INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.9, No.11, Nov. 2017

An Empirical Investigation on the Impact of Trust Mediated Determinants and Moderating Factors on the Adoption of Cloud Computing

Full Text (PDF, 413KB), PP.12-22


Views:54   Downloads:1

Author(s)

Saad Alharbi

Index Terms

Adoption;Cloud Computing;Mediation;Moderation;Trust;UTAUT( Unified Theory of Acceptance and Use of Technology_)

Abstract

In a prior study we found out that trust is an effective factor in the acceptance and adoption of cloud computing using the UTAUT. However, various relationships from the original UTAUT were not confirmed in the extended model for cloud computing. Therefore, we present here a study aimed at investigating the mediation effect of trust on users’ attitude toward the adoption of cloud computing using UTAUT. It is also aimed to examine the role of five moderating factors which are gender, age, education, managerial level and job domain on subjects’ behavioral intention to use cloud computing services. Data were collected from 219 subjects in order to test the modified model and were analyzed using Partial Least Square (PLS) algorithm. Experimental results demonstrated that Performance Expectancy and Facilitating Conditions are strongly mediated by trust for the behavioral intention to adopt cloud computing. Statistical results, on the other hand, indicated that the majority of the moderating factors did not have a significant impact on the acceptance of cloud computing. The paper finally concludes with the limitations of current study and directions for future work.

Cite This Paper

Saad Alharbi, "An Empirical Investigation on the Impact of Trust Mediated Determinants and Moderating Factors on the Adoption of Cloud Computing", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.11, pp.12-22, 2017. DOI: 10.5815/ijitcs.2017.11.02

Reference

[1]S. M. Habib, S. Ries, M. Mühlhäuser, and P. Varikkattu, “Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source,” Security and Communication Networks, vol. 7, no. 11, pp. 2185-2200, 2014.

[2]T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments: Obstacles and solutions,” ACM Comput. Surv., vol. 46, no. 1, pp. 1-30, 2013.

[3]S. Singh, and J. Sidhu, “Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers,” Future Generation Computer Systems, vol. 67, pp. 109-132, 2//, 2017.

[4]S. Alharbi, “An extended UTAUT Model for Understanding of the Effect of Trust on Users' Acceptance of Cloud Computing,” International Journal of Computer Applications in Technology, vol. Accepted, 2017.

[5]S. A. Elmubarak, A. Yousif, and M. B. Bashir, “Performance based Ranking Model for Cloud SaaS Services,” 2017.

[6]S. Goyal, “Public vs private vs hybrid vs community-cloud computing: a critical review,” International Journal of Computer Network and Information Security, vol. 6, no. 3, pp. 20, 2014.

[7]R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An integrative model of organizational trust,” Academy of management review, vol. 20, no. 3, pp. 709-734, 1995.

[8]D. H. McKnight, “Trust in information technology,” The Blackwell encyclopedia of management, vol. 7, pp. 329-331, 2005.

[9]B. Friedman, J. Peter H. Khan, and D. C. Howe, “Trust online,” Commun. ACM, vol. 43, no. 12, pp. 34-40, 2000.

[10]B. Shneiderman, “Designing trust into online experiences,” Commun. ACM, vol. 43, no. 12, pp. 57-59, 2000.

[11]N. K. Lankton, D. H. McKnight, and J. Tripp, “Technology, Humanness, and Trust: Rethinking Trust in Technology,” Journal of the Association for Information Systems, vol. 16, no. 10, pp. 880, 2015.

[12]N. Lankton, D. H. McKnight, and J. B. Thatcher, “Incorporating trust-in-technology into Expectation Disconfirmation Theory,” The Journal of Strategic Information Systems, vol. 23, no. 2, pp. 128-145, 6//, 2014.

[13]R. R. Hoffman, M. Johnson, J. M. Bradshaw, and A. Underbrink, “Trust in Automation,” IEEE Intelligent Systems, vol. 28, no. 1, pp. 84-88, 2013.

[14]K. S. Coulter, M. Brengman, and F. P. Karimov, “The effect of web communities on consumers' initial trust in B2C e-commerce websites,” Management Research Review, vol. 35, no. 9, pp. 791-817, 2012.

[15]Y. Fang, I. Qureshi, H. Sun, P. McCole, E. Ramsey, and K. H. Lim, “Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms,” Mis Quarterly, vol. 38, no. 2, pp. 407-427, 2014.

[16]Y.-M. Li, C.-T. Wu, and C.-Y. Lai, “A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship,” Decision Support Systems, vol. 55, no. 3, pp. 740-752, 6//, 2013.

[17]W.-T. Wang, Y.-S. Wang, and E.-R. Liu, “The stickiness intention of group-buying websites: The integration of the commitment–trust theory and e-commerce success model,” Information & Management, vol. 53, no. 5, pp. 625-642, 7//, 2016.

[18]I.-L. Wu, “The antecedents of customer satisfaction and its link to complaint intentions in online shopping: An integration of justice, technology, and trust,” International Journal of Information Management, vol. 33, no. 1, pp. 166-176, 2//, 2013.

[19]Y. Zhang, J. Bian, and W. Zhu, “Trust fraud: A crucial challenge for China’s e-commerce market,” Electronic Commerce Research and Applications, vol. 12, no. 5, pp. 299-308, 9//, 2013.

[20]E. Abu-Shanab, “Antecedents of trust in e-government services: an empirical test in Jordan,” Transforming Government: People, Process and Policy, vol. 8, no. 4, pp. 480-499, 2014.

[21]E. Abu-Shanab, and A. Al-Azzam, “Trust Dimensions and the adoption of E-government in Jordan,” International Journal of Information Communication Technologies and Human Development (IJICTHD), vol. 4, no. 1, pp. 39-51, 2012.

[22]L. Alzahrani, W. Al-Karaghouli, and V. Weerakkody, “Analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: A systematic review and a conceptual framework,” International Business Review, vol. 26, no. 1, pp. 164-175, 2//, 2017.

[23]J. V. Chen, R. J. M. Jubilado, E. P. S. Capistrano, and D. C. Yen, “Factors affecting online tax filing – An application of the IS Success Model and trust theory,” Computers in Human Behavior, vol. 43, pp. 251-262, 2//, 2015.

[24]S. E. Colesca, “Understanding trust in e-government,” Engineering Economics, vol. 63, no. 4, 2015.

[25]Y. Gao, “The Influences Of Cognitive Factors And Trust On E-Government Acceptance: Evidence From A Two-Stage Model,” The Review of Business Information Systems (Online), vol. 17, no. 4, pp. 153, 2013.

[26]M. I. Manda, and J. Backhouse, “Addressing trust, security and privacy concerns in e-government integration, interoperability and information sharing through policy: a case of South Africa,” 2016.

[27]M. K. Muchahari, and S. K. Sinha, "A New Trust Management Architecture for Cloud Computing Environment." pp. 136-140.

[28]F. Wenjuan, Y. Shanlin, P. Jun, and H. Luo, “Building trust into cloud,” International Journal of Cloud Computing and Services Science, vol. 1, no. 3, pp. 115, 2012.

[29]X. Li, and J. Du, “Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing,” IET Information Security, vol. 7, no. 1, pp. 39-50, 2013.

[30]D. Gonzales, J. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, “Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” IEEE Transactions on Cloud Computing, vol. PP, no. 99, pp. 1-1, 2015.

[31]W.-J. Fan, S.-L. Yang, H. Perros, and J. Pei, “A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach,” International Journal of Automation and Computing, vol. 12, no. 2, pp. 208-219, 2015.

[32]D. Shapiro, M. Socher, R. Lei, S. Muralidhar, B. T. Loo, and N. Heninger, “DARUMA: Regaining Trust in Cloud Storage,” 2016.

[33]S. M. Khan, and K. W. Hamlen, "Hatman: Intra-cloud Trust Management for Hadoop." pp. 494-501.

[34]P. Manuel, “A trust model of cloud computing based on Quality of Service,” Annals of Operations Research, vol. 233, no. 1, pp. 281-292, 2015.

[35]M. Firdhous, O. Ghazali, and S. Hassan, “Trust management in cloud computing: a critical review,” arXiv preprint arXiv:1211.3979, 2012.

[36]K. Yamaji, M. Nakamura, Y. Nagai, T. Ito, and H. Sato, "Specifying a Trust Model for Academic Cloud Services." pp. 91-99.

[37]Z. Yang, J. Sun, Y. Zhang, and Y. Wang, “Understanding SaaS adoption from the perspective of organizational users: A tripod readiness model,” Computers in Human Behavior, vol. 45, pp. 254-264, 4//, 2015.

[38]R. Martins, T. Oliveira, and M. A. Thomas, “An empirical analysis to assess the determinants of SaaS diffusion in firms,” Computers in Human Behavior, vol. 62, pp. 19-33, 9//, 2016.

[39]M. Stieninger, D. Nedbal, W. Wetzlinger, G. Wagner, and M. A. Erskine, “Impacts on the Organizational Adoption of Cloud Computing: A Reconceptualization of Influencing Factors,” Procedia Technology, vol. 16, pp. 85-93, //, 2014.

[40]S. Alismaili, M. Li, J. Shen, and Q. He, “A Multi Perspective Approach for Understanding the Determinants of Cloud Computing Adoption among Australian SMEs,” arXiv preprint arXiv:1606.00745, 2016.

[41]C. Low, Y. Chen, and M. Wu, “Understanding the determinants of cloud computing adoption,” Industrial Management & Data Systems, vol. 111, no. 7, pp. 1006-1023, 2011.

[42]H. Gangwar, H. Date, and R. Ramaswamy, “Understanding determinants of cloud computing adoption using an integrated TAM-TOE model,” Journal of Enterprise Information Management, vol. 28, no. 1, pp. 107-130, 2015.

[43]H. M. Sabi, F.-M. E. Uzoka, K. Langmia, and F. N. Njeh, “Conceptualizing a model for adoption of cloud computing in education,” International Journal of Information Management, vol. 36, no. 2, pp. 183-191, 4//, 2016.

[44]W.-L. Shiau, and P. Y. K. Chau, “Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach,” Information & Management, vol. 53, no. 3, pp. 355-365, 4//, 2016.

[45]N. Opitz, T. F. Langkau, N. H. Schmidt, and L. M. Kolbe, "Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments." pp. 1593-1602.

[46]C. G. Cegielski, L. A. Jones‐Farmer, Y. Wu, and B. T. Hazen, “Adoption of cloud computing technologies in supply chains: An organizational information processing theory approach,” The International Journal of Logistics Management, vol. 23, no. 2, pp. 184-211, 2012.

[47]N. Haile, and J. Altmann, “Risk-benefit-mediated impact of determinants on the adoption of cloud federation,” in 19th Pacific Asia Conf on Information Systems, 2015.

[48]F. Z. Filali, and B. Yagoubi, “Global trust: a trust model for cloud service selection,” International Journal of Computer Network and Information Security, vol. 7, no. 5, pp. 41, 2015.

[49]J. F. Hair Jr, G. T. M. Hult, C. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM): Sage Publications, 2016.

[50]I. H. Bernstein, and J. Nunnally, “Psychometric theory,” New York: McGraw-Hill. Oliva, TA, Oliver, RL, & MacMillan, IC (1992). A catastrophe model for developing service satisfaction strategies. Journal of Marketing, vol. 56, pp. 83-95, 1994.

[51]J. F. Hair, R. E. Anderson, B. J. Babin, and W. C. Black, Multivariate data analysis: A global perspective: Pearson Upper Saddle River, NJ, 2010.