Abstract
This research offers a constitutive, mixed-method approach in order to identify trust-influencing and -influenced factors in cloud computing, which should lead to a fundamental understanding of the formation and retention of trust in cloud computing. In cloud computing, sensitive data and whole processes are transferred and outsourced to the cloud provider, without necessitating face-to-face communication with a sales assistant. We find the research methods literature review, laboratory experimental research, semi-structured expert interviews, surveys, vignettes, and (retrospective) think aloud complemented by neuroscientific methods to be suitable to reach the target set. Since vignettes, think aloud and neuroscientific methods are underrepresented or rather new to the information systems domain, in this contribution we pay special attention on these. Our mixed-method approach has the ability to verify, reaffirm, and refine theories affected by cloud computing or even to create new ones. Based on the findings of this research, recommendations for actions as well as implications for users and providers alike can be deduced. Since we rely on triangulation of the data set, the limitations of the whole approach reflect the limitations of each applied research method. Preliminary results indicate that 76% of cloud users focus primarily on data security, whereas 58% name the price of a certain cloud computing service to be relevant to provider selection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Walterbusch, M., Martens, B., Teuteberg, F.: Exploring Trust in Cloud Computing: A Multi-Method Approach. In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013). Utrecht (2013)
Benlian, A., Hess, T.: The Signaling Role of IT Features in Influencing Trust and Participation in Online Communities. International Journal of Electronic Commerce 15, 7–56 (2011)
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 618–644 (2007)
Gefen, D., Straub, D.W.: Managing User Trust in B2C e-Services. Florida Libraries 2, 7–24 (2003)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing - Recommendations of the National Institute of Standards and Technology (2011)
Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)
Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: Writing a Literature Review. MIS Quarterly 26, 13–23 (2002)
Vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., Cleven, A.: Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In: Proceedings of the European Conference on Information Systems. Verona, Italy (2009)
Goyal, S., Limayem, M., Davis, F.: Unfulfilled Obligations in Recommendation Agent Use. In: Proceedings of the International Conference on Information Systems 2012, pp. 1–15 (2013)
Gould, D.: Using vignettes to collect data for nursing research studies: How valid are the findings? Journal of Clinical Nursing 5, 207–212 (1996)
Dennis, A., Robert, L.: Trust Is in the Eye of the Beholder: A Vignette Study of Postevent Behavioral Controls’ Effects on Individual Trust in Virtual Teams. Information Systems Research 23, 546–558 (2012)
Robert, L.P., Denis, A.R., Hung, Y.-T.C.: Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members. Journal of Management Information Systems 26, 241–279 (2009)
Miles, M.B., Huberman, A.M.: Qualitative data analysis: An expanded sourcebook. Sage Publications, Thousand Oaks (1994)
Hughes, R.: Considering the Vignette Technique and its Application to a Study of Drug Injecting and HIV Risk and Safer Behaviour. Sociology of Health and Illness 20, 381–400 (1998)
Finch, J.H.: The vignette technique in survey research. Sociology 21, 105–114 (1987)
Zafar, H., Clark, J., Ko, M.: Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. In: Proceedings of Americas Conference on Information Systems, Seattle, Washington (2012)
Staples, D., Jarvenpaa, S.: Using electronic media for information sharing activities: A replication and extension. In: Proceedings of the International Conference on Information Systems 2000 (2000)
Barnett, T., Bass, K., Brown, G.: Ethical ideology and ethical judgment regarding ethical issues in business. Journal of Business Ethics 13, 469–480 (1994)
Aronson, E., Carlsmith, J.M.: Experimentation in social psychology. In: Handbook of Social Psychology, pp. 1–79. Addison Wesley, Reading, MA (1968)
Trevino, L.K.: Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations. Business Ethics Quarterly 2, 121–136 (1992)
Chae, B., Paradice, D., Courtney, J.F., Cagle, C.J.: Incorporating an ethical perspective into problem formulation: Implications for decision support systems design. Decision Support Systems 40, 197–212 (2005)
Greenberg, J., Eskew, D.E.: The Role of Role Playing in Organizational Research. Journal of Management 19, 221–241 (1993)
Siponen, M., Vance, A., Willison, R.: New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management 49, 334–341 (2012)
Havlena, W.J., Holbrook, B.M.: The Varieties of Consumption Experience: Comparing Two Typologies of Emotion in Consumer Behavior. Journal of Consumer Research 13, 394–404 (1986)
Oja, M., Galliers, R.: Affect and Materiality in Enterprise Systems Usage: Setting the Stage for User Experience. In: Proceedings of the European Conference on Information Systems 2011 (2011)
Walsham, G.: Interpreting Information Systems in Organizations. John Wiley and Sons, Inc., New York (1993)
Seaman, C.B.: Qualitative Methods in Empirical Studies of Software Engineering. IEEE Transactions on Software Engineering 25, 557–572 (1999)
Yager, R.R.: On a Generalization of Variable Precision Logic. IEEE Transactions on Systems, Man, and Cybernetics 20, 248–252 (1990)
Dimoka, A., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., Pavlou, P.A., Müller-Pütz, G., Riedl, R., vom Brocke, J., Weber, B.: On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS. Management Information Systems Quarterly 36, 679–702 (2012)
Riedl, R., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Dimoka, A., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., Müller-Putz, G., Pavlou, P.A., Straub, D.W., Vom Brocke, J., Weber, B.: On the Foundations of NeuroIS: Reflections on the Gmunden Retreat 2009. Communications of the AIS 27, 243–264 (2010)
Dimoka, A.: What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 34, 373–396 (2010)
Wilde, T.: Experimentelle Forschung in der Wirtschaftsinformatik (english: Research Methods in Information Systems. An empirical Study). Verlag Dr. Kovač, Hamburg (2008)
Plöchl, M., Ossandón, J.P., König, P.: Combining EEG and eye tracking: identification, characterization, and correction of eye movement artifacts in electroencephalographic data. Front. Hum. Neurosci. 6 (2012)
Williamson, O.E.: The Economic Institutions of Capitalism. Free Press, New York (1985)
Walterbusch, M., Martens, B., Teuteberg, F.: Evaluating Cloud Computing Services from a Total Cost of Ownership Perspective. Management Research Review 36 (2013)
Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology) (1986)
Morgan, R.M., Hunt, S.D.: The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing 58, 20–38 (1994)
Churchill, G.A.J., Surprenant, C.: An Investigation Into the Determinants of Customer Satisfaction. Journal of Marketing Research 19, 491–504 (1982)
Coleman, J.: Foundations of Social Theory. Harvard Univ. Pr. (1994)
Bhattacherjee, A.: Managerial Influences on Intraorganizational Information Technology Use: A Principal- Agent Model. Decision Sciences 29, 139–162 (1998)
Schneberger, S., Wade, M., Allen, G., Vance, A., Eargle, D.: Theories Used in IS Research Wiki, http://istheory.byu.edu/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Walterbusch, M., Teuteberg, F. (2014). Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-09770-1_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09769-5
Online ISBN: 978-3-319-09770-1
eBook Packages: Computer ScienceComputer Science (R0)