Affiliation:
1. The University of North Carolina Wilmington
2. Miami University
Abstract
ABSTRACT
Guidelines originating from practice suggest the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy should be key factors affecting the trust of cloud-based systems. In our study, we test a model of end-user adoption of cloud-based software as a service (SaaS) by integrating the five principles from the Trust Services Criteria with systems risk. Using a survey methodology to collect data and analyzing it with structural equation modeling, we test hypotheses associated with the model. Our results show statistical support for the factors of security, confidentiality, and privacy as influencing consumers' trust in cloud-based services. Additionally, our results demonstrate trust in cloud-based services negatively influences the perceived systems risk, and these two items (trust and systems risk) significantly influence the decision by end-users to adopt a cloud-based system. Overall, our findings support the use of the Trust Services Criteria for assessing consumers' trust in cloud-based services.
Publisher
American Accounting Association
Subject
Management of Technology and Innovation,Information Systems and Management,Human-Computer Interaction,Accounting,Information Systems,Software,Management Information Systems
Reference58 articles.
1. Ahuja,
S.,
and
ManiS.
2012.
Availability of services in the era of cloud computing.
Network and Communications Technologies1
(1):
2–6.
https://doi.org/10.5539/nct.v1n1p2
2. AICPA.
2017.
TSP section 100 trust services principles and criteria for security, availability, processing integrity, confidentiality, and privacy.
Available at: https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-services-criteria.pdf (last accessed April 28, 2020).
3. Alharbi,
S.
2014.
Trust and acceptance of cloud computing: A revised UTAUT model.
Available at: https://ieeexplore.ieee.org/document/6822317
4. Ardagna,
C.,
Asal
R.,
Damiani
E.,
and
VuQ.
2014.
From security to assurance in the cloud: A survey.
ACM Computing Surveys48
(1):
2.
5. Arockiam,
L.,
and
MonikandanS.
2014.
Efficient cloud storage confidentiality to ensure data security.
Available at: https://ieeexplore.ieee.org/document/6921762
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献