G
Godwin J. Udo
Researcher at University of Texas at El Paso
Publications - 73
Citations - 2910
Godwin J. Udo is an academic researcher from University of Texas at El Paso. The author has contributed to research in topics: Developing country & Information technology. The author has an hindex of 21, co-authored 71 publications receiving 2706 citations. Previous affiliations of Godwin J. Udo include Southeast Missouri State University & University Of Tennessee System.
Papers
More filters
Journal ArticleDOI
Service quality, customer satisfaction, and behavioral intentions in the service factory
TL;DR: In this article, the authors investigate whether the typology to which a service belongs may explain the nature of the service quality construct and its relationship to customer satisfaction (SAT) and behavioral intentions (BI).
Journal ArticleDOI
An assessment of customers' e-service quality perception, satisfaction and intention
TL;DR: One of the major findings of this study is that although less perceived risk may lead to a favorable perception of web service quality, it does not necessarily translate to customer satisfaction, or positive behavioral intentions.
Journal ArticleDOI
Privacy and security concerns as major barriers for e‐commerce: a survey study
TL;DR: Investigation of the privacy and security concerns of IT users in order to establish a consensus among them shows that the following major concerns exist: privacy, security and threats, impersonation and forged identity, children protection, e‐mail safety, and censorship.
Journal ArticleDOI
Using SERVQUAL to assess the quality of e-learning experience
TL;DR: Data analysis from 203 e-learning students shows that four out of five dimensions play a significant role in perceived e- learning quality, which in turn affects learners' satisfaction and future intentions to enroll in online courses.
Journal ArticleDOI
An analysis of the growth of computer and internet security breaches
Kallol Bagchi,Godwin J. Udo +1 more
TL;DR: The modified Gompertz model was used to analyze various types of attacks and indicated that growth patterns of computer and Internet crimes differ in growth patterns and that a relationship exists between occurrences of such security breaches and uses of certain security technologies.