24 research outputs found

    Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises

    Get PDF
    The advancement and the proliferation of information systems among enterprises have given rise to cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access (ACSC 2020). Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium-sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences

    Understanding the Success of Software-as-a-Service (SaaS) - The Perspective of Post-Adoption Use

    Get PDF
    Understanding the antecedents and consequences of trust in an online and on-demand outsourcing context is important. This study explores the effects of service quality on trust, which in turn affects a client firm’s post-adoption use in SaaS. A research model was developed based on the dedication-constraint framework of social exchange theory to measure service quality, trust, and SaaS post-adoption as multiple dimensions. We empirically examined the model by collecting data from 246 firms (key informants) that have adopted SaaS. Results show that while all three dimensions of service quality (client orientation quality, client response quality, environment quality) positively affect trust in service quality, client orientation and environment quality have positively influence on trust in provider. Both types of trust positively influence post-adoption intention. Finally, we discuss the theoretical and practical implications

    Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach.

    Get PDF
    Data breaches are increasing, and fitness trackers have proven to be an ideal target, as they collect highly sensitive personal health data and are not governed by strict security guidelines. Nevertheless, companies encourage their customers to share data with the fitness tracker using privacy seals, gaining their trust without ensuring security. Since companies cannot guarantee security, the question arises on how privacy seals work after not keeping the security promise. This study examines the possibilities to mitigate the consequences of data breaches in advance to maintain the continuance intention. Expectation-confirmation theory (ECT) and privacy assurance statements as a shaping of privacy seals are used to influence customer expectations regarding the data security of fitness trackers in the run-up to a data breach. Results show that the use of privacy assurance statements leads to high-security expectations, and failure to meet these has a negative impact on satisfaction and thus continuance intention

    Determining Factors of Cloud Computing Adoption: A Study of Indonesian Local Government Employees

    Get PDF
    Research aims: This study aims to identify the factors that influence the Indonesian local government employees to adopt cloud computing.Design/Methodology/Approach: A Unified Theory of Acceptance and Use of Technology (UTAUT) theory were employed to identify these factors. Research data were obtained using an online survey of employees, working in local governments in Indonesia. This study obtained 123 responses, which were then processed utilizing the structural equation modeling approach.Research findings: The results showed that Performance Expectations, Business Expectations, and Perception of Availability had a positive effect on the intention of local government employees to use cloud computing.Theoretical contribution/ Originality: This study expanded the UTAUT model by including security factors. Thus, creating a new cloud computing adoption model contributed to a theoretical finding in the context of government cloud computing adoption.Practitioner/Policy implication: The results of this study make practical contributions to cloud computing service providers in order to understand what factors drive the adoption of cloud computing by local government employees. In addition, the study also helps the top management in local government organizations to develop adoption strategies by understanding the influential determinants of cloud computing adoption on their employees.Research limitation/Implication: The context of this study is restricted to Indonesian local government employees. The local government employees have their characteristics, and it is different from other government employees in the central government

    Analysing Trust Issues in Cloud Identity Environments

    Get PDF
    Trust acts as a facilitator for decision making in environments, where decisions are subject to risk and uncertainty. Security is one of the factors contributing to the trust model that is a requirement for service users. In this paper we ask, What can be done to improve end user trust in choosing a cloud identity provider? Security and privacy are central issues in a cloud identity environment and it is the end user who determines the amount of trust they have in any identity system. This paper is an in-depth literature survey that evaluates identity service delivery in a cloud environment from the perspective of the service user

    Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises

    Get PDF
    The advancement and the proliferation of information systems among enterprises have given rise to understanding cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access. Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences

    A Privacy Calculus Perspective

    Get PDF
    Sandhu, R. K., Vasconcelos-Gomes, J., Thomas, M. A., & Oliveira, T. (2023). Unfolding the Popularity of Video Conferencing Apps: A Privacy Calculus Perspective. International Journal Of Information Management, 68(February), 1-17. [102569]. https://doi.org/10.1016/j.ijinfomgt.2022.102569. Funding: This work was supported by national funds through FCT (Fundação para a Ciência e a Tecnologia) under the project - UIDB/04152/2020 - Centro de Investigação em Gestão de Informação (MagIC).Videoconferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications especially during the COVID-19 pandemic. Although VC apps offer myriad benefits, it has caught much media attention owing to concerns of privacy infringements. This study examines the key determinants of working professional’s intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed that is based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modelling (SEM) is used to empirically test the model using data collected from 487 working professionals. For researchers, the study offers insights on the extent to which social richness and technological capabilities afforded by the virtual environment serve as predictors of the continuance intentions of using VC apps. Researchers may also find the model applicable to other studies of surveillance-based technologies. For practitioners, key recommendations pivotal to the design and development mobile video-conferencing apps are presented to ensure higher acceptance and continued usage of VC apps in professional settings.preprintauthorsversionepub_ahead_of_prin
    corecore