Abstract
Cloud computing applications are nowadays commonly used in various aspects of human endeavour, and the education is no exception. Although cloud computing applications bring numerous advantages, their adoption could be significantly reduced due to users’ concerns related to security, privacy, and trust. This paper introduces a research framework that captures the essence of security, privacy, trust, and adoption in the context of cloud computing applications when used in educational environment. Drawing on an extensive literature review, a finite set of items was determined and consequently employed for the design of the measuring instrument in the form of a post-use questionnaire. With an aim to examine psychometric features of the measuring instrument, an empirical study was carried out. Participants in the study were students from two higher education institutions who employed cloud-based applications for the purpose of creating, sharing, and organizing educational artefacts. Study findings helped us determine the relevance of security, privacy, trust, and adoption dimensions in the context of cloud computing applications as perceived by users who apply them for educational purposes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)
Mell, P., Grace, T.: The NIST Definition of Cloud Computing. National Institutes of Standards (NIST) Special Publication, 800-145 (2011)
Bora, U.J., Ahmed, M.: E-learning using cloud computing. Int. J. Sci. Mod. Eng. 1(2), 9–13 (2013)
Alharthi, A., Yahya, F., Walters, R.J., Wills, G.: An overview of cloud services adoption challenges in higher education institutions. In: Emerging Software as a Service and Analytics, Lisbon, Portugal, pp. 1–8 (2015)
Al-Jebreen, B., Dahanayake, A., Syed, L.: Advances in higher educational resource sharing and cloud services for KSA. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 6(3), 25–40 (2015)
Hashim, H.S., Hassan, Z.B., Hashim, A.S.: The benefits and challenges of cloud computing adoption on Iraqi Universities: results from an empirical study. J. Appl. Sci. Res. 11(13), 14–21 (2015)
Changchit, C.: Students’ perceptions of cloud computing. Iss. Inf. Syst. 15(1), 312–322 (2014)
Li, Y., Chang, K.: A study on user acceptance of cloud computing: a multi-theoretical perspective. In: Proceedings of AMCIS 2012 (2012). Paper 19
Shiau, W.L., Chau, P.Y.: Understanding behavioral intention to use a cloud computing classroom: a multiple model comparison approach. Inf. Manag. 53(3), 355–365 (2016)
Hashim, H.S., Hassan, Z.B.: Factors that influence the users’ adoption of cloud computing services at Iraqi Universities: an empirical study. Aust. J. Basic Appl. Sci. 9(27), 379–390 (2015). UTUT
Guilloteau, S., Mauree, V.: Privacy in cloud computing, ITU-T technology watch report (2012). http://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000160001PDFE.pdf. Accessed 28 Nov 2016
Mutkoski, S.: Cloud computing, regulatory compliance, and student privacy: a guide for school administrators and legal counsel. John Marshall J. Inf. Technol. Priv. Law 30(3), 511–534 (2014)
Yang, H.-L., Lin, S.-L.: User continuance intention to use cloud storage service. Comput. Hum. Behav. 52, 219–232 (2015)
Meske, C., Stieglitz, S., Vogl, R., Rudolph, D., Öksüz, A.: Cloud storage services in higher education–results of a preliminary study in the context of the Sync&Share-Project in Germany. In: International Conference on Learning and Collaboration Technologies, pp. 161–171. Springer International Publishing (2014)
Svantesson, D., Clarke, R.: Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 26(4), 391–397 (2010)
Adrian, A.: How much privacy do clouds provide? An Australian perspective. Comput. Law Secur. Rev. 29(1), 48–57 (2013)
Mollah, M.B., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: survey and way ahead. J. Netw. Comput. Appl. 84, 38–54 (2017)
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2014)
Arpaci, I.: Understanding and predicting students’ intention to use mobile cloud storage services. Comput. Hum. Behav. 58, 150–157 (2016)
Nakayama, M., Taylor, C.: The effects of perceived functionality and usability on privacy and security concerns about adopting cloud application adoptions. In: Proceedings of the Conference on Information Systems Applied Research (2016). ISSN 2167-1508
Arpaci, I., Kilicer, K., Bardakci, S.: Effects of security and privacy concerns on educational use of cloud services. Comput. Hum. Behav. 45, 93–98 (2015)
Flavián, C., Guinalíu, M.: Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. 106(5), 601–620 (2006)
Islam, T., Manivannan, D., Zeadally, S.: A classification and characterization of security threats in cloud computing. Int. J. Next-Generation Comput. 7(1), 1–17 (2016)
Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)
Popović, K., Hocenski, Ž.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International MIPRO Convention, pp. 344–349. IEEE, Opatija (2010)
Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263–2268 (2013)
Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Hair, J.F., Ringle, C.M., Sarstedt, M.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19(2), 139–151 (2011)
Gupta, P., Seetharaman, A., Raj, J.R.: The usage and adoption of cloud computing by small and medium businesses. Int. J. Inf. Manag. 33(5), 861–874 (2013)
Cheung, C.M.K., Lee, M.K.O.: Trust in internet shopping: instrument development and validation through classical and modern approaches. J. Glob. Inf. Manag. 9(3), 23–35 (2001)
Janda, S., Trocchia, P., Gwinner, K.: Consumer perceptions of internet retail service quality. Int. J. Serv. Ind. Manag. 13(5), 412–431 (2002)
O’Cass, A., Fenech, T.: Web retailing adoption: exploring the nature of internet users web retailing behaviour. J. Retail. Consum. Serv. 10(2), 81–94 (2003)
Ranganathan, C., Ganapathy, S.: Key dimensions of business-to-consumer web sites. Inf. Manag. 39(6), 457–465 (2002)
Kumar, N., Scheer, L.K., Steenkamp, J.-B.E.M.: The effects of supplier fairness on vulnerable resellers. J. Mark. Res. 32(1), 42–53 (1995)
Siguaw, J., Simpson, P., Baker, T.: Effects of supplier market orientation on distributor market orientation and the channel relationship: the distributor perspective. J. Mark. 62, 99–111 (1998)
Roy, M., Dewit, O., Aubert, B.: The impact of interface usability on trust in web retailers. Internet Res. Electron. Netw. Appl. Policy 11(5), 388–398 (2001)
Bhattacherjee, A.: Understanding information systems continuance: an expectation confirmation model. MIS Q. 25(3), 351–370 (2001)
Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39(2), 273–315 (2008)
Venkatesh, V., Thong, J.Y.L., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157–178 (2012)
Moon, J.-W., Kim, Y.-G.: Extending the TAM for a World-Wide-Web context. Inf. Manag. 38(4), 217–230 (2001)
Orehovacki, T., Etinger, D., Babic, S.: Perceived security and privacy of cloud computing applications used in educational ecosystem. In: Proceedings of the 40th Jubilee International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 823–828. IEEE, Opatija (2017)
Cohen, J.: A power primer. Psychol. Bull. 112(1), 155–159 (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Orehovački, T., Babić, S., Etinger, D. (2018). Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-60585-2_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60584-5
Online ISBN: 978-3-319-60585-2
eBook Packages: EngineeringEngineering (R0)