The impact of credibility trust on user acceptance of software-as-a-service

This article was sponsored by Service Science Society of Taiwan. Abstract-Software as a Service (SaaS) provides the consumer with the capability to use the provider's applications running on a cloud infrastructure. However, The SaaS customer just receives access to the provider's applications running on a cloud infrastructure and has administrative control that is limited to customer-specific application configuration settings. It will not be possible to realize the full potential of the next generation of the Internet and Cloud Computing without developing better understanding of protecting data security and privacy. In order to offer more diagnostic and thus prescriptive advice, a more in-depth conceptualization of how credibility trust can influence on SaaS acceptance, this paper uses the UTAUT model and added the Credibility Trust (CT) construct which is based security and privacy issues to explain the degree of acceptance of SaaS users.

[1]  M. D. Wilkinson,et al.  Management science , 1989, British Dental Journal.

[2]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[3]  Rajeev R. Bhattacharya,et al.  A Formal Model of Trust Based on Outcomes , 1998 .

[4]  Thomas Hess,et al.  The Role of SaaS Service Quality for Continued SaaS Use: Empirical Insights from SaaS Using Firms , 2010, ICIS.

[5]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[6]  George A. Akerlof The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .

[7]  Dimitrios Zissis,et al.  Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..

[8]  J. E. Swan,et al.  Gaining Customer Trust: A Conceptual Guide for the Salesperson , 2013 .

[9]  Ann Cavoukian,et al.  Privacy in the clouds , 2008 .

[10]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[11]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[12]  Paul H. P. Yeow,et al.  User acceptance of Malaysian government multipurpose smartcard applications , 2009, Gov. Inf. Q..

[13]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[14]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[15]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[16]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[17]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[18]  N. Luhmann,et al.  Trust: Making and Breaking Cooperative Relations , 1990 .

[19]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[20]  Yi-Shun Wang,et al.  DETERMINANTS OF USER ACCEPTANCE OF INTERNET BANKING: AN EMPIRICAL STUDY , 2003 .

[21]  N. L. Chervany,et al.  What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .