485
Views
7
CrossRef citations to date
0
Altmetric
Articles

Self-Determination and Perceived Information Control in Cloud Storage Service

, &

References

  • Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A. Cloud computing: the business perspective. Decision Support Systems. 2011;51(1):176–89. doi:10.1016/j.dss.2010.12.006.
  • Mell P, Grance T The NIST definition of cloud computing; 2011 [accessed August 28, 2017]. http://www.profsandhu.com/cs6393_s13/nist-SP800-145.pdf.
  • Menard P, Gatlin R, Warkentin M. Threat protection and convenience: antecedents of cloud-based data backup. Journal of Computer Information Systems. 2014;55(1):83–91. doi:10.1080/08874417.2014.11645743.
  • Zviran M. User’s perspectives on privacy in web-based applications. Journal of Computer Information Systems. 2008;48(4):97–105.
  • Kim M, Park SO. Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing. 2013;16(4):725–31. doi:10.1007/s10586-013-0248-9.
  • Smith HJ, Dinev T, Xu H. Information privacy research: an interdisciplinary review. MIS Quarterly. 2011;35(4):989–1015.
  • Xu H, Dinev T, Smith J, Hart P. Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems. 2011;12(12):798–824.
  • Kim DJ, Sivasailam N, Rao HR. Information assurance in b2c websites for information goods/services. Electronic Markets. 2004 Dec;14(4):344–59. doi:10.1080/10196780412331311784.
  • Kobsa A. Privacy-enhanced personalization. Communications of the ACM. 2007;50(8):24–33. doi:10.1145/1278201.
  • Lansing J, Schneider S, Sunyaev A Cloud service certifications: measuring consumers’ preferences for assurances. In the Proceedings of the 21th European Conference on Information Systems; 2013; Netherlands, Utrecht. Paper 2013-181.
  • Hu W, Yang T, Matthews JN. The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Operating Systems Review. 2010;44(3):110–15. doi:10.1145/1842733.
  • Hu X, Wu G, Wu Y, Zhang H. The effects of Web assurance seals on consumers’ initial trust in an online vendor: a functional perspective. Decision Support Systems. 2010;48(2):407–18. doi:10.1016/j.dss.2009.10.004.
  • Kim D, Benbasat I. Trust-assuring arguments on consumer trust in Internet stores: application of Toulmin’s model of argumentation. Information Systems Research. 2006;17(3):286–300. doi:10.1287/isre.1060.0093.
  • Morton A, Sasse MA Privacy is a process, not a PET: a theory of effective privacy practice. In the Proceedings of the 2012 Workshop on New Security Paradigms; 2012; Bertinoro Italy, 87–104.
  • Deci EL, Eghrari H, Patrick BC, Leone DR. Facilitating internalization: the self-determination theory perspective. Journal of Personality. 1994;62(1):119–42. doi:10.1111/jopy.1994.62.issue-1.
  • Deci EL, Ryan RM. Intrinsic Motivation and Self-Determination in Human Behavior. New York: Plenum Press; 1985.
  • Deci EL, Ryan RM. The “what” and “why” of goal pursuits: human needs and the self-determination of behavior. Psychological Inquiry. 2000;11(4):227–68. doi:10.1207/S15327965PLI1104_01.
  • Sheldon KM, Tuban DB, Brown KG, Barrick MR, Judge TA. Applying self-determination theory to organizational research. Personnel and Human Resources Management. 2003;22:357–93.
  • Ryan RM, Deci EL. Overview of self-determination theory: an organismic dialectical perspective. In: El D, Rm R, editors. Handbook of Self-determination Research. New York: University of Rochester Press; 2002.
  • Li H, Sarathy R, Xu H. Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems. 2010;51(1):62–71.
  • Bansal G, Zahedi FM, Gefen D The Moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. Proceedings of the Twenty Ninth International Conference on Information Systems; Paris, France, 2008.
  • Hui KL, Teo HH, Lee SYT. The value of privacy assurance: an exploratory field experiment. MIS Quarterly. 2007;31(1):19–33.
  • Kim DJ, Steinfield C, Lai YJ. Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems. 2008;44(4):1000–15. doi:10.1016/j.dss.2007.11.007.
  • Ray S, Ow T, Kim SS. Security assurance: how online service providers can influence security control perceptions and gain trust. Decision Sciences. 2011;42(2):391–412. doi:10.1111/deci.2011.42.issue-2.
  • Xu H, Teo HH Alleviating consumers’ privacy concerns in location-based services: a psychological control perspective. In Proceedings of the 25th International Conference on Information Systems; Washington, D.C., 2004; 793–806.
  • Elliot AJ, McGregor HA, Thrash TM. The need for competence. In: El D, Rm R, editor. Handbook of Self-Determination Research. Rochester: University of Rochester Press; NY; 2004. p. 361–87.
  • Alge BJ, Ballinger GA, Tangirala S, Oakley JL. Information privacy in organizations: empowering creative and extra role performance. Journal of Applied Psychology. 2006;91(1):221–32. doi:10.1037/0021-9010.91.1.221.
  • Ntoumanis N. A self-determination approach to the understanding of motivation in physical education. British Journal of Educational Psychology. 2001;71:225–42. doi:10.1348/000709901158497.
  • Li Y, Wang X. online social networking sites continuance intention: a model comparison approach. Journal of Computer Information Systems. 2017;57(2):160–68. doi:10.1080/08874417.2016.1183448.
  • Wang X, Li Y. Users’ satisfaction with social network sites: a self-determination perspective. Journal of Computer Information Systems. 2015;56(1): Fall 2015:48–54. doi:10.1080/08874417.2015.11645800.
  • Standage M, Duda JL, Ntoumanis N. A test of self-determination theory in school physical education. British Journal of Educational Psychology. 2005;75(3):411–33. doi:10.1348/000709904X22359.
  • Li X, Hess TJ, Valacich JS. Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems. 2008;17(1):39–71. doi:10.1016/j.jsis.2008.01.001.
  • Chandra S, Srivastava SC, Theng YL. Evaluating the role of trust in consumer adoption of mobile payment systems: an empirical analysis. Communications of the Association for Information Systems. 2010;27(1):561–88.
  • Boritz JE. No WG. E-commerce and privacy: exploring what we know and opportunities for future discovery. Journal of Information Systems. 2011;25(2): Fall 2011:11–45. doi:10.2308/isys-10090.
  • Cannoy SD, Salam AFA. Framework for health care information assurance policy and compliance. Communications of the ACM. 2010;53(3):126–31. doi:10.1145/1666420.1666453.
  • Hein V, Koka A. Perceived feedback and motivation in physical education and physical activity. In: Ms H, Nld C, editors. Intrinsic Motivation and Self-Determination in Exercise and Sport. Champaign (IL): Human Kinetics; 2007.
  • La Guardia JG, Patrick H. Self-determination theory as a fundamental theory of close relationships. Canadian Psychology. 2008;49(3):201–09. doi:10.1037/a0012760.
  • Roy S, Ponnam A, Mandal S. Comprehending technology attachment in the case of smart phone-applications: an empirical study. Journal of Electronic Commerce in Organizations. 2017;15(1):23–43. doi:10.4018/JECO.
  • Rubinstein IS, Good N. Privacy by design: a counterfactual analysis of Google and Facebook privacy incidents. Berkeley Tech. Law Journal. 2013;28(2):1335–412.
  • Hagger MS, Chatzisarantis NLD. Integrating the theory of planned behaviour and self-determination theory in health behaviour: a meta-analysis. British Journal of Health Psychology. 2009;14(2):275–302. doi:10.1348/135910708X373959.
  • Hagger MS, Chatzisarantis NLD, Harris J. From psychological need satisfaction to intentional behavior: testing a motivational sequence in two behavioral contexts. Personality and Social Psychology Bulletin. 2006;131–48. doi:10.1177/0146167205279905.
  • Spreitzer GM, Kizilos MA, Nason SW. A dimensional analysis of the relationship between psychological empowerment and effectiveness, satisfaction, and strain. Journal of Management. 1997;23(5):679–704.
  • Martinko MJ, Gardner WL. Leaned helplessness: an alternative explanation for performance deficits. Academy of Management Review. 1982;7(2):195–204.
  • Venkatesh V, Davis FD. A model of the antecedents of perceived ease of use: development and test. Decision Science. 1996;27(3):451–81. doi:10.1111/j.1540-5915.1996.tb01822.x.
  • Culnan MJ, Bies RJ. Consumer privacy: balancing economic and justice considerations. Journal of Social Issues. 2003;59(2):104–15. doi:10.1111/1540-4560.00067.
  • Lin A, Chen NC. Cloud computing as an innovation: perception, attitude, and adoption. International Journal of Information Management. 2012;32(6):533–40. doi:10.1016/j.ijinfomgt.2012.04.001.
  • Li Y. Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems. 2012;54(1):471–81. doi:10.1016/j.dss.2012.06.010.
  • Pavlou PA, Liang H, Xue Y. Understanding and mitigating uncertainty in online buyer-seller relationships: a principal agent perspective. MIS Quarterly. 2007;31(1):105–36.
  • Klein CTF, Helweg-Larsen M. Perceived control and the optimistic bias: a meta-analytic review. Psychology and Health. 2002;17(4):437–46. doi:10.1080/0887044022000004920.
  • Hajli N, Lin X. Exploring the security of information sharing on social networking sites: the role of perceived control of information. Journal of Business Ethics. 2016;111–23. doi:10.1007/s10551-014-2346-x.
  • Krasnova H, Spiekermann S, Koroleva K. Online social networks: why we disclose. Journal of Information Technology. 2016;25(2):109–25. doi:10.1057/jit.2010.6.
  • Stantchev V, Colomo-Palacio R, Soto-Acosta P, Misra S. Learning management systems and cloud file hosting services: a study on students’ acceptance. Computers in Human Behavior. 2014;31:612–19. doi:10.1016/j.chb.2013.07.002.
  • Gefen D, Straub D. The relative importance of perceived ease of use in IS adoption: a study of e-commerce adoption. Journal of the Association for Information Systems. 2000;1(8):1–28.
  • Fornell C, Larcker D. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research. 1981;18:39–50. doi:10.2307/3151312.
  • Podsakoff PM, MacKenzie SB, Jeong-Yeon L, Podsakoff NP. Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology. 2003;88(5):879–903. doi:10.1037/0021-9010.88.5.879.
  • Gefen D, Rigdon EE, Straub D. An update and extension to sem guidelines for administrative and social science research. MIS Quarterly. 2011;35(2):iii–xiv.
  • Ringle CM, Wende S, Will S. SmartPLS 2.0 (M3) Beta; 2005. http://www.smartpls.de.
  • Baron RM, Kenny DA. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology. 1986;51:1173–82. doi:10.1037/0022-3514.51.6.1173.
  • Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing. 2000;19(1):27–41. doi:10.1509/jppm.19.1.27.16941.
  • Xu H, Teo HH, Tan BCY, Agarwal R. Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research. 2012;23(4):1342–63. doi:10.1287/isre.1120.0416.
  • Li Y. A multi-level model of individual information privacy beliefs. Electronic Commerce Research and Applications. 2014;13:32–44. doi:10.1016/j.elerap.2013.08.002.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.