89
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Exploring the Cloud Storage Service Adoption Through the Dual Perspectives: Protection Motivation Theory (PMT) and the Extended Unified Theory of Technology Acceptance Model (UTAUT2)

ORCID Icon, ORCID Icon & ORCID Icon
Received 25 Oct 2023, Accepted 04 Mar 2024, Published online: 18 Mar 2024

References

  • Ahmed, W., Hizam, S. M., Sentosa, I., Ali, J., & Ali, T. (2020). Structural equation modeling for acceptance of cloud computing [Paper presentation]. Proceedings of the 2019 International Conference on Advances in the Emerging Computing Technologies (AECT) (pp. 1–6). IEEE. https://doi.org/10.1109/AECT47998.2020.9194206
  • Al-Emran, M., Granić, A., Al-Sharafi, M. A., Ameen, N., & Sarrab, M. (2021). Examining the roles of students’ beliefs and security concerns for using smartwatches in higher education. Journal of Enterprise Information Management, 34(4), 1229–1251. https://doi.org/10.1108/JEIM-02-2020-0052
  • Alexandrou, A., & Chen, L. C. (2019). A security risk perception model for the adoption of mobile devices in the healthcare industry. Security Journal, 32(4), 410–434. https://doi.org/10.1057/s41284-019-00170-0
  • Alharbi, Y., Rabbi, F., & Alqahtani, R. (2020). Understanding university student’s intention to use quality cloud storage services. International Journal for Quality Research, 14(1), 313–324. https://doi.org/10.24874/IJQR14.01-20
  • Alsmadi, D., Halawani, M., Prybutok, V., & Al-Smadi, R. (2022). Intention, trust and risks as core determinants of cloud computing usage behavior. Journal of Systems and Information Technology, 24(3), 178–201. https://doi.org/10.1108/JSIT-09-2020-0180
  • Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218–226. https://doi.org/10.1016/j.chb.2018.04.003
  • Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14(3), 396–402. https://doi.org/10.1177/002224377701400320
  • Arpaci, I. (2019). A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education. Computers in Human Behavior, 90, 181–187. https://doi.org/10.1016/j.chb.2018.09.005
  • Asraar Ahmed, K. A., Sahu, A. K., Sahu, A. K., & Sahu, N. K. (2022). Quantify the behaviour intention of individuals to control sc performance by exploring cloud storage services: An extended UTAUT2 Approach. International Journal of Technology and Human Interaction, 18(7), 1–28. https://orcid.org/0000-0002-8939-7010 https://doi.org/10.4018/IJTHI.306227
  • Bazel, M. A., Haron, H., Ismail, I., & Gui, A. (2018). Factors influencing intention to use cloud storage services amongst postgraduate students in Malaysian technical universities [Paper presentation]. Proceedings of the 2018 International Conference on Information Management and Technology (ICIMTech) (pp. 350–355). IEEE. https://doi.org/10.1109/ICIMTech.2018.8528179
  • Bélanger, F., Collignon, S., Enget, K., & Negangard, E. (2017). Determinants of early conformance with information security policies. Information & Management, 54(7), 887–901. https://doi.org/10.1016/j.im.2017.01.003
  • Chai, L., Xu, J., & Li, S. (2023). Investigating the intention to adopt telecommuting during COVID-19 outbreak: An integration of TAM and TPB with risk perception. International Journal of Human–Computer Interaction, 39(18), 3516–3526. https://doi.org/10.1080/10447318.2022.2098906
  • Chandra, Y. U., & Hartono, S. (2018). Analysis factors of technology acceptance of cloud storage: A case of higher education students use Google Drive [Paper presentation]. Proceeding of the 2018 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 188–192). IEEE. https://doi.org/10.1109/ICITSI.2018.8696095
  • Chen, K. Y., & Yeh, C. F. (2017). Factors affecting adoption of smart meters in the post-Fukushima era in Taiwan: An extended protection motivation theory perspective [Paper presentation]. Behaviour & Information Technology, 36(9), 955–969. https://doi.org/10.1080/0144929X.2017.1317363
  • Cheng, S., Lee, S. J., & Choi, B. (2019). An empirical investigation of users’ voluntary switching intention for mobile personal cloud storage services based on the push-pull-mooring framework. Computers in Human Behavior, 92, 198–215. https://doi.org/10.1016/j.chb.2018.10.035
  • Chuenyindee, T., Ong, A. K. S., Prasetyo, Y. T., Persada, S. F., Nadlifatin, R., & Sittiwatethanasiri, T. (2022). Factors affecting the perceived usability of the COVID-19 contact tracing application “Thai Chana” during the early COVID-19 omicron period. International Journal of Environmental Research and Public Health, 19(7), 4383. https://doi.org/10.3390/ijerph19074383
  • Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing up personal data [Paper presentation]. Proceedings of the 43rd Hawaii International Conference on System Sciences (pp. 1–10). IEEE. https://doi.org/10.1109/HICSS.2010.311
  • Crossler, R. E., Andoh-Baidoo, F. K., & Menard, P. (2019). Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana. Information & Management, 56(5), 754–766. https://doi.org/10.1016/j.im.2018.11.009
  • Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386–408. https://doi.org/10.17705/1jais.00133
  • Dutta, A., Kovid, R. K., Thatha, M., & Jatin, J. (2023). Adoption of IoT-based healthcare devices: An empirical study of end consumers in an emerging economy. Paladyn, Journal of Behavioral Robotics, 14(1), 20220106. https://doi.org/10.1515/pjbr-2022-0106
  • Dwivedi, Y. K., Rana, N. P., Jeyaraj, A., Clement, M., & Williams, M. D. (2019). Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a revised theoretical model. Information Systems Frontiers, 21(3), 719–734. https://doi.org/10.1007/s10796-017-9774-y
  • Fard, S. S., Alkelani, A. M., & Ezhar Tamam, E. (2019). Habit as a moderator of the association of utilitarian motivation and hedonic motivation with purchase intention: Implications for social networking websites. Cogent Social Sciences, 5(1), 1674068. https://doi.org/10.1080/23311886.2019.1674068
  • Farhatunnada, I., & Wibowo, M. G. (2022). Determinants of Muslim intention in Yogyakarta to pay ZIS online during the Covid-19 pandemic. AZKA International Journal of Zakat & Social Finance, 3(2), 182–207. https://doi.org/10.51377/azjaf.vol3no2.123
  • Faul, F., Erdfelder, E., Lang, A. G., & Buchner, A. (2007). G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39(2), 175–191. https://doi.org/10.3758/bf03193146
  • Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  • Gartner (2022). Gartner says more than half of enterprise IT spending in key market segments will shift to the cloud by 2025. Gartner Says More Than Half of Enterprise IT Spending in Key Market Segments Will Shift to the Cloud by 2025. https://www.gartner.com/en/newsroom/press-releases/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending
  • Goode, S. (2019). Keeping the user in the cloud: A cognitive social capital antecedent to use continuance and trust-commitment in personal cloud storage services. Behaviour & Information Technology, 38(7), 701–725. https://doi.org/10.1080/0144929X.2018.1551934
  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Pearson Publishers.
  • Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM) (2nd ed.). Sage.
  • Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203
  • Hansen, J. M., Saridakis, G., & Benson, V. (2018). Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions. Computers in Human Behavior, 80, 197–206. https://doi.org/10.1016/j.chb.2017.11.010
  • Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. Advances in International Marketing, 20, 277–319. https://doi.org/10.1108/S1474-7979(2009)0000020014
  • Hsieh, H. L., Kuo, Y. M., Wang, S. R., Chuang, B. K., & Tsai, C. H. (2017). A study of personal health record user’s behavioral model based on the PMT and UTAUT integrative perspective. International Journal of Environmental Research and Public Health, 14(1), 8. https://doi.org/10.3390/ijerph14010008
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566. https://www.jstor.org/stable/25750691 https://doi.org/10.2307/25750691
  • Karahoca, A., Karahoca, D., & Aksöz, M. (2018). Examining intention to adopt to internet of things in healthcare technology products. Kybernetes, 47(4), 742–770. https://doi.org/10.1108/K-02-2017-0045
  • Kim, E., & Kyung, Y. (2023). Factors affecting the adoption intention of new electronic authentication services: A convergent model approach of VAM, PMT, and TPB. IEEE Access, 11, 13859–13876. https://doi.org/10.1109/ACCESS.2023.3243183
  • Kock, N., & Lynn, G. (2012). Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations. Journal of the Association for Information Systems, 13(7), 546–580. https://doi.org/10.17705/1jais.00302
  • Laugesen, J., & Hassanein, K. (2017). Adoption of personal health records by chronic disease patients: A research model and an empirical study. Computers in Human Behavior, 66, 256–272. https://doi.org/10.1016/j.chb.2016.09.054
  • Li, P., Varghese, M. M. (2023). Switching intention and intention to use personal cloud storage services among chinese undergraduate. Scholar: Human Sciences, 15(1), 171–181. https://doi.org/10.14456/shserj.2023.18
  • Liu, X., & Prybutok, V. R. (2021). An empirical investigation of factors that drive a user decision to continue using cloud storage services. Journal of Decision Systems, 30(1), 4–26. https://doi.org/10.1080/12460125.2020.1798590
  • Lozano, L. M., García-Cueto, E., & Muñiz, J. (2008). Effect of the number of response categories on the reliability and validity of rating scales. Methodology, 4(2), 73–79. https://doi.org/10.1027/1614-2241.4.2.73
  • Mariani, M. M., Styven, M. E., & Teulon, F. (2021). Explaining the intention to use digital personal data stores: An empirical study. Technological Forecasting and Social Change, 166, 120657. https://doi.org/10.1016/j.techfore.2021.120657
  • Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150. https://doi.org/10.1016/j.chb.2018.11.002
  • Mwagwabi, F., McGill, T., & Dixon, M. (2018). Short-term and long-term effects of fear appeals in improving compliance with password guidelines. Communications of the Association for Information Systems, 42(1), 147–182. https://doi.org/10.17705/1CAIS.04207
  • Mohd-Any, A. A., Sarker, M., & Hui, F. L. Z. (2023). Understanding users’ switching intention of cloud storage services: A push-pull-mooring framework. Journal of Consumer Behaviour, 0(0), 1–21. https://doi.org/10.1002/cb.2239
  • Moorthy, K., Tzu Yee, T., Chun T'ing, L., & Vija Kumaran, V. (2019). Habit and hedonic motivation are the strongest influences in mobile learning behaviours among higher education students in Malaysia. Australasian Journal of Educational Technology, 35(4), 175–191. https://doi.org/10.14742/ajet.4432
  • Nah, F. F., Tan, X., & Teh, S. H. (2004). An empirical investigation on end-users’ acceptance of enterprise systems. Information Resources Management Journal, 17(3), 32–53. https://doi.org/10.4018/irmj.2004070103
  • Najwa, N. F., Widyasari, Y. D. L., & Trisnadoli, A. (2023). Investigation of mobile cloud storage adoption factors in higher education. JOIV: International Journal on Informatics Visualization, 7(3), 823–829. https://doi.org/10.30630/joiv.7.3.1296
  • Nguyen, D. T., Tran, V. D., & Ghafoor, A. (2022). The Impact of Covid-19 lockdown on intention to follow preventive measures in Vietnam: Integrated protection motivation theory and theory planed behavior. Cogent Business & Management, 9(1), 2054502. https://doi.org/10.1080/23311975.2022.2054502
  • Nikolopoulou, K., Gialamas, V., & Lavidas, K. (2021). Habit, hedonic motivation, performance expectancy and technological pedagogical knowledge affect teachers’ intention to use mobile internet. Computers and Education Open, 2, 100041. https://doi.org/10.1016/j.caeo.2021.100041
  • Ogbanufe, O., Dinulescu, C. C., Liu, X., & Kucuk, C. Y. (2019). It’s in the cloud: Theorizing context-specific factors influencing the perception of mobile cloud storage. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 50(3), 116–137. https://doi.org/10.1145/3353401.3353408
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. The Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879
  • Prasetyo, Y. T., Castillo, A. M., Salonga, L. J., Sia, J. A., & Seneta, J. A. (2020). Factors affecting perceived effectiveness of COVID-19 prevention measures among Filipinos during Enhanced Community Quarantine in Luzon, Philippines: Integrating protection motivation theory and extended theory of planned behavior. International Journal of Infectious Diseases, 99, 312–323. https://doi.org/10.1016/j.ijid.2020.07.074
  • Ramírez-Correa, P., Rondán-Cataluña, F. J., Arenas-Gaitán, J., & Martín-Velicia, F. (2019). Analysing the acceptation of online games in mobile devices: An application of UTAUT2. Journal of Retailing and Consumer Services, 50, 85–93. https://doi.org/10.1016/j.jretconser.2019.04.018
  • Rashid, A., Rasheed, R., Amirah, N. A., Yusof, Y., Khan, S., & Agha, A. A. (2021). A quantitative perspective of systematic research: Easy and step-by-step initial guidelines. Turkish Online Journal of Qualitative Inquiry, 12(9), 2874–2883. http://www.tojqi.net/index.php/journal/article/view/6159/4387
  • Reynon, M. K., Bulatao, P. C., Vergel, J. A., Yabut, L. A., & Grimaldo, J. (2022). Consumer’s attitude on online payment systems as driven by risks. Journal of Business and Management Studies, 4(2), 13–26. https://doi.org/10.32996/jbms.2022.4.2.2
  • Richter, N. F., Sinkovics, R. R., Ringle, C. M., & Schlägel, C. (2016). A critical look at the use of SEM in international business research. International Marketing Review, 33(3), 376–404. https://doi.org/10.1108/IMR-04-2014-0148
  • Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. E. Petty (Eds.), Social psychophysiology: A source book (pp. 153–176). Guilford.
  • Rossiman, N. D., Rashid, N. H., Ramzuna, W. A. A., & Almunawar, M. N. (2021). The perception and usage of Google Drive among higher education institution students in Brunei Darussalam. International Journal of Asian Business and Information Management, 12(3), 222–241. https://doi.org/10.4018/IJABIM.20210701.oa14
  • Sadik, A. (2017). Students’ acceptance of file sharing systems as a tool for sharing course materials: The case of Google Drive. Education and Information Technologies, 22(5), 2455–2470. https://doi.org/10.1007/s10639-016-9556-z
  • Santoso, N., Kusyanti, A., Puspa, H., & April, Y. (2018). Trust and security concerns of cloud storage: An Indonesian technology acceptance. International Journal of Advanced Computer Science and Applications, 9(6), 453–458. https://doi.org/10.14569/IJACSA.2018.090662
  • Sergueeva, K., & Shaw, N. (2017). Improving healthcare with wearables: Overcoming the barriers to adoption [Paper presentation]. Proceedings of the 2017 International Conference on HCI in Business, Government, and Organizations (HCIBGO). Interacting with Information Systems, Cham (pp. 209–223). Springer. https://doi.org/10.1007/978-3-319-58481-2_17
  • Singh, N., Misra, R., Singh, S., Rana, N. P., & Khorana, S. (2022). Assessing the factors that influence the adoption of healthcare wearables by the older population using an extended PMT model. Technology in Society, 71, 102126. https://doi.org/10.1016/j.techsoc.2022.102126
  • Song, C., & Sohn, Y. (2022). The influence of dependability in cloud computing adoption. The Journal of Supercomputing, 78(10), 12159–12201. https://doi.org/10.1007/s11227-022-04346-1
  • Statista. (2023). Internet usage in South Korea - Statistics & facts. https://www.statista.com/topics/2230/internet-usage-in-south-korea/
  • Surahman, S. (2023). Unveiling the determinants of actual use among, Google Drive users: A comprehensive analysis. SSRN Electronic Journal, 1–16. https://doi.org/10.2139/ssrn.4620933
  • Tamilmani, K., Rana, N. P., Prakasam, N., & Dwivedi, Y. K. (2019). The battle of brain vs. heart: A literature review and meta-analysis of “hedonic motivation” use in UTAUT2. International Journal of Information Management, 46, 222–235. https://doi.org/10.1016/j.ijinfomgt.2019.01.008
  • Tamilmani, K., Rana, N. P., Wamba, S. F., & Dwivedi, R. (2021). The extended Unified Theory of Acceptance and Use of Technology (UTAUT2): A systematic literature review and theory evaluation. International Journal of Information Management, 57, 102269. https://doi.org/10.1016/j.ijinfomgt.2020.102269
  • Tanujaya, B., Prahmana, R. C. I., & Mumu, J. (2022). Likert scale in social sciences research: Problems and difficulties. FWU Journal of Social Sciences, 16(4), 89–101. https://doi.org/10.51709/19951272/Winter2022/7
  • Thompson, N., McGill, T. J., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391. https://doi.org/10.1016/j.cose.2017.07.003
  • Tsai, H. Y. S., Jiang, M., Alhabash, S., Larose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. https://doi.org/10.1016/j.cose.2016.02.009
  • Tubay, J. B. (2021). Students’ use of cloud storage in their studies: A case of a private university in the Philippines. Journal of Education and e-Learning Research, 8(1), 16–25. https://doi.org/10.20448/journal.509.2021.81.16.25
  • Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3-4), 190–198. https://doi.org/10.1016/j.im.2012.04.002
  • Venkatesh, V., Davis, F. D., & Zhu, Y. (2023). Competing roles of intention and habit in predicting behavior: A comprehensive literature review, synthesis, and longitudinal field study. International Journal of Information Management, 71, 102644. https://doi.org/10.1016/j.ijinfomgt.2023.102644
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. https://doi.org/10.2307/30036540
  • Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. https://doi.org/10.2307/41410412
  • Weng, L. J. (2004). Impact of the number of response categories and anchor labels on coefficient alpha and test-retest reliability. Educational and Psychological Measurement, 64(6), 956–972. https://doi.org/10.1177/0013164404268674
  • Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q. A. (2019). Understanding users’ willingness to put their personal information on the personal cloud-based storage applications: An empirical study. Computers in Human Behavior, 91, 167–185. https://doi.org/10.1016/j.chb.2018.09.034
  • Wu, K., Vassileva, J., & Zhao, Y. (2017). Understanding users’ intention to switch personal cloud storage services: Evidence from the Chinese market. Computers in Human Behavior, 68, 300–314. https://doi.org/10.1016/j.chb.2016.11.039
  • Xu, F., Tian, M., Xu, G., Ayala, B. R., & Shen, W. (2017). Understanding Chinese users’ switching behaviour of cloud storage services. The Electronic Library, 35(2), 214–232. https://doi.org/10.1108/EL-04-2016-0080
  • Xu, L., Li, P., Hou, X., Yu, H., Tang, T., Liu, T., Xiang, S., Wu, X., & Huang, C. (2021). Middle-aged and elderly users’ continuous usage intention of health maintenance-oriented WeChat official accounts: Empirical study based on a hybrid model in China. BMC Medical Informatics and Decision Making, 21(1), 257. https://doi.org/10.1186/s12911-021-01625-4
  • ZDNet. (2022). What is cloud computing? Everything you need to know about the cloud explained. https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-about-the-cloud/
  • Zhang, Q., Khan, S., Khan, S. U., & Khan, I. U. (2023). Assessing the older population acceptance of healthcare wearable in a developing country: An extended PMT model. Journal of Data, Information and Management, 5(1-2), 39–53. https://doi.org/10.1007/s42488-023-00087-9

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.