Skip to main content
Log in

A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis

  • Short Contribution
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

This paper analyzed the effects of security risk factors fit for cloud computing paradigm on the acceptance of enterprise cloud service with intent to illuminate the factors for vitalizing the adoption of corporate cloud services in the future. The acceptance intention was set as a dependent variable. Independent variables were set in reference to the technology acceptance theory. Security risks were categorized into compliance risk, information leakage risk, troubleshooting risk and service discontinuation risk to design a model for analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

References

  1. Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’–a forensic computing perspective. J. Comput. Virol. Hack. Tech. 9(1), 27–33 (2013)

    Article  Google Scholar 

  2. Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hack. Tech. 11(3), 149–155 (2015)

    Article  Google Scholar 

  3. Choi, S.: Study on model fostering for cloud service brokerage. J. Comput. Virol. Hack. Tech. 11(3), 181–192 (2015)

    Article  Google Scholar 

  4. Barakat, O.L., Hashim, S.J., Abdullah, R.S.A.B.R., Ramli, A.R., Hashim, F., Samsudin, K., Ab Rahman, M.: Malware analysis performance enhancement using cloud computing. J. Comput. Virol. Hack. Tech. 10(1), 1–10 (2013)

  5. Mullins, R.: IDC Survey: Risk in the Cloud. http://www.networkcomputing.com/cloud-infrastructure/idc-survey-risk-in-the-cloud/d/d-id/1231608? (2010)

  6. Johnston, S.: Cloud computing types: public cloud. Hybrid cloud. Private cloud, CircleID (2009)

  7. Gu, S.H., Kim, D.W., Park, C.M., Kim, K.H.: Influence of LTE characteristic and personal innovativeness on LTE smart phone acceptance. J. Digit. Contents Soc. 14(3), 291–301 (2013)

    Article  Google Scholar 

  8. Park, E., Pobil, A.P.: Technology acceptance model for the use of tablet PCs. Wirel. Pers. Commun. 73(4), 1561–1572 (2013)

    Article  Google Scholar 

  9. Cheong, J.H., Park, M.C.: Mobile internet acceptance in Korea. Internet Res. 15(2), 125–140 (2005)

    Article  Google Scholar 

  10. Carlsson, C., Hyvönen, K., Repo, P., Walden, P.: Adoption of mobile services across different technologies. In: 18th Bled Conference on Integration in Action, pp. 1–13 (2005)

  11. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)

    Article  Google Scholar 

  12. Fishbein, M., Ajzen, I.B.: Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)

    Google Scholar 

  13. Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)

  14. Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Report (2008)

  15. Carl, A.: A Practical Guide to Cloud Computing Security. A white paper from Accenture and Microsoft. Avanade Inc., Seattle. http://www.avanade.com/~/media/documents/research%20and%20insights/practicalguidetocloudcomputingsecurity574834.pdf (2009)

  16. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gen. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  17. Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and Eucalyptus. In: Cloud Computing. IEEE International Conference on 2009, pp. 151–154 (2009)

  18. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2010)

    Article  Google Scholar 

  19. Services. AWS Security Whitepaper. https://appirio.com/pdf/amazon-web-services-security.pdf (2008)

  20. John, W.R., James, F.R.: Cloud Computing: Implementation. Management and Security. CRC Press, New York (2010)

    Google Scholar 

  21. Tarrant, D., Brody, T., Carr, L.: From the desktop to the cloud: leveraging hybrid storage architectures in your repository. In: International Conference on Open Repositories (2009)

  22. Lee, G.G., Noh, Y.: An effect of innovation characteristics on perceived usefulness and ease of use in the internet banking. e-Bus. Stud. 7(3), 85–107 (2006)

    Google Scholar 

  23. Featherman, M.S., Fuller, M.: Applying TAM to e-services adoption: the moderating role of perceived risk. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)

  24. Wu, J.H., Wang, S.C.: What drives mobile commerce, an empirical evaluation of the revised technology acceptance model. Inf. Manag. 42(5), 719–729 (2005)

    Article  Google Scholar 

  25. Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce 7(3), 101–134 (2003)

    Google Scholar 

  26. Lui, H.K., Jamieson, R.: Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. In: ECIS, pp. 1154–1170 (2003)

  27. Tan, M., Teo, T.S.H.: Factors influencing the adoption of internet banking. J. Assoc. Inf. Syst. 1(5), 1–42 (2000)

    Google Scholar 

  28. Agarwal, R., Prasad, J.A.: Conceptual and operational definition of personal innovativeness in the domain of IT. Inf. Syst. Res. 9(2), 204–215 (1998)

    Article  Google Scholar 

  29. Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 19(2), 189–211 (1995)

    Article  Google Scholar 

  30. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111–1132 (1992)

    Article  Google Scholar 

  31. Taylor, S., Todd, P.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144–176 (1995)

    Article  Google Scholar 

  32. Thompson, A.M., Brown, J.C., Kay, J.W., Titterington, D.M.: A study of methods of choosing the smoothing parameter in image restoration by regularization. IEEE Trans. Pattern Anal. Mach. Intell. 13, 326–339 (1991)

  33. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186–204 (2000)

    Article  Google Scholar 

  34. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)

    Google Scholar 

  35. Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24(1), 115–139 (2000)

    Article  Google Scholar 

  36. Lee, J.Y.: Characteristics of cloud computing and current status of services provided by business operator. Inf. Soc. Dev. Res. 22(6), 1–22 (2010)

    Google Scholar 

  37. Pavlou, P., Gefen, D.: Building effective online marketplaces with institution-based trust. Inf. Syst. Res. 15(1), 37–59 (2004)

    Article  Google Scholar 

  38. Grazioli, S., Jarvenpaa, S.: Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395–410 (2000)

    Article  Google Scholar 

  39. Lau, G.T., Lee, S.H.: Consumers’ trust in a brand and the link to brand loyalty. J. Mark. Focus. Manag. 4, 341–370 (1999)

    Article  Google Scholar 

  40. The Savola Group: 2010 annual report. http://www.savola.com/SavolaE/pdf/Savola_Annual_Report_2010_E.pdf (2010)

  41. Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)

    Article  Google Scholar 

  42. Nunnally, J.: Psychometric Theory. McGraw-Hill, New York (1978)

    Google Scholar 

  43. Barclay, D., Higgins, C., Thompson, R.: The partial least squares (PLS) approach to causal modeling: personal computer adoption and use as an illustration. Technol. Stud. 2(2), 285–309 (1995)

    Google Scholar 

  44. Chin, W.W., Gopal, A.: Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database 26(2–3), 42–64 (1995)

    Article  Google Scholar 

  45. Falk, R.F., Miller, N.B.: A Primer for Soft Modeling. University of Akron Press, Ohio (1992)

    Google Scholar 

  46. Lai, T.L.: Service quality and perceived value’s impact on satisfaction, intention and usage of short message service (SMS). Inf. Syst. Front. 6(4), 353–368 (2004)

    Article  Google Scholar 

  47. Carte, T.A., Russell, C.J.: In pursuit of moderation: nine common errors and their solutions. MIS Q. 27(3), 479–501 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mi Hyun Ko.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, D.Y., Li, G., Park, S.T. et al. A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. J Comput Virol Hack Tech 12, 151–161 (2016). https://doi.org/10.1007/s11416-015-0262-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-015-0262-y

Keywords

Navigation