599
Views
10
CrossRef citations to date
0
Altmetric
Articles

An Identification of Factors Motivating Individuals’ Use of Cloud-Based Services

, &

References

  • Aharony N. 2015. An exploratory study on factors affecting the adoption of cloud computing by information professionals. ElectronLib. 33(2):308–323.
  • Ajzen I. 2006. Constructing a theory of planned behavior questionnaire. Unpublished manuscript.
  • Ajzen I. 2002. Constructing a TPB questionnaire: Conceptual and methodological considerations. Available from http://chuang.epage.au.edu.tw/ezfiles/168/1168/attach/20/pta_41176_7688352_57138.pdf
  • Ajzen I. 1991. The theory of planned behavior. Organizational Behav Hum Decis Processes 50(2):179–211.
  • Ajzen I, Fishbein M. 2005. Chapter five: The influence of attitudes on behavior. The handbook of attitudes, 173–230.
  • Ajzen I, Fishbein M. 1980. Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice Hall.
  • Alshamaila Y, Papagiannidis S, Li F. 2013. Cloud computing adoption by SMEs in the north east of England. J Enterp Inf Manage. 26(3):250–275.
  • Angst CM, Agarwal R. 2009. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Q. 33(2):339–370.
  • Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. 2010. A view of cloud computing. Commun ACM 53(4):50–58.
  • Bandura A. 1997. Self-efficacy: The Exercise Of Control. New York: John Wiley and Sons.
  • Bansal SK. 2014. Snapchat app vulnerable to denial-of-service attack, allows remotely crash iPhone. http://thehackernews.com/2014/02/hack-Snapchat-denial-of-service-attack-vulnerability.html [accessed 16 February 2016]
  • Bhattacherjee A, Park SC. 2014. Why end-users move to the cloud: A migration-theoretic analysis. Eur J Inf Syst. 23(3):357–372.
  • Brown M, Muchira R. 2004. Investigating the relationship between Internet privacy concerns and online purchase behavior. J Electron Commerce Res. 5(1):62–70.
  • Carcary M, Doherty E, Conway G. 2014. The adoption of cloud computing by irish SMEs - an exploratory study. Electron J Inf Syst Eval. 17(1):3–14.
  • Chen D, Zhao H. 2012. Data security and privacy protection issues in cloud computing, In: Proceedings, Computer Science and Electronics Engineering (ICCSEE/IEEE), Hangzhou, China, March 23, 2012, Vol. 1, 647–651.
  • Chen Y, Yan X, Fan W, and Gordon M. 2015. The joint moderating role of trust propensity and gender on consumers’ online shopping behavior. Comput Hum Behav. 43(1):272–283.
  • Chow S, Holden R. 1997. Toward an understanding of loyalty: the moderating role of trust. J Managerial Issues 9(3):275–298.
  • Clarke R. 2010. Computing Clouds on the Horizon? Benefits and Risks from the User’s Perspective, In: Proceedings, BLED, Bled, Solvenia, June 20, 2010, 569–590.
  • Compeau DR, and Higgins CA. 1995. Computer self-efficacy: Development of a measure and initial test. MIS Q. 19(2):189–211.
  • Dabholkar PA, Bagozzi RP. 2002. An attitudinal model of technology-based self-service: moderating effects of consumer traits and situational factors. J Acad Marketing Sci. 30(3):184–201.
  • Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C. 2006. Privacy calculus model in e-commerce–a study of Italy and the United States. Eur J Inf Syst. 15(4):389–402.
  • Eastin MS, LaRose R. 2000. Internet self‐efficacy and the psychology of the digital divide. J Comput‐Med Commun. 6(1).
  • Fishbein M, Ajzen I. 2011. Predicting and Changing Behavior: The Reasoned Action Approach. Taylor and Francis, Abingdon, England.
  • Fishbein M, and Ajzen I. 1975. Belief, attitude, intention, and behavior: an introduction to theory and research, Addison-Wesley series in social psychology, Addison-Wesley, Boston, Massachusetts.
  • French DP, Sutton S, Hennings SJ, Mitchell J, Wareham NJ, Griffin S, Kinmonth AL. 2005. The importance of affective beliefs and attitudes in the theory of planned behavior: Predicting intention to increase physical activity. J Appl Social Psychol. 35(9): 1824–1848.
  • Gangwar H, Date H, Ramaswamy R. 2015. Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. J Enterp Inf Manage. 28(1):107–130.
  • Gashami JP, Chang Y, Rho JJ, Park MC. 2014. Understanding the Trade-Off between Privacy Concerns and Perceived Benefits in SaaS Individual Adoption,” In: Proceedings, Pacific Asia Conference on Information Systems (PACIS), Hochiminh City, Vietnam, July, 11, 354–366.
  • Gefen D. 2000. E-commerce: The role of familiarity and trust. Omega Int J Manage Sci. 28(6):725–737.
  • Gefen D, Karahanna E, Straub DW. 2003. Trust and TAM in online shopping: An integrated model. MIS Q. 27(1):51–90.
  • Goldsmith RE, Freiden JB, Kilsheimer JC. 1993. Social values and female fashion leadership: A cross‐cultural study. Psychol Marketing 10(5):399–412.
  • Grewal R, Mehta R, Kardes FR. 2000. The role of the social-identity function of attitudes in consumer innovativeness and opinion leadership. J Econ Psychol. 21(3):233–252.
  • Hann IH, Hui KL, Lee SYT, Png IP. 2007. Overcoming online information privacy concerns: An information-processing theory approach. J Manage Inf Syst. 24(2):13–42.
  • Hazeldine MF, Miles MP. 2010. An exploratory role analysis of opinion leaders, adopters, and communicative adopters with a dynamically continuous innovation. J Appl Bus Res. 26(4):117.
  • Ion I, Sachdeva N, Kumaraguru P, Čapkun S. 2011. Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the Seventh Symposium on Usable Privacy and Security (ACM), Pittsburgh, Pennsylvania, July 20, 2011, article 13.
  • Janssen M, Joha A 2011. Challenges for adopting cloud-based software as a service (saas) in the public sector, In: Proceedings European Conference on Information Systems (ECIS), Helsinki, Finland, June 6, 2011, paper 80.
  • Kerr D. 2102. Dropbox confirms it was hacked, offers users help, http://www.cnet.com/news/dropbox-confirms-it-was-hacked-offers-users-help/.
  • Koehler P, Anandasivam A, Dan MA, Weinhardt C. 2010. Cloud Services from a consumer perspective, In: Proceedings, Americas Conference on Information Systems (AMCIS), Lima, Peru, August, 12, 2010, 329–339.
  • Koufaris M, Hampton-Sosa W. 2004. The development of initial trust in an online company by new customers. Inf Manage. 41(3):377–397.
  • Kumari M, Nath R. 2015. Security Concerns and Countermeasures in Cloud Computing Paradigm. In: Proceedings of Advanced Computing & Communication Technologies (ACCT) Fifth International Conference (IEEE), Rohtak, India: February 21, 2015, 534–540.
  • Leonard-Barton D. 1985. Experts as negative opinion leaders in the diffusion of a technological innovation. J Consum Res. 11(4):914–926.
  • Li Y, Chang KC. 2012. A study on user acceptance of cloud computing: A multi-theoretical perspective, In: Proceedings, Americas Conference on Information Systems (AMCIS), Seattle, Washington, August 9, 2012, paper 19.
  • Lin A, Chen NC. 2012. Cloud computing as an innovation: Perception, attitude, and adoption. Int J Inf Manage. 32(6):533–540.
  • Liu C, Marchewka JT, Lu J, Yu CS. 2005. Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf Manage. 42(2):289–304.
  • Luhmann N. 1979. Trust and Power.Chichester: United Kingdom: John Wiley and Sons.
  • Malhotra NK, Kim SS, Agarwal J. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf Syst Res. 15(4):336–355.
  • Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A. 2011. Cloud computing—The business perspective. Decis Support Syst. 51(1):176–189.
  • Mayer RC, Davis JH, Schoorman FD. 1995. An integrative model of organizational trust. Acad Manage Rev. 20(3):709–734.
  • McLain DL, Hackman K. 1995. Trust, risk, and decision-making in organizational change. Publ Administration Q. 23(2):152–176.
  • Mell P, Grance T. 2010. The NIST definition of cloud computing. Commun ACM. 53(6):50.
  • Menard P, Gatlin R, Warkentin M. 2014. Threat protection and convenience: Antecedents of cloud-based data backup. J Comput Inf Syst. 55(1):83–91.
  • Miller M. 2008. Cloud computing: Web-based Applications That Change the Way You Work and Collaborate Online. Que publishing; Indianapolis, Indiana.
  • Milne GR, Gordon ME. 1993. Direct mail privacy-efficiency trade-offs within an implied social contract framework. J Publ Policy Marketing 12(2):206–215.
  • Moqbel MA, Bartelt VL. 2015. Consumer acceptance of personal cloud: Integrating trust and risk with the technology acceptance model. AIS Trans Replication Res. 1(5):1–12.
  • Mou J, Cohen J. 2013. Trust and risk in consumer acceptance of e-services: A meta-analysis and a test of competing models, In: Proceedings of the Thirty-Fourth International Conference on Information Systems (ICIS), Milano, Italy, December 15, 2013, 1–14.
  • Paganini P. 2013. Vulnerability allows Hacking Facebook account and password reset within a minute [cited 16 Feb 16]. Available from http://thehackernews.com/2013/07/vulnerability-allows-hacking-facebook.html
  • Pavlou PA. Chai L. 2002. What drives electronic commerce across cultures? Across-Cultural empirical investigation of the theory of planned behavior. J Electron Commerce Res. 3(4):240–253.
  • Pavlou PA, Fygenson M. 2006. Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Q. 30(1):115–143.
  • Peng GCA, Gala C. 2014. Cloud ERP: a new dilemma to modern organisations? J Comput Inf Syst. 54(4):22–30.
  • Phelps J, Nowak G, Ferrell E. 2000. Privacy concerns and consumer willingness to provide personal information. J Publ Policy Marketing 19(1):27–41.
  • Qian L, Luo Z, Du Y, Guo L. 2009. Cloud Computing: An Overview. Springer, Berlin, Germany, 626–631.
  • Randall DM, Gibson AM. 1991. Ethical decision making in the medical profession: An application of the theory of planned behavior. J Bus Ethics 10(2):111–122.
  • Rastogi A. 2010. A model based approach to implement cloud computing in e-Governance. Int. J. Comput Appl. 9(7):15–18.
  • Ratten V. 2015. Factors influencing consumer purchase intention of cloud computing in the United States and Turkey. Eur Med J Bus. 10(1):80–97.
  • Sánchez-Franco MJ, Roldán JL. 2015. The influence of familiarity, trust and norms of reciprocity on an experienced sense of community: an empirical analysis based on social online services. Behav Inf Technol. 34(4):392–412.
  • Shin J, Jo M, Lee J, Lee D. 2014. Strategic management of cloud computing services: Focusing on consumer adoption behavior. IEEE Transactions on Eng Manage. 61(3):419–427.
  • Smith HJ, Milberg SJ, Burke SJ. 1996. Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(1):167–196.
  • Solomon MR. 2014. Consumer Behavior: Buying, Having, and Being. Englewood Cliffs, NJ: Prentice Hall.
  • Sparks P, Shepherd R. 1992. Self-identity and the theory of planned behavior: Assessing the role of identification with “green consumerism”. Social Psychol Q. 55(4):388–399.
  • Straub D, Limayem M, Karahanna-Evaristo E. 1995. Measuring system usage: Implications for IS theory testing. Manage Sci. 41(8):1328–1342.
  • Subashini S, Kavitha V. 2011. A survey on security issues in service delivery models of cloud computing. J Network Comput Appl. 34(1):1–11.
  • Sultan N. 2010. Cloud computing for education: A new dawn? Int J Inf Manage 30(2):109–116.
  • Taylor S, Todd PA. 1995. Understanding information technology usage: A test of competing models. Inf Syst Res. 6(2):144–176.
  • Teneyuca D. 2011. Internet cloud security: The illusion of inclusion. Inf Secur Technical Rep. 16(3):102–107.
  • Trafimow D, Sheeran P, Conner M, Finlay KA. 2002. Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. Br J Social Psychol. 41(1):101–121.
  • Van Slyke C, Shim JT, Johnson R, Jiang JJ. 2006. Concern for information privacy and online consumer purchasing. J Assoc Inf Syst. 7 (6):article16.
  • Venkatraman MP. 1989. Opinion leaders, adopters, and communicative adopters: A role analysis. Psychol. Marketing 6(1):51–68.
  • Velte T, Velte A, Elsenpeter R. 2009. Cloud Computing, a Practical Approach. New York, NY: McGraw-Hill, Inc.
  • Wang L, Von Laszewski G, Younge A, He X, Kunze M, Tao J, Fu C. 2010. Cloud computing: a perspective study. New Gener Comput. 28(2):137–146.
  • Widjaja A, Chen JV. 2012. Using cloud computing service: A perspective from users’ information security, privacy concern, and trust”. In: Proceedings, 43rd Decision Sciences Institute Annual Meeting (DSI), San Francisco, California, November, 20, 2012, 92201–92211.
  • Zhou M, Zhang R, Xie W, Qian W, Zhou A. 2010. Security and privacy in cloud computing: A survey. In: Proceedings of Semantics Knowledge and Grid (SKG) Sixth International Conference (IEEE), Ningbo, China, November, 1, 2010, 105–112.
  • Zucker LG. 1986. Production of trust: Institutional sources of economic structure. Res Organizational Behav. 8(1):1840–1920.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.