Çï¿ûÊÓƵ

Dr Ye Hou

Dr Ye Hou PhD, MSc, BSc

Lecturer in Business Information Systems

Key details

Dr Ye Hou

Lecturer in Business Information Systems


Dr Ye Hou joined the Çï¿ûÊÓƵ in September 2021 as Lecturer in Business Information Systems. She holds a MSc in Information Security at University College London, and PhD in Development Informatics at the University of Manchester. She worked as a research fellow at the InfoLab21, Lancaster University, an NCSC/EPSRC Academic Centre of Excellence in Cyber Security Research and the National and Kapodistrian University of Athens on the ERC research project.

Her research interests are:

  • Security and Privacy: Ye has worked on human, organisational and social aspects of information security, including information security policy and human security behaviour, risk management, and cyber security context and impact.
  • ICT for Development: Ye has studied digital development for government digital initiative. Ye is also interested in digital business and digital transformation, and how digital technologies shape and change about business innovation and business models.

Research / Scholarly interests

  • ICT for Development
  • Cyber-security, Privacy and Ethics of Information System
  • Digitalisation
  • IT/IS in healthcare
  • Information Systems for Sustainability

Recent publications

  • Hou, Y.,Such, J. M. and Rashid, A. (2019) Understanding security requirements for industrial control system supply chain, In Proceedings of IEEE International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS’ 19), Institute of Electrical and Electronics Engineers (IEEE): 50-53
  • Hou, Y.,Gao, P. and Nicholson, B. (2018) Understanding organisational responses to regulative pressures in information security management: the case of a Chinese hospital, Technological Forecasting and Social Change, 126: 64-75
  • Hou, Y.,Gao, P. and Heeks, R. (2011) The influence of institutional forces on employee compliance with information security policies, in Proceedings of 8th International Workshop on Security in Information Systems in conjunction with the 13th International Conference on Enterprise Information Systems (2011): 132-141