دانلود مقاله ISI انگلیسی شماره 155902
ترجمه فارسی عنوان مقاله

به اشتراک گذاری و رفتار ذخیره سازی از طریق محاسبات ابری: امنیت و حریم خصوصی در تحقیق و عمل

عنوان انگلیسی
Sharing and storage behavior via cloud computing: Security and privacy in research and practice
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
155902 2018 32 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Computers in Human Behavior, Volume 85, August 2018, Pages 218-226

ترجمه کلمات کلیدی
پردازش ابری، به اشتراک گذاری اطلاعات و رفتار ذخیره سازی، امنیت درک شده، حریم خصوصی درک، نفوذ همسالان،
کلمات کلیدی انگلیسی
Cloud computing; Information sharing and storage behavior; Perceived security; Perceived privacy; Peers influence;
پیش نمایش مقاله
پیش نمایش مقاله  به اشتراک گذاری و رفتار ذخیره سازی از طریق محاسبات ابری: امنیت و حریم خصوصی در تحقیق و عمل

چکیده انگلیسی

Cloud computing services (CCS) has altered information sharing and storage behavior. This study investigates this behavior and explores the paradox between industry reports and the academic CCS adoption literature. The majority of the academic literature shows that security and privacy beliefs are the major hindrances to wide adoption of CCS whilst multiple recent industrial reports state that security and privacy issues are no longer impediments to the use of CCS. The extensive sharing and storage of personal information among CCS regardless of any security and privacy concerns allows us to speculate about this paradox and provided insight for developing a cloud computing usage model. The posited model explores the influence of CCS main hindrances; that is, perceived security and perceived privacy, compared to the main determinants of technology adoption. The data was collected from 129 working professionals using a survey-based methodology. Contrary to the academic literature, the obtained results confirmed the hypotheses that cloud security and privacy concerns are not significant influences on information sharing and storage behavior. Peers influence was found a significant determinant of the behavior. The study contributes to the information systems and cloud computing literature and supports that the technology is perceived as able to protect user information. The analysis of the developed model provides multiple implications for researchers in academia and industry.