Faculty Profile

Andy Wu

Title
Associate Professor
Department
Information Technology and Decision Sciences
College
College of Business

    

Education

PhD, University of Central Florida, 2007.
Major: Business Administration
Degree Specialization: Management Information Systems
Dissertation Title: Effects of IT Governance Mechanisms on Information Security
MS, University of Central Florida, 2003.
Major: Management Information Systems

Current Scheduled Teaching*

BCIS 4630.001, Fundamentals of Information Technology Security, Summer 2024
BCIS 3680.001, Enterprise Oriented Programming, Spring 2024 Syllabus
BCIS 5630.002, Information Technology Security, Spring 2024 Syllabus

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Previous Scheduled Teaching*

BCIS 3680.001, Enterprise Oriented Programming, Fall 2023 Syllabus SPOT
BCIS 5740.004, Information Security Management, Fall 2023 Syllabus SPOT
BCIS 5630.002, Information Technology Security, Fall 2023 Syllabus SPOT
DSCI 5330.004, Enterprise Applications of Business Intelligence, Summer 5W1 2023 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Summer 5W1 2023 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Summer 5W1 2023 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Spring 2023 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2023 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Fall 2022 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2022 Syllabus SPOT
BCIS 5740.004, Information Security Management, Fall 2022 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Fall 2022 Syllabus SPOT
DSCI 5330.004, Enterprise Applications of Business Intelligence, Summer 5W1 2022 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Summer 5W1 2022 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Summer 5W1 2022 Syllabus SPOT
BCIS 6950.757, Doctoral Dissertation, Spring 2022 Syllabus
BCIS 3680.001, Enterprise Oriented Programming, Spring 2022 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2022 Syllabus SPOT
BCIS 6950.704, Doctoral Dissertation, Fall 2021 Syllabus
BCIS 3680.001, Enterprise Oriented Programming, Fall 2021 Syllabus SPOT
BCIS 4630.002, Fundamentals of Information Technology Security, Fall 2021 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Summer 3W1 2021 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Summer 5W1 2021 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Summer 5W1 2021 Syllabus SPOT
BCIS 4910.001, Special Problems, Summer 5W2 2021 Syllabus SPOT
BCIS 6950.711, Doctoral Dissertation, Spring 2021
BCIS 3680.001, Enterprise Oriented Programming, Spring 2021 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2021 Syllabus SPOT
BCIS 6950.756, Doctoral Dissertation, Fall 2020 Syllabus
BCIS 6950.762, Doctoral Dissertation, Fall 2020 Syllabus
BCIS 3680.001, Enterprise Oriented Programming, Fall 2020 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2020 Syllabus SPOT
BCIS 4740.001, Administration and Policy in Information Security, Summer 3W1 2020 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Summer 5W1 2020 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Spring 2020 Syllabus
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2020 Syllabus
BCIS 6940.756, Individual Research, Spring 2020
BCIS 6940.758, Individual Research, Spring 2020 Syllabus
BCIS 3680.001, Enterprise Oriented Programming, Fall 2019 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2019 Syllabus SPOT
BCIS 6940.756, Individual Research, Fall 2019 Syllabus
BCIS 4740.001, Administration and Policy in Information Security, Summer 3W1 2019 Syllabus SPOT
BCIS 4740.001, Administration and Policy in Information Security, Spring 2019 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2019 Syllabus SPOT
BCIS 4900.751, Special Problems, Spring 2019
BCIS 5900.708, Special Problems, Spring 2019
BCIS 3610.001, Basic Information Systems, Fall 2018 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Fall 2018 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2018 Syllabus SPOT
BCIS 4740.001, Administration and Policy in Information Security, Spring 2018 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2018 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Fall 2017 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2017 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Spring 2017 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2017 Syllabus SPOT
BCIS 5110.001, Structure of Programming Languages, Spring 2017 SPOT
BCIS 3680.001, Enterprise Oriented Programming, Spring 2016 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2016 Syllabus SPOT
BCIS 4900.751, Special Problems, Spring 2016
BCIS 5900.701, Special Problems, Spring 2016
BCIS 3680.001, Enterprise Oriented Programming, Fall 2015 Syllabus SPOT
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2015 Syllabus SPOT
BCIS 3680.001, Enterprise Oriented Programming, Spring 2015 Syllabus
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2015 Syllabus
BCIS 5900.701, Special Problems, Spring 2015
BCIS 5110.001, Structure of Programming Languages, Spring 2015
BCIS 3680.001, Enterprise Oriented Programming, Fall 2014 Syllabus
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2014 Syllabus
BCIS 3680.001, Enterprise Oriented Programming, Spring 2014
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2014
BCIS 4900.751, Special Problems, Spring 2014
BCIS 3680.001, Enterprise Oriented Programming, Fall 2013
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2013
BCIS 3680.001, Enterprise Oriented Programming, Spring 2013
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2013
BCIS 3680.001, Enterprise Oriented Programming, Fall 2012
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2012
BCIS 3680.001, Enterprise Oriented Programming, Spring 2012
BCIS 4630.001, Fundamentals of Information Technology Security, Spring 2012
BCIS 3680.001, Enterprise Oriented Programming, Fall 2011
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2011
BCIS 3680.001, Enterprise Oriented Programming, Spring 2011
BCIS 5630.001, Information Technology Security, Spring 2011
BCIS 3680.001, Enterprise Oriented Programming, Fall 2010
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2010
BCIS 5900.701, Special Problems, Fall 2010
BCIS 3680.001, Enterprise Oriented Programming, Spring 2010
BCIS 5630.001, Information Technology Security, Spring 2010
BCIS 3680.001, Enterprise Oriented Programming, Fall 2009
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2009
BCIS 5630.001, Information Technology Security, Spring 2009
BCIS 3630.001, Object Oriented Programming for Business, Spring 2009
BCIS 4900.701, Special Problems, Spring 2009
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2008
BCIS 3630.001, Object Oriented Programming for Business, Fall 2008
BCIS 3610.002, Basic Information Systems, Summer 5W1 2008
BCIS 4670.001, Continuing Seminar in Computer Based Information Systems, Summer 5W1 2008
BCIS 5630.001, Information Technology Security, Spring 2008
BCIS 3630.001, Object Oriented Programming for Business, Spring 2008
BCIS 4630.001, Fundamentals of Information Technology Security, Fall 2007
BCIS 2610.003, Introduction to Computers in Business, Fall 2007

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Published Publications

Published Intellectual Contributions

Conference Proceeding
Hanus, B., Wu, Y. (2012). The role of situation awareness in detecting criminal intrusions: A different perspective on information security awareness. The 18th Americas Conference on Information Systems.
Yang, M., Wu, Y. (2012). Using virtualization to ensure uninterrupted access to software applications for financial services firms. 5623-5630. The 45th Hawaii International Conference on System Sciences.
Wu, Y. (2012). Enabling constructivist learning in a graduate information security course. 157-163. Sixteenth Colloquium for Information Systems Security Education.
Hanus, B., Wu, Y. (2011). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Las Vegas, NV: The 10th Security Conference.
Paul, B., Wu, Y., Prytutok, V. R., Harden, G. (2010). Social network position measured by constraint and centrality: Performance effect on IT professionals. 921-926. San Diego, CA: Decision Sciences Institute.
Wu, Y. (2010). TCP three-way handshake as a pedagogical tool. 49-56. Baltimore, MD: Fourteenth Colloquium for Information Systems Security Education. http://www.cisse.info/archives/14th-colloquium/papers?download=156:0851-2010
Wu, Y. (2008). We govern, therefore we are secure: Effects of IT governance on information security services. Academy of Management Conference.
Wu, Y., Saunders, C. (2006). Control of agency problems in information security. Security Conference, Proceedings of the Fifth Security Conference.
Wu, Y. (2006). Controlling Adverse Selection in Information Security Budgeting: An IT Governance Approach. 4554-4559. Americas Conference on Information Systems.
Wu, Y., Li, Y., Saunders, C. (2006). Trust in B2B Commerce: Taxonomy and Roles. 1789-1797. Americas Conference on Information Systems.
Wu, Y., Saunders, C. (2005). Decision making, IT governance, and information systems security. 3239-3247. Americas Conference on Information Systems, Proceedings of the 11th Americas Conference on Inf.
Wu, Y., Van Slyke, C. (2005). Interface complexity and elderly users: Revisited. 289-294. Information Systems Conference Southern Association, Proceedings of the 2005 Southern Association of In.
Saunders, C., Wu, Y., Li, Y., Weisfeld, S. (2004). Interorganizational trust in B2B relationships. 272-279. International Conference on Electronic Commerce, Proceedings of the Sixth International Conference.
Journal Article
Wu, Y., Hanus, B., Xue, B., Mahto, R. V. (2023). Information security ignorance: An exploration of the concept and its antecedents. Information & Management. 60(2), 103753.
Hanus, B., Wu, Y., Parrish, J. L. (2022). Phish me, phish me not: Analysis of Phishing Antecedents in Humans. Journal of Computer Information Systems. 62(3), 516-526.
Liang, H., Xue, Y., Pinsonneault, A., Wu, Y. (2019). What users do besides problem-focused coping in the IT security context: An emotion-focused coping perspective. MIS Quarterly.
Hanus, B., Windsor, J. C., Wu, Y. (2018). Definition and multidimensionality of security awareness: Close encounters of the second order. The Data Base for Advances in Information Systems.
Wu, Y., Saunders, C. S. (2016). Governing the fiduciary relationship in information security services. Decision Support Systems. 92, 57-67.
Hanus, B., Wu, Y. (2016). Impact of users' security awareness on desktop security behavior: A Protection Motivation Theory perspective. Information Systems Management. 33(1), 2-16.
Visinescu, L. L., Azogu, O., Ryan, S., Wu, Y., Kim, D. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as cloud computing service. International Journal of Human-Computer Interaction. 32(11), 885-900.
Schuessler, J. H., Windsor, J., Wu, Y. (2014). Assessing information systems security effectiveness in large versus small businesses. Journal of Information System Security. 10(1), 3-39.
Peak, D., Prybutok, V., Gibson, M., Wu, Y., Xu, C. (2014). User perceptions of aesthetic visual design variables: A pluralistic, Web-based experiment. Informing Science. 17, 25-57.
Han, B., Wu, Y., Windsor, J. User's adoption of free third-party security apps. Journal of Computer Information Systems. 54(3), 77-86.
Wu, Y., Prybutok, V. R., Koh, C. E., Hanus, B. (2012). A nomological model of RFID privacy concern. Business Process Management Journal. 18(3), 420-444.
Burton, P., Wu, Y., Prybutok, V. R., Harden, G. (2012). Differential effects of strong and weak social network ties as communication links on knowledge workers' performance. IEEE Transactions on Professional Communication. 55(3), 239-253. http://libproxy.library.unt.edu:2253/stamp/stamp.jsp?tp=&arnumber=6212489
Wu, Y., Guynes, C. S., Windsor, J. (2012). Security awareness programs. Review of Business Information Systems. 16(4), 165-168.
Guynes, S., Wu, Y., Windsor, J. (2011). E-Commerce/network security considerations. International Journal of Management & Information Systems. 15(2), 1-7.
Wu, Y., Saunders, C. S. (2011). Governing information security: Governance domains and decision rights allocation patterns. Information Resources Management Journal. 24(1), 28-45.
Peak, D. A., Prybutok, V. R., Wu, Y., Xu, C. (2011). Integrating the visual design discipline with information systems research and practice. Informing Science. 14, 161-181. http://www.inform.nu/Articles/Vol14/ISJv14p161-181Peak603.pdf
Koh, C. E., Prybutok, V. R., Ryan, S. D., Wu, Y. (2010). A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science. Informing Science. 13, 177-203. http://www.inform.nu/Articles/Vol13/ISJv13p177-203Koh561.pdf
Paul, B., Wu, Y., Prybutok, V. R. (2010). Social network position and its relationship to performance of IT professionals. Informing Science. 13, 121-137. http://www.inform.nu/Articles/Vol13/ISJv13p121-137Burton554.pdf
Wu, Y., Li, Y. (2009). Trust in B2B commerce: Taxonomy and roles. International Journal of Networking and Virtual Organisations.
Hornik, S., Johnson, R. D., Wu, Y. (2007). When technology does not support learning: Conflicts between epistemological beliefs and technology support in virtual learning environments. Journal of Organizational and End User Computing. 19(2), 23-46.
Newsletter
Wu, Y. (2010). Benefits of virtualization in security lab design. ACM inroads - The SIGCSE Bulletin.
Scholarly Note
Wu, Y., Saunders, C. (2003). Further along the road to the IT artifact. Communications of the Association for Information Systems. 12, 562-567.
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE