Perceived IT Security Risks in Cloud Adoption: the Role of Perceptual Incongruence between Users and Providers

نویسندگان

  • André Loske
  • Thomas Widjaja
  • Alexander Benlian
  • Peter Buxmann
چکیده

Despite the widely recognized prevalence of IT security risk concerns in users’ Cloud adoption, little is understood about how Cloud providers assess IT security risks and in what ways potential disagreements among providers and potential users on the IT security risks of Cloud services affect users’ adoption intentions. Drawing on perceptual congruence research and risk perception theory, our study examines matched survey responses of providers and potential users of their Cloud services. Our findings show a consistent pattern of perceptual differences across all relevant IT security risk dimensions of Cloud Computing. We also show that this disagreement between the providers of Cloud services and their potential users has strong adverse effects on important downstream user beliefs and, ultimately, on users’ intentions to adopt the services. We discuss implications for research and practice.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Top Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study

Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the infor...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Exploring Users' Attitudes and Intentions toward the Adoption of Cloud Computing in Saudi Arabia: an Empirical Investigation

Over the past few years, cloud computing has evolved as one of the major advances in the field of Information Technology (IT) utilizing third-party services. Therefore, trust in cloud vendors as well as the determination of potential risks, such as privacy and security issues, are crucial for ensuring the successful adoption of an appropriate cloud. Prior research have addressed the technical a...

متن کامل

Ranking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)

Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...

متن کامل

Ranking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)

Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014