657
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

Understanding Service Quality and System Quality Success Factors in Cloud Archiving From an End-User Perspective

&

REFERENCES

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. doi:10.1016/0749-5978(91)90020-T
  • Ajzen, I. (2011). Behavioral interventions: Design and evaluation guided by the theory of planned behavior. In M. Mark, S. Donaldson, & B. Campbell (Eds.), Social psychology and evaluation (pp. 74–103). New York, NY: The Guilford Press.
  • Ambrose, P., & Chiravuri, A. (2010, May). An empirical investigation of cloud computing for personal use. Paper presented at the Midwest Association for Information Conference (MWAIS), Moorhead, MN, US.
  • Armbrust, M., Stoica, I., Zaharia, M., Fox, A. D., Griffith, R., Joseph, A., … Rabkin, A. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. doi:10.1145/1721654
  • Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261–292.
  • Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74–94. doi:10.1007/BF02723327
  • Bajak, F., & Chang, J. (2013). Internet users on U.S. ‘cybersnooping’: Outrage, resentment, resignation. Retrieved from http://www.ctvnews.ca/sci-tech/internet-users-on-u-s-cybersnooping-outrage-resentment-resignation-1.1316790#ixzz2eNkHTqCV
  • Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51(6), 1173–1182. doi:10.1037/0022-3514.51.6.1173
  • Behrend, T. S., Wiebe, E. N., London, J. E., & Johnson, E. C. (2011). Cloud computing adoption and usage in community colleges. Behaviour & Information Technology, 30(2), 231–240. doi:10.1080/0144929X.2010.489118
  • Benbasat, I., & Barki, H. (2007). Quo vadis TAM? Journal of the Association for Information Systems, 8(4), 7.
  • Benlian, A., Koufaris, M., & Hess, T. (2011). Service quality in software-as-a-service: Developing the SaaS-Qual measure and examining its role in usage continuance. Journal of Management Information Systems, 28(3), 85–126. doi:10.2753/MIS0742-1222280303
  • Benlian, A., Koufaris, M., & Hess, T. (2011). Service quality in software-as-a-service: Developing the SaaS-Qual measure and examining its role in usage continuance. Journal of Management Information Systems, 28(3), 85–126.
  • Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems, 23(3), 357–372. doi:10.1057/ejis.2013.1
  • Bollen, K. A. (2007). Interpretational confounding is due to misspecification, not to type of indicator: Comment on Howell, Breivik, and Wilcox (2007). Psychological Methods, 12(2), 219–228. doi:10.1037/1082-989X.12.2.219
  • Burda, D., & Teuteberg, F. (2013). Sustaining accessibility of information through digital preservation: A literature review. Journal of Information Science, 39(4), 442–458. doi:10.1177/0165551513480107
  • Burton-Jones, A. (2009). Minimizing method bias through programmatic research. MIS Quarterly, 33(3), 445–471.
  • Cenfetelli, R. T., Benbasat, I., & Al-Natour, S. (2008). Addressing the what and how of online services: Positioning supporting-services functionality and service quality for business-to-consumer success. Information Systems Research, 19(2), 161–181. doi:10.1287/isre.1070.0163
  • Chin, W. W. (1998). The partial least squares approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Chiu, C.-M., Chiu, C.-S., & Chang, H.-C. (2007). Examining the integrated influence of fairness and quality on learners’ satisfaction and web-based learning continuance intention. Information Systems Journal, 17(3), 271–287. doi:10.1111/isj.2007.17.issue-3
  • Cohen, J. (1988). Statistical power analysis for the behavioral sciences. Hillsdale, NJ: Lawrence Erlbaum.
  • Compeau, D., Marcolin, B., Kelley, H., & Higgins, C. (2012). Research commentary—generalizability of information systems research using student subjects—a reflection on our practices and recommendations for future research. Information Systems Research, 23(4), 1093–1109. doi:10.1287/isre.1120.0423
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008
  • Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340.
  • Davis, F. D. (1993). User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475–487. doi:10.1006/imms.1993.1022
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982
  • Davis, M. (2012). Worldwide internet broadband bandwidth demand 2012–2015—forecast. Framingham, MA: IDC, Inc.
  • De Ruyter, K., Wetzels, M., & Kleijnen, M. (2001). Customer adoption of e-service: An experimental study. International Journal of Service Industry Management, 12(2), 184–207. doi:10.1108/09564230110387542
  • Dearman, D., & Pierce, J. S. (2008, April). It’s on my other computer!: Computing with multiple devices. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems (CHI ‘08), Florence, Italy.
  • DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60–95. doi:10.1287/isre.3.1.60
  • Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.
  • Faul, F., Erdfelder, E., Buchner, A., & Lang, A.-G. (2009). Statistical power analyses using G* power 3.1: tests for correlation and regression analyses. Behavior Research Methods, 41(4), 1149–1160. doi:10.3758/BRM.41.4.1149
  • Fishbein, M. (2008). A reasoned action approach to health promotion. Medical Decision Making, 28(6), 834–844. doi:10.1177/0272989X08326092
  • Fishbein, M., & Ajzen, I. (2005). The influence of attitudes on behavior. In D. Albarracín, B. T. Johnson, & M. P. Zanna (Eds.), The handbook of attitudes (pp. 173–221). Mahwah, NJ: Lawrence Erlbaum Associates Publishers.
  • Flynn, L. R., & Goldsmith, R. E. (1999). A short, reliable measure of subjective knowledge. Journal of Business Research, 46(1), 57–66. doi:10.1016/S0148-2963(98)00057-5
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50. doi:10.2307/3151312
  • Gallagher, K., Parsons, J., & Foster, K. D. (2001). A tale of two studies: Replicating ‘advertising effectiveness and content evaluation in print and on the web.’ Journal of Advertising Research, 41(4), 71–82.
  • Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737. doi:10.1016/S0305-0483(00)00021-9
  • Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737.
  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.
  • Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16(1), 5.
  • Gefen, D., Straub, D., & Boudreau, M. C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 7.
  • Gefen, D., & Straub, D. W. (2000). The relative importance of perceived ease of use in IS adoption: A study of E-commerce adoption. Journal of the Association for Information Systems, 1(8), 1–28.
  • Giessmann, A., & Stanoevska, K. (2012, December). Platform as a service—a conjoint study on consumers’ preferences. Paper presented at the International Conference on Information Systems (ICIS 2012), Orlando, FL, US.
  • Goodhue, D., Lewis, W., & Thompson, R. (2006, January). PLS, small sample size, and statistical power in MIS research. Paper presented at the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), Hawaii.
  • Halawi, L. A., McCarthy, R. V., & Aronson, J. E. (2007). An empirical investigation of knowledge management systems’ success. Journal of Computer Information Systems, 48(2), 121–135.
  • Heath, Y., & Gifford, R. (2006). Free-market ideology and environmental degradation: The case of belief in global climate change. Environment and Behavior, 38(1), 48–71. doi:10.1177/0013916505277998
  • Heerwegh, D. (2006). An investigation of the effect of lotteries on web survey response rates. Field Methods, 18(2), 205–220. doi:10.1177/1525822X05285781
  • Hobfeld, T., Schatz, R., Varela, M., & Timmerer, C. (2012). Challenges of QoE management for cloud applications. IEEE Communications Magazine, 50(4), 28–36. doi:10.1109/MCOM.2012.6178831
  • IBM. (2014). Compute Mahalanobis distance and flag multivariate outliers. Retrieved from http://www-01.ibm.com/support/docview.wss?uid = swg21480128
  • Ion, I., Sachdeva, N., Kumaraguru, P., & Capkun, S. (2011, July). Home is safer than the cloud!: Privacy concerns for consumer cloud storage. Paper presented at the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA.
  • Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(12), 45–71.
  • Jun, C.-J., Lee, J.-H., & Jeon, I.-S. (2014). Research about factor affecting the continuous use of cloud storage service: User factor, system factor, psychological switching cost factor. The Journal of Society for e-Business Studies, 19(1), 15–42. doi:10.7838/jsebs.2014.19.1.015
  • Kettinger, W., & Lee, C. (1997). Pragmatic perspectives on the measurement of information systems service quality. MIS Quarterly, 21(2), 223. doi:10.2307/249421
  • Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional, 12(5), 20–27. doi:10.1109/MITP.2010.128
  • Kim, J., Hong, S., Min, J., & Lee, H. (2011). Antecedents of application service continuance: A synthesis of satisfaction and trust. Expert Systems with Applications, 38, 9530–9542. doi:10.1016/j.eswa.2011.01.142
  • Koehler, P., Anandasivam, A., Dan, M., & Weinhardt, C. (2010, August). Cloud services from a consumer perspective. Paper presented at the 16th Americas Conference on Information Systems (AMCIS), Lima, Peru.
  • Lansing, J., Schneider, S., & Sunyaev, A. (2013, June). Cloud service certifications: Measuring consumers’ preferences for assurances. Paper presented at the 21st European Conference on Information Systems (ECIS 2013), Utrecht, The Netherlands.
  • Leidner, D. E., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. Management Information Systems Quarterly, 30(2), 357–399.
  • Li, Y., & Chang, K.-C. (2012, March). A study on user acceptance of cloud computing: A multi-theoretical perspective. Paper presented at the 18th Americas Conference on Information Systems (AMICS), Seattle, WA.
  • Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59–87.
  • Lin, S.-L., Wang, C.-S., & Yang, H.-L. (2014). Applying fuzzy AHP to understand the factors of cloud storage adoption. In N. Nguyen, B. Attachoo, B. Trawiński, & K. Somboonviwat (Eds.), Intelligent information and database systems (Vol. 8398, pp. 282–291). Springer International Publishing.
  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.
  • Mahalanobis, P. C. (1936). On the generalised distance in statistics. Paper presented at the National Institute of Science of India.
  • Marcoulides, G. A., & Saunders, C. (2006). PLS: A silver bullet? MIS Quarterly, 30(2), iii–ix.
  • Marshall, C., & Tang, J. C. (2012, June). That syncing feeling: Early user experiences with the cloud. Paper presented at the Designing Interactive Systems Conference (DIS ‘12), Newcastle, UK.
  • McKinney, V., Yoon, K., & Zahedi, F. (2002). The measurement of web-customer satisfaction: An expectation and disconfirmation approach. Information Systems Research, 13(3), 296–315. doi:10.1287/isre.13.3.296.76
  • Miller, R. E., Hardgrave, B. C., & Jones, T. W. (2013). Iss-qual: A measure of service quality for the information systems function. Information Systems Management, 30(3), 250–262. doi:10.1080/10580530.2013.794633
  • Miller, R. E., Hardgrave, B. C., & Jones, T.W. (2013). Iss-Qual: A measure of service quality for the information systems function. Information Systems Management, 30(3), 250–262.
  • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222. doi:10.1287/isre.2.3.192
  • Nelson, R. R., Todd, P. A., & Wixom, B. H. (2005). Antecedents of information and system quality: An empirical examination within the context of data warehousing. Journal of Management Information Systems, 21(4), 199–235.
  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. doi:10.1111/joca.2007.41.issue-1
  • Otto, B., & Österle, H. (2010, June). Relevance through consortium research? A case study. Paper presented at the European Conference on Information Systems (ECIS 2010), Pretoria, South Africa.
  • Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1985). A conceptual model of service quality and its implications for future research. Journal of Marketing, 49(4), 41–50. doi:10.2307/1251430
  • Parasuraman, A., Zeithaml, V. A., & Malhotra, A. (2005). ES-QUAL a multiple-item scale for assessing electronic service quality. Journal of Service Research, 7(3), 213–233.
  • Parasuraman, A., Zeithaml, V. A., & Malhotra, A. (2005). E-S-QUAL: A multiple-item scale for assessing electronic service quality. Journal of Service Research, 7(3), 213–233. doi:10.1177/1094670504271156
  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
  • Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 35(4), 977–988.
  • Peterson, R. A. (2001). On the use of college students in social science research: Insights from a second-order meta-analysis. Journal of Consumer Research, 28(3), 450–461. doi:10.1086/323732
  • Petter, S., DeLone, W., & McLean, E. (2008). Measuring information systems success: Models, dimensions, measures, and interrelationships. European Journal of Information Systems, 17(3), 236–263. doi:10.1057/ejis.2008.15
  • Pinsonneault, A., & Kraemer, K. L. (1993). Survey research methodology in management information systems: An assessment. Journal of Management Information Systems, 10(2), 75–105.
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. doi:10.1037/0021-9010.88.5.879
  • Porter, S. R., & Whitcomb, M. E. (2003). The impact of lottery incentives on student survey response rates. Research in Higher Education, 44(4), 389–407. doi:10.1023/A:1024263031800
  • Rainie, L., Sara, K., Ruogu, K., & Madden, M. (2013). Anonymity, privacy, and security online. Retrieved from http://pewinternet.org/Reports/2013/Anonymity-online.aspx
  • Ringle, C. M., Sarstedt, M., & Straub, D. (2012). A critical look at the use of PLS-SEM in MIS quarterly. MIS Quarterly, 36(1), iii–xiv.
  • Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS, release 2.0 (beta). Retrieved from http://www.smartpls.de
  • Rönkkö, M., & Ylitalo, J. (2011, December). PLS marker variable approach to diagnosing and controlling for method variance. Paper presented at the 32nd International Conference on Information Systems (ICIS 2011), Shanghai, China.
  • Safdari, F., & Chang, V. (2014, April). Review and analysis of cloud computing quality of experience. Paper presented at the The First International Workshop on Emerging Software as a Service and Analytics. Retrieved from http://eprints.soton.ac.uk/362552/
  • Sarstedt, M., Henseler, J., & Ringle, C. M. (2011). Multigroup analysis in partial least squares (PLS) path modeling: Alternative methods and empirical results. Advances in International Marketing, 22, 195–218.
  • Sears, D. O. (1986). College sophomores in the laboratory: Influences of a narrow data base on social psychology’s view of human nature. Journal of Personality and Social Psychology, 51(3), 515–530. doi:10.1037/0022-3514.51.3.515
  • Shih, H. (2004). An empirical study on predicting user acceptance of e-shopping on the web. Information & Management, 41(3), 351–368. doi:10.1016/S0378-7206(03)00079-X
  • Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological Methodology, 13(1982), 290–312. doi:10.2307/270723
  • Sohn, T., Li, K. A., Griswold, W. G., & Hollan, J. D. (2008, April). A diary study of mobile information needs. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems (CHI’08), Florence, Italy.
  • Spreng, R. A., MacKenzie, S. B., & Olshavsky, R. W. (1996). A reexamination of the determinants of consumer satisfaction. Journal of Marketing, 60(3), 15–32.
  • Spreng, R. A., & Mackoy, R. D. (1996). An empirical examination of a model of perceived service quality and satisfaction. Journal of Retailing, 72(2), 201–214.
  • Straub, D., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(24), 380–427.
  • Tabachnick, B. G., & Fidell, L. S. (2007). Using multivariate statistics (5th ed.). Boston, MA: Pearson/Allyn & Bacon.
  • Takabi, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy Magazine, 8(6), 24–31. doi:10.1109/MSP.2010.186
  • Top. (2013). Why use online backup? Retrieved from http://www.thetop10bestonlinebackup.com
  • Trenz, M., Huntgeburth, J. C., & Veit, D. J. (2013, June). The role of uncertainty in cloud computing continuance: Antecedents, mitigators, and consequences. Paper presented at the 21st European Conference on Information Systems (ECIS 2013), Utrecht, The Netherlands.
  • Urbach, N., & Müller, B. (2012). The updated DeLone and McLean model of information systems success. In Y. K. Dwivedi, M. R. Wade, & S. L. Schneberger (Eds.), Information systems theory (Vol. 28, pp. 1–18). New York, NY: Springer.
  • Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315. doi:10.1111/j.1540-5915.2008.00192.x
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. doi:10.1287/mnsc.46.2.186.11926
  • Verma, S. (2012). Forecast: Consumer digital storage needs, 2010–2016. Stamford, CT: Gartner, Inc.
  • Walterbusch, M., Martens, B., & Teuteberg, F. (2013, June). Exploring trust in cloud computing: A multi-method approach. Paper presented at the 21st European Conference on Information Systems (ECIS), Utrecht, Netherlands.
  • Wang, C., Chow, S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375. doi:10.1109/TC.2011.245
  • Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information Systems Research, 16(1), 85–102. doi:10.1287/isre.1050.0042
  • Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information Systems Research, 16(1), 85–102.
  • Wolfinbarger, M., & Gilly, M. C. (2003). eTailQ: Dimensionalizing, measuring and predicting eTail quality. Journal of Retailing, 79(3), 183–198. doi:10.1016/S0022-4359(03)00034-4
  • Wolfinbarger, M., & Gilly, M. C. (2003). eTailQ: Dimensionalizing, measuring and predicting eTail Quality. Journal of Retailing, 79(3), 183–198.
  • Yoo, C. W., Ahn, H. J., & Rao, H. R. (2012, December). An exploration of the impact of information privacy invasion. Paper presented at the 33rd International Conference on Information Systems (ICIS 2012), Orlando, FL.
  • Zeithaml, V. A., Parasuraman, A., & Malhotra, A. (2002). Service quality delivery through web sites: A critical review of extant knowledge. Journal of the Academy of Marketing Science, 30(4), 362–375. doi:10.1177/009207002236911
  • Zhilin, Y., Peterson, R. T., & Huang, L. (2001). Taking the pulse of internet pharmacies. Article. Marketing Health Services, 21(2), 4–10.
  • Zhou, T., Lu, Y., & Wang, B. (2009). The relative importance of website design quality and service quality in determining consumers’ online repurchase behavior. Information Systems Management, 26(4), 327–337. doi:10.1080/10580530903245663

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.