Anil Gurung | Marshall University (original) (raw)
Papers by Anil Gurung
Information and Computer Security, 2016
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to t... more Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/methodology/approach Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the ...
Information and Computer Security, 2019
Purpose Organizational insiders play a critical role in protecting sensitive information. Prior r... more Purpose Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear what factors influence moral beliefs and the conditions under which those factors have stronger/weaker effects. Using an ethical decision-making model and value congruence theory, this study aims to investigate how moral intensity and organizational criticality influence moral beliefs and intentions to perform information protection behaviors. Design/methodology/approach The hypotheses were tested using a scenario-based survey of 216 organizational insiders. Two of the scenarios depict low criticality information security protection behaviors and two depict high criticality behaviors. Findings A major finding is that users rely more on perceived social consensus and magnitude of consequences when organizational criticality is low and on temporal immediacy and proximity when criticality is high. In addi...
Privacy concerns of the users have been listed as one of the hindrances in the growth of e-commer... more Privacy concerns of the users have been listed as one of the hindrances in the growth of e-commerce. Understanding the consequences of privacy and its relationship with risk perceptions may help in finding solutions to this problem. Internet users may use different strategies to protect their privacy so that they can become confident in taking part in e-commerce. In this study, we investigate how users can lower their risk perceptions in the context of e-commerce. The relationships among privacy, risk, trust and internet security measures are empirically investigated to predict the behavioral intention to take part in e-commerce. Theoretical contributions and implications are discussed.
Journal of Computer Information Systems, 2009
With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing conce... more With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern for organizations. Research has demonstrated employee reactions to monitoring systems and how they are implemented. However, little is known about the impact of punishment-related policies on employee intention to misuse Internet. To extend this line of research beyond prior studies, this paper proposes an integrated research model applying Theory of Planned Behavior, Deterrence Theory, and Theory of Ethics to examine the impact of punishment-related policy on employees' Internet misuse intentions. The results indicate that perceived importance, perceived behavioral control and subjective norms have significant influence on employee intention to avoid Internet misuse. Contrary to expectations, there is no support for the influence of punishment severity and punishment certainty. KEYWORD: Workplace Internet use monitoring, Internet misuse, monitoring, behavioral intentions.
The purpose of this paper is to study the performance of Information Systems (IS) project teams. ... more The purpose of this paper is to study the performance of Information Systems (IS) project teams. Performance of IS project teams is defined in terms of efficiency, effectiveness, and timeliness. Drawing upon the theories of organizational learning, a model is proposed that includes culture variables of collaboration and trust.
Luo, X., Gurung, A., & Shim, J. P. (2010). Understanding the determinants of user acceptance of e... more Luo, X., Gurung, A., & Shim, J. P. (2010). Understanding the determinants of user acceptance of enterprise instant messaging: An
Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular i... more Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular in mainstream IS research. This resurgence in MAS research can be attributed to two phenomena: the spread of concurrent and distributed computing with the advent of the web; and a deeper integration of computing into organizations and the lives of people, which has led to increasing collaborations among large collections of interacting people and large groups of interacting machines. However, it is next to impossible to correctly and completely specify these systems a priori, especially in complex environments. The only feasible way of coping with this problem is to endow the agents with learning, i.e., an ability to improve their individual and/or system performance with time. Learning in MAS has therefore become one of the important areas of research within MAS. In this paper we present a survey of important contributions made by IS researchers to the field of learning in MAS, and prese...
Despite being identified as an emerging topic, Work Flow Management Systems (WMS) has not been in... more Despite being identified as an emerging topic, Work Flow Management Systems (WMS) has not been included in the Management Information Systems (MIS) curriculum of most US universities. Workflow system combines business and technology and requires the integration of management policies and IT systems. MIS students can benefit from the knowledge of WMS and be able to explore job opportunities. We argue for the inclusion of WMS as an independent course and develop the framework for a full-fledged workflow management module in MIS. We explore the WMS components and the influential factors that are important for pedagogy and we conclude with the outline of a model curriculum. KeywordsWorkflow Management Systems, MIS curriculum, workflow, curriculum development
We use a problem-solving approach to learning where students work on a partially completed databa... more We use a problem-solving approach to learning where students work on a partially completed database with defects. To fix and complete the database design, students enforce entity, referential and column level constraints. After fixing the database, students develop data macros to update changes into other tables. By successfully fixing problems and creating macros, students gain confidence in working with databases. Informal feedback from students revealed evidence of learning among students. Students also learned valuable concepts in database design.
The use of Internet in workplace has brought about concerns for companies. Previous researches fo... more The use of Internet in workplace has brought about concerns for companies. Previous researches focused on the effect of electronic control on employee productivity and job satisfaction. This paper uses the Theory of Planned Behavior and Deterrence Theory to understand the factors that could affect the workplace Internet use behavior intention. The results will provide insightful suggestions for improving workplace Internet use management with less costly and proactive approaches that can cultivate employee voluntary avoidance of Internet misuse. Keyword: workplace Internet use monitoring, Internet use, Internet use monitoring, behavior intention change Liao, Luo, Gurung & Li, Workplace Internet monitoring and Behavior Intention
Along with the phenomenal growth in fast fashion, the industry is beset with many challenges. Top... more Along with the phenomenal growth in fast fashion, the industry is beset with many challenges. Topping the list are design, production, and supply of the fast fashion apparel (FFA). Adoption and effective use of supply chain management (SCM) practices in the FFA industry have become indispensable to achieve this. However, there is a gap in the fast fashion literature on the appropriate modeling of adoption and practice of SCM. In addressing this research gap, this study builds a comprehensive model of SCM adoption and practice by extracting relevant factors and variables from FFA manufacturing firms via qualitative field study. This study is one of the first to analyze SCM adoption from the diffusion of innovation theory perspective in the fashion industry. While existing literature does not clearly differentiate between SCM adoption and practice, this research underpins that the diffusion of SCM practices within FFA firms must go through stages of adoption and practice for successful wide-scale implementation.
Journal of Emerging Technologies in Accounting
Although Database skills are essential skills required for accounting students, a substantial gap... more Although Database skills are essential skills required for accounting students, a substantial gap exists between available and required skill levels in the industry. The significant changes in accounting information systems in modern enterprises require revisions to the accounting curriculum. When addressing this gap, researchers have identified a hands-on approach as the preferred method for learning Information Technology (IT) related skills such as in databases. The industry prefers students with hands-on learning projects mimicking real-life situations involving fixing problems rather than following steps. To this end, we develop a problemsolving based approach to enhance hands-on learning in database design. In this teaching module, students fix a partially completed database with defects intentionally placed by theinstructor. By involving in active thinking to fix and enhance the database, students not only gain confidence in working with databases but also learn valuable conc...
Information & Management
Abstract Cross-cultural studies in Information Systems (IS) have experienced an overreliance on H... more Abstract Cross-cultural studies in Information Systems (IS) have experienced an overreliance on Hofstede’s theory, which has impeded researchers from exploring alternative theoretical lenses. We examine the moderating effects of Schwartz’s Polar Dimensions on users’ perception of Social Network Service, highlighting cultural issues associated with IS privacy, trust, and social capital. We found that the effect of perceived reputation is more powerful in American culture than Chinese culture, though network centrality has a stronger effect on use intention among Chinese users than American users. We also introduce the imposed etic approach, which has been rarely seen in IS research.
... Recommended Citation. Liao, Qinyu; Luo, Xin; Gurung, Anil; and Li, Long, "Wo... more ... Recommended Citation. Liao, Qinyu; Luo, Xin; Gurung, Anil; and Li, Long, "Workplace Internet Use Monitoring and Employee Behavior Intention Change" (2007). AMCIS 2007 Proceedings. Paper 154. http://aisel.aisnet.org/amcis2007/154. ...
Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular i... more Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular in mainstream IS research. This resurgence in MAS research can be attributed to two phenomena: the spread of concurrent and distributed computing with the advent of the web; and a deeper integration of computing into organizations and the lives of people, which has led to increasing collaborations among large collections of interacting people and large groups of interacting machines. However, it is next to impossible to correctly and completely specify these systems a priori, especially in complex environments. The only feasible way of coping with this problem is to endow the agents with learning, i.e., an ability to improve their individual and/or system performance with time. Learning in MAS has therefore become one of the important areas of research within MAS. In this paper we present a survey of important contributions made by IS researchers to the field of learning in MAS, and prese...
Journal of Information Privacy and Security, 2008
Computers in Human Behavior, 2015
Journal of Global Information Technology Management, 2006
New Explorations, 2011
... on the Quality of IS Planning Projects: An Exploratory Study (pages 292-309). Varadharajan Sr... more ... on the Quality of IS Planning Projects: An Exploratory Study (pages 292-309). Varadharajan Sridhar (Management Development Institute, India), Dhruv Nath (Management Development Institute, India), and Amit Malik (Management Development Institute, India) Sample PDF ...
Information and Computer Security, 2016
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to t... more Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/methodology/approach Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the ...
Information and Computer Security, 2019
Purpose Organizational insiders play a critical role in protecting sensitive information. Prior r... more Purpose Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear what factors influence moral beliefs and the conditions under which those factors have stronger/weaker effects. Using an ethical decision-making model and value congruence theory, this study aims to investigate how moral intensity and organizational criticality influence moral beliefs and intentions to perform information protection behaviors. Design/methodology/approach The hypotheses were tested using a scenario-based survey of 216 organizational insiders. Two of the scenarios depict low criticality information security protection behaviors and two depict high criticality behaviors. Findings A major finding is that users rely more on perceived social consensus and magnitude of consequences when organizational criticality is low and on temporal immediacy and proximity when criticality is high. In addi...
Privacy concerns of the users have been listed as one of the hindrances in the growth of e-commer... more Privacy concerns of the users have been listed as one of the hindrances in the growth of e-commerce. Understanding the consequences of privacy and its relationship with risk perceptions may help in finding solutions to this problem. Internet users may use different strategies to protect their privacy so that they can become confident in taking part in e-commerce. In this study, we investigate how users can lower their risk perceptions in the context of e-commerce. The relationships among privacy, risk, trust and internet security measures are empirically investigated to predict the behavioral intention to take part in e-commerce. Theoretical contributions and implications are discussed.
Journal of Computer Information Systems, 2009
With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing conce... more With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern for organizations. Research has demonstrated employee reactions to monitoring systems and how they are implemented. However, little is known about the impact of punishment-related policies on employee intention to misuse Internet. To extend this line of research beyond prior studies, this paper proposes an integrated research model applying Theory of Planned Behavior, Deterrence Theory, and Theory of Ethics to examine the impact of punishment-related policy on employees' Internet misuse intentions. The results indicate that perceived importance, perceived behavioral control and subjective norms have significant influence on employee intention to avoid Internet misuse. Contrary to expectations, there is no support for the influence of punishment severity and punishment certainty. KEYWORD: Workplace Internet use monitoring, Internet misuse, monitoring, behavioral intentions.
The purpose of this paper is to study the performance of Information Systems (IS) project teams. ... more The purpose of this paper is to study the performance of Information Systems (IS) project teams. Performance of IS project teams is defined in terms of efficiency, effectiveness, and timeliness. Drawing upon the theories of organizational learning, a model is proposed that includes culture variables of collaboration and trust.
Luo, X., Gurung, A., & Shim, J. P. (2010). Understanding the determinants of user acceptance of e... more Luo, X., Gurung, A., & Shim, J. P. (2010). Understanding the determinants of user acceptance of enterprise instant messaging: An
Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular i... more Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular in mainstream IS research. This resurgence in MAS research can be attributed to two phenomena: the spread of concurrent and distributed computing with the advent of the web; and a deeper integration of computing into organizations and the lives of people, which has led to increasing collaborations among large collections of interacting people and large groups of interacting machines. However, it is next to impossible to correctly and completely specify these systems a priori, especially in complex environments. The only feasible way of coping with this problem is to endow the agents with learning, i.e., an ability to improve their individual and/or system performance with time. Learning in MAS has therefore become one of the important areas of research within MAS. In this paper we present a survey of important contributions made by IS researchers to the field of learning in MAS, and prese...
Despite being identified as an emerging topic, Work Flow Management Systems (WMS) has not been in... more Despite being identified as an emerging topic, Work Flow Management Systems (WMS) has not been included in the Management Information Systems (MIS) curriculum of most US universities. Workflow system combines business and technology and requires the integration of management policies and IT systems. MIS students can benefit from the knowledge of WMS and be able to explore job opportunities. We argue for the inclusion of WMS as an independent course and develop the framework for a full-fledged workflow management module in MIS. We explore the WMS components and the influential factors that are important for pedagogy and we conclude with the outline of a model curriculum. KeywordsWorkflow Management Systems, MIS curriculum, workflow, curriculum development
We use a problem-solving approach to learning where students work on a partially completed databa... more We use a problem-solving approach to learning where students work on a partially completed database with defects. To fix and complete the database design, students enforce entity, referential and column level constraints. After fixing the database, students develop data macros to update changes into other tables. By successfully fixing problems and creating macros, students gain confidence in working with databases. Informal feedback from students revealed evidence of learning among students. Students also learned valuable concepts in database design.
The use of Internet in workplace has brought about concerns for companies. Previous researches fo... more The use of Internet in workplace has brought about concerns for companies. Previous researches focused on the effect of electronic control on employee productivity and job satisfaction. This paper uses the Theory of Planned Behavior and Deterrence Theory to understand the factors that could affect the workplace Internet use behavior intention. The results will provide insightful suggestions for improving workplace Internet use management with less costly and proactive approaches that can cultivate employee voluntary avoidance of Internet misuse. Keyword: workplace Internet use monitoring, Internet use, Internet use monitoring, behavior intention change Liao, Luo, Gurung & Li, Workplace Internet monitoring and Behavior Intention
Along with the phenomenal growth in fast fashion, the industry is beset with many challenges. Top... more Along with the phenomenal growth in fast fashion, the industry is beset with many challenges. Topping the list are design, production, and supply of the fast fashion apparel (FFA). Adoption and effective use of supply chain management (SCM) practices in the FFA industry have become indispensable to achieve this. However, there is a gap in the fast fashion literature on the appropriate modeling of adoption and practice of SCM. In addressing this research gap, this study builds a comprehensive model of SCM adoption and practice by extracting relevant factors and variables from FFA manufacturing firms via qualitative field study. This study is one of the first to analyze SCM adoption from the diffusion of innovation theory perspective in the fashion industry. While existing literature does not clearly differentiate between SCM adoption and practice, this research underpins that the diffusion of SCM practices within FFA firms must go through stages of adoption and practice for successful wide-scale implementation.
Journal of Emerging Technologies in Accounting
Although Database skills are essential skills required for accounting students, a substantial gap... more Although Database skills are essential skills required for accounting students, a substantial gap exists between available and required skill levels in the industry. The significant changes in accounting information systems in modern enterprises require revisions to the accounting curriculum. When addressing this gap, researchers have identified a hands-on approach as the preferred method for learning Information Technology (IT) related skills such as in databases. The industry prefers students with hands-on learning projects mimicking real-life situations involving fixing problems rather than following steps. To this end, we develop a problemsolving based approach to enhance hands-on learning in database design. In this teaching module, students fix a partially completed database with defects intentionally placed by theinstructor. By involving in active thinking to fix and enhance the database, students not only gain confidence in working with databases but also learn valuable conc...
Information & Management
Abstract Cross-cultural studies in Information Systems (IS) have experienced an overreliance on H... more Abstract Cross-cultural studies in Information Systems (IS) have experienced an overreliance on Hofstede’s theory, which has impeded researchers from exploring alternative theoretical lenses. We examine the moderating effects of Schwartz’s Polar Dimensions on users’ perception of Social Network Service, highlighting cultural issues associated with IS privacy, trust, and social capital. We found that the effect of perceived reputation is more powerful in American culture than Chinese culture, though network centrality has a stronger effect on use intention among Chinese users than American users. We also introduce the imposed etic approach, which has been rarely seen in IS research.
... Recommended Citation. Liao, Qinyu; Luo, Xin; Gurung, Anil; and Li, Long, "Wo... more ... Recommended Citation. Liao, Qinyu; Luo, Xin; Gurung, Anil; and Li, Long, "Workplace Internet Use Monitoring and Employee Behavior Intention Change" (2007). AMCIS 2007 Proceedings. Paper 154. http://aisel.aisnet.org/amcis2007/154. ...
Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular i... more Multiagent systems (MAS), long studied in artificial intelligence, have recently become popular in mainstream IS research. This resurgence in MAS research can be attributed to two phenomena: the spread of concurrent and distributed computing with the advent of the web; and a deeper integration of computing into organizations and the lives of people, which has led to increasing collaborations among large collections of interacting people and large groups of interacting machines. However, it is next to impossible to correctly and completely specify these systems a priori, especially in complex environments. The only feasible way of coping with this problem is to endow the agents with learning, i.e., an ability to improve their individual and/or system performance with time. Learning in MAS has therefore become one of the important areas of research within MAS. In this paper we present a survey of important contributions made by IS researchers to the field of learning in MAS, and prese...
Journal of Information Privacy and Security, 2008
Computers in Human Behavior, 2015
Journal of Global Information Technology Management, 2006
New Explorations, 2011
... on the Quality of IS Planning Projects: An Exploratory Study (pages 292-309). Varadharajan Sr... more ... on the Quality of IS Planning Projects: An Exploratory Study (pages 292-309). Varadharajan Sridhar (Management Development Institute, India), Dhruv Nath (Management Development Institute, India), and Amit Malik (Management Development Institute, India) Sample PDF ...