Skip to main content
Log in

Factors affecting the continuous use of cloud service: focused on security risks

  • Published:
Cluster Computing Aims and scope Submit manuscript

An Erratum to this article was published on 14 May 2016

Abstract

Despite its many technology maturity and significant advantages, the cloud services are still far from success in the market. In accordance with some research, security risks have been regarded as the main factors that impede activating cloud service. Accordingly, this study divides the factors of security risk into Information leakage risk, Fault recovery risk, Compliance risk, Service interruption risk and made an empirical analysis of the impact of these four factors on continuous adoption intention. The effects of security risk and adoption intention of cloud service were analyzed via the moderation effects of trust. The analytical results of China data show that bo th Information Leakage Risk and Compliance Risk have negative impact on continuous adoption intention of cloud service. Neither Fault Recovery Risk nor Service Interruption Risk is significantly related with continuous adoption intention of cloud service. The analytical results of Korea data show that Fault Recovery Risk, Compliance Risk and Service Interruption Risk significantly impact continuous adoption intention of cloud service, whereas Information Leakage Risk insignificantly impact continuous adoption intention of the cloud service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cho, L.G., Park, M.C.: Technological-level evaluation using patent statistics: model and application in mobile communications. Clust. Comput. 18, 259–268 (2015)

    Article  MathSciNet  Google Scholar 

  2. Jarschel, M., Schlosser, D., Scheuring, S.: Gaming in the clouds: QoE and the users perspective. Math. Comput. Model. 57, 2883–2894 (2013)

    Article  Google Scholar 

  3. Casas, P., Schatz, R.: Quality of experience in cloud services: survey and measurements. Comput. Netw. 68(1), 149–165 (2014)

    Article  Google Scholar 

  4. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web. 15(4), 409–428 (2012)

    Article  Google Scholar 

  5. RightScale: 2015 State of the Cloud Report: See the Latest Cloud Computing Trends. http://www.rightscale.com/lp/2015-state-of-the-cloud-report (2015). Accessed 25 August 2015

  6. Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. In: Wireless Communications and Mobile Computing. http://onlinelibrary.wiley.com/doi/10.1002/wcm.1203/full (2011). Accessed 25 August 2015

  7. Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: 2011 IEEE International Conference on Cloud Computing, pp. 541–548. IEEE (2011)

  8. Phaphoom, N., Oza, N., Wang, X., Abrahamsson. P.: Does cloud computing deliver the promised benefits for IT industry?. In: Proceedings of the WICSA/ECSA 2012 Companion Volume, pp. 45–52. ACM. http://dx.doi.org/10.1145/2361999.2362007 (2012). Accessed 25 August 2015

  9. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM. 53(4), 50–58 (2010)

    Article  Google Scholar 

  10. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing—the business perspective. Decis. Support Syst. 51(1), 176–189 (2015). doi:10.1016/j.dss.2010.12.006

    Article  Google Scholar 

  11. Rafique, K., Tareen, A.W., Saeed, M., Wu, J.Z., Qureshi, S.S.: Cloud computing economics opportunities and challenges. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology. Shenzhen, 28–30, pp. 401-406 (2011) http://dx.doi.org/10.1109/ICBNMT.2011.6155965 (2011) Accessed 25 August 2015

  12. Goodburn, M.A., Hill, S.: The cloud transforms business. Financ. Exec. 26(10), 34–39 (2010)

    Google Scholar 

  13. Harris, J., Grandgenett, N., Hofer, M.: Testing a TPACK-based technology integration assessment rubric. In: Maddux, C.D. (ed.) Research Highlights in Technology and Teacher Education 2010, pp. 323–331. Society for Information Technology & Teacher Education (SITE), Chesapeake (2010)

  14. Jasti, H., Hanusa, B.H., Switzer, G.E., Granieri, R., Elnicki, M.: Residents’ perceptions of a night float system. BMC Med. Educ. 2009 9(52) doi:10.1186/1472-6920-9-52 (2009). Accessed 25 August (2015)

  15. Mladenow, A., Fuchs, E., Dohmen, P., Strauss, C.: Value creation using clouds: analysis of value drivers for start-ups and small and medium sized enterprises in the textile industry. In: 26th International Conference on Advanced Information Networking and Applications Workshops 2012, pp. 1215–1220. IEEE (2012)

  16. Marko, K.: 2014 State of Storage. http://reports.informationweek.com/abstract/24/12015/Storage-Server/Research:-2014-State-of-Storage (2014). Accessed 25 August (2015)

  17. Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17, 703–710 (2014)

    Article  Google Scholar 

  18. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. US Nat’l Inst. of Science and Technology. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (2011). Accessed 25 August 2015

  19. Haghighat, M., Zonouz, S., Abdel-Mottaleb, M.: CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 42(21), 7905–7916 (2015)

    Article  Google Scholar 

  20. Hamadaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. In: Ali, H., Atif, M. (eds.) Advances in Computers, vol.86, pp. 41–85 (2012)

  21. Hussain, M., Abdulsalam, H.M.: Software quality in the clouds: a cloud-based solution. Clust. Comput. 17, 389–402 (2014)

    Article  Google Scholar 

  22. Stamford, C.: Gartner Says Public Cloud Services Are Simultaneously Cannibalizing and Stimulating Demand for External IT Services Spending. http://www.gartner.com/newsroom/id/2220715 (2014). Accessed 25 August (2015)

  23. Ratansingham, P., Kumer, K.: Trading partner trust in electronic commerce participation. In: Proceeding of the 22nd International Conference on Information systems, pp. 544–552 (2000)

  24. Kim, K.K., Lee, J.W., Kim, H.S.: Impact of trust and risk on internet banking adoption. Korean Manag. Rev. 32(6), 1771–1797 (2003)

    Google Scholar 

  25. Jarvenpaa, S.L., Knoll, K., Leidner, D.E.: Is anybody out there? Antecedents of trust in global virtual teams. J. Manag. Inf. Syst. 14(4), 29–64 (1998)

    Article  Google Scholar 

  26. Lim, N.: Consumer’s Perceived Risk: Sources versus Consequences. Electron. Commer. Res. Appl. 2(3), 216–228 (2003)

    Article  Google Scholar 

  27. Ahn, J.H., Choi, K.C., Sung, K.M., Lee, J.H.: A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust. In: International Conference on Information systems, vol.15

  28. Hexin, Y., Ahn, J.C.: An empirical analysis on the persistent usage of personal cloud service: a cast study of China. Proc. Korean Soc. Internet Inf. Conf. 15(2), 149–150 (2014)

    Google Scholar 

  29. Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor affecting the continuous use of cloud storage service: user factor, system factor, psychological switching cost factor. J. Soc. e-Bus. Stud. 19(1), 15–42 (2014)

    Article  Google Scholar 

  30. Seo, K.K.: Factor analysis of the cloud service adoption intension of Korean firms: applying the TAM and VAM. J. Digit Policy Manag. 11(12), 155–160 (2013)

    Google Scholar 

  31. Park, C.S.: Study on security considerations in the cloud computing. J Korea Acad.-Ind. Co-op. Soc. 12(3), 1408–1416 (2011)

    Google Scholar 

  32. Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)

  33. Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing. Gartner (2008)

  34. Almond, C.: A Practical Guide to Cloud Computing Security What You Need to Know Now About Your Business and Cloud Security, pp. 6–27. Avanade Inc. (2009)

  35. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  36. Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and eucalyptus. Cloud computing. In: IEEE International Conference, pp. 151–154 (2009). Accessed 25 August (2015)

  37. Tarrant, D., Brody, T., Carr, L.: From the desktop to the cloud: leveraging hybrid storage architectures in your repository. In: International Conference on Open Repositories. http://eprints.soton.ac.uk/267084/1/or09.pdf (2009). Accessed 25 August (2015)

  38. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

  39. Liu, C., Marchewka, J.T., Lu, J., Yu, C.S.: Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42, 289–304 (2005)

    Article  Google Scholar 

  40. Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877–886 (2006)

    Article  Google Scholar 

  41. Liao, C., Liu, C.C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron. Commer. Res. Appl. 10, 702–715 (2011)

    Article  Google Scholar 

  42. Rho, M.J., Kim, H.S., Chung, K.Y., Choi, I.Y.: Factors influencing the acceptance of telemedicine for diabetes management. Clust. Comput. 18, 321–331 (2015)

    Article  Google Scholar 

  43. Ajzen, I.: The theory of planned behavior. Org. Behav. Hum. Decis. Process. 50, 179–211 (1991)

    Article  Google Scholar 

  44. Barnes, S., Bohringer, M.: Modeling user continuance behavior in microblogging services: the case of Twitter. J. Comput. Inf. Syst. 51(4), 1–10 (2011)

    Google Scholar 

  45. Burtescu, E.: Reliability and security—convergence or divergence. Inf. Econ. 14(4), 68–77 (2010)

    Google Scholar 

  46. Weber, R.: Ontological Foundations of Information Systems. Buscombe Vicprint, Blackburn, Victoria (1997)

    Google Scholar 

  47. Rotter, J.B.: A new scale for measurement of interpersonal trust. J. Personal. 35(4), 651–665 (1967)

    Article  Google Scholar 

  48. Wiliamson, M.: Invaders, weeds and the risk from genetically modified organisms. Experientia 49, 219–224 (1993)

    Article  Google Scholar 

  49. Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998)

    Article  Google Scholar 

  50. Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)

    Google Scholar 

  51. Grazioli, S., Jarvenpaa, S.: Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395–410 (2000)

  52. John, W.R., James, F.R.: Cloud Computing: Implementation, Management and Security. CRC Press (2010)

  53. Savola.: The Savola Group Annual Report 2010. http://www.savola.com/SavolaE/pdf/Savola_Annual_Report_2010_E.pdf (2010). Accessed 25 August (2015)

  54. Davis, F.D.: Perceived Usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)

    Article  Google Scholar 

  55. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186–204 (2000)

    Article  Google Scholar 

  56. Hansmann, K.W., Ringle, C.M.: SmartPLS Manual. http://forum.smartpls.com/viewtopic.php?f=2&t=1700 (2004). Accessed 25 August (2015)

  57. Hulland, J.: Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg. Manag. J. 20(2), 195–204 (1999)

    Article  Google Scholar 

  58. Fornell, C., Cha, J.: Partial least squares. In: Bagozzi, R.P. (ed.) Advanced Methods in Marketing Research, pp. 52–78. Blackwell, Cambridge (1994)

    Google Scholar 

  59. Fornell, C., Larcker, D.: Structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guozhong Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, ST., Park, EM., Seo, JH. et al. Factors affecting the continuous use of cloud service: focused on security risks. Cluster Comput 19, 485–495 (2016). https://doi.org/10.1007/s10586-015-0516-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-015-0516-y

Keywords

Navigation