247
Views
5
CrossRef citations to date
0
Altmetric
Articles

Does privacy matter to millennials? The case for personal cloud

, , &

References

  • Aceto, G., Botta, A., De Donato, W., & Pescapè, A. (2013). Cloud monitoring: A survey. Computer Networks, 57(9), 2093–2115. doi:10.1016/j.comnet.2013.04.001
  • Agarwal, R., & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. Mis Quarterly, 24(4), 665–694. doi:10.2307/3250951
  • Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–582. doi:10.1111/deci.1997.28.issue-3
  • Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204–215. doi:10.1287/isre.9.2.204
  • Almamy, T., Taina, S., Airi, S., Erkki, S., & Yue, D. (2015). The role of trust in enhancing Internet use in a high-risk society. Journal of Systems and Information Technology, 17(2), 141–166. doi:10.1108/JSIT-09-2014-0066
  • Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N., & Reavis, J. (2010). Top threats to cloud computing V1.0. Seattle, WA: Cloud Security Alliance.
  • Atkinson, J. W. (1964). An introduction to motivation. Oxford, England: Van Nostrand.
  • Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74–94. doi:10.1007/BF02723327
  • Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. doi:10.1016/j.dss.2010.01.010
  • Brodkin, J. (2008). Gartner: Seven cloud-computing security risks. Infoworld, 2008, 1–3. Retrieved from http://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html
  • Chakraborty, R., Ramireddy, S., Raghu, T., & Rao, H. R. (2010). The information assurance practices of cloud computing vendors. It Professional, 12(4), 29–37. doi:10.1109/MITP.2010.44
  • Chen, M. J., & Miller, D. (1994). Competitive attack, retaliation and performance: An expectancy‐valence framework. Strategic Management Journal, 15(2), 85–102. doi:10.1002/smj.4250150202
  • Chin, W. W. (1998). Commentary: Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), vii–xvi.
  • da Silva, C. M. R., Da Silva, J. L. C., Rodrigues, R. B., Nascimento, L. M. D., & Garcia, V. C. (2013). Systematic mapping study on security threats in cloud computing. Arxiv Preprint Arxiv:1303.6782, 11(3), 1–10.
  • Davis, F., Bagozzi, R., & Warshaw, P. (1992). Extrinsic and intrinsic motivation to use computers in the workplace1. Journal of Applied Social Psychology, 22(14), 1111–1132. doi:10.1111/jasp.1992.22.issue-14
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Mis Quarterly, 13, 319–340. doi:10.2307/249008
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982
  • Drissi, S., Houmani, H., & Medromi, H. (2013). Survey: Risk assessment for cloud computing. International Journal of Advanced Computer Science and Applications, 4(11), 143–148.
  • Eccles, J. S., & Wigfield, A. (1995). In the mind of the achiever: The structure of adolescents’ academic achievement related-beliefs and self-perceptions. Personality and Social Psychology Bulletin, 21 (3), 215–225.
  • Efthymia, M., Catherine, M., Panagiotis, T., Niclas, E., Georgios, G., & Christos, S. (2014). Human factor and information security in higher education. Journal of Systems and Information Technology, 16(3), 210–221. doi:10.1108/JSIT-01-2014-0007
  • El Sawy, O. A., Malhotra, A., Gosain, S., & Young, K. M. (1999). IT-intensive value innovation in the electronic economy: Insights from Marshall Industries. Mis Quarterly, 23(3), 305–335. doi:10.2307/249466
  • Ettlie, J. E., & Pavlou, P. A. (2006). Technology-based new product development partnerships. Decision Sciences, 37(2), 117–147. doi:10.1111/deci.2006.37.issue-2
  • Feather, N. T. (1988). Values, valences, and course enrollment: Testing the role of personal values within an expectancy-valence framework. Journal of Educational Psychology, 80(3), 381–391. doi:10.1037/0022-0663.80.3.381
  • Fornell, C., & Larcker, D. (1981a). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research (JMR), 18(1), 39–50. doi:10.2307/3151312
  • Fornell, C., & Larcker, D. F. (1981b). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. doi:10.2307/3151312
  • Friedman, B., Khan, P. H., & Howe, D. C. (2000). Trust online. Commun. ACM, 43(12), 34–40. doi:10.1145/355112.355120
  • Gashami, J. P., Chang, Y., Rho, J. J., & Park, M.-C. (2014). Understanding the trade-off between privacy concerns and perceived benefits in SaaS individual adoption. Paper presented at the Pacific Asia Conference On Information Systems (Pacis), Chengdu, China.
  • Gharehchopogh, F. S., & Hashemi, S. (2012). Security challenges in cloud computing with more emphasis on trust and privacy. International Journal of Scientific & Technology Research, 1(6), 49–54.
  • Goodburn, M. A., & Hill, S. (2010). The Cloud Transforms Business Cloud is not the future—It’s now. It’s an enabling force for business evolution that goes beyond technology, allowing organizations to more efficiently and effectively reengineer the company’s corporate strategy. For transformative power, the new model is blue—As in” sky.”. Financial Executive, 26(10), 34.
  • Goodhue, D. L., & Straub, D. W. (1991). Security concerns of system users: A study of perceptions of the adequacy of security. Information & Management, 20(1), 13–27. doi:10.1016/0378-7206(91)90024-V
  • Haenlein, M., & Kaplan, A. M. (2004). A beginner’s guide to partial least squares analysis. Understanding Statistics, 3(4), 283–297. doi:10.1207/s15328031us0304_4
  • Hair, J., Black, W., Babin, B., & Anderson, R. (2010). Multivariate data analysis. Upper Saddle River, N.J.; London: Pearson.
  • Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. International Journal of Information Security and Privacy, 4(2), 36–48. doi:10.4018/IJISP
  • Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5–13. doi:10.1186/1869-0238-4-5
  • Höner, P. (2013). Cloud computing security requirements and solutions: A systematic literature review. Enschede, The Netherlands: University of Twente.
  • House, R. J. (1971). A path goal theory of leader effectiveness. Administrative Science Quarterly, 16(3), 321–339. doi:10.2307/2391905
  • Hunsinger, D. S., & Corley, J. K. (2013). What influences students to use dropbox? Journal Of Information Systems Applied Research (Jisar), 6(3), 18–25.
  • Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. Nist Special Publication, 800, 144.
  • Janssen, O., van de Vliert, E., & West, M. (2004). The bright and dark sides of individual and group innovation: A special issue introduction. Journal of Organizational Behavior, 25(2), 129–145. doi:10.1002/(ISSN)1099-1379
  • Karakas, F., & Manisaligil, A. (2012). Reorienting self-directed learning for the creative digital era. European Journal of Training And Development, 36(7), 712–731. doi:10.1108/03090591211255557
  • Katsikas, S. K., Lopez, J., & Pernul, G. (2005). Trust, privacy and security in e-business: Requirements and solutions. Paper presented at the Panhellenic Conference on Informatics, Volos, Greece.
  • Kim, S., & Yoon, A. (2012). Do I trust Google? An exploration of how people form trust in cloud computing. Proceedings of the American Society for Information Science and Technology, 49(1), 1–3. doi:10.1002/meet.145.v49:1
  • Kirton, M. (1976). Adaptors and innovators: A description and measure. Journal of Applied Psychology, 61(5), 622–629. doi:10.1037/0021-9010.61.5.622
  • Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011). TrustCloud: A framework for accountability and trust in cloud computing. Paper presented at the Services (SERVICES), 2011 IEEE World Congress on.
  • Kock, N. (2015). WarpPLS 5.0 user manual. Laredo, TX: ScriptWarp Systems.
  • Kuyoro, S., Ibikunle, F., & Awodele, O. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks, 3(5), 247–255.
  • Lancelot Miltgen, C., Popovič, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Decision Support Systems, 56(0), 103–114. doi:10.1016/j.dss.2013.05.010
  • Latif, R., Abbas, H., Assar, S., & Ali, Q. (2014). Cloud computing risk assessment: A systematic literature review. In Future Information Technology 276 285–295.
  • Lee, J.-H., & Song, C.-H. (2013). Effects of trust and perceived risk on user acceptance of a new technology service. Social Behavior and Personality: An International Journal, 41(4), 587–597. doi:10.2224/sbp.2013.41.4.587
  • Lindell, M. K., & Whitney, D. J. (2001). Accounting for common method variance in cross-sectional research designs. Journal of Applied Psychology, 86(1), 114–121. doi:10.1037/0021-9010.86.1.114
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (draft). Nist Special Publication, 800(145), 7.
  • Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1), 42–57. doi:10.1016/j.jnca.2012.05.003
  • Moqbel, M., & Bartelt, V. (2015). Consumer acceptance of personal cloud: Integrating trust and risk with the technology acceptance model. AIS Transactions on Replication Research, 1(1), 1–5.
  • Moqbel, M., Bartelt, V., & Al-Suqri, M. (2014a). A study of personal cloud computing: Compatibility, social influence, and moderating role of perceived familiarity. Paper presented at the Twentieth Americas Conference on Information Systems (AMCIS), Savannah, Georgia.
  • Moqbel, M., Bartlett, V., & Cicala, J. (2014b, March 11–15). Personal cloud user acceptance: The role of trust and perceived risk in the technology acceptance model. Paper presented at the Southwest Decision Science Institute Forty-Fifth Annual Conference, Dallas, TX.
  • Mowbray, M., Pearson, S., & Shen, Y. (2012). Enhancing privacy in cloud computing via policy-based obfuscation. The Journal of Supercomputing, 61(2), 267–291. doi:10.1007/s11227-010-0425-z
  • Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory. New York, NY: McGraw Hill.
  • Parekh, D. H., & Sridaran, R. (2013). An analysis of security challenges in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA), 4(1), 38–46.
  • Pearson, S., & Yee, G. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3–42). London: Springer-Verlag..
  • Pînzaru, F., & Mitan, A. (2013). Generation y students: Using Facebook for communicating with university staff and professors. Management Dynamics in the Knowledge Economy, 1(2), 221.
  • Pitta, D., Kilian, T., Hennigs, N., & Langner, S. (2012). Do Millennials read books or blogs? Introducing a media usage typology of the internet generation. Journal of Consumer Marketing, 29(2), 114–124. doi:10.1108/07363761211206366
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. doi:10.1037/0021-9010.88.5.879
  • Ratten, V. (2014). Indian and US consumer purchase intentions of cloud computing services. Journal of Indian Business Research, 6(2), 170–188. doi:10.1108/JIBR-07-2013-0068
  • Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391–412. doi:10.1111/deci.2011.42.issue-2
  • Reese, G. (2009). Cloud application architectures: Building applications and infrastructure in the cloud. Sebastopol, CA: O’Reilly Media, Inc.
  • Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73. doi:10.1109/MIC.2012.14
  • Rogers, E. (1995). Diffusion of innovations. New York: Free Press.
  • Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404.
  • Ryan, M. D. (2011). Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), 36–38. doi:10.1145/1866739
  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. Mis Quarterly, 20(2), 167. doi:10.2307/249477
  • SOASTA. (2014). Cloud computing survey. Retrieved from http://www.businesswire.com/news/home/20140610005569/en/SOASTA-Cloud-Computing-Survey-2-5-Americans#.VORg5uaUd48
  • Srinivasan, S. (2013). Is security realistic in cloud computing? Journal of International Technology and Information Management, 22(4), 47–66.
  • Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116. doi:10.1016/j.ijinfomgt.2009.09.004
  • Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278. doi:10.1016/j.ijinfomgt.2010.08.001
  • Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. The Journal of Strategic Information Systems, 16(2), 214–232. doi:10.1016/j.jsis.2007.05.006
  • Twenge, J. M., Campbell, S. M., Hoffman, B. J., & Lance, C. E. (2010). Generational differences in work values: Leisure and extrinsic values increasing, social and intrinsic values decreasing. Journal of Management, 36(5), 1117–1142.
  • Vroom, V. (1964). Work and motivation. Oxford, UK: Wiley.
  • Weinhardt, C., Anandasivam, D.-I.-W. A., Blau, B., Borissov, D.-I. N., Meinl, D.-M. T., Michalk, D.-I.-W.-W., & Stößer, J. (2009). Cloud computing–a classification, business models, and research directions. Business & Information Systems Engineering, 1(5), 391–399. doi:10.1007/s12599-009-0071-2
  • Widjaja, A., & Chen, J. V. (2012). Using cloud computing service: A perspective from users’ information security, privacy concern, and trust. Paper presented at the 43rd Decision Sciences Institute Annual Meeting, San Francisco Marriot, San Francisco, CA.
  • Yuan, F., & Woodman, R. W. (2010). Innovative behavior in the workplace: The role of performance and image outcome expectations. Academy of Management Journal, 53(2), 323–342. doi:10.5465/AMJ.2010.49388995
  • Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115–123. doi:10.1016/j.im.2009.12.003
  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. doi:10.1016/j.future.2010.12.006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.