Skip to main content

Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Abstract

Cloud computing applications are nowadays commonly used in various aspects of human endeavour, and the education is no exception. Although cloud computing applications bring numerous advantages, their adoption could be significantly reduced due to users’ concerns related to security, privacy, and trust. This paper introduces a research framework that captures the essence of security, privacy, trust, and adoption in the context of cloud computing applications when used in educational environment. Drawing on an extensive literature review, a finite set of items was determined and consequently employed for the design of the measuring instrument in the form of a post-use questionnaire. With an aim to examine psychometric features of the measuring instrument, an empirical study was carried out. Participants in the study were students from two higher education institutions who employed cloud-based applications for the purpose of creating, sharing, and organizing educational artefacts. Study findings helped us determine the relevance of security, privacy, trust, and adoption dimensions in the context of cloud computing applications as perceived by users who apply them for educational purposes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)

    Google Scholar 

  2. Mell, P., Grace, T.: The NIST Definition of Cloud Computing. National Institutes of Standards (NIST) Special Publication, 800-145 (2011)

    Google Scholar 

  3. Bora, U.J., Ahmed, M.: E-learning using cloud computing. Int. J. Sci. Mod. Eng. 1(2), 9–13 (2013)

    Google Scholar 

  4. Alharthi, A., Yahya, F., Walters, R.J., Wills, G.: An overview of cloud services adoption challenges in higher education institutions. In: Emerging Software as a Service and Analytics, Lisbon, Portugal, pp. 1–8 (2015)

    Google Scholar 

  5. Al-Jebreen, B., Dahanayake, A., Syed, L.: Advances in higher educational resource sharing and cloud services for KSA. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 6(3), 25–40 (2015)

    Article  Google Scholar 

  6. Hashim, H.S., Hassan, Z.B., Hashim, A.S.: The benefits and challenges of cloud computing adoption on Iraqi Universities: results from an empirical study. J. Appl. Sci. Res. 11(13), 14–21 (2015)

    Google Scholar 

  7. Changchit, C.: Students’ perceptions of cloud computing. Iss. Inf. Syst. 15(1), 312–322 (2014)

    Google Scholar 

  8. Li, Y., Chang, K.: A study on user acceptance of cloud computing: a multi-theoretical perspective. In: Proceedings of AMCIS 2012 (2012). Paper 19

    Google Scholar 

  9. Shiau, W.L., Chau, P.Y.: Understanding behavioral intention to use a cloud computing classroom: a multiple model comparison approach. Inf. Manag. 53(3), 355–365 (2016)

    Article  Google Scholar 

  10. Hashim, H.S., Hassan, Z.B.: Factors that influence the users’ adoption of cloud computing services at Iraqi Universities: an empirical study. Aust. J. Basic Appl. Sci. 9(27), 379–390 (2015). UTUT

    Google Scholar 

  11. Guilloteau, S., Mauree, V.: Privacy in cloud computing, ITU-T technology watch report (2012). http://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000160001PDFE.pdf. Accessed 28 Nov 2016

  12. Mutkoski, S.: Cloud computing, regulatory compliance, and student privacy: a guide for school administrators and legal counsel. John Marshall J. Inf. Technol. Priv. Law 30(3), 511–534 (2014)

    Google Scholar 

  13. Yang, H.-L., Lin, S.-L.: User continuance intention to use cloud storage service. Comput. Hum. Behav. 52, 219–232 (2015)

    Article  Google Scholar 

  14. Meske, C., Stieglitz, S., Vogl, R., Rudolph, D., Öksüz, A.: Cloud storage services in higher education–results of a preliminary study in the context of the Sync&Share-Project in Germany. In: International Conference on Learning and Collaboration Technologies, pp. 161–171. Springer International Publishing (2014)

    Google Scholar 

  15. Svantesson, D., Clarke, R.: Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 26(4), 391–397 (2010)

    Article  Google Scholar 

  16. Adrian, A.: How much privacy do clouds provide? An Australian perspective. Comput. Law Secur. Rev. 29(1), 48–57 (2013)

    Article  MathSciNet  Google Scholar 

  17. Mollah, M.B., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: survey and way ahead. J. Netw. Comput. Appl. 84, 38–54 (2017)

    Article  Google Scholar 

  18. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2014)

    Article  Google Scholar 

  19. Arpaci, I.: Understanding and predicting students’ intention to use mobile cloud storage services. Comput. Hum. Behav. 58, 150–157 (2016)

    Article  Google Scholar 

  20. Nakayama, M., Taylor, C.: The effects of perceived functionality and usability on privacy and security concerns about adopting cloud application adoptions. In: Proceedings of the Conference on Information Systems Applied Research (2016). ISSN 2167-1508

    Google Scholar 

  21. Arpaci, I., Kilicer, K., Bardakci, S.: Effects of security and privacy concerns on educational use of cloud services. Comput. Hum. Behav. 45, 93–98 (2015)

    Article  Google Scholar 

  22. Flavián, C., Guinalíu, M.: Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. 106(5), 601–620 (2006)

    Article  Google Scholar 

  23. Islam, T., Manivannan, D., Zeadally, S.: A classification and characterization of security threats in cloud computing. Int. J. Next-Generation Comput. 7(1), 1–17 (2016)

    Google Scholar 

  24. Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)

    Article  Google Scholar 

  25. Popović, K., Hocenski, Ž.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International MIPRO Convention, pp. 344–349. IEEE, Opatija (2010)

    Google Scholar 

  26. Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263–2268 (2013)

    Article  Google Scholar 

  27. Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)

    Article  Google Scholar 

  28. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  29. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  30. Hair, J.F., Ringle, C.M., Sarstedt, M.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19(2), 139–151 (2011)

    Article  Google Scholar 

  31. Gupta, P., Seetharaman, A., Raj, J.R.: The usage and adoption of cloud computing by small and medium businesses. Int. J. Inf. Manag. 33(5), 861–874 (2013)

    Article  Google Scholar 

  32. Cheung, C.M.K., Lee, M.K.O.: Trust in internet shopping: instrument development and validation through classical and modern approaches. J. Glob. Inf. Manag. 9(3), 23–35 (2001)

    Article  Google Scholar 

  33. Janda, S., Trocchia, P., Gwinner, K.: Consumer perceptions of internet retail service quality. Int. J. Serv. Ind. Manag. 13(5), 412–431 (2002)

    Article  Google Scholar 

  34. O’Cass, A., Fenech, T.: Web retailing adoption: exploring the nature of internet users web retailing behaviour. J. Retail. Consum. Serv. 10(2), 81–94 (2003)

    Article  Google Scholar 

  35. Ranganathan, C., Ganapathy, S.: Key dimensions of business-to-consumer web sites. Inf. Manag. 39(6), 457–465 (2002)

    Article  Google Scholar 

  36. Kumar, N., Scheer, L.K., Steenkamp, J.-B.E.M.: The effects of supplier fairness on vulnerable resellers. J. Mark. Res. 32(1), 42–53 (1995)

    Article  Google Scholar 

  37. Siguaw, J., Simpson, P., Baker, T.: Effects of supplier market orientation on distributor market orientation and the channel relationship: the distributor perspective. J. Mark. 62, 99–111 (1998)

    Article  Google Scholar 

  38. Roy, M., Dewit, O., Aubert, B.: The impact of interface usability on trust in web retailers. Internet Res. Electron. Netw. Appl. Policy 11(5), 388–398 (2001)

    Article  Google Scholar 

  39. Bhattacherjee, A.: Understanding information systems continuance: an expectation confirmation model. MIS Q. 25(3), 351–370 (2001)

    Article  Google Scholar 

  40. Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39(2), 273–315 (2008)

    Article  Google Scholar 

  41. Venkatesh, V., Thong, J.Y.L., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157–178 (2012)

    Google Scholar 

  42. Moon, J.-W., Kim, Y.-G.: Extending the TAM for a World-Wide-Web context. Inf. Manag. 38(4), 217–230 (2001)

    Article  Google Scholar 

  43. Orehovacki, T., Etinger, D., Babic, S.: Perceived security and privacy of cloud computing applications used in educational ecosystem. In: Proceedings of the 40th Jubilee International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 823–828. IEEE, Opatija (2017)

    Google Scholar 

  44. Cohen, J.: A power primer. Psychol. Bull. 112(1), 155–159 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tihomir Orehovački .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Orehovački, T., Babić, S., Etinger, D. (2018). Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics