Explaining the Role of Trust in Cloud Service Acquisition

Effective digital identity management system is a critical enabler of cloud computing, since it supports the provision of the required assurances to the transacting parties. Such assurances sometimes require the disclosure of sensitive personal information. Given the prevalence of various forms of identity abuses on the Internet, a re-examination of the factors underlying cloud services acquisition has become critical and imperative. In order to provide better assurances, parties to cloud transactions must have confidence in service providers' ability and integrity in protecting their interest and personal information. Thus a trusted cloud identity ecosystem could promote such user confidence and assurances. Using a qualitative research approach, this paper explains the role of trust in cloud service acquisition by organizations. The paper focuses on the processes of acquisition of cloud services by financial institutions in Ghana. The study forms part of comprehensive study on the monetization of personal Identity information.

[1]  E. Deci,et al.  Self-determination in a work organization. , 1989 .

[2]  Maria Dolores C. Tongco,et al.  Purposive Sampling as a Tool for Informant Selection , 2007 .

[3]  R. Hinson,et al.  Internet banking: an initial look at Ghanaian Bank Consumer Perceptions , 2008 .

[4]  Thomas H. Jerdee,et al.  Influence of subordinate characteristics on trust and use of participative decision strategies in a management simulation. , 1977 .

[5]  Henning Olesen,et al.  Keeping Identity Private , 2011, IEEE Vehicular Technology Magazine.

[6]  Mark de Reuver,et al.  Mobile cloud computing: state of the art and outlook , 2013 .

[7]  Ruth Ann Hattori,et al.  Collaboration, trust and innovative change , 2004 .

[8]  Stuart Hannabuss,et al.  The Big Switch: Rewiring the World, from Edison to Google , 2009 .

[9]  Jan Camenisch,et al.  Information privacy?! , 2012, Comput. Networks.

[10]  Etienne Wenger,et al.  Situated Learning: Legitimate Peripheral Participation , 1991 .

[11]  Donna L. Hoffman,et al.  Bridging the Digital Divide: The Impact of Race on Computer Access and Internet Use. , 1998 .

[12]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[13]  Thompson S. H. Teo,et al.  Citizen Trust Development for E-Government Adoption and Usage: Insights from Young Adults in Singapore , 2009, Commun. Assoc. Inf. Syst..

[14]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[15]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.

[16]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[17]  K. Weick The social psychology of organizing , 1969 .

[18]  Rowena Cullen,et al.  Addressing the digital divide , 2001, Online Inf. Rev..

[19]  Madjid Merabti,et al.  Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .

[20]  M. Brian Blake,et al.  Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.

[21]  J. Adjei Towards a trusted national identities framework , 2013 .

[22]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[23]  R. Schaller,et al.  Moore's law: past, present and future , 1997 .

[24]  E. Murphy,et al.  A proposed cooperation framework for organisations and their leaders , 2012 .

[25]  T. Grance,et al.  SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .

[26]  Diego Gambetta Can We Trust Trust , 2000 .

[27]  Milton L. Mueller,et al.  Digital Convergence and its Consequences , 1999 .

[28]  Byungjoo Park,et al.  Future Directions of Information and Telecommunication Systems Through the Technological Advancement Convergence , 2013 .

[29]  Ann Cavoukian,et al.  Privacy in the clouds , 2008 .

[30]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[31]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[32]  Peter F. Green,et al.  On governance structures for cloud resources and assessing their effectiveness , 2013 .

[33]  Li Jiang,et al.  Trust and Electronic Government Success: An Empirical Study , 2008, J. Manag. Inf. Syst..

[34]  Denzil Ferreira,et al.  Ubiquitous mobile instrumentation , 2013, UbiComp.

[35]  R. Burt The contingent value of social capital. , 1997 .