scispace - formally typeset
G

Godwin J. Udo

Researcher at University of Texas at El Paso

Publications -  73
Citations -  2910

Godwin J. Udo is an academic researcher from University of Texas at El Paso. The author has contributed to research in topics: Developing country & Information technology. The author has an hindex of 21, co-authored 71 publications receiving 2706 citations. Previous affiliations of Godwin J. Udo include Southeast Missouri State University & University Of Tennessee System.

Papers
More filters
Journal ArticleDOI

Service quality, customer satisfaction, and behavioral intentions in the service factory

TL;DR: In this article, the authors investigate whether the typology to which a service belongs may explain the nature of the service quality construct and its relationship to customer satisfaction (SAT) and behavioral intentions (BI).
Journal ArticleDOI

An assessment of customers' e-service quality perception, satisfaction and intention

TL;DR: One of the major findings of this study is that although less perceived risk may lead to a favorable perception of web service quality, it does not necessarily translate to customer satisfaction, or positive behavioral intentions.
Journal ArticleDOI

Privacy and security concerns as major barriers for e‐commerce: a survey study

TL;DR: Investigation of the privacy and security concerns of IT users in order to establish a consensus among them shows that the following major concerns exist: privacy, security and threats, impersonation and forged identity, children protection, e‐mail safety, and censorship.
Journal ArticleDOI

Using SERVQUAL to assess the quality of e-learning experience

TL;DR: Data analysis from 203 e-learning students shows that four out of five dimensions play a significant role in perceived e- learning quality, which in turn affects learners' satisfaction and future intentions to enroll in online courses.
Journal ArticleDOI

An analysis of the growth of computer and internet security breaches

TL;DR: The modified Gompertz model was used to analyze various types of attacks and indicated that growth patterns of computer and Internet crimes differ in growth patterns and that a relationship exists between occurrences of such security breaches and uses of certain security technologies.