Sharing and storage behavior via cloud computing: Security and privacy in research and practice

Abstract Cloud computing services (CCS) has altered information sharing and storage behavior. This study investigates this behavior and explores the paradox between industry reports and the academic CCS adoption literature. The majority of the academic literature shows that security and privacy beliefs are the major hindrances to wide adoption of CCS whilst multiple recent industrial reports state that security and privacy issues are no longer impediments to the use of CCS. The extensive sharing and storage of personal information among CCS regardless of any security and privacy concerns allows us to speculate about this paradox and provided insight for developing a cloud computing usage model. The posited model explores the influence of CCS main hindrances; that is, perceived security and perceived privacy, compared to the main determinants of technology adoption. The data was collected from 129 working professionals using a survey-based methodology. Contrary to the academic literature, the obtained results confirmed the hypotheses that cloud security and privacy concerns are not significant influences on information sharing and storage behavior. Peers influence was found a significant determinant of the behavior. The study contributes to the information systems and cloud computing literature and supports that the technology is perceived as able to protect user information. The analysis of the developed model provides multiple implications for researchers in academia and industry.

[1]  V. Ratten A US-China comparative study of cloud computing adoption behavior , 2014 .

[2]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[3]  John H. Grant,et al.  Construct Measurement in Organizational Strategy Research: A Critique and Proposal , 1986 .

[4]  Sung Yul Ryoo,et al.  An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective , 2013, Comput. Hum. Behav..

[5]  E. Oster,et al.  DETERMINANTS OF TECHNOLOGY ADOPTION: PEER EFFECTS IN MENSTRUAL CUP TAKE-UP , 2012 .

[6]  Suha AlAwadhi,et al.  The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[7]  Garry L. White Education and Prevention Relationships on Security Incidents for Home Computers , 2015, J. Comput. Inf. Syst..

[8]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[9]  J. Hair Multivariate data analysis : a global perspective , 2010 .

[10]  Andree E. Widjaja,et al.  Using Cloud Computing Service: A Perspective from Users’ Information Security, Privacy Concern, and Trust , 2012 .

[11]  E. Straub Understanding Technology Adoption: Theory and Future Directions for Informal Learning , 2009 .

[12]  George Pallis,et al.  Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.

[13]  Jeanna Neefe Matthews,et al.  The good, the bad and the ugly of consumer cloud storage , 2010, OPSR.

[14]  Gary B. Wills,et al.  An Overview of Cloud Services Adoption Challenges in Higher Education Institutions , 2015, ESaaSA@CLOSER.

[15]  E. Carvajal-Trujillo,et al.  Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model , 2014 .

[16]  Mika Immonen,et al.  Evolution of technology perceptions over time , 2015, Inf. Technol. People.

[17]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[18]  Yeoh Sok Foon,et al.  Internet Banking Adoption in Kuala Lumpur: An Application of UTAUT Model , 2011 .

[19]  J. Scott Armstrong,et al.  Estimating nonresponse bias in mail surveys. , 1977 .

[20]  Anol Bhattacherjee,et al.  Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..

[21]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[22]  Ekaba Bisong What Is Cloud Computing , 2019 .

[23]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[24]  Tuncay Ercan,et al.  Effective use of cloud computing in educational institutions , 2010 .

[25]  Victor R. Prybutok,et al.  Product quality vs service quality in the mobile industry: Is there a dominant driver of customer intention to switch providers? , 2014, Operations Management Research.

[26]  Eunil Park,et al.  An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Technology Acceptance Model , 2014, Telematics Informatics.

[27]  Himani,et al.  A Concern towards Data Security in Cloud Computing , 2015 .

[28]  Ab Razak Che Hussin,et al.  The Organizational Critical Success Factors for Adopting Cloud Computing in SMEs , 2013 .

[29]  Ibrahim Arpaci,et al.  Understanding and predicting students' intention to use mobile cloud storage services , 2016, Comput. Hum. Behav..

[30]  Annie I. Antón,et al.  Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.

[31]  M. Rosenzweig,et al.  Microeconomics of Technology Adoption. , 2010, Annual review of economics.

[32]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[33]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[34]  Ibrahim Arpaci,et al.  Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..

[35]  T. Oliveira,et al.  Information technology adoption models at firm level: review of literature. , 2010 .

[36]  Tiago Oliveira,et al.  Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..

[37]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[38]  Douglas R. Vogel,et al.  Predicting user acceptance of collaborative technologies: An extension of the technology acceptance model for e-learning , 2013, Comput. Educ..

[39]  Kai-Ying Chen,et al.  User acceptance of ‘near field communication’ mobile phone service: an investigation based on the ‘unified theory of acceptance and use of technology’ model , 2013 .

[40]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[41]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[42]  K. Jöreskog,et al.  Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .

[43]  H. Harman Modern factor analysis , 1961 .

[44]  Robin L. Wakefield The Acceptance and Use of Innovative Technology: Do Positive and Negative Feelings Matter? , 2015, DATB.

[45]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[46]  N. Kshetri Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .

[47]  Gavriel Salvendy,et al.  Perceived security determinants in e-commerce among Turkish university students , 2005, Behav. Inf. Technol..

[48]  Ali Sunyaev,et al.  Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents , 2016, DATB.