Why Do Users Continue to Use Mobile Cloud Computing Applications? A Security-Privacy

Mobile cloud computing (MCC) apps are mobile apps that use cloud computing technology to provide larger storage capacity and simultaneous access from different mobile devices. Despite the benefits, sending data to the cloud raises security and privacy concerns as mobile users do not have direct control over their data in the cloud. Further, many MCC apps are not used just after single use. In this study, we do a cost/benefit analysis based on security and privacy to investigate the factors that drive or inhibit mobile users to continue to use MCC apps. Additionally, we examine whether security and privacy interventions of MCC apps providers influence the cost/benefit analysis. The results of the survey with 412 MCC apps users show that while security concerns inhibit, privacy concerns do not stop using MCC apps. The value of MCC apps is the main enabler followed by trust to continue to use the apps. The results also show that security and privacy interventions do not add value to MCC apps, but they increase trust. These interventions decrease privacy concerns but have no effect on security concerns. Finally, these interventions indirectly drive users to continue to use the apps through trust.

[1]  Victor R. Prybutok,et al.  Sharing and storage behavior via cloud computing: Security and privacy in research and practice , 2018, Comput. Hum. Behav..

[2]  Viswanath Venkatesh,et al.  User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach , 2017, MIS Q..

[3]  Edoardo M. Airoldi,et al.  Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook , 2016, Inf. Syst. Res..

[4]  Paul Benjamin Lowry,et al.  Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications , 2016, AIS Trans. Hum. Comput. Interact..

[5]  Fatemeh Zahedi,et al.  Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..

[6]  David Gefen,et al.  The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..

[7]  Yong Liu,et al.  Modeling hedonic is continuance through the uses and gratifications theory: An empirical study in online games , 2015, Comput. Hum. Behav..

[8]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[9]  Jörg Henseler,et al.  Consistent Partial Least Squares Path Modeling , 2015, MIS Q..

[10]  Ibrahim Arpaci,et al.  Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..

[11]  Merrill Warkentin,et al.  An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..

[12]  T. Aaron Gulliver,et al.  ISPC: An Information Security, Privacy, and Compliance Readiness Model for Cloud Computing Services , 2014 .

[13]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[14]  Frank Teuteberg,et al.  The role of trust and risk perceptions in cloud archiving — Results from an empirical study , 2014 .

[15]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[16]  Sandeep Sharma,et al.  Secure Cloud Architecture for Preserving Privacy in Cloud Computing Using OTP/WTP , 2013 .

[17]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[18]  Ting Li,et al.  Willing to pay for quality personalization? Trade-off between quality and privacy , 2012, Eur. J. Inf. Syst..

[19]  Kevin W. Hamlen,et al.  AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  David C. Yen,et al.  The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..

[21]  Oliver Günther,et al.  Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture , 2012, WI 2012.

[22]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[23]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[24]  Chechen Liao,et al.  Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model , 2011, Electron. Commer. Res. Appl..

[25]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .

[26]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[27]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[28]  Rathindra Sarathy,et al.  Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..

[29]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[30]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[31]  Ronald T. Cenfetelli,et al.  Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..

[32]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[33]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[34]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[35]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[36]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[37]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[38]  Robin L. Wakefield,et al.  Mobile computing: a user study on hedonic/utilitarian mobile device usage , 2006, Eur. J. Inf. Syst..

[39]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[40]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[41]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[42]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[43]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[44]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .