Skip to main content
Top
Published in: Cluster Computing 1/2016

01-03-2016

Factors affecting the continuous use of cloud service: focused on security risks

Authors: Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, Guozhong Li

Published in: Cluster Computing | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Despite its many technology maturity and significant advantages, the cloud services are still far from success in the market. In accordance with some research, security risks have been regarded as the main factors that impede activating cloud service. Accordingly, this study divides the factors of security risk into Information leakage risk, Fault recovery risk, Compliance risk, Service interruption risk and made an empirical analysis of the impact of these four factors on continuous adoption intention. The effects of security risk and adoption intention of cloud service were analyzed via the moderation effects of trust. The analytical results of China data show that bo th Information Leakage Risk and Compliance Risk have negative impact on continuous adoption intention of cloud service. Neither Fault Recovery Risk nor Service Interruption Risk is significantly related with continuous adoption intention of cloud service. The analytical results of Korea data show that Fault Recovery Risk, Compliance Risk and Service Interruption Risk significantly impact continuous adoption intention of cloud service, whereas Information Leakage Risk insignificantly impact continuous adoption intention of the cloud service.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cho, L.G., Park, M.C.: Technological-level evaluation using patent statistics: model and application in mobile communications. Clust. Comput. 18, 259–268 (2015)MathSciNetCrossRef Cho, L.G., Park, M.C.: Technological-level evaluation using patent statistics: model and application in mobile communications. Clust. Comput. 18, 259–268 (2015)MathSciNetCrossRef
2.
go back to reference Jarschel, M., Schlosser, D., Scheuring, S.: Gaming in the clouds: QoE and the users perspective. Math. Comput. Model. 57, 2883–2894 (2013)CrossRef Jarschel, M., Schlosser, D., Scheuring, S.: Gaming in the clouds: QoE and the users perspective. Math. Comput. Model. 57, 2883–2894 (2013)CrossRef
3.
go back to reference Casas, P., Schatz, R.: Quality of experience in cloud services: survey and measurements. Comput. Netw. 68(1), 149–165 (2014)CrossRef Casas, P., Schatz, R.: Quality of experience in cloud services: survey and measurements. Comput. Netw. 68(1), 149–165 (2014)CrossRef
4.
go back to reference Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web. 15(4), 409–428 (2012)CrossRef Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web. 15(4), 409–428 (2012)CrossRef
7.
go back to reference Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: 2011 IEEE International Conference on Cloud Computing, pp. 541–548. IEEE (2011) Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: 2011 IEEE International Conference on Cloud Computing, pp. 541–548. IEEE (2011)
9.
go back to reference Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM. 53(4), 50–58 (2010)CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM. 53(4), 50–58 (2010)CrossRef
11.
go back to reference Rafique, K., Tareen, A.W., Saeed, M., Wu, J.Z., Qureshi, S.S.: Cloud computing economics opportunities and challenges. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology. Shenzhen, 28–30, pp. 401-406 (2011) http://dx.doi.org/10.1109/ICBNMT.2011.6155965 (2011) Accessed 25 August 2015 Rafique, K., Tareen, A.W., Saeed, M., Wu, J.Z., Qureshi, S.S.: Cloud computing economics opportunities and challenges. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology. Shenzhen, 28–30, pp. 401-406 (2011) http://​dx.​doi.​org/​10.​1109/​ICBNMT.​2011.​6155965 (2011) Accessed 25 August 2015
12.
go back to reference Goodburn, M.A., Hill, S.: The cloud transforms business. Financ. Exec. 26(10), 34–39 (2010) Goodburn, M.A., Hill, S.: The cloud transforms business. Financ. Exec. 26(10), 34–39 (2010)
13.
go back to reference Harris, J., Grandgenett, N., Hofer, M.: Testing a TPACK-based technology integration assessment rubric. In: Maddux, C.D. (ed.) Research Highlights in Technology and Teacher Education 2010, pp. 323–331. Society for Information Technology & Teacher Education (SITE), Chesapeake (2010) Harris, J., Grandgenett, N., Hofer, M.: Testing a TPACK-based technology integration assessment rubric. In: Maddux, C.D. (ed.) Research Highlights in Technology and Teacher Education 2010, pp. 323–331. Society for Information Technology & Teacher Education (SITE), Chesapeake (2010)
14.
go back to reference Jasti, H., Hanusa, B.H., Switzer, G.E., Granieri, R., Elnicki, M.: Residents’ perceptions of a night float system. BMC Med. Educ. 2009 9(52) doi:10.1186/1472-6920-9-52 (2009). Accessed 25 August (2015) Jasti, H., Hanusa, B.H., Switzer, G.E., Granieri, R., Elnicki, M.: Residents’ perceptions of a night float system. BMC Med. Educ. 2009 9(52) doi:10.​1186/​1472-6920-9-52 (2009). Accessed 25 August (2015)
15.
go back to reference Mladenow, A., Fuchs, E., Dohmen, P., Strauss, C.: Value creation using clouds: analysis of value drivers for start-ups and small and medium sized enterprises in the textile industry. In: 26th International Conference on Advanced Information Networking and Applications Workshops 2012, pp. 1215–1220. IEEE (2012) Mladenow, A., Fuchs, E., Dohmen, P., Strauss, C.: Value creation using clouds: analysis of value drivers for start-ups and small and medium sized enterprises in the textile industry. In: 26th International Conference on Advanced Information Networking and Applications Workshops 2012, pp. 1215–1220. IEEE (2012)
17.
go back to reference Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17, 703–710 (2014)CrossRef Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17, 703–710 (2014)CrossRef
19.
go back to reference Haghighat, M., Zonouz, S., Abdel-Mottaleb, M.: CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 42(21), 7905–7916 (2015)CrossRef Haghighat, M., Zonouz, S., Abdel-Mottaleb, M.: CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 42(21), 7905–7916 (2015)CrossRef
20.
go back to reference Hamadaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. In: Ali, H., Atif, M. (eds.) Advances in Computers, vol.86, pp. 41–85 (2012) Hamadaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. In: Ali, H., Atif, M. (eds.) Advances in Computers, vol.86, pp. 41–85 (2012)
21.
go back to reference Hussain, M., Abdulsalam, H.M.: Software quality in the clouds: a cloud-based solution. Clust. Comput. 17, 389–402 (2014)CrossRef Hussain, M., Abdulsalam, H.M.: Software quality in the clouds: a cloud-based solution. Clust. Comput. 17, 389–402 (2014)CrossRef
23.
go back to reference Ratansingham, P., Kumer, K.: Trading partner trust in electronic commerce participation. In: Proceeding of the 22nd International Conference on Information systems, pp. 544–552 (2000) Ratansingham, P., Kumer, K.: Trading partner trust in electronic commerce participation. In: Proceeding of the 22nd International Conference on Information systems, pp. 544–552 (2000)
24.
go back to reference Kim, K.K., Lee, J.W., Kim, H.S.: Impact of trust and risk on internet banking adoption. Korean Manag. Rev. 32(6), 1771–1797 (2003) Kim, K.K., Lee, J.W., Kim, H.S.: Impact of trust and risk on internet banking adoption. Korean Manag. Rev. 32(6), 1771–1797 (2003)
25.
go back to reference Jarvenpaa, S.L., Knoll, K., Leidner, D.E.: Is anybody out there? Antecedents of trust in global virtual teams. J. Manag. Inf. Syst. 14(4), 29–64 (1998)CrossRef Jarvenpaa, S.L., Knoll, K., Leidner, D.E.: Is anybody out there? Antecedents of trust in global virtual teams. J. Manag. Inf. Syst. 14(4), 29–64 (1998)CrossRef
26.
go back to reference Lim, N.: Consumer’s Perceived Risk: Sources versus Consequences. Electron. Commer. Res. Appl. 2(3), 216–228 (2003)CrossRef Lim, N.: Consumer’s Perceived Risk: Sources versus Consequences. Electron. Commer. Res. Appl. 2(3), 216–228 (2003)CrossRef
27.
go back to reference Ahn, J.H., Choi, K.C., Sung, K.M., Lee, J.H.: A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust. In: International Conference on Information systems, vol.15 Ahn, J.H., Choi, K.C., Sung, K.M., Lee, J.H.: A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust. In: International Conference on Information systems, vol.15
28.
go back to reference Hexin, Y., Ahn, J.C.: An empirical analysis on the persistent usage of personal cloud service: a cast study of China. Proc. Korean Soc. Internet Inf. Conf. 15(2), 149–150 (2014) Hexin, Y., Ahn, J.C.: An empirical analysis on the persistent usage of personal cloud service: a cast study of China. Proc. Korean Soc. Internet Inf. Conf. 15(2), 149–150 (2014)
29.
go back to reference Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor affecting the continuous use of cloud storage service: user factor, system factor, psychological switching cost factor. J. Soc. e-Bus. Stud. 19(1), 15–42 (2014)CrossRef Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor affecting the continuous use of cloud storage service: user factor, system factor, psychological switching cost factor. J. Soc. e-Bus. Stud. 19(1), 15–42 (2014)CrossRef
30.
go back to reference Seo, K.K.: Factor analysis of the cloud service adoption intension of Korean firms: applying the TAM and VAM. J. Digit Policy Manag. 11(12), 155–160 (2013) Seo, K.K.: Factor analysis of the cloud service adoption intension of Korean firms: applying the TAM and VAM. J. Digit Policy Manag. 11(12), 155–160 (2013)
31.
go back to reference Park, C.S.: Study on security considerations in the cloud computing. J Korea Acad.-Ind. Co-op. Soc. 12(3), 1408–1416 (2011) Park, C.S.: Study on security considerations in the cloud computing. J Korea Acad.-Ind. Co-op. Soc. 12(3), 1408–1416 (2011)
32.
go back to reference Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010) Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702 (2010)
33.
go back to reference Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing. Gartner (2008) Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing. Gartner (2008)
34.
go back to reference Almond, C.: A Practical Guide to Cloud Computing Security What You Need to Know Now About Your Business and Cloud Security, pp. 6–27. Avanade Inc. (2009) Almond, C.: A Practical Guide to Cloud Computing Security What You Need to Know Now About Your Business and Cloud Security, pp. 6–27. Avanade Inc. (2009)
35.
go back to reference Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef
36.
go back to reference Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and eucalyptus. Cloud computing. In: IEEE International Conference, pp. 151–154 (2009). Accessed 25 August (2015) Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and eucalyptus. Cloud computing. In: IEEE International Conference, pp. 151–154 (2009). Accessed 25 August (2015)
38.
go back to reference Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995) Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)
39.
go back to reference Liu, C., Marchewka, J.T., Lu, J., Yu, C.S.: Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42, 289–304 (2005)CrossRef Liu, C., Marchewka, J.T., Lu, J., Yu, C.S.: Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42, 289–304 (2005)CrossRef
40.
go back to reference Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877–886 (2006)CrossRef Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877–886 (2006)CrossRef
41.
go back to reference Liao, C., Liu, C.C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron. Commer. Res. Appl. 10, 702–715 (2011)CrossRef Liao, C., Liu, C.C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron. Commer. Res. Appl. 10, 702–715 (2011)CrossRef
42.
go back to reference Rho, M.J., Kim, H.S., Chung, K.Y., Choi, I.Y.: Factors influencing the acceptance of telemedicine for diabetes management. Clust. Comput. 18, 321–331 (2015)CrossRef Rho, M.J., Kim, H.S., Chung, K.Y., Choi, I.Y.: Factors influencing the acceptance of telemedicine for diabetes management. Clust. Comput. 18, 321–331 (2015)CrossRef
43.
go back to reference Ajzen, I.: The theory of planned behavior. Org. Behav. Hum. Decis. Process. 50, 179–211 (1991)CrossRef Ajzen, I.: The theory of planned behavior. Org. Behav. Hum. Decis. Process. 50, 179–211 (1991)CrossRef
44.
go back to reference Barnes, S., Bohringer, M.: Modeling user continuance behavior in microblogging services: the case of Twitter. J. Comput. Inf. Syst. 51(4), 1–10 (2011) Barnes, S., Bohringer, M.: Modeling user continuance behavior in microblogging services: the case of Twitter. J. Comput. Inf. Syst. 51(4), 1–10 (2011)
45.
go back to reference Burtescu, E.: Reliability and security—convergence or divergence. Inf. Econ. 14(4), 68–77 (2010) Burtescu, E.: Reliability and security—convergence or divergence. Inf. Econ. 14(4), 68–77 (2010)
46.
go back to reference Weber, R.: Ontological Foundations of Information Systems. Buscombe Vicprint, Blackburn, Victoria (1997) Weber, R.: Ontological Foundations of Information Systems. Buscombe Vicprint, Blackburn, Victoria (1997)
47.
go back to reference Rotter, J.B.: A new scale for measurement of interpersonal trust. J. Personal. 35(4), 651–665 (1967)CrossRef Rotter, J.B.: A new scale for measurement of interpersonal trust. J. Personal. 35(4), 651–665 (1967)CrossRef
48.
go back to reference Wiliamson, M.: Invaders, weeds and the risk from genetically modified organisms. Experientia 49, 219–224 (1993)CrossRef Wiliamson, M.: Invaders, weeds and the risk from genetically modified organisms. Experientia 49, 219–224 (1993)CrossRef
49.
go back to reference Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998)CrossRef Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998)CrossRef
50.
go back to reference Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003) Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)
51.
go back to reference Grazioli, S., Jarvenpaa, S.: Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395–410 (2000) Grazioli, S., Jarvenpaa, S.: Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395–410 (2000)
52.
go back to reference John, W.R., James, F.R.: Cloud Computing: Implementation, Management and Security. CRC Press (2010) John, W.R., James, F.R.: Cloud Computing: Implementation, Management and Security. CRC Press (2010)
54.
go back to reference Davis, F.D.: Perceived Usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)CrossRef Davis, F.D.: Perceived Usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)CrossRef
55.
go back to reference Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186–204 (2000)CrossRef Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186–204 (2000)CrossRef
57.
go back to reference Hulland, J.: Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg. Manag. J. 20(2), 195–204 (1999)CrossRef Hulland, J.: Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg. Manag. J. 20(2), 195–204 (1999)CrossRef
58.
go back to reference Fornell, C., Cha, J.: Partial least squares. In: Bagozzi, R.P. (ed.) Advanced Methods in Marketing Research, pp. 52–78. Blackwell, Cambridge (1994) Fornell, C., Cha, J.: Partial least squares. In: Bagozzi, R.P. (ed.) Advanced Methods in Marketing Research, pp. 52–78. Blackwell, Cambridge (1994)
59.
go back to reference Fornell, C., Larcker, D.: Structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)CrossRef Fornell, C., Larcker, D.: Structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)CrossRef
Metadata
Title
Factors affecting the continuous use of cloud service: focused on security risks
Authors
Seong-Taek Park
Eun-Mi Park
Joung-Hae Seo
Guozhong Li
Publication date
01-03-2016
Publisher
Springer US
Published in
Cluster Computing / Issue 1/2016
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0516-y

Other articles of this Issue 1/2016

Cluster Computing 1/2016 Go to the issue

Premium Partner