Abstract
This paper analyzed the effects of security risk factors fit for cloud computing paradigm on the acceptance of enterprise cloud service with intent to illuminate the factors for vitalizing the adoption of corporate cloud services in the future. The acceptance intention was set as a dependent variable. Independent variables were set in reference to the technology acceptance theory. Security risks were categorized into compliance risk, information leakage risk, troubleshooting risk and service discontinuation risk to design a model for analysis.
References
Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’–a forensic computing perspective. J. Comput. Virol. Hack. Tech. 9(1), 27–33 (2013)
Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hack. Tech. 11(3), 149–155 (2015)
Choi, S.: Study on model fostering for cloud service brokerage. J. Comput. Virol. Hack. Tech. 11(3), 181–192 (2015)
Barakat, O.L., Hashim, S.J., Abdullah, R.S.A.B.R., Ramli, A.R., Hashim, F., Samsudin, K., Ab Rahman, M.: Malware analysis performance enhancement using cloud computing. J. Comput. Virol. Hack. Tech. 10(1), 1–10 (2013)
Mullins, R.: IDC Survey: Risk in the Cloud. http://www.networkcomputing.com/cloud-infrastructure/idc-survey-risk-in-the-cloud/d/d-id/1231608? (2010)
Johnston, S.: Cloud computing types: public cloud. Hybrid cloud. Private cloud, CircleID (2009)
Gu, S.H., Kim, D.W., Park, C.M., Kim, K.H.: Influence of LTE characteristic and personal innovativeness on LTE smart phone acceptance. J. Digit. Contents Soc. 14(3), 291–301 (2013)
Park, E., Pobil, A.P.: Technology acceptance model for the use of tablet PCs. Wirel. Pers. Commun. 73(4), 1561–1572 (2013)
Cheong, J.H., Park, M.C.: Mobile internet acceptance in Korea. Internet Res. 15(2), 125–140 (2005)
Carlsson, C., Hyvönen, K., Repo, P., Walden, P.: Adoption of mobile services across different technologies. In: 18th Bled Conference on Integration in Action, pp. 1–13 (2005)
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)
Fishbein, M., Ajzen, I.B.: Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)
Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)
Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Report (2008)
Carl, A.: A Practical Guide to Cloud Computing Security. A white paper from Accenture and Microsoft. Avanade Inc., Seattle. http://www.avanade.com/~/media/documents/research%20and%20insights/practicalguidetocloudcomputingsecurity574834.pdf (2009)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gen. Comput. Syst. 28(3), 583–592 (2012)
Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and Eucalyptus. In: Cloud Computing. IEEE International Conference on 2009, pp. 151–154 (2009)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2010)
Services. AWS Security Whitepaper. https://appirio.com/pdf/amazon-web-services-security.pdf (2008)
John, W.R., James, F.R.: Cloud Computing: Implementation. Management and Security. CRC Press, New York (2010)
Tarrant, D., Brody, T., Carr, L.: From the desktop to the cloud: leveraging hybrid storage architectures in your repository. In: International Conference on Open Repositories (2009)
Lee, G.G., Noh, Y.: An effect of innovation characteristics on perceived usefulness and ease of use in the internet banking. e-Bus. Stud. 7(3), 85–107 (2006)
Featherman, M.S., Fuller, M.: Applying TAM to e-services adoption: the moderating role of perceived risk. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)
Wu, J.H., Wang, S.C.: What drives mobile commerce, an empirical evaluation of the revised technology acceptance model. Inf. Manag. 42(5), 719–729 (2005)
Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce 7(3), 101–134 (2003)
Lui, H.K., Jamieson, R.: Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. In: ECIS, pp. 1154–1170 (2003)
Tan, M., Teo, T.S.H.: Factors influencing the adoption of internet banking. J. Assoc. Inf. Syst. 1(5), 1–42 (2000)
Agarwal, R., Prasad, J.A.: Conceptual and operational definition of personal innovativeness in the domain of IT. Inf. Syst. Res. 9(2), 204–215 (1998)
Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 19(2), 189–211 (1995)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111–1132 (1992)
Taylor, S., Todd, P.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144–176 (1995)
Thompson, A.M., Brown, J.C., Kay, J.W., Titterington, D.M.: A study of methods of choosing the smoothing parameter in image restoration by regularization. IEEE Trans. Pattern Anal. Mach. Intell. 13, 326–339 (1991)
Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186–204 (2000)
Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)
Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24(1), 115–139 (2000)
Lee, J.Y.: Characteristics of cloud computing and current status of services provided by business operator. Inf. Soc. Dev. Res. 22(6), 1–22 (2010)
Pavlou, P., Gefen, D.: Building effective online marketplaces with institution-based trust. Inf. Syst. Res. 15(1), 37–59 (2004)
Grazioli, S., Jarvenpaa, S.: Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395–410 (2000)
Lau, G.T., Lee, S.H.: Consumers’ trust in a brand and the link to brand loyalty. J. Mark. Focus. Manag. 4, 341–370 (1999)
The Savola Group: 2010 annual report. http://www.savola.com/SavolaE/pdf/Savola_Annual_Report_2010_E.pdf (2010)
Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)
Nunnally, J.: Psychometric Theory. McGraw-Hill, New York (1978)
Barclay, D., Higgins, C., Thompson, R.: The partial least squares (PLS) approach to causal modeling: personal computer adoption and use as an illustration. Technol. Stud. 2(2), 285–309 (1995)
Chin, W.W., Gopal, A.: Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database 26(2–3), 42–64 (1995)
Falk, R.F., Miller, N.B.: A Primer for Soft Modeling. University of Akron Press, Ohio (1992)
Lai, T.L.: Service quality and perceived value’s impact on satisfaction, intention and usage of short message service (SMS). Inf. Syst. Front. 6(4), 353–368 (2004)
Carte, T.A., Russell, C.J.: In pursuit of moderation: nine common errors and their solutions. MIS Q. 27(3), 479–501 (2003)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, D.Y., Li, G., Park, S.T. et al. A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. J Comput Virol Hack Tech 12, 151–161 (2016). https://doi.org/10.1007/s11416-015-0262-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-015-0262-y