A-Z Index

Dr. Cindy Zhiling Tu

Dr. Cindy Zhiling Tu



2210 Colden



Joined Northwest in 2016

Associate Professor

Program Coordinator, MS-Information Systems


  • Ph.D. Information Systems, McMaster University, Canada
  • M. Sc. Management Information Systems, Queen’s University, Canada
  • M.B.A., E-Business & Information Technology, Maastricht School of Management, the Netherlands
  • M. Eng. Computer Science, Nanjing University, P. R. China
  • B.S. Computer Science, Nanjing University, P. R. China

Courses Taught

  • Object-Oriented System Development with Java
  • Information Systems Analysis and Design
  • IT Management
  • Information Systems in Management
  • Project Management
  • Computer Networking and Security
  • Database Management
  • Data Mining and Business Intelligence
  • MIS Capstone Project

Academic Interests

  • Information Security
  • E-Commerce
  • Business Intelligence

Scholarly Activity

Selected Publications

  • Tu, Z., Yuan, Y., Archer, N., and Connelly, C. (2018). “Strategic Value Alignment for Information Security Management: A Critical Success Factor Analysis”. Information and Computer Security, 26(2), pp. 150-170.
  • Tu, Z., Adkins, J., and Zhao Y. (2018), “Complying with BYOD Security Policies: A Moderation Model”, Midwest United States Association for Information Systems 13th Annual Conference, May 17-18, St. Louis, USA. (First Place of Best Paper Award)
  • Tu, Z. and Adkins, J. (2017), “Complying with BYOD Security Policies”, Thirteenth International Conference on Technology, Knowledge and Society and the Technology, Knowledge, and Society Knowledge Community, Toronto, Canada.
  • Tu, Z., Turel, O., Yuan, Y. and Archer, N. (2015), “Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination”, Information & Management, 52, pp. 506-517.
  • Wang, Y., Yuan, Y., Turel, Y., and Tu, Z. (2015), “Understanding the development and diffusion of mobile commerce technologies in China: A biographical study with an Actor-Network Theory perspective”, International Journal of Electronic Commerce, 19(4), pp. 47-76.
  • Tu, Z., Yuan, Y. and Archer, N. (2014). “Understanding user behavior in coping with security threats of mobile device loss and theft”. International Journal of Mobile Communications, 12(6), pp. 603-623. 
  • Tu, Z. and Yuan, Y. (2014). “Critical success factors analysis on effective information security management: A literature review”. Proceedings of Americas Conference on Information Systems (AMCIS) 2014, 2014, Savannah, USA. 
  • Gonzalez, P., McKeen, J., and Tu, Z. (2012). "IT stereotyping and the CEO-CIO headlock". Proceedings of the International Conference on Information Systems (ICIS) 2012, Orlando, USA.
  • Tu, Z. and Yuan, Y. (2012). “Understanding user’s behaviors in coping with security threat of mobile devices loss and theft”. Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS-45), Grand Wailea, Maui, USA.
  • Tu, Z. and McKeen J.D. (2011). "Determinants of business students’ perceptions regarding information systems". Proceedings of the 2011 Administrative Sciences Association of Canada (ASAC) Conference, 2011, Montreal, Canada.
  • Tu, Z. (2010). "The effect of computer self-efficacy on perceived ease of use: A meta-analysis". Proceedings of the 2010 Administrative Sciences Association of Canada (ASAC) Conference, 2010, Regina, Canada.

Other Professional Experience

  • Reviewer of Social Behavior and Personality: 2018
  • Reviewer of Journal of Information Technology Theory and Application: 2016
  • Reviewer of Behaviour & Information Technology:  2016, 2015
  • Reviewer of International Journal of Mobile Communications:  2015, 2013
  • Reviewer of African Journal of Marketing Management: 2013
  • Reviewer of AMCIS conference:  2016, 2015, 2014
  • Reviewer of HICSS-45 conference:  2012
  • Reviewer of ASAC 2011 conference:  2011, 2010
  • Reviewer of International Journal of Management Reviews:  2010
  • Reviewer of ASAC 2010 conference: 2010