Investigating consumers' reluctance to give up local hard drives after adopting the Cloud

Purpose The next phase of hardware technology development is focused on alternative ways to manage and store consumers’ personal content. However, even consumers who have adopted Cloud-based services have demonstrated a reluctance to move all of their personal content into the Cloud and continue to resist giving up local hard drives. This paper aims to investigate the characteristics of local hard drives and the Cloud that lead to simultaneous use. Design/methodology/approach This paper uses content analysis of online comments and ten depth interviews with simultaneous users of local hard drives and the Cloud. Findings Three factors influence the resistance to giving up local hard drives. Simultaneous users utilize local hard drives as a redundancy system and as a way to ensure the permanence of their digital content. They are unsure of the Cloud’s ability to support their content creation, management and storage activities (task-technology fit). Research limitations/implications Study findings are based on qualitative methods and thus the results cannot be considered conclusive. Practical implications The authors speculate that it is unlikely that Cloud-only will fully replace hard drives until these factors are understood and addressed by information technology developers. Cloud service providers may not be aware of how little that users understand the Cloud. In contrast to their certainty and confidence in local hard drives, simultaneous users are confused as to what the Cloud is and how it functions. This uncertainty exacerbates their risk perception and need for control. Originality/value This is the first study exploring simultaneous use of local hard drives and the Cloud with a view to understanding this behaviour in terms of the relative advantage of the incumbent technology over the new technology.

[1]  E. Reed The Ecological Approach to Visual Perception , 1989 .

[2]  Piers Wilson,et al.  Positive perspectives on cloud security , 2011, Inf. Secur. Tech. Rep..

[3]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[4]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[5]  Kevin A Hallgren,et al.  Computing Inter-Rater Reliability for Observational Data: An Overview and Tutorial. , 2012, Tutorials in quantitative methods for psychology.

[6]  Mark A. Earley,et al.  Reciprocity and Constructions of Informed Consent: Researching with Indigenous Populations , 2006 .

[7]  Srdjan Capkun,et al.  Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.

[8]  Dothang Truong How Cloud Computing Enhances Competitive Advantages: A Research Model for Small Businesses , 2010 .

[9]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[10]  Uwe Röhm,et al.  User Awareness and Policy Compliance of Data Privacy in Cloud Computing , 2013, AWC.

[11]  J. Brehm,et al.  Psychological Reactance: A Theory of Freedom and Control , 1981 .

[12]  Christopher R. Plouffe Examining “peer‐to‐peer” (P2P) systems as consumer‐to‐consumer (C2C) exchange , 2008 .

[13]  M. Landau Redundancy, Rationality, and the Problem of Duplication and Overlap , 1969 .

[14]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[15]  Ummaha Hazra,et al.  Interpreting simultaneous use of an existing technology and its replacement innovation , 2014 .

[16]  William Samuelson,et al.  Status quo bias in decision making , 1988 .

[17]  Paula Rosinski,et al.  Strange Bedfellows: Human-Computer Interaction, Interface Design, and Composition Pedagogy , 2009 .

[18]  Jonna Järveläinen,et al.  Distrust of One's Own Web Skills: A Reason for Offline Booking after Online Information Search , 2004, Electron. Mark..

[19]  Robert C. Nickerson,et al.  Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..

[20]  Hiroshi Ishii,et al.  The tangible user interface and its evolution , 2008, CACM.

[21]  E. Rogers,et al.  Diffusion of Innovations , 1964 .

[22]  Anat Rafaeli,et al.  Instrumentality, aesthetics and symbolism of physical artifacts as triggers of emotion , 2004 .

[23]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[24]  J. Fereday,et al.  Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development , 2006 .

[25]  Ananth Chiravuri,et al.  An Empirical Investigation of Cloud Computing for Personal Use , 2010 .

[26]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[27]  Dobrica Savic,et al.  Automatic classification of office documents: Review of available methods and techniques , 1995 .

[28]  Peter H. Bloch Seeking the Ideal Form: Product Design and Consumer Response , 1995 .

[29]  Eric K. Clemons,et al.  Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[30]  Maarten de Rijke,et al.  Extracting the discussion structure in comments on news-articles , 2007, WIDM '07.

[31]  Grant Mccracken Culture and Consumption: A Theoretical Account of the Structure and Movement of the Cultural Meaning of Consumer Goods , 1986 .

[32]  Ilze Zigurs,et al.  A Theory of Task/Technology Fit and Group Support Systems Effectiveness , 1998, MIS Q..

[33]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[34]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .

[35]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[36]  T. D. Wilson The e-book phenomenon: a disruptive technology , 2014, Inf. Res..

[37]  Pieter Verdegem,et al.  Rethinking determinants of ICT acceptance: Towards an integrated and comprehensive overview , 2011 .

[38]  D. Lehmann,et al.  Reactance to Recommendations: When Unsolicited Advice Yields Contrary Responses , 2004 .