Does the Augmentation of Service Level Agreements Affect User Decisions in Cloud Adoption Scenarios? - an Experimental Approach

Despite the benefits of cloud computing, customers are reluctant to use cloud services as they have concerns about data security and privacy. Many of these concerns arise due to the lack of transparency. Consequently, bridging the existing information asymmetry and, thus, fostering trust in the cloud provider is of high relevance. As service level agreements are an important trust building factor and due to their technical and complex nature, the augmentation of these is promising. Therefore, we investigate the effects of augmenting service level agreements (by means of augmented browsing) on the ease of the information gathering process and simultaneously on perceived information overload, comprehension and transparency in a web-based experiment. The results of our online experiment do not confirm our assumed positive effects of augmentation. Nonetheless, we show that the ease of gathering information about a cloud service positively influences the perceived trustworthiness. Furthermore, we demonstrate that the perceived trustworthiness of a cloud computing provider largely determines the intention to use its services. Thus, besides improving security, cloud providers not only have to communicate trust-critical information but also have to identify suitable measures of information provisioning that considerably improve transparency while lowering information overload.

[1]  Dirk Neumann,et al.  Dynamic Service Level Agreement Management for Efficient Operation of Elastic Information Systems , 2011, ICIS.

[2]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[3]  M. Frohlich,et al.  Arcs of integration: an international study of supply chain strategies , 2001 .

[4]  J. D. Fletcher,et al.  The Multimedia Principle. , 2005 .

[5]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[6]  Cynthia Clark Williams,et al.  Trust Diffusion: The Effect of Interpersonal Trust on Structure, Function, and Organizational Transparency , 2005 .

[7]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[8]  Darren Carlson,et al.  Towards Augmenting Legacy Websites with Context-Awareness , 2013, MobiQuitous.

[9]  Walter Kintsch,et al.  Comprehension: A Paradigm for Cognition , 1998 .

[10]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[11]  T. Yamagishi,et al.  Trust and commitment in the United States and Japan , 1994 .

[12]  Wen-Lian Hsu,et al.  Enhancing Search Results with Semantic Annotation Using Augmented Browsing , 2011, IJCAI.

[13]  Herbert A. Simon,et al.  Why a Diagram is (Sometimes) Worth Ten Thousand Words , 1987, Cogn. Sci..

[14]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[15]  Wojciech Rutkowski,et al.  Domain Based Semantic Compression for Automatic Text Comprehension Augmentation and Recommendation , 2011, ICCCI.

[16]  Richard Burns,et al.  Business Research Methods and Statistics Using SPSS , 2008 .

[17]  Jason W. Osborne,et al.  Best practices in exploratory factor analysis: four recommendations for getting the most from your analysis. , 2005 .

[18]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[19]  Roger M. Heeler,et al.  Measure Validation in Marketing , 1972 .

[20]  John Zimmerman,et al.  Media Augmentation and Personalization Through Multimedia Processing and Information Extraction , 2004, Personalized Digital Television.

[21]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[22]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[23]  Katinka M. Bijlsma-Frankema,et al.  Understanding the Trust-Control Nexus , 2005 .

[24]  Nabil Ahmed Sultan,et al.  International Journal of Information Management , 2010 .

[25]  Mark Ryan,et al.  Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.

[26]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[27]  Mirjam van Praag,et al.  The Effects of Performance Measurement and Compensation on Motivation: An Empirical Study , 2003 .

[28]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[29]  Anne Morris,et al.  The problem of information overload in business organisations: a review of the literature , 2000, Int. J. Inf. Manag..

[30]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[31]  Frank Teuteberg,et al.  "May I help You?" Increasing Trust in Cloud Computing Providers through Social Presence and the Reduction of Information Overload , 2014, ICIS.

[32]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[33]  Elisa Bertino,et al.  A roadmap for comprehensive online privacy policy management , 2007, CACM.

[34]  Krishnendu Roy,et al.  An SLA-based Framework for Estimating Trustworthiness of a Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[35]  Lawrence A. Gordon,et al.  Information overload: A temporal approach☆ , 1990 .

[36]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[37]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[38]  Ulf-Dietrich Reips Standards for Internet-based experimenting. , 2002, Experimental psychology.

[39]  Michael L. Tushman,et al.  Information Processing as an Integrating Concept in Organizational Design. , 1978 .

[40]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[41]  Paul Sparrow,et al.  Strategy and cognition: understanding the role of management knowledge structures, organizational memory and information overload , 1999 .

[42]  N. Luhmann,et al.  Trust: Making and Breaking Cooperative Relations , 1990 .

[43]  John D. Lee,et al.  Trust in Automation: Designing for Appropriate Reliance , 2004 .

[44]  Björn Niehaves,et al.  Reconstructing the giant: On the importance of rigour in documenting the literature search process , 2009, ECIS.

[45]  Jason Bennett Thatcher,et al.  Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.

[46]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[47]  Lora Aroyo,et al.  The effects of transparency on trust in and acceptance of a content-based art recommender , 2008, User Modeling and User-Adapted Interaction.

[48]  Michael J. Shaw,et al.  Buyers' Choice of Online Search Strategy and Its Managerial Implications , 2006, J. Manag. Inf. Syst..

[49]  Subhash Sharma,et al.  Consumer Ethnocentrism: Construction and Validation of the CETSCALE , 1987 .

[50]  H. Ritter,et al.  Processing and Integrating Multimodal Material — The Influence of Color-Coding , 2005 .

[51]  N. Malhotra Reflections on the Information Overload Paradigm in Consumer Decision Making , 1984 .

[52]  A. Zaheer,et al.  Does Trust Matter? Exploring the Effectsof Interorganizational and Interpersonaltrust on Performance , 1998 .

[53]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[54]  Matteo Turilli,et al.  The ethics of information transparency , 2009, Ethics and Information Technology.

[55]  Gary L. Hunter,et al.  Salespersons’ Information Overload: Scale Development, Validation, and its Relationship to Salesperson Job Satisfaction and Performance , 2008 .

[56]  Jonas Repschläger Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics , 2013, GPC.

[57]  Rajeev Sharma,et al.  Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .

[58]  Katsumi Tanaka,et al.  Content Augmentation and Webification for Enhancing TV Viewing , 2005, ICADL.

[59]  Katherine Gallagher,et al.  A Tale of Two Studies: Replicating ‘Advertising Effectiveness and Content Evaluation in Print and on the Web’ , 2001, Journal of Advertising Research.

[60]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[61]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[62]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[63]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[64]  Jay R. Galbraith Organization Design: An Information Processing View , 1974 .

[65]  D. Straub,et al.  Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .

[66]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[67]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[68]  Izak Benbasat,et al.  Addressing the What and How of Online Services: Positioning Supporting-Services Functionality and Service Quality for Business-to-Consumer Success , 2008, Inf. Syst. Res..

[69]  Bu-Sung Lee,et al.  TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[70]  Katharina Scheiter,et al.  Picture or Text First? Explaining Sequence Effects when Learning with Pictures and Text , 2015 .

[71]  J. Zaichkowsky Measuring the Involvement Construct , 1985 .

[72]  Karl Kurbel,et al.  Service Level Agreement as an Instrument to Enhance Trust in Cloud Computing - An Analysis of Infrastructure-as-a-Service Providers , 2012, AMCIS.

[73]  Joelle Pineau,et al.  Automatically suggesting topics for augmenting text documents , 2010, CIKM.

[74]  Helen Kelley,et al.  Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..

[75]  P. Barrett Structural equation modelling : Adjudging model fit , 2007 .

[76]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[77]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[78]  Frank Teuteberg,et al.  Augmented Sustainability Reports: A Design Science Approach , 2012 .

[79]  Izak Benbasat,et al.  The Influence of Multimedia on Improving the Comprehension of Organizational Information , 2002, J. Manag. Inf. Syst..