Skip to main content

Andy Wu

Title: Associate Professor

Department: Information Technology and Decision Sciences

College: College of Business

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, University of Central Florida, 2007
    Major: Business Administration
    Specialization: Management Information Systems
    Dissertation: Effects of IT Governance Mechanisms on Information Security
  • MS, University of Central Florida, 2003
    Major: Management Information Systems

Current Scheduled Teaching

BCIS 3680.001Enterprise Oriented ProgrammingSpring 2025
BCIS 5630.002Information Technology SecuritySpring 2025
BCIS 3680.001Enterprise Oriented ProgrammingFall 2024 Syllabus
BCIS 3680.002Enterprise Oriented ProgrammingFall 2024 Syllabus
BCIS 5630.002Information Technology SecurityFall 2024

Previous Scheduled Teaching

BCIS 4630.001Fundamentals of Information Technology SecuritySummer 5W1 2024 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySummer 5W1 2024 SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2024 Syllabus SPOT
BCIS 5630.002Information Technology SecuritySpring 2024 SPOT
BCIS 3680.001Enterprise Oriented ProgrammingFall 2023 Syllabus SPOT
BCIS 5740.004Information Security ManagementFall 2023 SPOT
BCIS 5630.002Information Technology SecurityFall 2023 SPOT
DSCI 5330.004Enterprise Applications of Business IntelligenceSummer 5W1 2023 SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySummer 5W1 2023 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySummer 5W1 2023 SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2023 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2023 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingFall 2022 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2022 Syllabus SPOT
BCIS 5740.004Information Security ManagementFall 2022 SPOT
BCIS 5630.001Information Technology SecurityFall 2022 SPOT
DSCI 5330.004Enterprise Applications of Business IntelligenceSummer 5W1 2022 SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySummer 5W1 2022 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySummer 5W1 2022 SPOT
BCIS 6950.757Doctoral DissertationSpring 2022
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2022 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2022 Syllabus SPOT
BCIS 6950.704Doctoral DissertationFall 2021
BCIS 3680.001Enterprise Oriented ProgrammingFall 2021 Syllabus SPOT
BCIS 4630.002Fundamentals of Information Technology SecurityFall 2021 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSummer 3W1 2021 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySummer 5W1 2021 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySummer 5W1 2021 SPOT
BCIS 4910.001Special ProblemsSummer 5W2 2021 Syllabus SPOT
BCIS 6950.711Doctoral DissertationSpring 2021
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2021 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2021 Syllabus SPOT
BCIS 6950.756Doctoral DissertationFall 2020
BCIS 6950.762Doctoral DissertationFall 2020
BCIS 3680.001Enterprise Oriented ProgrammingFall 2020 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2020 Syllabus SPOT
BCIS 4740.001Administration and Policy in Information SecuritySummer 3W1 2020 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySummer 5W1 2020 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2020 Syllabus
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2020 Syllabus
BCIS 6940.756Individual ResearchSpring 2020
BCIS 6940.758Individual ResearchSpring 2020
BCIS 3680.001Enterprise Oriented ProgrammingFall 2019 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2019 Syllabus SPOT
BCIS 6940.756Individual ResearchFall 2019
BCIS 4740.001Administration and Policy in Information SecuritySummer 3W1 2019 Syllabus SPOT
BCIS 4740.001Administration and Policy in Information SecuritySpring 2019 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2019 Syllabus SPOT
BCIS 4900.751Special ProblemsSpring 2019
BCIS 5900.708Special ProblemsSpring 2019
BCIS 3610.001Basic Information SystemsFall 2018 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingFall 2018 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2018 Syllabus SPOT
BCIS 4740.001Administration and Policy in Information SecuritySpring 2018 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2018 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingFall 2017 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2017 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2017 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2017 Syllabus SPOT
BCIS 5110.001Structure of Programming LanguagesSpring 2017 SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2016 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2016 Syllabus SPOT
BCIS 4900.751Special ProblemsSpring 2016
BCIS 5900.701Special ProblemsSpring 2016
BCIS 3680.001Enterprise Oriented ProgrammingFall 2015 Syllabus SPOT
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2015 Syllabus SPOT
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2015 Syllabus
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2015 Syllabus
BCIS 5900.701Special ProblemsSpring 2015
BCIS 5110.001Structure of Programming LanguagesSpring 2015
BCIS 3680.001Enterprise Oriented ProgrammingFall 2014 Syllabus
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2014 Syllabus
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2014
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2014
BCIS 4900.751Special ProblemsSpring 2014
BCIS 3680.001Enterprise Oriented ProgrammingFall 2013
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2013
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2013
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2013
BCIS 3680.001Enterprise Oriented ProgrammingFall 2012
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2012
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2012
BCIS 4630.001Fundamentals of Information Technology SecuritySpring 2012
BCIS 3680.001Enterprise Oriented ProgrammingFall 2011
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2011
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2011
BCIS 5630.001Information Technology SecuritySpring 2011
BCIS 3680.001Enterprise Oriented ProgrammingFall 2010
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2010
BCIS 5900.701Special ProblemsFall 2010
BCIS 3680.001Enterprise Oriented ProgrammingSpring 2010
BCIS 5630.001Information Technology SecuritySpring 2010
BCIS 3680.001Enterprise Oriented ProgrammingFall 2009
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2009
BCIS 5630.001Information Technology SecuritySpring 2009
BCIS 3630.001Object Oriented Programming for BusinessSpring 2009
BCIS 4900.701Special ProblemsSpring 2009
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2008
BCIS 3630.001Object Oriented Programming for BusinessFall 2008
BCIS 3610.002Basic Information SystemsSummer 5W1 2008
BCIS 4670.001Continuing Seminar in Computer Based Information SystemsSummer 5W1 2008
BCIS 5630.001Information Technology SecuritySpring 2008
BCIS 3630.001Object Oriented Programming for BusinessSpring 2008
BCIS 4630.001Fundamentals of Information Technology SecurityFall 2007
BCIS 2610.003Introduction to Computers in BusinessFall 2007

Published Intellectual Contributions

    Conference Proceeding

  • Hanus, B., Wu, Y. (2012). The role of situation awareness in detecting criminal intrusions: A different perspective on information security awareness. The 18th Americas Conference on Information Systems.
  • Yang, M., Wu, Y. (2012). Using virtualization to ensure uninterrupted access to software applications for financial services firms. 5623-5630. The 45th Hawaii International Conference on System Sciences.
  • Wu, Y. (2012). Enabling constructivist learning in a graduate information security course. 157-163. Sixteenth Colloquium for Information Systems Security Education.
  • Hanus, B., Wu, Y. (2011). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Las Vegas, NV, The 10th Security Conference.
  • Paul, B., Wu, Y., Prytutok, V.R., Harden, G. (2010). Social network position measured by constraint and centrality: Performance effect on IT professionals. 921-926. San Diego, CA, Decision Sciences Institute.
  • Wu, Y. (2010). TCP three-way handshake as a pedagogical tool. 49-56. Baltimore, MD, Fourteenth Colloquium for Information Systems Security Education. http://www.cisse.info/archives/14th-colloquium/papers?download=156:0851-2010
  • Wu, Y. (2008). We govern, therefore we are secure: Effects of IT governance on information security services. Academy of Management Conference.
  • Wu, Y., Saunders, C. (2006). Control of agency problems in information security. Security Conference, Proceedings of the Fifth Security Conference.
  • Wu, Y. (2006). Controlling Adverse Selection in Information Security Budgeting: An IT Governance Approach. 4554-4559. Americas Conference on Information Systems.
  • Wu, Y., Li, Y., Saunders, C. (2006). Trust in B2B Commerce: Taxonomy and Roles. 1789-1797. Americas Conference on Information Systems.
  • Wu, Y., Saunders, C. (2005). Decision making, IT governance, and information systems security. 3239-3247. Americas Conference on Information Systems, Proceedings of the 11th Americas Conference on Inf.
  • Wu, Y., Van Slyke, C. (2005). Interface complexity and elderly users: Revisited. 289-294. Information Systems Conference Southern Association, Proceedings of the 2005 Southern Association of In.
  • Saunders, C., Wu, Y., Li, Y., Weisfeld, S. (2004). Interorganizational trust in B2B relationships. 272-279. International Conference on Electronic Commerce, Proceedings of the Sixth International Conference.
  • Journal Article

  • Wu, Y., Hanus, B., Xue, B., Mahto, R.V. (2023). Information security ignorance: An exploration of the concept and its antecedents. Information & Management. 60 (2) 103753.
  • Hanus, B., Wu, Y., Parrish, J.L. (2022). Phish me, phish me not: Analysis of Phishing Antecedents in Humans. Journal of Computer Information Systems. 62 (3) 516-526.
  • Liang, H., Xue, Y., Pinsonneault, A., Wu, Y. (2019). What users do besides problem-focused coping in the IT security context: An emotion-focused coping perspective. MIS Quarterly.
  • Hanus, B., Windsor, J.C., Wu, Y. (2018). Definition and multidimensionality of security awareness: Close encounters of the second order. The Data Base for Advances in Information Systems.
  • Wu, Y., Saunders, C.S. (2016). Governing the fiduciary relationship in information security services. Decision Support Systems. 92 57-67.
  • Hanus, B., Wu, Y. (2016). Impact of users' security awareness on desktop security behavior: A Protection Motivation Theory perspective. Information Systems Management. 33 (1) 2-16.
  • Visinescu, L.L., Azogu, O., Ryan, S., Wu, Y., Kim, D. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as cloud computing service. International Journal of Human-Computer Interaction. 32 (11) 885-900.
  • Schuessler, J.H., Windsor, J., Wu, Y. (2014). Assessing information systems security effectiveness in large versus small businesses. Journal of Information System Security. 10 (1) 3-39.
  • Peak, D., Prybutok, V., Gibson, M., Wu, Y., Xu, C. (2014). User perceptions of aesthetic visual design variables: A pluralistic, Web-based experiment. Informing Science. 17 25-57.
  • Han, B., Wu, Y., Windsor, J. User's adoption of free third-party security apps. Journal of Computer Information Systems. 54 (3) 77-86.
  • Wu, Y., Prybutok, V.R., Koh, C.E., Hanus, B. (2012). A nomological model of RFID privacy concern. Business Process Management Journal. 18 (3) 420-444.
  • Burton, P., Wu, Y., Prybutok, V.R., Harden, G. (2012). Differential effects of strong and weak social network ties as communication links on knowledge workers' performance. IEEE Transactions on Professional Communication. 55 (3) 239-253. http://libproxy.library.unt.edu:2253/stamp/stamp.jsp?tp=&arnumber=6212489
  • Wu, Y., Guynes, C.S., Windsor, J. (2012). Security awareness programs. Review of Business Information Systems. 16 (4) 165-168.
  • Guynes, S., Wu, Y., Windsor, J. (2011). E-Commerce/network security considerations. International Journal of Management & Information Systems. 15 (2) 1-7.
  • Wu, Y., Saunders, C.S. (2011). Governing information security: Governance domains and decision rights allocation patterns. Information Resources Management Journal. 24 (1) 28-45.
  • Peak, D.A., Prybutok, V.R., Wu, Y., Xu, C. (2011). Integrating the visual design discipline with information systems research and practice. Informing Science. 14 161-181. http://www.inform.nu/Articles/Vol14/ISJv14p161-181Peak603.pdf
  • Koh, C.E., Prybutok, V.R., Ryan, S.D., Wu, Y. (2010). A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science. Informing Science. 13 177-203. http://www.inform.nu/Articles/Vol13/ISJv13p177-203Koh561.pdf
  • Paul, B., Wu, Y., Prybutok, V.R. (2010). Social network position and its relationship to performance of IT professionals. Informing Science. 13 121-137. http://www.inform.nu/Articles/Vol13/ISJv13p121-137Burton554.pdf
  • Wu, Y., Li, Y. (2009). Trust in B2B commerce: Taxonomy and roles. International Journal of Networking and Virtual Organisations.
  • Hornik, S., Johnson, R.D., Wu, Y. (2007). When technology does not support learning: Conflicts between epistemological beliefs and technology support in virtual learning environments. Journal of Organizational and End User Computing. 19 (2) 23-46.
  • Newsletter

  • Wu, Y. (2010). Benefits of virtualization in security lab design. ACM inroads - The SIGCSE Bulletin.
  • Scholarly Note

  • Wu, Y., Saunders, C. (2003). Further along the road to the IT artifact. Communications of the Association for Information Systems. 12 562-567.
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE