698
Views
8
CrossRef citations to date
0
Altmetric
Original Research

Better Safe than Sorry: A Study of Investigating Individuals’ Protection of Privacy in the Use of Storage as a Cloud Computing Service

, , , &

References

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision, 50, 179–211.
  • Ajzen, I., & Madden, T. M. (1986, September). Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology, 22(5), 453–474.
  • Alicke, M. D., & Sedikides, C. (2009). Self-enhancement and self-protection: What they are and what they do. European Review of Social Psychology, 20, 1–48.
  • Ambrose, P., & Chiravuri, A. (2010). An empirical investigation of Cloud Computing for personal use. Proceedings of the Fifth Midwest Association for Information Systems Conference. Retrieved from http://aisel.aisnet.org/mwais2010/24.
  • Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 614–643.
  • Anonymous. (2011). Cloud providers aren’t much concerned with security. Information Management Journal, 45(4), 7.
  • Armburst, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.
  • Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33.
  • Bagozzi, R. P., Yi, Y., & Philips, L. W. (1991). Assessing construct validity in organizational research. Administrative Science Quarterly, 36(3), 421–458.
  • Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84, 191–215.
  • Bansal, G., Zahedi, F., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 138–150.
  • Bardhan, I. R., Demirkan, H., Kannan, P. K., Kauffman, R. J., & Sougstad, R. (2010). An interdisciplinary perspective on IT services management and service science. Journal of Management Information Systems, 26(4), 13–64.
  • Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493–524.
  • Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: Findings from a survey of IT executives. Decision Support Systems, 52, 232–246.
  • Benlian, A., Koufaris, M., & Hess, T. (2011). Service quality in software-as-a-service: Developing the SaaS-Qual measure and examining its role in usage continuance. Journal of Management Information Systems, 28(3), 85–126.
  • Buyya, R., Yeo, C., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.
  • Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H., & Upadhyaya, S. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167–182.
  • Chenoweth, T., Minch, R., & Gattiker, T. (2009). Application of protection motivation theory to adoption of protective technologies. Paper presented at the 42nd Hawaii International Conference on System Sciences, Big Island, HI, January 5–8. doi:10.1109/HICSS.209.74
  • Chin, W. (1998). Issues and opinions on structural equation modeling. MIS Quarterly, 22(1), vii–xvi.
  • Chin, W. W. (2010). How to write up and report PLS analysis. In E. V. Vinzi, W. W. Chin, J. Henseler, & H. Wang (Eds.), Handbook of partial least squares (Concepts, methods, and applications) (pp. 655–690). Berlin: Springer-Verlag.
  • Choudhary, V., & Vithayathil, J. (2013). The impact of cloud computing: Should the IT department be organized as a cost center or a profit center? Journal of Management Information Systems, 30(2), 67–100.
  • Cremonini, M., Braghin, C., & Ardagna, C. A. (2009). Net privacy. In Computer and information security handbook (pp. 469–488). Burlington, VT: Morgan Kaufmann.
  • Crosman, P. (2013, February). Cloud computing security rules put responsibility on users. Retrieved from http://www.americanbanker.com/issues/178_29/cloud-computing-data-security-rules-put-responsibility-on-users-1056664-1.html
  • Crossler, E. R. (2010). Protection motivation theory: Understanding determinants to backing up personal data. Paper presented at the 2010 43rd Hawaii International Conference on Systems Sciences, Honolulu, HI, January 5–8.
  • Dimitros, Z., & Dimitros, L. (2012, March). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.
  • Dinev, T., & Hart, P. (2006). An extended calculus privacy model for e-commerce transactions. Information Systems Research, 17, 61–80.
  • Durkee, D. (2010). Why cloud computing will never been free. Queue, 8(4), 20–29.
  • Dutta, A., Peng, G.-C. A., & Choudhary, A. (2013). Risks in enterprise cloud computing: The perspective of IT experts. Journal of Computer Information Systems, 53(4), 39–48.
  • Earley, P. C., Connolly, T., & Ekegren, G. (1989). Goals, strategy development, and task performance: Some limits on the efficacy of goal setting. Journal of Applied Psychology, 74, 24–33.
  • Faul, F., Erdfelder, E., Lang, A. G., & Buchner, A. (2007). G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39, 175–191.
  • Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: The influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219–229.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing, 18, 39–50.
  • Goodrich, T., & Tamassia, R. (2011). Introduction to computer security. Pearson, MA: Boston.
  • Grama, J. L. (2011). Legal issues in information security. Sudbury, MA: Jones & Bartlett.
  • Gritzalis, D. A. (2004). Embedding privacy in IT applications development. Information Management & Computer Security, 12(1), 8–26.
  • Haans, A., Kaiser, F. G., & DeKort, Y. A. (2007). Privacy needs in office environments: Development of two behavior-based scales. European Psychologist, 12(2), 93–102.
  • Han, K., Shih, P. C., & Carroll, J. M. (2014, September). Local news chatter: Augmenting community news by aggregating hyperlocal microblog content in a tag cloud. International Journal of Human–Computer Interaction, 30(12), 1003–1014.
  • Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.
  • Herath, T., & Rao, H. R. (2009b). Protection motivation and detterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18, 106–125.
  • Homburg, A., & Stolberg, A. (2006). Explaining pro-environmental behavior with a cognitive theory of stress. Journal of Environmental Psychology, 26, 1–14.
  • Horrigan, J. B. (2008). Use of cloud computing applications and services. Pew Internet and American Life Project. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2008/PIP_Cloud.Memo.pdf.pdf
  • Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 195–224.
  • Hung, S.-W., Cheng, M.-J., & Chen, P.-C. (2012). Reexamining the factors for trust in cultivating online customer repurchase intentions: The moderating effect of perceived waiting. International Journal of Human–Computer Interaction, 28(10), 666–677.
  • Ion, I., Sachdeva, N., Kumaraguru, P., & Capkun, S. (2011). Home is safer than the cloud!: Privacy concerns for consumer cloud storage. Paper presented at the Seventh Symposium on Usable Privacy and Security, Pittsburgh, PA, July 20–22.
  • Jaeger, P., Lin, J., Grimes, J., & Simmons, S. (2009). Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing. First Monday, 14(5). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/osj/index.php/fm/article/view/2456/2171
  • Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269–283.
  • Johns, M., Windsor, J., & Visinescu, L. (2011, June). Information technology literacy revisited: An exploratory assessment. ACM Inroads, 2(2), 59–66.
  • Johnston, A. C., & Warketin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 648–566.
  • Jones, K., & Leonard, L. K. (2008). Trust in consumer-to-consumer electronic commerce. Information & Management, 45(2), 88–95.
  • Jourard, S. M. (1966). Some psychological aspects of privacy. Law and Contemporary Problems, 31, 307–318.
  • Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17, 387–402.
  • Karni, E., & Schmeidler, D. (1986). Self-preservation as a foundation of rational behavior under risk. Journal of Economic Behavior and Organization, 7, 71–82.
  • Katzan, H. (2010a). On an ontological view of cloud computing. Journal of Service Science, 3, 1–6.
  • Katzan, H. (2010b). On the privacy of cloud computing. International Journal of Management & Information Systems, 14(2), 1–12.
  • Khajeh-Hosseini, A., Sommerville, I., & Sriram, I. (2010). Research challenges for enterprise cloud computing. Submitted to 1st ACM Symposium on Cloud Computing. Retrieved from http://arxiv.org/ftp/arxiv/papers/1001/1001.3257.pdf.
  • Khansa, L., & Zobel, C. W. (2013). Assessing innovations in cloud security. Journal of Computer Information Systems, 54(3), 45–56.
  • Ko, D. G., Kirsch, L. J., & King, W. R. (2005). Antecedents of knowledge transfer from consultants to clients in enterprise systems implementations. MIS Quarterly, 29, 59–85.
  • Korzaan, M., Brooks, N., & Greer, T. (2009). Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business, 1, 1–17.
  • Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online company by new customers. Information and Management, 4(13), 377–397.
  • La Rose, R., Rifon, N. J., & Enbody, R. (2008, March). Promoting personal responsibility for internet safety. Communications of the ACM, 51(3), 71–76.
  • Larose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for internet safety. Communications of the ACM, 51(3), 71–76.
  • Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. European Journal of Information Systems, 18, 177–187.
  • Liang, H., Sarag, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of the top management. MIS Quarterly, 31(1), 59–87.
  • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.
  • Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2004). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, 127–142.
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479.
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrated model of organizational trust. Academy of Management Review, 20(3), 709–734.
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing(draft). National Institute of Standards and Technology Special Publication 800-145. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
  • Menard, P., Gatlin, R., & Warkentin, M. (2013, Forthcoming). Threat protection and convenience: Antecedents of cloud-based data backup. Journal of Computer Information Systems, 55(1), 83–91.
  • Miller, K. W., Voas, J., & Laplante, P. (2010). In trust we trust. Computer, 43(10), 85–87.
  • Miller, M. (2009). Cloud computing pros and cons for end users. Retrieved from http://www.informit.com/articles/article.aspx?p=1324280.
  • Mishra, S. (2014). Cloud threat and security concern. International Journal of Emerging Trends & Technology in Computer Science, 3(4), 202–206.
  • Morrow, S. (2011). Data security in the cloud. In R. Buyya, J. Broberg, & A. Goscinski (Eds.), Cloud computing: Principles and paradigms. Hoboken, NJ: John Wiley & Sons.
  • Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric Theory (3rd ed.). New York: McGraw-Hill.
  • Oliveira, T., Thomas, M., & Espandal, M. (2014, July). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497–510.
  • Onwubiko, C. (2010). Security issues to cloud computing. In N. Antonopoulos & L. Gillam (Eds.), Cloud computing: Principles, systems, and applications, computer communications and networks. London: Springer-Verlag.
  • Pedersen, D. M. (1982). Personality correlates of privacy. Journal of Psychology, 112(1), 11–14.
  • Pennanen, K., Kaapu, T., & Paakki, M. K. (2006). Trust, risk, privacy, and security in ecommerce. Paper presented at the International Conference on Electronic Business (ICEB) + Research Forum to Understand Business in Knowledge Society (eBRF) Conference, Tampere, Finland, November 28–December 2.
  • Podsakoff, P. M., Mackenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
  • Proctor, R. W., Ali, M. A., & Vu, K.-P. (2008). Examining Usability of Web Privacy Policies. International Journal of Human–Computer Interaction, 24(3), 307–328.
  • Rashid, F. Y. (2011, May). Epsilon data breach highlights cloud-computing security concerns. Retrieved from www.eweek.com: http://www.eweek.com/c/a/Security/Cloud-Service-Providers-Say-Data-Security-Not-My-Job-Study-381728/
  • Rimal, B. P., Choi, E., & Lumb, I. (2009). A taxonomy and survey of cloud computing systems. Paper presented at the Fifth International Joint Conference on INC, IMS and IDC, Seoul, Korea, August 5–27.
  • Roberts, J. C., & Al-Hamdani, W. (2011). Who can you trust in the cloud?: A review of security issues within the cloud computing. Proceedings of the 2011 Information Security Curriculum Development Conference ACM (pp. 15–19). New York: ACM.
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology: Interdisciplinary and Applied, 93, 93–144.
  • Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. Cacciopo & R. Petty (Eds.), Social Psychophysiology. New York: Guilford Press.
  • Rogers, R. W., & Prentice-Dunn, S. (1997). Protection motivation theory. In D. S. Gochmans (Ed.), Handbook of health behavior research (pp. 113–132). New York: Plenum.
  • Seoumni, Y. (2009). Determinants of online privacy concern and its influence on privacy protection behavior among young adults. Journal of Consumer Affairs, 43(3), 389–418.
  • Shin, D.-H., & Shin, Y.-J. (2011). Consumers’ trust in virtual mall shopping: The role of social presence and perceived security. International Journal of Human–Computer Interaction, 27(5), 450–475.
  • Smith, J. H., Milberg, J. S., & Burke, S. J. (1996). Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
  • Son, I., Lee, D., Lee, J.-N., & Chang, Y. B. (2014, September). Market perception on cloud computing initiatives in organizations: An extended resource-based view. Information & Management, 51(6), 653–669.
  • Thatcher, J., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381–396.
  • Torkzadeh, G., Chang, -J. C.-J., & Demirhan, D. (2006, June). A contingency model of computer and Internet self-efficacy. Information & Management, 43(3), 541–550.
  • Turk, J. (2011). Computer literacy as life skills for a web 2.0 world. Proceedings of the 42nd ACM Technical Symposium on Computer Science Education, Dallas, (pp. 417–422). New York: ACM.
  • Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the AIS, 7(6), 415–444.
  • Vance, A., Siponen, M., & Pahnila, S. (2012, May). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.
  • Wang, C., Leung, H. F., Cheung, S. C., & Wang, Y. (2005). Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents. International Journal of High Performance Computing and Networking, 3(5–6), 385–394.
  • West, R. (2008). The psychology of security. Communications of the ACM, 51(4), 34–40.
  • White, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education & Behavior, 27(5), 591–615.
  • Woon, I., Tan, G.-W., & Low, R. (2005). A protection motivation theory approach to home wireless security. Paper presented at ICIS 2005, Las Vegas, NV, December 11–14.
  • Wu, Y., Prybutok, V. R., Koh, C., & Hanus, B. (2012). A nomological net for RFID privacy concern. Business Process Management Journal, 18(3), 420–444.
  • Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710–722.
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43, 389–418.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.