Skip to main content

Advertisement

An empirical study on the influential factors affecting continuous usage of mobile cloud service

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Diffusion of smart devices, explosive growth of SNSs, increased speed of mobile network, alongside with the rapid development of ICT, all allow provision and use of many services on smart (mobile) devices, which have been provided in the wired network environment. Particularly, the use of a cloud service that allows users to access it in any place and at any time has increased on mobile devices, as well as on PCs. However, as compared to wired services, wireless services are likely to be exposed to the risk of security breach. This may inhibit the penetration of technologies. The purpose of the present study is to identify the factors that affect the intention of a continuous use (continuous intention) of mobile cloud services. For that purpose, the present study analyzes the effects of security breach risk on trust and the intention of a continuous use. The results of our analysis indicate the risks relevant to service authentication. Specifically, fault recovery and compliance exerted significant effects on trust and the continuous use intention. However, we also found that the service interruption risk and the personal information leakage risk have a significant influence on trust only. On the other hand, our findings demonstrate that trust also significantly affects the intention of a continuous use. Therefore, when a strategic decision making is considered a requisite to induce a continuous use, it is advisable to opt for and control the technologies relevant to service authentication, fault recovery, and compliance risks instead of those related to the disruption of services or leakage of personal information. Therefore, it appears to be imperative to adopt an integrated management and support process for developing a service equipped with security information technologies facilitating the continuity of businesses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kim, Y.K., Kim, T.U., Park, S.T., Jung, J.R.: Establishing the importance weight of appropriability mechanism by using AHP: the case of the China’s electronic industry. Clust. Comput. 19(3), 1635–1646 (2016)

    Article  Google Scholar 

  2. Kwon, H.C., Jung, D.Y., Jung, B.H., Kim, J.N.: Cloud security overview. J. Korean Inst. Commun. Sci. 32(10), 71–76 (2015)

    Google Scholar 

  3. Bartels, A., Bartoletti, D., Rymer, J.R.: The Public Cloud Services Market Will Grow Rapidly To $236 Billion In 2020. Forrester, Cambridge (2016)

  4. IDC.: Worldwide Semiannual Public Cloud Services Spending Guide. (2017). https://www.idc.com/getdoc.jsp?containerId=IDC_P33214

  5. Gillett, F.E., Pelino, M., Maxim, M., Dai, C., Ask, J.A., Kindness, A.: Predictions 2017: Security And Skills Will Temper Growth Of IoT. Forrester, Cambridge (2016)

  6. Bloter.: Cloud Security Business authentic boots. (2017). http://www.bloter.net/archives/276647

  7. Coles, C.: Gartner’s Latest CASB Report: How to Evaluate Vendors. Gartner, Stamford (2015)

  8. Lee, Y.H., Park, H.S.: Big data analysis strategy in mobile cloud. J. Korean Inst. Commun. Sci. 32(7), 57–62 (2015)

    Google Scholar 

  9. NIPA.: http://www.msip.go.kr (2017)

  10. Wang, H., Zheng, Z., Wu, L., Li, P.: New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust. Comput. 20(3), 2385–2392 (2016)

    Article  Google Scholar 

  11. Wang, Y., Chandrasekhar, S., Singhal, M.: A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Clust. Comput. 19(2), 647–662 (2016)

    Article  Google Scholar 

  12. Dubois, D.J., Casale, G.: OptiSpot: minimizing application deployment cost using spot cloud resources. Clust. Comput. 19(2), 893–909 (2016)

    Article  Google Scholar 

  13. Choi, H.J., Son, D.O., Kim, J.M., Kim, J.S., Kim, C.H.: A novel memory management technique for cloud client devices. Clust. Comput. 18(3), 1111–1116 (2015)

    Article  Google Scholar 

  14. Bae, J.K.: An empirical study on the effect of perceived privacy, perceived security, perceived enjoyment on continuance usage intention in mobile cloud computing. e-Business Stud. 15(3), 3–27 (2014)

    Article  MathSciNet  Google Scholar 

  15. Han, J.S.: Security threats in the mobile cloud service environment. J. Digit. Converg. 12(5), 263–269 (2014)

    Article  MathSciNet  Google Scholar 

  16. Dinh, H.T., Lee, C.H., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)

    Article  Google Scholar 

  17. Liu, S.G.: An architecture of mobile internet base on cloud computing. Adv. Mater. Res. 457–458(1), 38–41 (2012)

    Article  Google Scholar 

  18. Park, S.T., Park, E.M., Seo, J.H., Li, G.: Factors affecting the continuous use of cloud service: focused on security risks. Clust. Comput. 19(1), 485–495 (2016)

    Article  Google Scholar 

  19. Kim, D.Y., Li, G., Park, S.T., Ko, M.H.: A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. J. Comput. Virol. Hacking Tech. 12(3), 151–161 (2016)

    Article  Google Scholar 

  20. Ross, R., Oren, J.C., McEvilley, M.: Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems, Gaithersburg, MD. National Institute of Standard and Technology. Special Publication. NIST SP 800-160 (2014)

  21. Vikas, S.S., Pawan, K., Gurudatt, A.K., Shyam, G.: Mobile cloud computing: security threats. In: 2014 International Conference (IEEE), Electronics and Communication Systems (ICECS), pp. 1–4 (2014)

  22. Kazim, M., Zhu, S.Y.: A survey on top security threats in cloud computing. Int. J. Adv. Comput. Sci. Appl. 6(3), 109–113 (2015)

    Google Scholar 

  23. ITU-T X.1601.: Security framework for cloud computing—ITU. https://www.itu.int/rec/T-REC-X.1601-201510-I (2015)

  24. Cloud Security Alliance.: The Treacherous 12—Cloud Computing Top Threats in 2016. CSA (2016)

  25. Getova, M.: Top 12 Security Issues Facing Cloud, Zetta. (2017) http://www.zetta.net/about/blog/top-12-security-issues-facing-cloud

  26. Shahzad, A., Hussain, M.: Security issues and challenges of mobile cloud computing. Int. J. Grid Distrib. Comput. 6(6), 37–50 (2013)

    Article  Google Scholar 

  27. Usha, M., Malathi, P., PushpaRani, M.: Security threats in mobile cloud computing. Int. J. Res. Sci. Eng. Technol. 2(9), 42–45 (2015)

    Google Scholar 

  28. Goel, L., Jain, V.: A Review on Security Issues and Challenges of Mobile Cloud Computing and Preventive Measures. In: IJCA Proceedings on International Conference on Advances in Computer Engineering and Applications, vol. 5, pp. 22–27 (2014)

  29. Olafare, O., Parhizkar, H., Vem, S.: A new secure mobile cloud architecture. Int. J. Comput. Sci. Issues 12(2), 161–175 (2015)

    Google Scholar 

  30. Cloud Security Alliance’s Security.: Guidance for Critical Areas of Focus in Cloud Computing v4.0. CSA (2017)

  31. Rousseau, D., Tijoriwala, S.: What’s a good reason to change? Motivated reasoning and social accounts in promoting organizational change. J. Appl. Psychol. 84(4), 514–528 (1999)

    Article  Google Scholar 

  32. Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003)

    Article  Google Scholar 

  33. CVE Details.: Apple iCloud: CVE security vulnerabilities, versions and detailed reports. (2017) http://www.cvedetails.com/product/34308/Apple-Icloud.html?vendor_id=49

  34. Adaptive Mobile.: iCloud Attacks Expand. (2016) https://www.adaptivemobile.com/blog/icloud-attacks-expand

  35. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Article  Google Scholar 

  36. Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59(8), 877–886 (2006)

    Article  Google Scholar 

  37. Park, E.S., Woo, H.J.: A study on factors affecting the intention to use personal cloud service: focused on the convergence model of TAM and PMT. J. Cyber Commun. Acad. Soc. 30(2), 111–150 (2013)

    MathSciNet  Google Scholar 

  38. Kim, S.H., Kim, G.A.: An empirical study on the factors affecting the adoption of mobile cloud and the moderating effect of mobile trust. e-Business Stud. 12(1), 281–310 (2011)

    Article  Google Scholar 

  39. Yu, H.X., Sura, S., Ahn, J.: An empirical analysis on the persistent usage intention of chinese personal cloud service. J. Internet Comput. Ser. 16(3), 79–93 (2015)

    Article  Google Scholar 

  40. Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor affecting the continuous use of cloud storage service: user factor, system factor, psychological switching cost factor. J. Soc. e-Business Stud. 19(1), 15–42 (2014)

    Article  Google Scholar 

  41. Jouinia, M., Rabaia, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)

    Article  Google Scholar 

  42. Ahn, J.H., Choi, K.C., Sung, K.M., Lee, J.H.: A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust. J. Soc. e-Business Stud. 15(4), 143–163 (2010)

    Google Scholar 

  43. Chandra, S., Srivastava, S.C., Theng, Y.L.: Evaluating the role of trust in consumer adoption of mobile payment systems: an empirical analysis. Commun. Assoc. Inf. Syst. 27, 561–588 (2010)

    Google Scholar 

  44. Abroud, A., Choong, Y.V., Muthaiyah, S.: A conceptual framework for online stock trading service adoption. Int. J. E-Adopt. 5(1), 52–67 (2013)

    Article  Google Scholar 

  45. Chin, W.W., Gopal, A.: Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database 26(2–3), 42–64 (1995)

    Article  Google Scholar 

  46. Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res. 18(1), 39–50 (1981)

    Article  Google Scholar 

  47. Nunnally, J.: Psychometric Theory. McGraw-Hill, New York, NY (1978)

    Google Scholar 

  48. Thompson, R., Barclay, D.W., Higgins, C.A.: The partial least squares approach to causal modeling: personal computer adoption and use as an illustration. Technol. Stud 2(2), 284–324 (1995)

    Google Scholar 

  49. Falk, R.F., Miller, N.B.: A Primer for Soft Modeling. University of Akron Press, Ohio (1992)

    Google Scholar 

  50. Wetzels, M., Odekerken-Schroder, G., Oppen, C.V.: Using PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration. Manag. Inf. Syst. Q. 33(1), 177–195 (2009)

    Article  Google Scholar 

  51. Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., Lauro, C.: PLS Path Modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myeong-Ryoon Oh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, ST., Oh, MR. An empirical study on the influential factors affecting continuous usage of mobile cloud service. Cluster Comput 22 (Suppl 1), 1873–1887 (2019). https://doi.org/10.1007/s10586-017-1518-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1518-8

Keywords