An empirical study on business analytics affordances enhancing the management of cloud computing data security

被引:66
作者
Wang, Zhiying [1 ]
Wang, Nianxin [1 ]
Su, Xiang [1 ]
Ge, Shilun [1 ]
机构
[1] Jiangsu Univ Sci & Technol, Sch Econ & Management, Dept Informat Management, Zhenjiang, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Management of cloud computing data security; Business analytics affordances; Data security decision-making rationality; Data-driven culture; IT business process integration; BIG DATA; ORGANIZATIONAL CULTURE; INFORMATION; CAPABILITY; MODELS;
D O I
10.1016/j.ijinfomgt.2019.09.002
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The mechanism of business analytics affordances enhancing the management of cloud computing data security is a key antecedent in improving cloud computing security. Based on information value chain theory and IT affordances theory, a research model is built to investigate the underlying mechanism of business analytics affordances enhancing the management of cloud computing data security. The model includes business analytics affordances, decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and the management of cloud computing data security. Simultaneously, the model considers the role of data-driven culture and IT business process integration. It is empirically tested using data collected from 316 enterprises by Partial Least Squares-based structural equation model. Without data-driven culture and IT business process integration, the results suggest that there is a process from business analytics affordances to decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and to the management of cloud computing data security. Moreover, Data-driven culture and IT business process integration have a positive mediation effect on the relationship between business analytics affordances and decision-making affordances of cloud computing data security. The conclusions in this study provide useful references for the enterprise to strengthen the management of cloud computing data security using business analytics.
引用
收藏
页码:387 / 394
页数:8
相关论文
共 46 条
[1]  
Abbasi A, 2016, J ASSOC INF SYST, V17, pI
[2]  
Ackermann T., 2012, 33 INT C INF SYST OR, P1
[3]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[4]  
[Anonymous], INT J APPL ENG RES D
[5]  
[Anonymous], PAC AS C INF SYST
[6]  
[Anonymous], 24 EUR C INF SYST EC
[7]  
[Anonymous], 36 INT C INF SYST
[8]  
[Anonymous], WORLD ACAD SCI ENG T
[9]  
[Anonymous], 2013, IVEY BUSINESS J
[10]  
[Anonymous], 34 INT C INF SYST