Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anil Gurung is active.

Publication


Featured researches published by Anil Gurung.


Journal of Organizational Computing and Electronic Commerce | 2010

Understanding the Determinants of User Acceptance of Enterprise Instant Messaging: An Empirical Study

Xin (Robert) Luo; Anil Gurung; Jung P. Shim

As modern organizations increasingly depend on information systems (IS) to enhance work productivity and seek new business opportunities, communication effectiveness has become one of the key factors that underlie the effective performance of IS implementations and applications. Instant Messaging (IM) presents a revolution in enterprise communication. As more organizations are findings ways to utilize this near-synchronous computing communication technology to enhance communication effectiveness in the workplace, there is a compelling need to understand the factors that are important for the adoption of enterprise IM. We have developed an integrative model based on constructs of the existing IT adoption models as well as theories on motivation, innovation diffusion, and critical mass. Using responses from 140 intended subjects, we have found the results of survey data support the contentions that perceived usefulness, compatibility, enjoyment, and security are significant predictors of intention to use enterprise IM. Although perceived connectivity did not predict the intention directly, it did indirectly through perceived usefulness and perceived ease of use. Implications and future research are discussed.


Information Management & Computer Security | 2009

Consumer motivations in taking action against spyware: an empirical investigation

Anil Gurung; Xin (Robert) Luo; Qinyu Liao

Purpose – The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti‐spyware tools when they are faced with security threats.Design/methodology/approach – The research model was tested with data obtained through online survey questionnaires. A pre‐ and a pilot‐test of the survey instrument are conducted. Then, a final five‐point Likert scale instrument is created. The solicitation for participants is done through e‐mail invitations. Survey results are analyzed using factor analysis and logistic regression.Findings – The results do not find statistically significant relationships for hypotheses related to perceived vulnerability and response cost with the dependent variable. Perceived severity, self‐efficacy, and response efficacy are significantly related to use of anti‐spyware tools.Research limitations/implications – The empirical findings suggest that protection motivation theory (PMT) may possibly provide a new ave...


Journal of Organizational and End User Computing | 2009

Rebuilding Post-Violation Trust in B2C Electronic Commerce

Qinyu Liao; Xin (Robert) Luo; Anil Gurung

This article proposes a model addressing the rebuilding of post-violation trust in B2C electronic commerce. The model uses expectation-confirmation theory and provides empirical verification for the factors affecting post-violation trust rebuilding and the association between them. The factors are perceived trustworthiness, confirmation by trust restoration, satisfaction and continuance trust intention. In accordance with exiting literature, perceived trustworthiness was found to have significant impact on continuance trust intention. The study also showed that confirmation by post-violation trust restoration activities had strong impact on satisfaction but satisfaction did not lead to post-violation continuance trust intention.


Journal of Information Privacy and Security | 2008

An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment

Anil Gurung; Xin (Robert) Luo; M. K. Raja

Abstract Privacy concerns of the users have been listed as one of the hindrances in the growth of e-commerce. Understanding the consequences of privacy and its relationship with risk perceptions may help in finding solutions to this problem. Internet users may use different strategies to protect their privacy so that they can become confident in taking part in e-commerce. In this study, we investigate how users can lower their risk perceptions in the context of e-commerce. The relationships among privacy, risk, trust and internet security measures are empirically investigated to predict the behavioral intention to take part in e-commerce. Theoretical contributions and implications are discussed.


International Journal of Web-based Learning and Teaching Technologies | 2008

Management of Lecture Time: Using the Web to Manipulate Extrinsic Cognitive Load

Michael A. Chilton; Anil Gurung

The variety of new technologies available for classroom use requires a choice not just between the technological options, but among them as well, since an educator may choose a single option or include a mix of media. In this study we investigate a particular mix of advanced technology and its effect on student learning outcomes. Our experimental design compares outcomes from a traditional teaching format with those of a more advanced web-based format. Our model is based on cognitive load theory, is developed from perceptions of the students, and is analyzed using factor analysis. The results based on this qualitative model show promise for delving further into the assessment of learning. This would provide researchers with additional tools to help evaluate their results and educators with a basis on which to make decisions regarding which advanced technologies to use.


Journal of Global Information Technology Management | 2006

A Research Framework for the Impact of Cultural Differences on IT Outsourcing

Anil Gurung; Edmund Pratter


Journal of Computer Information Systems | 2015

Workplace Management and Employee Misuse: Does Punishment Matter?

Qinyu Liao; Anil Gurung; Xin (Robert) Luo; Long Li


Archive | 2006

Empirical investigation of the relationship of privacy, security and trust with behavioral intention to transact in e-commerce

M. K. Raja; Anil Gurung


americas conference on information systems | 2011

Validating Perception and Use of Mobile Social Network Service: A Cross-Cultural Comparison Study

Chengqi Guo; Jung P. Shim; Xin (Robert) Luo; Anil Gurung


Archive | 2018

A Problem-Solving Based Approach to Teaching Database Design

Anil Singh; Vikram S. Bhadauria; Anil Gurung

Collaboration


Dive into the Anil Gurung's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anil Singh

University of Texas at Brownsville

View shared research outputs
Top Co-Authors

Avatar

Jung P. Shim

Mississippi State University

View shared research outputs
Top Co-Authors

Avatar

Long Li

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

M. K. Raja

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Vikram S. Bhadauria

Southern Arkansas University

View shared research outputs
Top Co-Authors

Avatar

Anurag Jain

Salem State University

View shared research outputs
Top Co-Authors

Avatar

Edmund Pratter

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge