Qing Hu

We develop and test a theoretical model to investigate the assimilation of enterprise systems in the post-implementation stage within organizations. Specifically, this model explains how top management mediates the impact of external institutional pressures on the degree of usage of enterprise resource planning (ERP) systems. The hypotheses were tested using survey data from companies that have already implemented ERP systems. Results from partial least squares analyses suggest that mimetic pressures positively affect top management beliefs, which then positively affects top management participation in the ERP assimilation process. In turn, top management participation is confirmed to positively affect the degree of …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu Nov 2005

The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu

Qing Hu

Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventive technologies based on the frameworks of theory of planned behavior in the context of anti-spyware technologies. We find that the user awareness of the issues and threats from harmful technologies is a strong predictor of user behavioral intention toward the use of preventive technologies. In the presence of awareness, …


Integrating Web Services With Competitive Strategies: The Balanced Scorecard Approach, C. Derrick Huang, Qing Hu Dec 2003

Integrating Web Services With Competitive Strategies: The Balanced Scorecard Approach, C. Derrick Huang, Qing Hu

Qing Hu

The significance of aligning IT with corporate strategy is widely recognized, but the lack of appropriate methodologies prevented practitioners from integrating IT projects with competitive strategies effectively. This article addresses the issue of deploying Web services strategically using the concept of a widely accepted management tool, the balanced scorecard. A framework is developed to match potential benefits of Web services with corporate strategy in four business dimensions: innovation and learning, internal business process, customer, and financial. It is argued that the strategic benefits of implementing Web services can only be realized if the Web services initiatives are planned and implemented …


Research Report: Diffusion Of Information Systems Outsourcing: A Reevaluation Of Influence Sources, Qing Hu, Carol Saunders, Mary Gebelt Sep 1997

Research Report: Diffusion Of Information Systems Outsourcing: A Reevaluation Of Influence Sources, Qing Hu, Carol Saunders, Mary Gebelt

Qing Hu

Information systems outsourcing is an increasingly popular IS management practice in companies of all sizes. Examining the adoption of IS outsourcing from the well-developed theoretical foundation of innovation diffusion may shed some light on significant factors that affect the adoption decision, and clarify some misperceptions. This study explores the sources of influence in the adoption of IS outsourcing. Using a sample of 175 firms that outsourced their IS functions during the period from January 1985 to January 1995, we tested three hypotheses of sources of influences using four diffusion models: internal influence, external influence, and two mixed influence models. Our …


Achieving Success In Information Systems Outsourcing, Carol Saunders, Mary Gebelt, Qing Hu Jan 1997

Achieving Success In Information Systems Outsourcing, Carol Saunders, Mary Gebelt, Qing Hu

Qing Hu

A study of 34 large companies, which outsourced for at least 2 years, demonstrates that outsourcing can be successful even when information systems are viewed as core functions. However, outsourcing negotiations must reflect the role of the company performing the outsourced functions and the nature of the outsourced work. A critical key to success in outsourcing arrangements lies in having tight contracts, even when the outsourcing vendor is viewed as a strategic partner or the IS function is considered to be core.