Associate Professor
Program Coordinator, MS-Information Systems
Education
- Ph.D. Information Systems, McMaster University, Canada
- M. Sc. Management Information Systems, Queen’s University, Canada
- M.B.A., E-Business & Information Technology, Maastricht School of Management, the Netherlands
- M. Eng. Computer Science, Nanjing University, P. R. China
- B.S. Computer Science, Nanjing University, P. R. China
Courses Taught
- Object-Oriented System Development with Java
- Information Systems Analysis and Design
- IT Management
- Information Systems in Management
- Project Management
- Computer Networking and Security
- Database Management
- Data Mining and Business Intelligence
- MIS Capstone Project
Academic Interests
- Information Security
- E-Commerce
- Business Intelligence
Scholarly Activity
Journal Publications:
- Zhao, G. Y., Tu, C. Z., & Adkins, J. (2024). Challenges and Practices of Knowledge Sharing in E-Learning: A Systematic Literature Review. Information Systems Education Journal, 22(4), 4-14.
- Zhao, G. Y., & Tu, C. Z. (2024). Key Performance Indicator Selection for Online Teaching Performance Prediction. Journal of Computing Sciences in Colleges, 39(6), 30-40.
- Tu, C. Z., & Zhao, G. Y. (2023). Influencing Technical Features of Using Podcast in E-Learning. Journal of Computing Sciences in Colleges, 38(6), 19-27.
- Tu, C. Z., Adkins, J. (2022). Comparing Students' Evaluation of Online, Hybrid, and Face-to-Face Classes. Journal of Systemics, Cybernetics and Informatics, 20(2), 8-12.
- Zhao, G. Y., and Tu, C. Z. (2022), “A Literature Review on User Acceptance of AI-Enabled Application”, The Journal of Computing Sciences in Colleges, 37(6), pp. 24-34.
- Shi, T., Tian, R.G., Tu, C.Z. and Lim, C.L. (2022), "Affective factors influencing responses to international brand alliances", Marketing Intelligence & Planning, 40(5), pp. 656-670.
- Adkins, J. K., & Tu, C. (2021). Online Teaching Effectiveness: A Case Study of Online 4-Week Classes in a Graduate Information Systems Program. Information Systems Education Journal, 19(3), 31-37.
- Tu, C. Z., & Adkins, J. (2020). Effect of user involvement in information systems capstone course: a case study. The Journal of Computing Sciences in Colleges, 35(6), 107-116.
- Adkins, J., & Tu, C. Z. (2019). Applying an agile approach in an information systems capstone course. Information Systems Education Journal, 17(3), 41-49.
- Tu, C. Z., Adkins, J., & Zhao Y. (2019). Complying with BYOD security policies: a moderation model based on Protection Motivation Theory. Journal of the Midwest Association for Information Systems, 2019(1), 11-27.
- Tu, Z., Yuan, Y., Archer, N., & Connelly, C. (2018). Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security, 26(2), 150-170.
- Tu, Z., Turel, O., Yuan, Y., & Archer, N. (2015). Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination. Information & Management, 52, 506-517.
- Wang, Y., Yuan, Y., Turel, O., & Tu, Z. (2015). Understanding the development and diffusion of mobile commerce technologies in China: a biographical study with an Actor-Network Theory perspective. International Journal of Electronic Commerce, 19(4), 47-76.
- Tu, Z., Yuan, Y., & Archer, N. (2014). Understanding user behaviour in coping with security threats of mobile device loss and theft. International Journal of Mobile Communications, 12(6), 603-623.
Conference Proceedings:
- Tu, C. Z., Zhao, G. Y., & El-Gayar, O. (2024). Enabling Adaptive Learning through Data Analytics: A Literature Survey on Applying Machine Learning to Learning Management System Data. In Proceedings of the ISCAP Conference ISSN (Vol. 2473, p. 4901).
- Zhao, G. Y., Tu, C. Z., & Yuan, Y. (2024). An Exploration of Online Instructor Performance Prediction Model Using LMS Data with Machine Learning Techniques. CONF-IRM 2024 Proceedings. 17.
- Tu, C. Z., Zhao, G. Y., & Adkins, J. (2023). How Would Individuals Like to Use AI-Enabled Applications? An Empirical Study Based on HCI Framework. In Proceedings of the 2023 Americas Conference on Information Systems (AMCIS).
- Zhao, G. Y., El-Gayar, O., & Tu, C. Z. (2023). A Knowledge Extraction Approach for IT Tech-support Transcripts. In Proceedings of the 2023 Americas Conference on Information Systems (AMCIS).
- Zhao, Y. G., El-Gayar, O., & Tu, Z. (2023). Is artificial intelligence attractive? An empirical study on user’s intention to use AI-enabled applications. In Proceedings of the 56th Hawaii International Conference on System Sciences (HICSS-56).
- Tu, C. Z. and Adkins, J. (2022, November), “Applying Flipped Classroom in Information Systems Analysis and Design Course”, In EDSIGCON Proceedings 2022: Abstract Presentation.
- Tu, C. Z., Adkins, J. (2022). Comparing Students' Evaluation of Online, Hybrid, and Face-to-Face Classes. In Proceedings of the 13th International Conference on Society and Information Technologies.
- Zhao, G. Y., El-Gayar, O. and Tu, C. Z. (2022, August), “How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI Apps”, TREO Talk Paper, Twenty-Eighth Americas Conference on Information Systems (AMCIS 2022), Minneapolis, 2022.
- Tu, C. Z. and Adkins, J. (2021, November), “Comparison of Online, Hybrid, and Face-to-Face Classes: A Case Study”, In 2021 EDSIG Proceedings: Abstract Presentation.
- Adkins, J., & Tu, C. Z. (2020, November). Online teaching effectiveness: a case study of online 4-week classes in a graduate information systems program. In Proceedings of the 2020 ISCAP-EDSIG Conference.
- Tu, C. Z., & Adkins, J. (2020, October). Success factors of a project-based capstone course. In Proceedings of the Sixteenth International Conference on Technology, Knowledge and Society and the Technology, Knowledge, and Society Knowledge Community (forthcoming).
- Tu, C. Z., Adkins, J., & Zhao, G. Y. (2019, May). A review of information systems security management: an integrated framework. In MWAIS 2019 Proceedings (15).
- Adkins, J., & Tu, C. Z. (2018, October). Applying an agile approach in an information systems capstone course. In Proceedings of the 2018 EDSIG Conference (4622).
- Tu, C. Z., Adkins, J., & Zhao Y. (2018, May). Complying with BYOD security policies: a moderation model. In MWAIS 2018 Proceedings (25).
- Tu, C. Z., & Adkins, J. (2017, May). Complying with BYOD security policies. In Proceedings of the Thirteenth International Conference on Technology, Knowledge and Society and the Technology, Knowledge, and Society Knowledge Community.
- Tu, Z., & Yuan, Y. (2015, August). Coping with BYOD Security Threat: From Management Perspective. In Proceedings of the 2015 Americas Conference on Information Systems (AMCIS)。
- Tu, Z., & Yuan, Y. (2014, August). Critical success factors analysis on effective information security management: a literature review. In Proceedings of the 2014 Americas Conference on Information Systems (AMCIS).
- Gonzalez, P., McKeen, J., & Tu, Z. (2012, December). IT stereotyping and the CEO-CIO headlock. In Proceedings of the International Conference on Information Systems (ICIS) 2012.
- Tu, Z., & Yuan, Y. (2012, January). Understanding user’s behaviors in coping with security threat of mobile devices loss and theft. In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS-45).
- Tu, Z., & McKeen J. D. (2011, July). Determinants of business students’ perceptions regarding information systems. In Proceedings of the 2011 Administrative Sciences Association of Canada (ASAC) Conference.
- Tu, Z. (2010, May). The effect of computer self-efficacy on perceived ease of use: a meta-analysis. In Proceedings of the 2010 Administrative Sciences Association of Canada (ASAC) Conference.