Advertisement

Risk and Information Disclosure in Google Drive Sharing of Tax Data

  • Craig C. ClaybaughEmail author
  • Langtao Chen
  • Peter Haried
  • Dale Zhou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10923)

Abstract

Risk abounds as individuals engage in activities involving the sharing of sensitive information through a third-party cloud storage tool. In this research, we investigate the storage and sharing of very sensitive information (an individual’s tax filing information) through a specific third-party technology provider, Google Drive. Within the specifics of such a potentially risky act we argue that information assurance mechanisms implemented by the cloud storage service provider reduce risk perceptions of individuals even when very sensitive information is being shared. Previous positive experience with a cloud service is likely to mitigate concerns on information sharing on the cloud. To elaborate this proposed relationship a research model of information assurance is proposed and tested in the context of tax filing sharing intention.

Keywords

Information assurance Risk Tax filing data Cloud storage 

References

  1. 1.
    Bernal, O., Gnabo, J.Y., Guilmin, G.: Assessing the contribution of banks, insurance and other financial services to systemic risk. J. Bank. Financ. 47, 270–287 (2014)CrossRefGoogle Scholar
  2. 2.
    CNN 2017: Giant Equifax data breach: 143 million people could be affected. http://money.cnn.com/2017/09/07/technology/business/equifax-data-breach/index.html. Accessed 7 Feb 2018
  3. 3.
    Chen, J.V., Jubilado, R.J.M., Capistrano, E.P.S., Yen, D.C.: Factors affecting online tax filing–an application of the IS success model and trust theory. Comput. Hum. Behav. 43, 251–262 (2015)CrossRefGoogle Scholar
  4. 4.
    Venkatesh, V., Thong, J.Y., Chan, F.K., Hu, P.J.: Managing citizens’ uncertainty in E-government services: the mediating and moderating roles of transparency and trust. Inf. Syst. Res. 27(1), 87–111 (2016)CrossRefGoogle Scholar
  5. 5.
    Levine, R.: Financial development and economic growth: views and agenda. J. Econ. Lit. 32(2), 668–726 (1997)Google Scholar
  6. 6.
    Salampasis, D., Mention, A.L., Torkkeli, M.: Open innovation and collaboration in the financial services sector: exploring the role of trust. Int. J. Bus. Innov. Res. 8(5), 466–484 (2014)CrossRefGoogle Scholar
  7. 7.
    Albring, S., Robinson, D., Robinson, M.: Audit committee financial expertise, corporate governance, and the voluntary switch from auditor-provided to non-auditor-provided tax services. Adv. Account. 30(1), 81–94 (2014)CrossRefGoogle Scholar
  8. 8.
    Thilakanathan, D., Chen, S., Nepal, S., Calvo, R.A.: Secure data sharing in the cloud. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud Systems, pp. 45–72. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-642-38586-5_2CrossRefGoogle Scholar
  9. 9.
    Guo, J.T., Harrison, S.G.: Tax policy and stability in a model with sector-specific externalities. Rev. Econ. Dyn. 4(1), 75–89 (2001)CrossRefGoogle Scholar
  10. 10.
    Claybaugh, C.C., Haseman, W.D.: Understanding professional connections in LINKEDIN—A question of trust. J. Comput. Inf. Syst. 54(1), 94–105 (2013)Google Scholar
  11. 11.
    Claybaugh, C.C., Haried, P., Chen, L., Twyman, N.: Dueling for trust in the online fantasy sports industry: fame, fortune, and pride for the winners. In: Nah, F.F.-H., Tan, C.-H. (eds.) HCIBGO 2017. LNCS, vol. 10294, pp. 203–212. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-58484-3_16CrossRefGoogle Scholar
  12. 12.
    Kshetri, N.: Big data’s impact on privacy, security and consumer welfare. Telecommun. Policy 38(11), 1134–1145 (2014)CrossRefGoogle Scholar
  13. 13.
    Hajli, N., Lin, X.: Exploring the security of information sharing on social networking sites: the role of perceived control of information. J. Bus. Eth. 133, 111–123 (2016)CrossRefGoogle Scholar
  14. 14.
    Hu, W., Yang, T., Matthews, J.N.: The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Oper. Syst. Rev. 44(3), 110–115 (2010)CrossRefGoogle Scholar
  15. 15.
    Li, H., Sarathy, R., Xu, H.: Understanding situational online information disclosure as a privacy calculus. J. Comput. Inf. Syst. 51(1), 62–71 (2010)Google Scholar
  16. 16.
    Yang, H.L., Lin, S.L.: User continuance intention to use cloud storage service. Comput. Hum. Behav. 52, 219–232 (2015)CrossRefGoogle Scholar
  17. 17.
    Haried, P.J., Claybaugh, C.C.: Evaluating information systems offshore project success: can success and failure coexist? J. Glob. Inf. Technol. Manag. 20(1), 8–27 (2017)Google Scholar
  18. 18.
    Claybaugh, C.C., Srite, M.: Factors contributing to the information technology vendor-client relationship. JITTA: J. Inf. Technol. Theory Appl. 10(2), 19 (2009)Google Scholar
  19. 19.
    Chakraborty, R., Ramireddy, S., Raghu, T.S., Rao, H.R.: The information assurance practices of cloud computing vendors. IT Prof. 12(4), 29–37 (2010)CrossRefGoogle Scholar
  20. 20.
    Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33–36 (2013)CrossRefGoogle Scholar
  21. 21.
    Li, X., Hess, T.J., Valacich, J.S.: Why do we trust new technology? A study of initial trust formation with organizational information systems. J. Strateg. Inf. Syst. 17(1), 39–71 (2008)CrossRefGoogle Scholar
  22. 22.
    Hsu, M.H., Chang, C.M., Chu, K.K., Lee, Y.J.: Determinants of repurchase intention in online group-buying: the perspectives of DeLone & McLean IS success model and trust. Comput. Hum. Behav. 36, 234–245 (2014)CrossRefGoogle Scholar
  23. 23.
    Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735–737. ACM (2010)Google Scholar
  24. 24.
    Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1016 (2011)CrossRefGoogle Scholar
  25. 25.
    Boritz, J.E., No, W.G.: E-commerce and privacy: exploring what we know and opportunities for future discovery. J. Inf. Syst. 25(2), 11–45 (2011)Google Scholar
  26. 26.
    Chandra, S., Srivastava, S.C., Theng, Y.L.: Evaluating the role of trust in consumer adoption of mobile payment systems: an empirical analysis. Commun. Assoc. Inf. Syst. 27(1), 561–588 (2010)Google Scholar
  27. 27.
    Bansal, G., Zahedi, F.M., Gefen, D.: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis. Support Syst. 49(2), 138–150 (2010)CrossRefGoogle Scholar
  28. 28.
    Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRefGoogle Scholar
  29. 29.
    Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011)Google Scholar
  30. 30.
    Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, AINA, pp. 27–33 (2010)Google Scholar
  31. 31.
    Claybaugh, C.C., Ramamurthy, K., Haseman, W.D.: Assimilation of enterprise technology upgrades: a factor-based study. Enterp. Inf. Syst. 11(2), 250–283 (2017)CrossRefGoogle Scholar
  32. 32.
    Chun, S., Choi, B.: Service modes and pricing schemes for cloud computing. Clust. Comput. 17, 529–535 (2014)CrossRefGoogle Scholar
  33. 33.
    Haimes, Y., Horowitz, B.M., Guo, Z., Andrijicic, E., Bogdanor, J.: Assessing systemic risk to cloud-computing technology as complex interconnected systems of systems. Syst. Eng. 18(3), 284–299 (2015)CrossRefGoogle Scholar
  34. 34.
    Kern, T., Willcocks, L.: Exploring information technology outsourcing relationship: theory and practice. J. Strateg. Inf. Syst. 9, 321–350 (2000)CrossRefGoogle Scholar
  35. 35.
    Aubert, B.A., Patry, M., Rivard, S.: A framework for information technology outsourcing risk management. Database Adv. Inf. Syst. 36(4), 9–28 (2005)CrossRefGoogle Scholar
  36. 36.
    ENISA (European Network and Information Security Agency) Cloud Computing: Benefits, risks and recommendations for information security. http://www.enisa.europa.eu/. Accessed 7 Feb 2018
  37. 37.
    Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003)CrossRefGoogle Scholar
  38. 38.
    Pires, G., Stanton, J., Eckford, A.: Influences on the perceived risk of purchasing online. J. Consum. Behav. 4(2), 118–131 (2004)CrossRefGoogle Scholar
  39. 39.
    Bélanger, F., Carter, L.: Trust and risk in e-government adoption. J. Strateg. Inf. Syst. 17(2), 165–176 (2008)CrossRefGoogle Scholar
  40. 40.
    Kull, T.J., Oke, A., Dooley, K.J.: Supplier selection behavior under uncertainty: contextual and cognitive effects on risk perception and choice. Decis. Sci. 45(3), 467–505 (2014)CrossRefGoogle Scholar
  41. 41.
    Chen, L.: Essays on health information technology: insights from analyses of big datasets. Dissertation, Georgia State University (2016)Google Scholar
  42. 42.
    Gefen, D., Rigdon, E.E., Straub, D.: An update and extension to SEM guidelines for administrative and social science research. MIS Q. 35(2), iii–xiv (2011)CrossRefGoogle Scholar
  43. 43.
    Hair, J.F., Hult, G.T.M., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). SAGE Publications, Incorporated, Thousand Oaks (2013)zbMATHGoogle Scholar
  44. 44.
    Chen, L., Straub, D.: The impact of virtually crowdsourced social support on individual health: analyzing big datasets for underlying causalities. In: Proceedings of the 21st Americas Conference on Information Systems, Puerto Rico (2015)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Craig C. Claybaugh
    • 1
    Email author
  • Langtao Chen
    • 1
  • Peter Haried
    • 2
  • Dale Zhou
    • 3
  1. 1.Missouri University of Science and TechnologyRollaUSA
  2. 2.University of Wisconsin - La CrosseLa CrosseUSA
  3. 3.Washington University in St. LouisSt. LouisUSA

Personalised recommendations