scispace - formally typeset
K

Kallol Bagchi

Researcher at University of Texas at El Paso

Publications -  95
Citations -  2069

Kallol Bagchi is an academic researcher from University of Texas at El Paso. The author has contributed to research in topics: Developing country & Empirical research. The author has an hindex of 19, co-authored 91 publications receiving 1836 citations. Previous affiliations of Kallol Bagchi include University of Texas at Austin & Florida Atlantic University.

Papers
More filters
Journal ArticleDOI

An assessment of customers' e-service quality perception, satisfaction and intention

TL;DR: One of the major findings of this study is that although less perceived risk may lead to a favorable perception of web service quality, it does not necessarily translate to customer satisfaction, or positive behavioral intentions.
Journal ArticleDOI

On-line Shopping Behavior: Cross-Country Empirical Research

TL;DR: The study finds that the factors of trust and economic conditions, but not educational level and technological savvy, make a significant positive contribution to online shopping behavior.
Journal ArticleDOI

Using SERVQUAL to assess the quality of e-learning experience

TL;DR: Data analysis from 203 e-learning students shows that four out of five dimensions play a significant role in perceived e- learning quality, which in turn affects learners' satisfaction and future intentions to enroll in online courses.
Journal ArticleDOI

National Culture and Information Technology Product Adoption

TL;DR: In this article, a large scale study of national culture is used to predict the adoption of six information technologies (PC, Telephone, Cell Phone, Fax, the Internet, and Pager) over a ten year period in thirty one nations.
Journal ArticleDOI

An analysis of the growth of computer and internet security breaches

TL;DR: The modified Gompertz model was used to analyze various types of attacks and indicated that growth patterns of computer and Internet crimes differ in growth patterns and that a relationship exists between occurrences of such security breaches and uses of certain security technologies.