vitaminiop.blogg.se

Empirical research on effects of confidentiality
Empirical research on effects of confidentiality







empirical research on effects of confidentiality empirical research on effects of confidentiality empirical research on effects of confidentiality

Wang, H., Zheng, Z., Wu, L., Li, P.: New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Lee, Y.H., Park, H.S.: Big data analysis strategy in mobile cloud.

empirical research on effects of confidentiality

Ĭoles, C.: Gartner’s Latest CASB Report: How to Evaluate Vendors. Forrester, Cambridge (2016)īloter.: Cloud Security Business authentic boots. Gillett, F.E., Pelino, M., Maxim, M., Dai, C., Ask, J.A., Kindness, A.: Predictions 2017: Security And Skills Will Temper Growth Of IoT. IDC.: Worldwide Semiannual Public Cloud Services Spending Guide. 32(10), 71–76 (2015)īartels, A., Bartoletti, D., Rymer, J.R.: The Public Cloud Services Market Will Grow Rapidly To $236 Billion In 2020. Kwon, H.C., Jung, D.Y., Jung, B.H., Kim, J.N.: Cloud security overview. Kim, Y.K., Kim, T.U., Park, S.T., Jung, J.R.: Establishing the importance weight of appropriability mechanism by using AHP: the case of the China’s electronic industry. Therefore, it appears to be imperative to adopt an integrated management and support process for developing a service equipped with security information technologies facilitating the continuity of businesses. Therefore, when a strategic decision making is considered a requisite to induce a continuous use, it is advisable to opt for and control the technologies relevant to service authentication, fault recovery, and compliance risks instead of those related to the disruption of services or leakage of personal information. On the other hand, our findings demonstrate that trust also significantly affects the intention of a continuous use. However, we also found that the service interruption risk and the personal information leakage risk have a significant influence on trust only. Specifically, fault recovery and compliance exerted significant effects on trust and the continuous use intention. The results of our analysis indicate the risks relevant to service authentication. For that purpose, the present study analyzes the effects of security breach risk on trust and the intention of a continuous use. The purpose of the present study is to identify the factors that affect the intention of a continuous use (continuous intention) of mobile cloud services. This may inhibit the penetration of technologies. However, as compared to wired services, wireless services are likely to be exposed to the risk of security breach. Particularly, the use of a cloud service that allows users to access it in any place and at any time has increased on mobile devices, as well as on PCs. Diffusion of smart devices, explosive growth of SNSs, increased speed of mobile network, alongside with the rapid development of ICT, all allow provision and use of many services on smart (mobile) devices, which have been provided in the wired network environment.









Empirical research on effects of confidentiality