Skip to main content

Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8647))

Abstract

This research offers a constitutive, mixed-method approach in order to identify trust-influencing and -influenced factors in cloud computing, which should lead to a fundamental understanding of the formation and retention of trust in cloud computing. In cloud computing, sensitive data and whole processes are transferred and outsourced to the cloud provider, without necessitating face-to-face communication with a sales assistant. We find the research methods literature review, laboratory experimental research, semi-structured expert interviews, surveys, vignettes, and (retrospective) think aloud complemented by neuroscientific methods to be suitable to reach the target set. Since vignettes, think aloud and neuroscientific methods are underrepresented or rather new to the information systems domain, in this contribution we pay special attention on these. Our mixed-method approach has the ability to verify, reaffirm, and refine theories affected by cloud computing or even to create new ones. Based on the findings of this research, recommendations for actions as well as implications for users and providers alike can be deduced. Since we rely on triangulation of the data set, the limitations of the whole approach reflect the limitations of each applied research method. Preliminary results indicate that 76% of cloud users focus primarily on data security, whereas 58% name the price of a certain cloud computing service to be relevant to provider selection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Walterbusch, M., Martens, B., Teuteberg, F.: Exploring Trust in Cloud Computing: A Multi-Method Approach. In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013). Utrecht (2013)

    Google Scholar 

  2. Benlian, A., Hess, T.: The Signaling Role of IT Features in Influencing Trust and Participation in Online Communities. International Journal of Electronic Commerce 15, 7–56 (2011)

    Article  Google Scholar 

  3. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 618–644 (2007)

    Article  Google Scholar 

  4. Gefen, D., Straub, D.W.: Managing User Trust in B2C e-Services. Florida Libraries 2, 7–24 (2003)

    Google Scholar 

  5. Mell, P., Grance, T.: The NIST Definition of Cloud Computing - Recommendations of the National Institute of Standards and Technology (2011)

    Google Scholar 

  6. Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)

    Google Scholar 

  7. Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: Writing a Literature Review. MIS Quarterly 26, 13–23 (2002)

    Google Scholar 

  8. Vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., Cleven, A.: Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In: Proceedings of the European Conference on Information Systems. Verona, Italy (2009)

    Google Scholar 

  9. Goyal, S., Limayem, M., Davis, F.: Unfulfilled Obligations in Recommendation Agent Use. In: Proceedings of the International Conference on Information Systems 2012, pp. 1–15 (2013)

    Google Scholar 

  10. Gould, D.: Using vignettes to collect data for nursing research studies: How valid are the findings? Journal of Clinical Nursing 5, 207–212 (1996)

    Article  Google Scholar 

  11. Dennis, A., Robert, L.: Trust Is in the Eye of the Beholder: A Vignette Study of Postevent Behavioral Controls’ Effects on Individual Trust in Virtual Teams. Information Systems Research 23, 546–558 (2012)

    Article  Google Scholar 

  12. Robert, L.P., Denis, A.R., Hung, Y.-T.C.: Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members. Journal of Management Information Systems 26, 241–279 (2009)

    Article  Google Scholar 

  13. Miles, M.B., Huberman, A.M.: Qualitative data analysis: An expanded sourcebook. Sage Publications, Thousand Oaks (1994)

    Google Scholar 

  14. Hughes, R.: Considering the Vignette Technique and its Application to a Study of Drug Injecting and HIV Risk and Safer Behaviour. Sociology of Health and Illness 20, 381–400 (1998)

    Article  Google Scholar 

  15. Finch, J.H.: The vignette technique in survey research. Sociology 21, 105–114 (1987)

    Article  Google Scholar 

  16. Zafar, H., Clark, J., Ko, M.: Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. In: Proceedings of Americas Conference on Information Systems, Seattle, Washington (2012)

    Google Scholar 

  17. Staples, D., Jarvenpaa, S.: Using electronic media for information sharing activities: A replication and extension. In: Proceedings of the International Conference on Information Systems 2000 (2000)

    Google Scholar 

  18. Barnett, T., Bass, K., Brown, G.: Ethical ideology and ethical judgment regarding ethical issues in business. Journal of Business Ethics 13, 469–480 (1994)

    Article  Google Scholar 

  19. Aronson, E., Carlsmith, J.M.: Experimentation in social psychology. In: Handbook of Social Psychology, pp. 1–79. Addison Wesley, Reading, MA (1968)

    Google Scholar 

  20. Trevino, L.K.: Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations. Business Ethics Quarterly 2, 121–136 (1992)

    Article  Google Scholar 

  21. Chae, B., Paradice, D., Courtney, J.F., Cagle, C.J.: Incorporating an ethical perspective into problem formulation: Implications for decision support systems design. Decision Support Systems 40, 197–212 (2005)

    Article  Google Scholar 

  22. Greenberg, J., Eskew, D.E.: The Role of Role Playing in Organizational Research. Journal of Management 19, 221–241 (1993)

    Article  Google Scholar 

  23. Siponen, M., Vance, A., Willison, R.: New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management 49, 334–341 (2012)

    Article  Google Scholar 

  24. Havlena, W.J., Holbrook, B.M.: The Varieties of Consumption Experience: Comparing Two Typologies of Emotion in Consumer Behavior. Journal of Consumer Research 13, 394–404 (1986)

    Article  Google Scholar 

  25. Oja, M., Galliers, R.: Affect and Materiality in Enterprise Systems Usage: Setting the Stage for User Experience. In: Proceedings of the European Conference on Information Systems 2011 (2011)

    Google Scholar 

  26. Walsham, G.: Interpreting Information Systems in Organizations. John Wiley and Sons, Inc., New York (1993)

    Google Scholar 

  27. Seaman, C.B.: Qualitative Methods in Empirical Studies of Software Engineering. IEEE Transactions on Software Engineering 25, 557–572 (1999)

    Article  Google Scholar 

  28. Yager, R.R.: On a Generalization of Variable Precision Logic. IEEE Transactions on Systems, Man, and Cybernetics 20, 248–252 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  29. Dimoka, A., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., Pavlou, P.A., Müller-Pütz, G., Riedl, R., vom Brocke, J., Weber, B.: On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS. Management Information Systems Quarterly 36, 679–702 (2012)

    Google Scholar 

  30. Riedl, R., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Dimoka, A., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., Müller-Putz, G., Pavlou, P.A., Straub, D.W., Vom Brocke, J., Weber, B.: On the Foundations of NeuroIS: Reflections on the Gmunden Retreat 2009. Communications of the AIS 27, 243–264 (2010)

    Google Scholar 

  31. Dimoka, A.: What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 34, 373–396 (2010)

    Google Scholar 

  32. Wilde, T.: Experimentelle Forschung in der Wirtschaftsinformatik (english: Research Methods in Information Systems. An empirical Study). Verlag Dr. Kovač, Hamburg (2008)

    Google Scholar 

  33. Plöchl, M., Ossandón, J.P., König, P.: Combining EEG and eye tracking: identification, characterization, and correction of eye movement artifacts in electroencephalographic data. Front. Hum. Neurosci. 6 (2012)

    Google Scholar 

  34. Williamson, O.E.: The Economic Institutions of Capitalism. Free Press, New York (1985)

    Google Scholar 

  35. Walterbusch, M., Martens, B., Teuteberg, F.: Evaluating Cloud Computing Services from a Total Cost of Ownership Perspective. Management Research Review 36 (2013)

    Google Scholar 

  36. Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology) (1986)

    Google Scholar 

  37. Morgan, R.M., Hunt, S.D.: The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing 58, 20–38 (1994)

    Article  Google Scholar 

  38. Churchill, G.A.J., Surprenant, C.: An Investigation Into the Determinants of Customer Satisfaction. Journal of Marketing Research 19, 491–504 (1982)

    Article  Google Scholar 

  39. Coleman, J.: Foundations of Social Theory. Harvard Univ. Pr. (1994)

    Google Scholar 

  40. Bhattacherjee, A.: Managerial Influences on Intraorganizational Information Technology Use: A Principal- Agent Model. Decision Sciences 29, 139–162 (1998)

    Article  Google Scholar 

  41. Schneberger, S., Wade, M., Allen, G., Vance, A., Eargle, D.: Theories Used in IS Research Wiki, http://istheory.byu.edu/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Walterbusch, M., Teuteberg, F. (2014). Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09770-1_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09769-5

  • Online ISBN: 978-3-319-09770-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics