Advertisement

Examining Cloud Computing Applications from the Perspectives of Privacy and Unified Theory of Acceptance and Use of Technology

  • Tihomir OrehovačkiEmail author
  • Darko Etinger
  • Snježana Babić
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 876)

Abstract

Recent advances in the field of e-learning are focused on constructivist teaching methods that encourage student-centered educational process in which teacher plays the role of a facilitator and mediator. The employment of cloud computing applications enables students to, regardless of space and time, collaborate, learn from each other, exchange ideas and different digital resources, and build knowledge within set educational goals. One of the key prerequisites for successful integration of novel technologies in higher education processes is their adoption by students. This paper examines an interplay among UTAUT model constituents and following facets of privacy: concerns, risks, and control. The validity and reliability of the proposed research framework and associated hypotheses were examined by means of the partial least squares (PLS) structural equation modelling (SEM) technique. Implications for both researchers and practitioners are presented and discussed.

Keywords

Cloud computing applications Educational settings Google Drive Unified Theory of Acceptance and Use of Technology Privacy PLS-SEM 

References

  1. 1.
    Hung, D.: Theories of learning and computer-mediated instructional technologies. Educ. Media Int. 38(4), 281–287 (2001)CrossRefGoogle Scholar
  2. 2.
    Denton, D.W.: Enhancing instruction through constructivism, cooperative learning, and cloud computing. TechTrends 56(4), 34–41 (2012)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Yadegaridehkordi, E., Iahad, N.A., Ahmad, N.: User perceptions of the technology characteristics in a cloud-based collaborative learning environment: a qualitative study. Int. J. Technol. Enhanc. Learn. 7(1), 75–90 (2015)CrossRefGoogle Scholar
  4. 4.
    Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  5. 5.
    Gambo, Y.: Review on factors influencing user acceptance of cloud-based learning system in higher education. Int. J. Comput. Appl. 7(3) (2017). https://rspublication.com/ijca/2017/june17/6.pdf
  6. 6.
    Kayali, M.H., Safie, N., Mukhtar, M.: Adoption of cloud based E-learning: a systematic literature review of adoption factors and theories. J. Eng. Appl. Sci. 11(8), 1839–1845 (2016)Google Scholar
  7. 7.
    Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)CrossRefGoogle Scholar
  8. 8.
    Hashim, H.S., Hassan, Z.B.: Factors that influence the users’ adoption of cloud computing services at Iraqi Universities: an empirical study. Aust. J. Basic Appl. Sci. 9(27), 379–390 (2015)Google Scholar
  9. 9.
    Li, Y., Chang, K. C.: Antecedents to individual adoption of cloud computing. In: Web-Based Services: Concepts, Methodologies, Tools, and Applications, pp. 1088–1110. IGI Global (2016)Google Scholar
  10. 10.
    Arpaci, I.: Understanding and predicting students’ intention to use mobile cloud storage services. Comput. Hum. Behav. 58, 150–157 (2016)CrossRefGoogle Scholar
  11. 11.
    Arpaci, I., Kilicer, K., Bardakci, S.: Effects of security and privacy concerns on educational use of cloud services. Comput. Hum. Behav. 45, 93–98 (2015)CrossRefGoogle Scholar
  12. 12.
    Alotaibi, M.B.: Exploring users’ attitudes and intentions toward the adoption of cloud computing in Saudi Arabia: an empirical investigation. J. Comput. Sci. 10(11), 2315–2329 (2014)CrossRefGoogle Scholar
  13. 13.
    Gashami, J.P.G., Chang, Y., Rho, J.J., Park, M.C.: Privacy concerns and benefits in SaaS adoption by individual users: a trade-off approach. Inf. Dev. 32(4), 837–852 (2016)CrossRefGoogle Scholar
  14. 14.
    Lang, M., Wiesche, M., Krcmar, H.: Perceived Control and Privacy in a Professional Cloud Environment. In: Proceedings of the 51st Hawaii International Confer (HICSS), pp. 3668–3677, Big Island, Hawaii (2018)Google Scholar
  15. 15.
    Orehovački, T., Etinger, D., Babić, S.: Perceived security and privacy of cloud computing applications used in educational ecosystem. In: Proceedings of the 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2017), pp. 717–722. IEEE, Opatija (2017)Google Scholar
  16. 16.
    Orehovački, T., Babić, S., Etinger, D.: Identifying relevance of security, privacy, trust, and adoption dimensions concerning cloud computing applications employed in educational settings. In International Conference on Applied Human Factors and Ergonomics, pp. 308–320, Springer, Cham (2017)Google Scholar
  17. 17.
    Ringle, C.M., Wende, S., Becker, J.M.: SmartPLS 3, Boenningstedt: SmartPLS GmbH (2015). http://www.smartpls.com
  18. 18.
    Hair, J.F., Hult, G.T.M., Ringle, C.M., Sarstedt, M.: A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications Inc., CA, Los Angeles (2017)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Tihomir Orehovački
    • 1
    Email author
  • Darko Etinger
    • 1
  • Snježana Babić
    • 2
  1. 1.Faculty of InformaticsJuraj Dobrila University of PulaPulaCroatia
  2. 2.Polytechnic of RijekaRijekaCroatia

Personalised recommendations