Sharing and storage behavior via cloud computing: Security and privacy in research and practice

被引:42
作者
Alsmadi, Duha [1 ]
Prybutok, Victor [2 ]
机构
[1] UNT, Coll Informat, Denton, TX 76209 USA
[2] UNT, Coll Business, Denton, TX 76209 USA
关键词
Cloud computing; Information sharing and storage behavior; Perceived security; Perceived privacy; Peers influence; TECHNOLOGY ACCEPTANCE MODEL; USER ACCEPTANCE; UNIFIED THEORY; DETERMINANTS; ADOPTION; DIRECTIONS; INTENTION; EXTENSION; SERVICE; USAGE;
D O I
10.1016/j.chb.2018.04.003
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Cloud computing services (CCS) has altered information sharing and storage behavior. This study investigates this behavior and explores the paradox between industry reports and the academic CCS adoption literature. The majority of the academic literature shows that security and privacy beliefs are the major hindrances to wide adoption of CCS whilst multiple recent industrial reports state that security and privacy issues are no longer impediments to the use of CCS. The extensive sharing and storage of personal information among CCS regardless of any security and privacy concerns allows us to speculate about this paradox and provided insight for developing a cloud computing usage model. The posited model explores the influence of CCS main hindrances; that is, perceived security and perceived privacy, compared to the main determinants of technology adoption. The data was collected from 129 working professionals using a survey-based methodology. Contrary to the academic literature, the obtained results confirmed the hypotheses that cloud security and privacy concerns are not significant influences on information sharing and storage behavior. Peers influence was found a significant determinant of the behavior. The study contributes to the information systems and cloud computing literature and supports that the technology is perceived as able to protect user information. The analysis of the developed model provides multiple implications for researchers in academia and industry. Published by Elsevier Ltd.
引用
收藏
页码:218 / 226
页数:9
相关论文
共 55 条
  • [1] Abdollahzadegan A., 2013, Journal of Information Systems Research and Innovation JISRI, V4, P67
  • [2] AlAwadhi S., 2008, P 41 HAWAII INT C SY, P1, DOI DOI 10.1109/HICSS.2008.452
  • [3] Alharthi Abdulrahman, 2015, 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA 2015). Proceedings, P102
  • [4] Almadhoun N. M., 2011, IEEE INT C CONTR SYS, P426
  • [5] Alvi F. A., 2012, IAESJOURNAL, V2
  • [6] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [7] ESTIMATING NONRESPONSE BIAS IN MAIL SURVEYS
    ARMSTRONG, JS
    OVERTON, TS
    [J]. JOURNAL OF MARKETING RESEARCH, 1977, 14 (03) : 396 - 402
  • [8] Understanding and predicting students' intention to use mobile cloud storage services
    Arpaci, Ibrahim
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2016, 58 : 150 - 157
  • [9] Effects of security and privacy concerns on educational use of cloud services
    Arpaci, Ibrahim
    Kilicer, Kerem
    Bardakci, Salih
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2015, 45 : 93 - 98
  • [10] Bajwa M.S., 2015, INT J COMPUT APPL, V114, P17