A research framework for the impact of cultural differences on IT outsourcing A Gurung, E Prater Journal of Global Information Technology Management 9 (1), 24-43, 2006 | 193 | 2006 |
Online privacy and security concerns of consumers A Gurung, MK Raja Information & Computer Security 24 (4), 348-371, 2016 | 129 | 2016 |
Consumer motivations in taking action against spyware: An empirical investigation A Gurung, X Luo, Q Liao Information Management & Computer Security 17 (3), 276-289, 2009 | 113 | 2009 |
Understanding the determinants of user acceptance of enterprise instant messaging: An empirical study X Luo, A Gurung, JP Shim Journal of Organizational Computing and Electronic Commerce 20 (2), 155-181, 2010 | 98 | 2010 |
Workplace management and employee misuse: does punishment matter? Q Liao, A Gurung, X Luo, L Li Journal of Computer Information Systems 50 (2), 49-59, 2009 | 92 | 2009 |
Empirical investigation of the relationship of privacy, security and trust with behavioral intention to transact in e-commerce A Gurung The University of Texas at Arlington, 2006 | 92 | 2006 |
Role of gender, self-efficacy, anxiety and testing formats in learning spreadsheets A Singh, V Bhadauria, A Jain, A Gurung Computers in Human Behavior 29 (3), 739-746, 2013 | 47 | 2013 |
An empirical investigation on customer’s privacy perceptions, trust and security awareness in E-commerce environment A Gurung, X Luo, MK Raja Journal of Information Privacy and Security 4 (1), 42-60, 2008 | 31 | 2008 |
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services CJ Guo, M Warkentin, XR Luo, A Gurung, JP Shim Information & Management 57 (8), 103261, 2020 | 24 | 2020 |
A survey of information technologies in logistics management A Gurung Proceedings of the Decision Sciences Institute, 2006 | 20 | 2006 |
A holistic understanding of non-users’ adoption of university campus wireless network: An empirical investigation Q Liao, XR Luo, A Gurung, W Shi Computers in Human Behavior 49, 220-229, 2015 | 19 | 2015 |
Rebuilding post-violation trust in B2C electronic commerce Q Liao, X Luo, A Gurung Journal of Organizational and End User Computing (JOEUC) 21 (1), 60-74, 2009 | 18 | 2009 |
Information protection behaviors: morality and organizational criticality NK Lankton, C Stivason, A Gurung Information & Computer Security 27 (3), 468-488, 2019 | 12 | 2019 |
Management of lecture time: Using the web to manipulate extrinsic cognitive load MA Chilton, A Gurung International Journal of Web-Based Learning and Teaching Technologies …, 2008 | 8 | 2008 |
Makers: The new industrial revolution A Gurung Competitiveness Review 24 (2), 147-149, 2014 | 7 | 2014 |
Validating perception and use of mobile social network service: A cross-cultural comparison study C Guo, JP Shim, X Luo, A Gurung | 7 | 2011 |
Antecedents of online privacy protection behavior: towards an integrative model A Gurung, A Jain Cyber Crime: Concepts, Methodologies, Tools and Applications, 69-82, 2012 | 6 | 2012 |
The role of virtuality and work family conflict in forming attitudes towards virtual work A Gurung International Journal of Information Systems and Change Management 2 (1), 69-80, 2007 | 5 | 2007 |
A problem-solving-based teaching approach to database design A Singh, V Bhadauria, A Gurung Journal of Emerging Technologies in Accounting 18 (2), 149-155, 2021 | 4 | 2021 |
Towards a comprehensive model of SCM adoption and practice in the fast fashion apparel industry MA Jahed, M Quaddus, A Gurung International Journal of Information Systems and Supply Chain Management …, 2021 | 2 | 2021 |