Professional Documents
Culture Documents
i
Studynama.com - #1 destination for free notes, eBooks, papers & projects.
Choose your course below and start downloading!
BBA/BBM, B.COM., MCA NOTES, EBOOKS, PROJECTS & REPORTS PDF DOWNLOAD
The purpose of this project was to identify and explore the end-users perspective
towards marketing challenges of security and privacy, a core issue which has emerged
with the introduction of Cloud Computing. The presence of these challenges has made
it difficult for the cloud-vendors to penetrate into the market in spite of the hype
“Cloud-Computing” has received. This study helps the cloud-vendors to identify the
end-user characteristics, their beliefs, attitudes and perceptions in reference to the
acceptance of cloud services in the midst of the security and privacy concerns
revolving around this technology. The researcher has reviewed literature about
acceptance of technology like the Technology Acceptance Model, Theory of
Reasoned Action, followed by focussing on marketing literature available on High-
Tech Innovations. Understanding the High-Tech Marketing environment was pivotal
in determining the different kinds of uncertainties from organisations viewpoint,
which influence the Cloud-computing end-users. However, most of the authors have
ignored the end-users perspective in their studies. This investigation commenced by
joining end-users through Google® Groups and LinkedIn® discussion forums. The
webinars were a mode of entry tool to grasp knowledge about characteristics of the
end-users. The primary data collection method employed for this research was survey
questionnaire to reach and gather responses from as many end-users as possible which
can represent a sample of the research population considering the growing number of
end-users of Cloud Computing. The findings demonstrate the effects of culture,
different factors considered by end-users based on their characteristics in the
acceptance of Cloud computing, not only as a secured option, but also one which can
protect confidential data. The research contributes significantly as it studies end-user
behaviour in acceptance of cloud computing which has paved the road-ahead for
cloud-vendors in adapting, planning and developing a sound business plan for
successful adoption of cloud computing technology solutions. Through this study, the
enormous popularity of this technology is further extended, as its focus is on suiting
the needs of end-users, which is one of the key determinants of successful adoption of
technology.
iv
Studynama’s Engineering Community is one of India’s Largest Community of BE & BTECH Students. About 79,182
Indian Engineering students are members of this community and share FREE study material, notes, eBooks, major
and minor projects, exam papers etc. to enable each other to do well in their semester exams.
Advanced Java Antenna & wave Electrical Machine-1 pdf Automobile engineering lecture
Surveying 1 - eBook
Programming eBook propagation eBook download notes
Web Technology - Network analysis & Electrical machines-II Engineering materials & SOM - strength of
eBook synthesis notes eBook metallurgy lecture notes materials - eBook
1. INTRODUCTION …………………………………………………………........ 1
v
4. FINDINGS ………………………………………………………………………… 40
4.1. Key Facts …………………………………………………………………… 41
4.2. Respondent Statistics …………………………………………………… 42
4.3. Survey Responses ……………………………………………………….. 42
6. CONCLUSION …………………………………………………………………... 83
7. RECOMMENDATIONS …………………………………………………………. 89
REFERENCES ……………………………………………………………………. 94
APPENDICES………..………………………………………………………….… 103
vi
TABLE OF FIGURES
vii
Studynama’s MBA Community is one of India’s Largest Community of MBA & PGDM Students. About 29,882 Indian
Management students are members of this community and share FREE study material, notes, eBooks, projects, case
studies exam papers etc. to enable each other to do well in their semester exams.
MBA/PGDM first Enterprise resource Security analysis & Business environment MBA Operations
year notes planning (ERP) pdf portfolio Mgmt. Notes Notes
And 12,998 more free downloads for MBA & PGDM Students.
viii
1. INTRODUCTION
In the past few years, many technological advances have benefited mankind, whether
be it, scientific inventions or medical aids, innovations such as electric cars or
exciting developments from IT industry. Most technical advancements bloom, while
some fade away more or less on a daily basis. This dissertation touches upon one such
major change in computing called Cloud Computing, a form of data storage that will
amend the way of storing information and running applications, completely different
than what we currently do on a desktop computer.
Cloud Computing has developed from a promising business model to one of the
fastest growing segments in the IT industry. Technological changes seen since the
advent of World Wide Web, for instance; where every page used to look identical
with similar HTML coding, were transformed when frames were introduced, followed
by tabs, adding flash images, etc. resulting in dynamic and exciting web pages that are
no longer the dull, less effective and standardised pages when it first came into scene
in 1994. Currently, we are in an identical state of development with Cloud
Computing. Authors such as Miller (2009), suggest the emergence of cloud
computing comparable with the electricity revolution, a century ago. According to
him, before the introduction of electric utilities, most businesses produced their own
electricity using stand-alone generators. However, once the electric grid was invented,
those businesses switched from these stand-alone generators to new electrical units,
thereby not only reducing costs but presenting greater reliability than conventional
generators.
A decade or two from now could witness a completely new revolution in this form of
technology, provided some key marketing challenges are addressed from the end-user
perspective. These challenges are being studied here by studying end-users
characteristics. Before looking into this primary reason for conducting this research,
it is vital to comprehend what does the term ‘Cloud Computing’ mean and how is it
different from current technology of computing we us in our day to day life.
-1-
1.1. WHAT IS CLOUD COMPUTING?
The term “cloud” usually a metaphor for the internet is the key to the definition of
Cloud Computing. Cloud is a huge group of interconnected computers which can be
personal computers or network servers. This group of multiple computers serves
beyond a single company or enterprise. Unlike traditional computing also known as
‘desktop computing’ where software applications are executed on each computer, in
Cloud Computing, they are all stored on servers accessed via the internet. Similarly,
files such as word documents, spreadsheets, presentations and applications are
accessed through the internet. In case of a computer breakdown, the software and
applications are still accessible by other users by logging on to the internet. The basic
difference between both the computing models is simply that traditional desktop
computing is PC-centric while Cloud Computing is user-centric and document-
centric. In this way, cloud computing facilitates a shift from PC paradigm to a user-
centric and a document-specific environment, from software application to tasks these
applications can perform, from data which isolated as it is stored on PC in the form of
data that can be accessed via an active internet connection on any device from
anywhere in the world.
Wyld (2009) defines the term “Cloud Computing, as a computing service that is
delivered over the Internet, on demand, from a remote location, rather than residing
on one’s own desktop, laptop, mobile device, or even on an organization’s servers.”
-2-
Studynama’s Law Community is one of India’s Largest Community of Law Students. About
29,982 Indian Law students are members of this community and share FREE study material,
cases, projects, exam papers etc. to enable each other to do well in their semester exams.
Links to Popular Study Material for LAW (LLB & BA.LLB) students:
• Family law pdf lecture notes & eBook download for LLB students
• Jurisprudence Law lecture notes pdf & eBook download for LLB students
• Company Law lecture notes pdf & eBook download for LLB students
• Law of Evidence lecture notes pdf & eBook download for LLB students
• Contract Law lecture notes pdf & eBook download for LLB students
• Criminal law pdf lecture notes & eBook download for LLB students
• Taxation Law lecture notes pdf & eBook download for LLB students
• Law of torts pdf eBook & lecture notes for LLB students
• Constitutional law pdf lecture notes & eBook download
• Labour law lecture notes pdf & eBook download for LLB students
• Administrative law lecture notes pdf & eBook download for LLB students
• Constitutional Law - I q&a notes pdf & eBook download for LLB
And 1998 more free downloads for Law & LLB Students.
In the midst of the growing popularity of the internet, and the ever-increasing number
of users logging on from several locations, from numerous different organisations, it
was expected to collaborate on projects spanning across multiple companies and
geographical boundaries. To enable this, such projects were hosted in the “cloud”,
which made accessing it possible from virtually any Internet-enabled location.
(Miller, 2009)
Use of cloud computing is evident in our day-to-day lives when using the internet.
Accessing social networking websites, checking e-mails, uploading pictures, posting
videos or files such as spreadsheets, presentations, or documents online is evidence to
the fact that one has made an entry into the territory of this new technology without
being really aware about it. Brockman (2009), cited remarks by technology futurist
Paul Saffo stating “A lot of people are in the cloud and don’t even realise it.”
E-mail services such as Gmail store your mails on the Google servers rather than the
physical machines. This enables an end-user (any internet user) to access their e-mails
from any location provided he / she has access to the internet and a device with web-
access functionality. Consequently, whether knowingly or unknowingly we have been
using cloud services.
Cloud computing presents us with numerous benefits which have a high potential,
both to the end-users as well as the developers. Reduced maintenance costs, increase
in the amount of storage space, higher processing power to run the applications,
improved economies of scale, decrease in the overall IT (Information Technology)
infrastructure costs are just to name a few for the developers.
-3-
In addition to this, the end-users also benefit by obtaining better upgrade offers, but
more importantly there is a benefit of group collaboration where a number of people
can work on the same project at the same time for e.g. a presentation where all
changes made by all users are evident to the ones in the group thereby saving time and
improved visibility.
On the other hand, like everything in IT, Cloud also has its demerits indicating need
for certain challenges to be addressed before such a gigantic technological change can
materialize. Although there are many technical challenges associated with the advent
of Cloud computing, this research will primarily focus on certain technical issues
which directly or indirectly has an impact on its marketing. This section highlights
and examines these challenges in brief, some of which will be later inspected in detail
in Chapter 2.
-4-
c) Challenge of Data security and Privacy: Data is stored off-site, which
provides an opportunity for it to be compromised. While cloud vendors, seek
to maintain the data safe, there’s always a possibility of a security lapse.
Contrary to that, some analysts view it as a benefit to small-scale companies,
as their movement to cloud would enable them to increase the level of their
security through the movement of their data and applications on the cloud as
the resources are shared across the client-base of the cloud vendor.
In addition, Schwartz (2008), points out that cloud vendors can invest more in
security which can be spread over the entire client-base resulting into improved
security considerably rather than investment by an individual firm for themselves.
None-the-less, security and privacy are major challenges which will be further
investigated in this research.
This research aimed at identifying and exploring the real challenges particularly the
ones threatening the end-users in accepting Cloud-computing technology. Much
literature has been available discussing threats such as data security and privacy
which is causing major marketing issues faced by Cloud Computing vendors,
however testing it from an end-user perspective is the primary intention behind this
research. By the end of the research, the following objectives are met:
a) Research Objectives
To identify what kind of security challenges are really a threat to use of Cloud
Computing from an organisation point of view by studying end-user
behaviour.
-5-
To verify the impact of culture when threats such as data security and data
privacy are being analysed in relation to the economies of scale and time value
of money.
To establish the key variables considered by the end user in accepting cloud as
a solution over the threats in an effort to combat the uncertainty which
hampers the acceptance of Cloud computing as a new form of technology.
To determine major factors that ensures security and privacy protection and
restores confidence in the minds of end-users to adapt to the new Cloud
technology.
b) Research Questions
The research questions below are aimed at exploring, identifying and tackling
marketing challenges associated with technological changes in the form of computing,
i.e. with the introduction of Cloud computing. The end-user perspective is used to
validate certain key issues about acceptance of Cloud Computing technology.
-6-
2. Does a customer of Cloud solution, (end-user), with limited technical
knowledge of cloud solutions care, if their data is stored on the same
server along with his competitor’s data keeping in mind the benefits these
solutions have to offer such as economies of scale, reaping time value of
money, etc.?
These questions set the foundation for this research to study end-user behaviour and
combat the issues of security and privacy by understanding their perspective towards
the present layers of security and privacy, which is discussed in Chapter 2.
-7-
2. LITERATURE REVIEW
The importance of any research and its outcomes found thereafter will always be
judged in correspondence to other people’s research and their findings. Tranfield et. al
(2008) supports this belief by suggesting researchers to ‘map and assess the existing
intellectual territory’, to establish the nature of previous researches which have been
published in the selected topic area, and possibly discover current researches being
carried out.
This chapter commences by reviewing the literature from a broader dimension about
technological advances, marketing theories in acceptance of technology, narrowing
down to the Cloud model, assessing its security and privacy issues and ultimately
evaluating the role of culture in technology acceptance as end-users behaviour and
their perceptions will be studied.
Technology has played an enormous role in building our society the way it is today.
The rate of such technological progress is often classified into two phases: “Invention
(a scientific breakthrough) and innovation (commercialisation of the invention)” – A
distinction highlighted in the book “Open Innovtions” by Chesbrough et. al (2006)
where Nelson and Winter (1982) have credited this classification to Schumpeter
(1934).
With an array of products already present in the market for sale, organisations keep
innovating and launching new and improved variances. By introducing a new gadget
like mobile phones, or latest models of cars, or these organisations are changing the
way we live all the time. Innovations in the medical field help mankind to counteract
against the deadliest of diseases. Remarkably, these innovations are continuously on-
going. “Innovation won’t go away – it is not the next big thing- it is always there”, a
statement cited in a special report. (Getting Creative, Special Report – Business Week
August 2005)
-8-
Ettlie (2006) highlights three reasons why technological changes have gained
importance over the years, viz.
On the contrary, authors such as March and Simon (1958), emphasize on two
important factors, internal pressures and external pressures which initiate such
technological changes in most organisations, but not all.
Based on discussion so far, it is evident technology sets up the path for organisations
to flourish and grow and maintain competitive sustainable advantage over its
competitors. What remains to be seen is why do some organisations seem to be more
innovative? How do some organisations maintain their innovative behaviour, while
others hesitate?
-9-
Christensen(1992) came up with the study of the Technology S-curve. It suggests
high potential at the beginning of technology life-cycle with the increase in efforts
(Resources, Time and Engineering) spent which later diminishes with the advent of
new technology.
Next Generation
Product Performance
Of Technology
1 2 3 4
In the above Figure 2.1, Point 1 is where new technology is invented. As seen above,
technological change is continuous, until Point 2, where the existing technology is
being constantly improved till it reaches its peak at Point 3, where the existing
technology reaches its maturity with given efforts, and / or increasing engineering
efforts. After this Point 3, it has diminishing returns to performance of the technology.
The dotted S-curve denotes the invention of new technology, this technology cycle is
observed to be recurring all over again. Point 4 is when the new technology reaches
its peak, until new technology again comes into play.
Studies by Sahal (1991) supported the above view in his book, “Patterns of
Technological Innovation”. He was the first one to demonstrate with empirical
evidence that with passage of time, there is a steady progress of technology as its
potential is understood.
- 10 -
2.2. Marketing theories relevant to acceptance of
new technology
These factors are highlighted when studying the characteristics of such high-tech
marketing environments. Studies by Moriarity et.al (1989), Gardner, D (1990) and
Moore, G (2002) established certain characteristics that all high-technology industries
share in common are discussed in the sub-section below:
i. Market Uncertainty
- 11 -
Figure 2.2 – Characterizing High-Tech Marketing Environments
Source: Adopted from Mohr et.al (2005)
The Figure 2.2 above demonstrates how marketing of high-tech products and
innovations take place when these three common variables intersect.
- 12 -
c) Lack of industry standards: In-appropriate or lack of industry standards
for a new innovation / technology in a market affects consumer’s
decision to adapt to a new technology. Aley, J. (2003) emphasized these
factors which lead to slow adoption of 3G wireless technology.
According to him, 3G technology was adopted by many customers after
a lot of careful considerations about the CDMA – (Code Division
Multiple Access) and W-CDMA (Wideband Code Division Multiple
Access as both these interfaces were a part of 3G technology but they
were region specific which meant that if CDMA works in one region, it
may not work in another.
- 13 -
iii. Competitive Volatility: refers to the alternations in the competitive
environments. Determining companies competitors, their products / services,
tools utilised by their competitive firms to compete against them. Sources of
such competitive volatility are:
c) Identifying which of their own products will the company compete with,
after identifying and analysing the competitors and their tactics?
iii. Time: The time element used in Diffusion of Innovations Theory is involved in
three separate modes
- 14 -
a) Innovation-Decision Process: The innovation-decision making process
(Figure 2.3) indicates the 5-staged process where an individual (or decision-
maker) seeks information, moves from first body of knowledge about an
innovation, to shaping an opinion or attitude about it, in deciding about
adopting or rejecting the idea to implement, and finally confirming their
decision
iv. Social System: refers to the members of a particular group who are jointly-
engaged towards solving a common issue by working towards accomplishing a
common goal.
- 15 -
2.2.3 Theory of Reasoned Action & Technology Acceptance Model
Theory of Reasoned Action (TRA), a study associated with Fishbein and Ajzen
(1975) linked behaviour to quite a few elements like attitudes, beliefs and
behavioural intentions. Individual behaviour was identified to be an outcome of
behavioural intentions which was ultimately determined by an individual’s attitude.
Based on the general concept of TRA, a new model called Technology Acceptance
Model (TAM) was developed by Davis (1989). TAM suggested that a number of
factors influence the decision-making process for a consumer to decide as to how
and when they will use or adopt new technology. The two main factors i.e.
Perceived Usefulness (PU) refers to the extent to which a person believes that using
a system will improve his / her performance and Perceived Ease-of-use (PEOU),
defined as “degree to which a person believes that using a particular systems will be
free from any effort.”
Hoyer, W.D and Maccinis, D.J (2009) realized that consumers decision on adoption
or rejection of a new technology depends on whether they are prevention-focussed
or promotion focussed. Some consumers, who are more concerned about protection
and safety, will end up resisting the temptation to adopt a new technology. Similarly
the author identifies promotional-based consumers, who value growth, advancement
and the promotions offered by the new technology, especially when the risks are
insignificant.
- 16 -
There are various uses of technological products and numerous countries have
adopted such innovations. However, the technological paradoxical concept remains
firm on the belief that there may be global products but there are no global people.
Hofstede’s (2007) model of cultural values is useful as there is no global language
by which we can reach global consumers.
Lewis et. Al (2003), studied a variety of theoretical models portraying the beliefs
which constituted the determinants of acceptance of target technology. Various
models of IT such as TAM and TRA discussed above support that beliefs of
individual dominate their usage behaviour while other studies have recognized the
importance of finding determinants of such beliefs. Beliefs seem to have a deep
impact on subsequent individual behaviour towards the acceptance technology
hence observing how beliefs were formed was investigated consequently.
Generally, perceived usefulness and perceived ease of use have been two
prominent variables arising of these studies in the field of acceptance of technology,
This raises a question about individual differences being account for.
Literature suggests that certain factors which constitute of these differences are as
follows:
- 17 -
Institutional Factors: have been subjects of interest in Information Systems
research. Organizational attributes have been studied including user training
(Fuerst and Cheney 1982; Leonard-Barton 1987; Raymond 1988; Sanders and
Courtney 1985); knowledge management (Boynton et al. 1994; Pennings and
Harianto 1992) and organizational support (Delone 1988, Leonard-Barton and
Deschamps 1988; Monge et.al 1992). Although, as seen above numerous scholars
have emphasised about managerial commitment, much is still desired into what
constructs these beliefs.
Social Factors: Fulk (1993) and Schmitz (1991) demonstrated the extent to which
others view technology can also serve as a positive influence on one’s own beliefs
and perception about usefulness of the technology.
Long-term consequences: are those “outcomes that have a pay-off in the future”
- 18 -
2.3. THE NEW CLOUD MODEL
In retrospect to the traditional model where organisations purchase a licence for each
application the new cloud computing model charges on the basis of its use similar to
Pay-per-use, thereby offering an assortment of applications and services available to
use as per the end-user requirements.
In 2007, Gartner’s press release indicated that CaaS market is expected to sum up to
$2.3 billion in 2011. Least or no management on part of the customer is one of the
key features of a CaaS. Furthermore, maintenance and managing expenses for the
communication infrastructure is shared across the customer-base of the cloud vendor
which allows the customers to leverage an enterprise-class communications solution
and allocate remaining financial and other assets where businesses can use them in the
best possible manner.
- 19 -
2.3.2 Infrastructure-as-a-Service (IaaS)
Cloud computing has evolved to encompass platforms for building and running
customized web-applications, a model known as Platform-as-a-Service. This model
formulates an architecture including all facilities essential for supporting the life-cycle
of building and delivering web-applications and services available through the
internet, without any software downloads or installation for developers, IT managers
or end-users.
Distinct from the IaaS model, where users may use specific operating systems with
mandatory applications running, the PaaS developers are focussed on the web-
development aspect provided by the platform and not with the kind of operating
systems used. It sets the focus on innovation rather than infrastructure, thereby
allowing organisations to plan their finances and invest more in creation of new and
- 20 -
improved web-applications without upsetting their infrastructure needs. Developers
around the globe, through internet have access to unlimited computing power through
which they can build dominant web applications and deploy them to users
worldwide.
Unlike Paas, where you develop your own applications, SaaS offers the software /
application to the end-users. Many users have limited knowledge how and why the
software application is being developed, and focuses mainly on using the software.
SaaS is ideal in such circumstances, supporting features such as multi-tenancy, i.e.
supporting multiple-users to access software concurrently, which is what separates it
apart from traditional models of software distribution.
- 21 -
2.4. PRIVACY AND SECURITY ISSUES
According to the TRUST’es survey in December 2008 and results by the Poneman
Institute, privacy was identified as the key differentiator in cyber world. “Consumer
perceptions are not superficial, but are in fact the result of diligent and successful
execution of thoughtful privacy strategies.” said the chairman of Poneman Institute,
Dr. Larry Poneman who believes consumer trust is the basis of business. “Consumers
want to do business with brands they believe they can trust.”
Based on the studies above, privacy can be viewed as an important business issue
focussing on protecting the personally identifiable information from inappropriate and
unauthorised methods of data collection, usage and leakage, consequently preventing
the loss of customers trust and avoiding frauds such as identity theft, phishing and e-
mail spamming.
- 22 -
b) Security and Privacy Specification and Secondary Usage control – in
order to identify under what circumstances an individual can trust others for
security and privacy. Digital certificates issues by given entities certifying
the holders of information with properties such as accreditation and in
addition given user the ability to constraint possible secondary uses of their
information
Velte et.al (2010) pointed out people using cloud services fail to understand the
security and privacy implications of their e-mail accounts, their social networking
user accounts and even recognise that these services are considered cloud services.
Moreover, any regulation will affect other cloud services. Their studies also
highlight a combination of security techniques allowing users to secure their data
when moving their data to a cloud vendor. These techniques are:
- 23 -
a) Encryption: is a process of encoding data with a series of complex algorithms
which can be decoded only through an encryption key. Although, cracking
coded information is possible, however, most hackers find it difficult due to
the amount of processing power needed for it to be cracked.
However, in spite of these techniques, the security concerns are not completed
addressed. Having said that, if there is a disaster in the organisation where all the data
is lost, implementing a Cloud solution with the data backed up on Cloud server will
benefit as all the data will not be lost.
Authors like Worthen and Vascellaro (2009) and Kaplan (2009), view cloud services
as more reliable and secured than individual organisations offerings. The only
difference as they see is that if a company’s e-mail system crashes, it does not make
the headline while any outage or data breach by Gmail, Apple or Amazon cloud
service hits the front cover of the local newspaper.
- 24 -
Figure 2.5: Issues related to Cloud Computing
Source: IDC findings, 2008a
- 25 -
2.5. THE ROLE OF OPEN SOFTWARE SOURCE &
VIRTUALIZATION
Nevertheless, IT firms face the risk of such collaboration as too much encouragement
to users can also reduce the availability of vendors to achieve proprietary lock-in, i.e.
making a customer dependent on a vendor for products and services resulting into
inability to switch to another vendor without substantial amount of switching costs.
In context to the Cloud Computing, the Open Source Consortium aims in supporting
the development of standards and interoperability amongst various clouds. Not only
does is support the developments of benchmarking standards, but is also a strong
promoter of using open source software in cloud solutions.
- 26 -
Virtualization is an elementary technological development which allows experienced
people in the IT industry to set up inventive way out to tackle such business
challenges. For instance, while using computer games, if the virtual memory is
activated, the computer operating system gains more memory than actual physical
installed memory. Likewise, virtualization technologies may be applicable to other IT
infrastructure layers such storage, networks, laptop or server hardware, applications
and operating systems.
The Figure 2.6 above presents us with an explanation how this combination of
virtualization technology by employing a VMware Virtualization Layer between
computing, storage and networking hardware and the applications running on it.
- 27 -
2.6. CULTURE AND TECHNOLOGY
The link between individual and culture is best stated by Linton (1945), who states “A
culture is the configuration of learned behaviour and the results of behaviour whose
components elements are shared and transmitted by members of a particular society”
Culture is an integral part of both the individual and the society making routine tasks
simpler than ever before due to unwritten rules understood by participating in a
society. According to Goodenough (1971), “culture is a set of beliefs or standards,
shared by a group of people, which help the individual decide what is, what can be,
how to feel, what to do and how to go about doing it.”
Many scholars such as Agarwal (1999), Igbaria (1990), Melone (1990) and Davis
(1989), realise the importance of considering individuals cultural differences in
acceptance of technology and it usage. Although organizations adopt to new
technology and IT solutions which may fit flawlessly with their aims and business
objectives, however it may not necessarily ensure a guaranteed performance unless
members of the organisation use it effectively. Agarwal (1999), states “Acquiring
appropriate IT is necessary but not sufficient condition for utilizing it effectively”
Intercultural marketing approaches not only limits itself to geographical and national
boundaries, but also accounts for consumer attitudes, lifestyles, their preferences
which are linked to their age, class, occupation, ethnicity, etc. (Usunier and Lee,
2009)
- 28 -
Despite of the popularity of Technology Acceptance Model (TAM) by (Davis, 1989),
it is considered as the most deficient model in explaining use of IT at the individual
level. Since individuals are accustomed by their respective cultures, integration of
such cultural differences with TAM may predict and explain the behaviour towards
new technology (Cloud Computing). Key variables in TAM model other than
perceived usefulness and perceived ease of use, (which are discussed above) are
perceived behavioural control, perceived risk and demographics particularly age and
gender. Perceived risk of adopting Cloud services may refer to protecting privacy and
data security of information stored using such services potentially leading to identity
theft, compromising of confidential data, etc. Perceived behavioural control are linked
to the circumstances of cloud usage, instances where end-users prefer to switch to
cloud vendors for cloud usage for recurring activities leaving behind more important
tasks for their internal IT experts.
In summary, the literature emphasises the central issues of privacy and security lying
with the adoption of the new technology, i.e. Cloud Computing in context of this
research. Uncertainty is a key attribute in the adoption of new technology which will
be tested through this research from the end-user perspective by studying their
perceptions, beliefs and opinions about acceptance of technology. Virtualization and
Open source software’s are key concepts which will be looked into as the research
carries on. Research institutes like Garner have conducted their research on the central
issues from an organisational perspective. It is evident from the literature that security
and privacy issues are present. On the other hand, there are various benefits of
switching to cloud computing as well due to which organizations are promoting this
switch. However, the importance of these issues from an end-user perspective will be
analysed through this research to identify and resolve the marketing challenges
enabling cloud vendors to focus on the concerns of end-users.
- 29 -
3. RESEARCH METHODOLOGY
The aim of this research was to explore the current marketing challenges i.e. Security
and Privacy faced by most data storage companies, particularly Cloud vendors, with
the advent of Cloud computing. While most findings and literature highlights security
and privacy as issues pertaining to Cloud Computing from the organisation
perspective, however much is still desired to be studied about these issues from an
end-user perspective, as to what they think and perceive about confidentiality of their
data, keeping in mind the solutions offered by cloud vendors. The access to Cloud-
Computing end-users was crucial for data gathering purposes in this research. This
began with attending webinars and building connections for data gathering.
Most authors such as Polonsky and Waller (2004), highlight the importance of data
gathering in a research project. The method chosen for any research project will have
profound effects on performance of the remaining activities in any research project.
Weller & Romney (1988), suggest considering special care and attention as choosing
the most appropriate methodology can determine the biggest cost (time and money) of
the research.
This research has adopted an inductive approach. The inductive approach is selected
as it allows for changes by offering a more flexible structure, as the research
progresses. Since the end-user perspective about marketing challenges of security and
privacy in Cloud Computing is being studied, for which there is not much literature
available, an inductive line of investigation is the most appropriate research approach.
- 30 -
b) To evaluate research strategies and employ the methods which will function and
selectively eliminate the one’s which may not work, and
c) To adapt the research design to cater for constraints such as lack of prior
knowledge of the subject, which was a constraint in this research as Cloud Computing
is a relatively new topic, with very a small number of previous researches, especially
on end-users of Cloud Computing.
Research philosophy is vital for a researcher to develop knowledge and the nature of
that knowledge. Saunders et al. (2009), examines the different research philosophy
using The Research ‘Onion’ and classifies research philosophies into Positivism,
Realism, Interpretivism and Pragmatism.
The philosophical position chosen for this research was Interpretivism as it takes into
consideration the complexity of humans as social actors in business and management
which cannot be governed by definite ‘laws’ similar to physical sciences in the
positivist position. Additionally, the Interpretivism research philosophy lays
emphasis on conducting research on living human-beings rather than lifeless objects
studied in most scientific research. When studying security and privacy challenges
from an end-user perspective it is critical not to disregard the social element in the
respondents, hence Interpretivism seems to be the most obvious choice.
Bryman and Bell (2007) underpin the importance of a research strategy as it lays the
foundation of conducting a business research. This research adopted a Quantitative
research strategy using questionnaire / survey as the primary method of data
collection.
- 31 -
3.3.1. Quantitative research
3.3.2. Participants
As the title suggests, this research could have not been conducted without with
the opinions, suggestions and responses of end-users of Cloud computing who
have used and / or responsible for recruiting individuals in the information
technology industry dealing with Cloud Computing. Thus, professionals such
as IT security consultants, IT product managers, Head of Datacenter &
Information Technology, Chief Technology Officers, IT Helpdesk executives,
software developers, system engineers, marketing managers in Information
systems, SaaS and PaaS professionals, and staff members of College of
Technology London (pilot-survey) were contacted to share their views about
security and privacy (confidentiality) when using Cloud-based services.
- 32 -
3.3.3. Gaining access
The studies from the literature review confirmed that most organisations fear
security and privacy as major hurdle in getting the users adopt to the new
Cloud-based services. What was desired before this research was to confirm it
from the end-users perspective. Before an attempt was made to gain access to
end-users, invitations were sent to online discussion groups like on Google
groups, LinkedIn groups to ensure adequate familiarity of the characteristics
of group members and understanding of the end-users. Saunders et. al (2009)
advocates gaining such knowledge as it enables the researcher to signify to the
prospective respondents during the research “why they should grant access?”
Most surveys deal with identifying the ‘research population’ for providing
fundamental information to address the research questions. It is often a
challenge to involve all members of the population, hence selecting who
participates in the survey is a key consideration. The primary aim in selecting
the respondents in this research, out of the thousands of others is to ensure
those who are participating represent a sub-set of the research population,
thereby the generalising the findings to that target population with utmost
confidence. (Jill and Johnson, 2002)
- 33 -
The main issue was establishing first contact with the research population. To
being with, webinars on Cloud Computing were attended to get introduced to
prospective respondents, followed by using LinkedIn®, a professional
networking website to join groups and discussion forums where individuals
interested in participating in a research project were short-listed. Using non-
probability sampling, the self-selection sampling was employed for the
research. Saunders et.al (2009) explains self-selection sampling as a method
by which individuals knowledgeable about the topic are identified who desire
to be a part of your survey. Subsequently, the data is collected from those who
respond.
The primary research began by sending a pilot-survey on the 22nd April 2010
to staff members of College of Technology London, user’s of Ampera, a
student administration system used by the college which is based on Cloud
Computing. This was to test the survey questions before it was released after
knowing the initial response. Upon receiving 23 responses within first ten
days, more than 750 invitations through discussion forums and LinkedIn for
participating in the survey questionnaire released on the 1st of May 2010.
These invitations were sent to users of cloud services mainly targeting at
expert end-users, allowing myself to identify the desired end-users who are
willing to respond and knowledgeable about the topic of research.
- 34 -
Figure 3.1: Types of Questionnaires
Source: Saunders et.al, 2009
The next challenge was to choose the questionnaire amongst the different
kinds of questionnaires available as seen above in Figure 3.1. Self-
administered questionnaire design was preferred as it would attract larger
number of respondents, irrespective how geographically dispersed they may
be. Amongst the three types of self-administered questionnaires, internet and
internet-mediated questionnaire was ideal, when compared to postal and
delivery & collection methods simply because they offer better control over
the reach of the desired person as respondent. For instance, when a postal or a
delivery & collection questionnaire is addressed to an employee with an aim to
find out what is the most-time consuming task to help him / her improve their
time-management, you may find out distorted or contaminated responses as
the respondent may even ask one of his colleagues to fill in the same responses
due to lack of supervision or control. In contrast, internet and internet-
mediated questionnaires particularly those which are sent to the official e-mail
or a message through the professional networking website to a particular
account holder, presents considerable command over other forms of survey
designs / questionnaires.
- 35 -
please you or because they believe certain responses are more socially
desirable”, thereby reducing data contamination by using this approach
The questionnaire design, (Refer to Appendices) was published using an
online tool offered by SurveyMonkey.com®. The professional version of the
tool was preferred to accommodate for unlimited responses and “filter” and
“cross-tabs” tool option to analyse data using the same. The questions were
classified into 4 sub-sections, i.e.
a) About Yourself,
b) About Technology Awareness – Cloud Computing
c) About Technology Acceptance and Beliefs
d) About Security, Privacy and Confidentiality of data
Classifying the questions not only meant it was presentable, but it also made it
clear for the respondents to anticipate kind of questions and its
comprehensibility to encourage more responses. The questionnaire designed
presented the respondents an opportunity to alter their responses during the
survey as all the questions were not plotted on a single page. The survey was
open for a month from the 22nd April 2010, when the pilot-survey was tested,
until the 21st May 2010.
The data collected from the survey responses was both quantitative and
qualitative, in a raw form with numbers and variables, conveying very little
sense of it. Qualitative data was pre-coded into categories to process them into
information which can be described. Saunders et. al (2009), explains the use of
developing categories, followed by connecting them to form relevant data.
Excel™ spreadsheet and software package from the internal “filter tool” and
“cross-tabs” within the Survey Monkey Pro® account was used to conduct the
analysis.
- 36 -
Charts, graphs and statistics were some of the quantitative analysis techniques
utilised in exploring, describing, and examining the results of the survey
which was useful in establishing relation and trends within the data obtained.
The data analysed was then presented in the form of pie-charts, vertical bar
charts or column charts, line diagrams to represent trends and horizontal bar
charts.
Most authors like Raimond (1993) and Rogers (1961), express their views on
the importance of the credibility of research findings by aiming to reduce the
possible errors by focussing on reliability and validity of the research design
McBurney and White (2007), defines reliability as “the property of
consistency of a measurement that gives the same result on different
occassions”. Validity is defined as “the property of a measurement that tests
what it is supposed to test.”
Robson (2002), claims there are four threats of reliability which are assessed
to ensure that data collection and the analysis of this research yields consistent
conclusions. Participant / Subject error was reduced by sending the invites at
the same time of the day which was mid-night during weekdays (GMT) as this
seemed to be morning in most parts of the globe wherever the respondents
reside. Similarly, Participant / Subject biases were avoided ever since the
formation of the research design to ensure respondents are given enough
indications to guarantee anonymity. Lastly, to address the threat of validity
related to Observer error and Observer biases, questions included in the
survey had text box to ask the response if they were able to interpret the
research questions and in case of any doubts to ask the researcher for any
clarity.
- 37 -
Similarly, the threats to validity as suggested by Robson (2002) were
considered. Threats to validity such as history of events in the past were
studied. Cloud computing technology has always been in hype and pick of
things. However, at the time of this research no dramatic events were
associated Cloud’s data security and privacy in comparison to 2009 when it
first came into the picture. Respondents were informed about their
participation to be completely voluntary and bearing no effects to their every
day usage addressed the testing and instrumentation threat to validity.
Whilst conducting this research, at every stage the ethical implications were
considered, in particular about preserving the confidentiality of data. Concerns
related to ethics emerged while planning, gaining access, data collection,
analysing and report-writing.
During planning and gaining access stage stage, various methods were
considered and the research design was formulated ensuring the selected
choices for data collection are in sync after considering ethical issues such as
consent of participants, their reaction to the procedure selected to obtain data
from them i.e. if it causes the intended respondents any kind of pressures,
feeling of discomfort, stress, etc.
The anonymity of respondents was practised while data collection was carried
out. This was to ensure concealment of particular viewpoints to protect the
identity of the respondents from being disclosed and their responses therein.
The nature of participating was completely voluntary, providing the
participant the right for withdrawing at any stage of the survey, partially or
completely. This ensured that no pressure if applied on the intended
participants supporting the views of Robson(2002); Sekaran(2003)
- 38 -
As Jankowicz (2005) suggests, irrespective of the approach chosen whether
positivist or interpretivist, special care was taken to maintain the data in a
secure location with a password protection known only to the researcher
ensuring that before data is processed, it is stored securely.
- 39 -
4. FINDINGS
This section presents the findings of the primary research conducted by means of the
questionnaire method. The information presented in this chapter is to be considered as
primary findings as it is data in the raw form. Thus, offering first-hand information
before the analysis is carried out in Chapter 5, where the responses are discussed in
detail before drawing conclusions subsequently. Some key facts facilitate
comprehending these findings are stated below:-
- 40 -
To enable this, the questionnaire design was well-defined with clear instructions and
logical reasoning behind asking the questions. Participants were given the choice at
the beginning of the survey to enter their e-mail address which was not mandatory,
but if the respondent desires to obtain a copy of the survey results, they may opt to fill
their e-mail addresses.
The particulars mentioned below are in relation to the prospective respondents who
were chosen for this research.
Total Survey Invites - 751
Total Refusals (Opt-outs) - 3
Maximum Response Expected – 748
Total Started Surveys – 155
Total Completed Responses – 122
Percentage of Total Started / Completed Responses – 78.7%
As seen above a total of 122 completed responses were collected out of the possible
maximum of 748 responses. The respondents who opted out were due to lack of
interest or time.
- 41 -
4.3 Survey Results
This section provides the raw data in a tabular format of the number of responses
obtained for each of the questions presented to the respondents. Figures such as line
graphs, pie-charts, area-charts are used to represent the data in percentages.
Question 1. Age-group
- 42 -
Question 2. Gender
Gender Total
Male 102
Female 20
122
Table 4.2
Most end-users (83.6%) were male professionals as depicted in the Figure 4.2 below.
The number of females who have participated in this research were mainly
contributed during the initial survey (pilot-survey) which included staff members of
the College of Technology London.
- 43 -
Question 3. Ethnic Background
Ethnicity Total
White - British 8
White - Other 25
American 5
European 22
African 2
Asian 10
Indian 37
Chinese 6
Hispanic 1
Brazilian 6
122
Table 4.3
Ethnicity was one of the key characteristics which was captured to study the end-user
behaviour and differences in beliefs, attitudes and towards acceptance of technology,
Cloud-Computing, in context to this research. The three major contributors as
demonstrated in Figure 4.3 were Indians (30.3%), Whites - Other than British (20.5%)
and Europeans (18.0%)
- 44 -
Similarly, end-user attributes such as their First Language, Preferred Language, etc
were also enquired to analyse results effectively.
Languages Total
Kannada 1
Telugu 1
Portuguese 5
Spanish 1
Malayalam 1
Vietnamese 1
Chinese 6
French 10
German 1
Dutch 8
Cantonese 1
Mandarin 1
Finnish 1
Ukranian 1
Urdu 1
Arabic 1
Marathi 1
Tamil 1
Italian 2
Hindi 1
Croatia 1
English 68
TOTAL 115
Non English (NE) 47
NE Preferred English 11
Table 4.4
- 45 -
SECTION 2: ABOUT TECHNOLOGY AWARENESS – CLOUD
COMPUTING
Question 5. Have you come across the term “Cloud Computing” or ever used
such technology?
Total
Yes, I am aware about it and use it quite oftenly 108
No, I am not aware or used this technology 5
Not sure, I have heard the term, but not sure 9
122
Table 4.5
The awareness of Cloud Computing was evident by observing the responses for
Question 5. The most encouraging sign was that 88.5% of the research population
studied in this research were aware of this technology and oftenly used it. Others who
were not sure or answered No, were unknowingly using Cloud based services without
knowing it.
- 46 -
Question 6. Have you come across the term “Cloud Computing” or ever used
such technology?
As stated above, the users who opted for No or Not Sure option about the awareness
of the term “Cloud Computing” were presented Question 6. Apparently, all the
respondents did select at least one of the Cloud-based services in response to this
question. Those who had indicated their unfamiliarity with the term were informed
though a note that if they have selected any of the options here, they are either
knowingly or unknowingly using the Cloud-based services.
- 47 -
SECTION 2: ABOUT TECHNOLOGY – YOUR BELIEFS & ACCEPTANCE
Question 7. When you hear about a cost-effective new technology, you first
consider?
- 48 -
Question 8. What describes you best amongst the following options in reference
to adaptation to new technology?
Innovator 36
Early Adopter 45
Early Majority 33
Late Majority 4
Laggards 2
120
Table 4.8
The respondents were asked to describe themselves in the above groups which were
coded and descriptions of these codes are as follows:
Late Majority and Laggards formed the minority which contributed to only 5% of the
total participants, whilst highest majority of 37.5% respondents were Early adopters.
- 49 -
Question 9. Which of the following factors influence you most in accepting /
rejecting a new technology?
Proper training, knowledge and organisation's support 60
Social group’s acceptance : Peers/Colleagues point of view 29
Long‐term benefits associated with it 84
Ability to use the technology 77
Status symbol or Brand Image in using it 9
Others 7
TOTAL RESPONSES 119
Table 4.9
The query about the most influential factors generated a 70.6% reaction in favour of
long-term benefits associated with the acceptance / rejection of a new technology. An
astonishing piece of finding was the fact that only 7.6% of the respondents considered
status symbol / brand image as a reason of using it.
Proper training, knowledge
80.0% 70.6% and organisation's support
64.7%
70.0%
Social group’s acceptance :
Peers/Colleagues point of
60.0% view
50.4%
50.0% Long‐term benefits
associated with it
40.0%
24.4% Ability to use the
30.0%
technology
20.0%
7.6%
5.9% Status symbol or Brand
10.0% Image in using it
0.0%
Others
- 50 -
SECTION 3: About Security & Privacy and Confidentiality of your data
Security Dilemma
0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% 100.0%
Use of open-access and flexible No interference with personal Observe others experiences and
Continue using web-space as it
data storage facility with minimal photos and documents for feel secured about such risks and
offers ease in uploading pictures
or no cost to store your data, benefits such as free storage continue to use such services
AGREE 33.9% 36.8% 67.0% 46.1%
NIETHER, NOR 16.5% 23.7% 19.1% 27.0%
DISAGREE 49.6% 39.5% 13.9% 27.0%
- 51 -
Question 11. When visiting websites, they may collect and store your personal
information to let you access their services, For e.g. Accessing information about
air-tickets, etc. According to you as a user, if given a choice rate the privacy
measures will you impose to protect your identity?
Table 4.11
The privacy measures highlighted in the literature were tested on the end-users to
analyse their views in relation to protecting themselves from issues such as identity
theft, phishing, etc. Although, users were asked to rate from 1 to 5, their responses are
condensed into groups of importance, neither important nor unimportant and
unimportant. This helps in data analysing as well as presenting it effectively. The area
chart depicts that most privacy related measures are important as highlighted below in
dark. However, the gap keeps widening when factors such as issue of digital
certificates are considered.
Privacy Dilemma
120.0%
100.0%
80.0%
UNIMPORTANT
60.0% NIETHER, NOR
IMPORTANT
40.0%
20.0%
0.0%
Identify website Inference and
Restrict Issue Digital
Data Protection Right to Control data collection Linking Attack
Secondary Use Certificates
and sharing Protection
UNIMPORTANT 6.8% 4.3% 5.3% 4.3% 8.6% 2.6%
NIETHER, NOR 4.3% 4.3% 6.1% 12.9% 13.8% 8.6%
IMPORTANT 88.9% 91.5% 88.6% 82.8% 77.6% 88.8%
- 52 -
Question 12. When adopting to a Cloud solution, or using cloud web-services
what according to you as a user, if given a choice what security measures will
you add to your wish-list? (Multiple Choice)
Using these applications and services on a
familiar platform such as Windows OS,
Linux OS or Apple OS 55
Complete knowledge about infrastructure,
i.e. hardware used, the systems 39
Location of where your data is store 47
Control on secondary usage – to ensure the
information entered on the website once is
not used again by some other source
without your knowledge 72
Use of encryption techniques – to encode
your data to add an additional layer of
security in case the cloud vendors security
is hacked 72
Use of Authentication Processes – through
Open‐source software to create username
and password 76
Authorization practices – to create lists of
people who are authorised to access
information 80
TOTAL RESPONSES 101
79.2% Using these applications and services on a
80.0% 75.2% familiar platform such as Windows OS,
71.3% 71.3% Linux OS or Apple OS
70.0% Complete knowledge about infrastructure,
i.e. hardware used, the systems
60.0% 54.5%
Location of where your data is store
46.5%
50.0%
38.6%
Control on secondary usage – to ensure the
40.0%
information entered on the website once is
not used again by some other source
without your knowledge
30.0%
Use of encryption techniques – to encode
your data to add an additional layer of
20.0% security in case the cloud vendors security
is hacked
Use of Authentication Processes – through
10.0% Open‐source software to create username
and password
0.0% Authorization practices – to create lists of
Percentage people who are authorised to access
information
- 53 -
5. DISCUSSION AND ANALYSIS
The key findings discussed below, also provide an analysis about the marketing
challenges from an end-user perspective. By studying their characteristics,
behaviour, beliefs and attitudes, these findings present facts about dealing with
Cloud Computing challenges of security and privacy to Cloud vendors.
Security measures are important, but different for different user’s and different kinds
of data. This was ascertained during this research as the same user may interpret
security measures differently when dealing with different kinds of data. For instance,
a lecturer may use their notes to share amongst his/her students and publish it on a
student portal which improves the learning of a student. However, the lecturer (same
user) may want to encrypt the data, or fear the confidentiality of sharing it when using
an online tool to transmit information to the exams office about assessment of
examination and marks obtained by each student.
- 54 -
This kind of data is considered as sensitive data while data which can be shared is
non-sensitive data.
Participant’s usage was tracked by their responses about their web-based usage
ranging from accessing e-mails, to storing pictures, video, using web-applications
such as Google docs to web services such as pay-per use web services to store
organisation data or backing up their hard-drive on a website. Although, the same
user can select more than one option. However, the one’s who did select the options
of backing up their hard-drive to an online website or using a pay-per-use Cloud
service, were considered to be users of sensitive data. This may be potentially a
limitation of this research which has been acknowledged in the subsequent chapter
about limitations. However, the purpose of segregating sensitive and non-sensitive
data through determining the web-usage of the participants was considered for this
research as it is the first of its kind and the awareness of end-users is unknown. This
approach of differentiating sensitive and non-sensitive data by simply confirming
the web-usage, made it simpler for all the participants to comprehend.
An analytical test, using the cross-tab tool available through the Professional
version of SurveyMonkey.com was carried out between the kinds of data, both
sensitive and non-sensitive along with the kinds of security options considered by
multiple users. This data was further plotted on Excel® spreadsheets using pivot
tables and then represented in graphical format for presenting the data obtained.
The first option was to analyse if the end-users will continue using the open-access,
flexible data storage systems which may involve risks as data is stored and
accessible anywhere, which may be compromised. This was tested with users who
backup their hard-drive data to an online tool and those who use pay-per-use
services to store important organisational data as this kind of data would be
sensitive in comparison to data such as e-mails, pictures, videos, etc.
- 55 -
The Figure 5.1 denotes that almost 50.0% of the users who backup their hard-drive to
an online website and 42.5% of the users who use pay-per-use cloud services,
disagree with the idea of taking risks for the benefit of using open-access, flexible
data storage solution and saving on costs involved.
42.5%
taking risks as it may be shared to unknown users
Diasgree 50.0%
30.0%
Agree
36.4%
0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% 50.0%
Sensitive Data
Figure 5.1: Use of open-access, flexible storage at cost of risks for Sensitive data
Similarly, a small proportion of 13.6% and 27.5% of hard-drive backup and pay-per-
user services users respectively are neither in favour, nor against using cost-effective
means of data storage which may be at risk. This leaves us with 36.4% end-users who
backup their hard-drive and 30.0% end-users who prefer pay-per-use data solutions
who may still wish to continue taking advantage of costs versus risks.
- 56 -
What was interesting to note, was the end-users with non-sensitive data such as using
e-mails, storing pictures and videos, using web-application like Google docs do
reflect a similar picture as seen below in the Figure 5.2, where almost 50% in each of
the categories of different web-usage indicate their disagreement of taking risks
sharing data at the cost vis-à-vis benefiting from the cost-effectiveness offered by
these solutions.
49.5%
e veryw h ere throu gh inte rne t w hich m a y b e a t th e cost o f
m in im a l or no co st to sto re yo ur d a ta w hich is acce ssible
50.9%
Diasgree 50.6%
50.4%
30.9%
Agree 30.8%
32.8%
Figure 5.2: Use of open-access, flexible storage at cost of risks for Non-sensitive data
- 57 -
The second option being investigated was to examine if end-users want no
interference with their personal data such as photos and documents, for benefits such
as free storage space and they would rather prefer to send physical hard-copies to
ensure complete data-security.
32.5%
Diasgree 48.9%
45.0%
Agree
27.9%
0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% 50.0%
Sensitive Data
As seen in the Figure 5.3 above, there are mixed responses where 45.0% of users of
pay-per-use web-services prefer that there is no interference with their personal data
such as photos and documents for free storage space or minimal cost, while 48.9% of
end-users who backup their hard-drive to an online website rejected the idea of no
interference to be able to save on cost. Another interesting observation is that almost
1/5th of these users are neither in favour nor against such interference which would be
potentially an area of further research which is also evident in users of non-sensitive
data where 1/4th of them reflect similar responses as seen in Figure 5.4 below.
- 58 -
No Interference for benefits such as free data storage
p re fe r to se n d p h y sic a l h a rd -co p ie s to e n su re co m p le te d a ta -
39.8%
d o c u m e n ts fo r b e n e fits su ch a s fre e sto ra g e sp a c e , ra th e r
Y o u w ill w a n t n o in te rfe re n ce w ith p e rso n a l p h o to s a n d
44.4%
Diasgree
43.3%
39.3%
Store videos
Agree, Nor 25.6%
Disagree
24.1% Store pictures / photos
0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0%
Non-sensitive Data
The third option was to verify if end-users for sensitive and non-sensitive data will
continue using the web-space which offers free storage space and is relatively easier
than maintaining physical data sets managed by themselves. It is clearly evident in
Figure 5.5 and Figure 5.6 below, both sensitive and non-sensitive data end-users
agree with continuing the use of web-storage space as it offers convenience in
uploading in data such as pictures and documents in comparison to using physical
modes of transfer, to transmit the data. Users of video storage solutions were the most
prominent (78.2%) amongst the non-sensitive data segment who agreed to use such
solutions as they offered expediency. While in the sensitive data segment, user who
commonly back-up their hard-drive to an online website were the major advocates
(72.7%) of Cloud based services.
- 59 -
Use of web-space as it offers ease in uploading data
You will continue to use their web-space as it offers ease in
uploading pictures preferred through such web-services
rather than using other modes of transferring or sharing
15.0%
Diasgree
13.6%
65.0%
Agree
72.7%
Figure 5.5: Using web-space which offers uploading ease – Sensitive Data
13.5%
uploading pictures preferred through such web-services
rather than using other modes of transferring or sharing
7.3%
Diasgree 9.9%
14.1%
14.5%
Neither Agree, Store videos
Nor Disagree 17.6%
18.7% Store pictures / photos
78.2%
Agree 72.5%
67.2%
Figure 5.6: Using web-space which offers uploading ease – Non-sensitive Data
- 60 -
Observing peer experiences and feel secured
You will observe others experiences and feel secured about
such risks and continue to use such services without being
22.5%
Diasgree
25.0%
concerned about i
47.5%
Agree
52.3%
Figure 5.7: Observing peer experiences & feeling secured - Sensitive Data
The fourth option was used to evaluate if end-users will be influenced by observing
the experiences of their peers, when using the web-services based on Cloud
Computing and the extent to which they would feel secured about using them
especially when security and privacy risks are hindering the adoption of Cloud
Computing technology.
Whilst the ratio of end-users who do observe peer experiences when using these web-
services, and also feel a sense of security, was dominant as against those who disagree
with the statement. However, as seen in the Figure 5.7, it does indicate when the
people who neither agree nor disagree are considered along with those who disagree it
outnumbers the number of people who do agree with feeling secured only because
others are following the technology.
- 61 -
Observing peer experiences and feel secured
Y o u w ill o b serv e o th ers e xp e rien ces an d fee l se cu red
ab o u t s u ch risks a n d co n tin u e to u se su ch serv ic es
21.3%
23.6%
Diasgree
26.4%
w ith o u t b ein g co n ce rn ed ab o u t i
27.5%
0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% 50.0%
Non-Sensitive Data
Figure 5.8: Observing peer experiences & feeling secured Non-Sensitive Data
The Figure 5.8, above suggests a similar trend for users of non-sensitive data such as
e-mails, pictures, videos and web-based applications like Google documents which
has the leading number of 49.5% respondents who agree being secured based on their
peers perception.
Based on what has been discussed so far, end-users are often concerned about security
of data, whether the data is sensitive or insensitive. Despite the availability of open-
access, flexible storage systems which reduces the maintenance, infrastructural and
implementation costs, most users are not completely certain about the security
measures provided by cloud vendors considering there are various risks involved as
data may be accessible to anyone as it is available on the internet. These users realise
that it is not possible to have absolutely no interference when it comes to publishing
data such as pictures on the web.
- 62 -
Hence many users do prefer to use the web-space based on peer’s experiences about
security of a particular cloud-service or a selective cloud-vendor. Thus the importance
of security measures varies with the sensitivity of data along with various
considerations as discussed earlier.
- 63 -
2. Knowledge of the physical location of the data is not the most critical
information desired by the end-users but does hold some relevance.
As learnt from the literature in Chapter 2, where authors have highlighted the
significance of knowing the physical location of the data stored, the same was
assessed amongst the end-users. The cross-tab tool and the filter option were
particularly useful to conduct a content analysis where the characteristics of end-users
such as their web usage, their awareness about Cloud services, and their
innovativeness in accepting technology were systematically identified to understand
the intensity of knowledge about the physical location of the data storage.
47.3%
Store pictures / photos
48.2%
Figure 5.9: The importance of knowledge about physical location to end-users based on their usage
The first characteristic which was studied to analyse the importance of identifying
the physical data location was the end-users different web usages. As seen in the
Figure 5.9, the X-axis denotes the percentage of end-users who feel knowing the
physical data storage location is important whilst the Y-axis highlights the different
kinds of web-services used by these end-users. The range of this importance varies
from 45.2% for users of web e-mail services up to 55.5% of pay-per-use web service
users.
- 64 -
Although, these figures may seem to be worth mentioning, however, it was found
insignificant when other security measures were analysed in following sub-sections.
The second characteristic was studied by integrating the aspect about the Cloud-
Computing awareness of the end-users relative to their opinion about importance of
knowing the physical data location of the data they store on the internet.
80.0%
80.0% Yes, I am aware about it and
60.0% use it quite oftenly
40.0% No, I am not aware or used this
43.7% 44.4% technology
20.0% Not sure, I have heard the term,
0.0% but not sure what it is exactly
Importance about knowing the
location of where your data is stored
Figure 5.10: The importance of knowledge about physical location to end-users based on their
awareness about Cloud Computing
Figure 5.10 exhibits that only 43.7% of aware end-users believe that knowing the
physical location is important security measure while 44.4% of informed users feel
likewise. Although the figure above does denote 80.0% of unaware users consider
physical data location as a vital piece of information in securing the data hosted on the
web, a key consideration is the fact that only 5 out of the 122 participants were in this
category. (Refer to page 42, Table 4.5)
The innovativeness of the end-users is an ideal personality trait in analysing the role
of security measures such as the information about location of the data store or the
lack of it.
- 65 -
Importance of knowledge of physical data location Vs Rate of
Innovatiness
60.0%
50.0% 52.9% Innovator
46.9% 50.0%
40.0% Early Adopter
40.0%
30.0% Early Majority
20.0% 25.0%
Late Majority
10.0%
Laggards
0.0%
Importance about knowing the location of where
your data is stored
Figure 5.11: Importance of knowledge about physical location to end-users based on Rate of
Innovativeness of an Individual
The end-users who possess diverse rate of innovativeness, were questioned about
importance of knowing the physical data location as a security measure. As Figure
5.11 signifies, the variation of the least number being 25.0% of Late Majority users
who are skeptical of using a technology unless majority is using it, while 52.9% of
innovators who are risk-bearing and always ready to transform from existing practices
were the most renowned believers of this information which acts as a considerable
factor in securing data over Cloud-based services.
The outcome of this analysis as discussed thus makes it lucid, that knowing the
physical data location of their data does act as an important measure of security in the
minds of most end-users. However, as there are a number of end-users, who disregard
it, suggests that although it is essential to know the location but is not the most critical
security measure to prevent any unwanted sharing of data or avoiding of similar risks,
when adopting a Cloud solution. Subsequent discussions and analysis will further
establish the most critical security measures when other key choices are appraised.
- 66 -
3. Layers of security such as creating Authentication practices and using
Authorisation processes are most vital when the aim of the Cloud service
provider is to ensure maximum security with utmost reliability, followed by
practising encryption and restricting secondary use of data.
The next step in investigating the layers of security while using Cloud solution was to
check the different security measures. As discussed in the literature against the end-
user’s innovativeness in adopting a relatively new technology in data storage
solutions.
120.0%
100.0%
80.0%
60.0%
40.0%
20.0% Innovator
0.0% Early Adopter
Use of familiar Having complete Location of Use of Use of Authorization
platforms for knowledge about where your data
Control on
encryption Authentication practices – to Early Majority
secondary usage
web-services / infrastructure, is store techniques – to Processes – create lists of Late Majority
Innovator 61.8% 32.4% 52.9% 58.8% 67.6% 79.4% 76.5% Laggards
Early Adopter 42.2% 35.6% 40.0% 77.8% 71.1% 77.8% 80.0%
Early Majority 59.4% 40.6% 46.9% 75.0% 75.0% 75.0% 78.1%
Late Majority 25.0% 25.0% 25.0% 100.0% 100.0% 75.0% 75.0%
Laggards 50.0% 0.0% 50.0% 50.0% 50.0% 100.0% 100.0%
- 67 -
The primary security measures are mainly, the use of authentication processes at
79.4% amongst Innovators, Authorisation practices at 80.0% and 78.1% amongst
Early Adopters and Early Majority respectively. Similarly amongst the late majority,
use encryption techniques (100.0%) and control on secondary usage (100.0%) were
the most significant layers of security measures. Laggards, also contributed richly
accumulating for 100.0% share of end-users who chose authentication processes
through open-sources software to create usernames and password as well as
authorization practices as the primary layers of security when using web-services or
web-based applications.
52.1%
71.8%
Use of encryption techniques –
to encode your data to add an
additional layer of security in
77.8% case the cloud vendors security
is hacked
Use of Authentication Processes
78.6% – through Open-source software
to create username and
password
Authorization practices – to
create lists of people who are
0.0% 20.0% 40.0% 60.0% 80.0%
authorised to access information
- 68 -
Figure 5.13 describes the importance of different security measures amongst all end-
users who have participated in this research. The most critical factors evident are
authorization practices (78.6%) and authentication processes (77.8%) followed by use
of encryption techniques and restricting secondary usage at (71.8%)
- 69 -
4. Cultural differences do play a profound role when data confidentiality and
privacy of Cloud-based solutions are measured.
The end-users who participated in this research were further categorized based on
their ethnicity to highlight the impact played by their cultural differences in the
adoption of technology. The aim of analysing the responses of end-users in a culture-
wise distribution of various privacy choices was to figure out what do end-users from
different ethnic backgrounds, think about data confidentiality and how do they go
about using web-based applications and services based on clouds, considering the
risks of data being accessible anywhere on the internet and possibly shared to
unknown users.
The decision of using an open-access flexible data storage which may be at a risk
amongst different end-users from various ethnicities was amongst the first privacy
choices which was analysed. An important observation before considering the bar-
chart below is out of the 122 respondents, the majority of them fall into the category
of Indians (30.3%), White-Others (20.5%), and Europeans (18.0%), while the
percentage of Hispanic was almost negligible (0.8%) (Refer to Page 40 for details)
The chart in Figure 5.14, below depicts end-users belonging from ethnic backgrounds
associated with most developed countries such as Americans, White-British, White-
Other’s are more sensitive to sharing their data using flexible cloud solutions where
there is any risk involved which is the first of privacy choices analysed in this section.
The figures obtained speaks for itself where 80.0% Americans, 75.0% Whites -
British and 50% of Whites from Other countries disagree with the choice of taking
data sharing risks by adopting to a Cloud solution in order to protect their privacy
rights.
The only exception amongst users from developed countries are European end-users
who are mostly in favour of adopting to a cloud solution even at risks of data sharing,
while 35% of them still disagree.
- 70 -
Using open-access, flexible data storage solutions at risk of data sharing
Hispanic 100.0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
White – White
American European African Asian Indian Chinese Hispanic Brazilian
British –Other
Diasgree 75.0% 50.0% 80.0% 35.0% 50.0% 33.3% 60.0% 20.0% 0.0% 33.3%
Neither Agree, Nor Disagree 0.0% 16.7% 0.0% 15.0% 0.0% 22.3% 20.0% 20.0% 0.0% 33.4%
Agree 25.0% 33.3% 20.0% 50.0% 50.0% 44.4% 20.0% 60.0% 100.0% 33.3%
On the other hand, when responses from end-users, from developing countries were
examined, their denial to using cloud-based web-services and applications was
considerably lower. Asians accounted for 33.3% while only 20.0% of Chinese end-
users were concerned about risks like personal data being shared to unknown people
when uploaded on Cloud-based servers. Indians, amongst this assortment, were most
concerned with such risks and 60.0% refused the proposal of using such solutions
considering the risks involved therein. The responses from end-users representing
South American countries like Brazil chose evenly accounting for 33.3% for all the
three choices.
- 71 -
The second privacy choice involved identifying the different cultural beliefs in
transmitting personal data such as picture through physical distribution by ways of
hard-copies, burning data on CD’s / DVD’s, transmitting through USB sticks and
having no interference what-so-ever in this aspect.
Users wanting no interference with personal data and prefering to send physical hard-copies
Hispanic 100.0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
White –
White –Other American European African Asian Indian Chinese Hispanic Brazilian
British
Diasgree 71.5% 41.7% 60.0% 40.0% 50.0% 44.4% 31.4% 20.0% 100.0% 16.7%
Neither Agree, Nor Disagree 0.0% 16.6% 20.0% 30.0% 0.0% 11.2% 28.6% 60.0% 0.0% 33.3%
Agree 28.5% 41.7% 0.0% 30.0% 50.0% 44.4% 40.0% 20.0% 0.0% 50.0%
Figure 5.15: Culture-wise distribution of end-users wanting no interference with personal data
A similar trend was observed between end-users from developing and developed
countries. For instance, British and Americans respondent show a majority of 71.5%
and 60.0% respectively, disagreeing with the thought of no interference with their
personal data and being strict about protecting their data by following rigid approach
while transferring data. This observation signifies that these end-users prefer
flexibility in storing and transmitting data at the same time are concerned about
protecting it from being available to unknown entities. The other majority are end-
users from Africa (50.0%), Asia (44.4%) and India (40.0%) who agree with no
interference with their personal data.
- 72 -
The third choice to analyse, although may seem identical to the previous two
discussed above. However, the major consideration over testing this choice amongst
end-users belonging to various backgrounds was to key in the importance of use of
web-space due to uploading ease. Although, it can still be argued that similar analysis
is conducted between these variables, however in my view it was important to find
how much would the ease in uploading, be a factor in comparison to the difficulty in
using physical means of data transmission, discussed in the previous privacy choices.
Hispanic 100.0%
African 100.0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
White –
White –Other American European African Asian Indian Chinese Hispanic Brazilian
British
Diasgree 25.0% 25.0% 0.0% 20.0% 0.0% 0.0% 11.4% 0.0% 0.0% 0.0%
Neither Agree, Nor Disagree 25.0% 25.0% 20.0% 20.0% 0.0% 11.1% 14.3% 40.0% 0.0% 16.7%
Agree 50.0% 50.0% 80.0% 60.0% 100.0% 88.9% 74.3% 60.0% 100.0% 83.3%
Figure 5.16: Culture-wise distribution of end-users preferring to use web-space due to its
ease in uploading
As seen in Figure 5.16, the end-users belonging to the White ethnicity (both, British
and Others) are the least amongst the group at 50.0% who agree with the ease of
uploading being a dominant factor impacting their need for keeping data confidential /
protect its confidentiality.
- 73 -
Statistics of each of the other representatives imply that ease in uploading is central to
attract web-usage through Cloud-based solution despite of cultural differences.
The final choice, was straight-forward, precise and aimed at identifying end-user
opinions about feeling secured in respect to privacy risks, by observing others
experiences. This analysis would not only be beneficial to address the privacy risks
but also helps to tackle the security issue which is a crucial marketing issue in
adoption of Cloud Computing technology.
Users who observe others experiences and feel secured about privacy risks
Hispanic 100.0%
African 100.0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
White –
White –Other American European African Asian Indian Chinese Hispanic Brazilian
British
Diasgree 50.0% 37.5% 0.0% 15.0% 100.0% 22.2% 25.8% 20.0% 0.0% 16.7%
Neither Agree, Nor Disagree 12.5% 45.8% 40.0% 30.0% 0.0% 22.2% 17.1% 20.0% 0.0% 33.3%
Agree 37.5% 16.7% 60.0% 55.0% 0.0% 55.6% 57.1% 60.0% 100.0% 50.0%
Figure 5.17: Culture-wise distribution of end-users who observe others experiences in feeling
secured about privacy risks
Figure 5.17, above shows a complete contrast to the previous choices where
responses of end-users from developing and developed countries were discussed and
analysed. The culture-wise distribution of end-users who feel secured about privacy
risks by observing others experience demonstrated that 60% Americans, 55%
- 74 -
Europeans, 55.6% Asians, 57.1% Indians, 60% Chinese and 100% Hispanic
ethnicities were influenced by peers, colleagues and others more than their
counterparts.
Despite of analysis between the two variables of ethnic background and the privacy
options they prefer, what was desired to diagnose was the cultural impact into the rate
of individual innovativeness.
The majority of response rates were from end-users belonging to communities such as
Indian, White-Others, Europeans and Americans. As seen in Table 5.1 above, only
concentrating on this majority, their rate of innovativeness varies and hence they are
classified into different groups based on their individual innovativeness. Indian’s
contribute to a majority of Early Majority at 39.4%, Europeans end-users are
primarily Early Adopters with a majority of 26.4%, while 25.0% of American
respondents who participated in this research accounted for mostly late majority who
accept use of technology when the majority has accepted it.
- 75 -
5. The most influential factor initially in the decision making process about
technology acceptance is primarily based on suitability of needs, while they
perceive technology as acceptable if there are long-term sustainable benefits
associated with its acceptance
The respondents were also questioned about the most influential factor when it
comes to first hearing about a cost-effective technology. The reason the question
specifically stated “cost-effective” was to present the option to disregard the cost
factor involved which may be a distinguishing factor based on income-levels of
an end-user. Since this study does not go in-depth in studying individual
characteristics of income levels, which could possibly be an area of further
research.
The results as seen in Figure 5.18, implies that when a new technology comes
into existence, the 89.2% end-users focus on it’s suitability to their needs before
considering making any decision about acceptance or rejection of the same.
27.5%
30.8%
37.5%
53.3%
Response Percent 55.0%
69.2%
41.7%
89.2%
0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0%
Whether any unanticipated / side-effects of the new technology are looked upon by the service-provider
Whether Post-sales services will be offered by its vendor
Whether visibility of its results are seen already
Whether any trial options will be offered to you to test it
Whether it is relatively advantageous than the previous one
Whether it will deliver as promised
Whether it is compatible with industry standards
Whether it is suitable to your needs
Figure 5.18: Factors influencing end-users at the initial stage of newly developed technology
- 76 -
The next most crucial factor is whether the given technology will deliver as promised.
Cloud vendors, like most marketers make promises to attract the use of Cloud-based
data storage systems.
Based on this reason, end-users as much as 69.2% of the total respondents opted for
deliverability standards as promised.
Table 5.2: Response-percent and Response-Count (Max: 100% or 120 responses, 2 skipped)
The Table 5.2 represents rest of all the other factors such as compatibility with
industry standards, relative advantage over the previous technology, trial-ability
options, visibility of the results of the given technology, post-sales services offers and
any other unanticipated / side-effects being looked upon by the service provider.
- 77 -
The next set of responses were analysed to distinguish the most crucial factors while
accepting / rejecting a new technology. There was an open-ended text-box also
incorporated to capture any factors which may have been overlooked. The end-users
were thereby encouraged to specify any factors not present in the original
questionnaire design.
5.9%
7.6%
64.7%
24.4%
50.4%
Proper training, knowledge and organisation's support Social group’s acceptance : Peers/Colleagues point of view
Long-term benefits associated with it Ability to use the technology
Status symbol or Brand Image in using it Other (please specify)
Figure 5.19: Factors influencing end-users while accepting / rejecting a new technology
Which of the following factors influence you most in accepting /
Response Percent Response Count
rejecting a new technology? (Multiple choice answer)
Proper training, knowledge and organisation's support 50.4% 60
Social group’s acceptance : Peers/Colleagues point of view 24.4% 29
Long-term benefits associated with it 70.6% 84
Ability to use the technology 64.7% 77
Status symbol or Brand Image in using it 7.6% 9
Other (please specify) 5.9% 7
Table 5.3: Response-percent and Response-Count (Max: 100% or 119 responses, 3 skipped)
The table 5.3 represent the various factors along with the percentage & count of end-
users who selected the particular choices. The most common amongst all the end-
users was the long-term benefits associated with the given technology (Cloud
Computing), in context to this research. 70.6% of end-users were concerned about the
long term benefits offered by Cloud-computing to maintain sustainable competitive
advantage in the long-run. The other two factors were closely associated to each other
namely the ability to use technology (64.7%) and support from organisation through
imparting knowledge and training (50.4%)
- 78 -
6. Uncertainty avoidance affects the end-user behaviour differently based on
their age and gender
It has been learnt from the literature that there are various uncertainties which revolve
around the technology acceptance model. Users are wary about many unknown
possibilities associated with the technological adoption. This research does involve
addressing the question as to which are the key uncertainty elements, which if
controlled may affect end-user behaviour positively by studying their characteristics
and their behaviour. Participants from different age-groups and genders were
presented a series of alternatives in considering adoption of technology from the time
they first hear about a new technology (Cloud-computing, in context of this research),
till the end of the decision-making process about accepting or rejecting its use. The
charts below highlight the key uncertainty areas both gender-wise and age-wise to
prove the above finding.
0.0% 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0
% % % % % % % % % %
Male Female
- 79 -
Most men and women, 89.0% and 90.0% respectively have chosen this factor
associated with the market uncertainty as described by Moriarity et.al (1989),
Gardner, D (1990) and Moore, G (2002).
50.0%
Service provider's initiative in taking Un-anticipated / side-effects into account 23.9%
27.9%
30.0%
Post-sales services offered by the vendor 35.8%
23.3%
60.0%
Visibility of results seen already 34.3%
37.2%
40.0%
Trial options offered to test it 58.2%
48.8%
70.0%
Relatively advantageous over previous technology 49.3%
60.5%
80.0%
Deliverable as promised 67.2%
69.8%
30.0%
Compatiblity to industry standards 41.8%
44.2%
80.0%
Suitability to your needs 94.0%
83.7%
0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% 100.0%
- 80 -
Yet again, factors such as service providers initiative in reference to un-anticipated
side-effects is more popular 50.0% amongst the age group of 50-64 years.
A similar trend is observed for factors such as visibility of results and relative
advantage over the previous technology where end-users from the 50-64 year age-
group rated them 60.0% and 70.0% respectively.
- 81 -
7. The significance of privacy in relation to Cloud-based information systems
has multiplied as most end-users like to see the Cloud vendors impose a
series of privacy measures. One can only ensure that the required data is
shared while PII is protected, if the combination of all the privacy measures
is practised simultaneously.
Privacy control measures advocated by authors like Bagehi and Atluri (2006),
Jahankhani (2009) and Velte (2010) were put to test using this research to test the
end-user's opinions about the combination of these techniques. Using a Likert's scale
rating of 1-5, (where 5 was treated as most important and 1 as least important), based
in the order of importance six variables were tested as stated in the previous chapter
(Refer Figure 4.11, Page 48). Among the total respondents, 91.5% of the end-users
felt their identity and personal information was protected if the websites disclose who
may have access all their personal information. This right to control not only seemed
to bestow confidence to these users to protect their identity, but also offer them an
incentive to use cloud-based services as they may decide who can / cannot view their
personal data.
On the other hand, privacy control measures like identifying the data collection and
sharing process by websites and issuing digital certificates were identified to be not to
important as 26.7% of the population opted for the 3 rating which signified that
although they may help restoring confidence in the minds of the end-users about the
challenges of Cloud data privacy, however its absence may not affect one-fourth of
them. To add to this, 12.9% of the participants viewed it as completely unimportant.
Despite of the popularity of using such digital certificates in the banking industry for
its online customers, to make it more secured and protect customers from identity
thefts, this research highlights that from an end-user point of view, issuing of digital
certificates alone, does not suffice the purpose. Moreover, some end-users who visit
these websites are not concerned, if their data is collected, stored and shared with any
other organisation, which is contrary to what the literature states.
- 82 -
6. CONCLUSION
The current study was undertaken with an aim to determine key attributes of end-
users which may be useful to cloud vendors in meeting security and privacy
challenges from an end-user perspective. The level of data security and confidentiality
varies across individual end-users from different cultures as their beliefs, attitudes and
perceptions differ. While these characteristics were being examined during the
research, another decisive study about key variables to avoid uncertainty revolved
around this research work. The literature discussed in the beginning of this study
predominantly included thoughts and studies about technology acceptance, in context
to Cloud computing and its challenges by different writers. However, by and large all
the studies were from an organisation perspective, giving least amount of interest to
end-user’s point of view about such challenges.
- 83 -
The complex nature of security and privacy issues was a driving force in conducting
this research to comprehend what Cloud-computing has to offer as it is considered to
be the next-big thing after world-wide-web.
1. Irrespective of the data sensitivity, almost ½ of total end-users oppose the use
of open-access & flexible data storage facility when there is an element of risk
involved, such as data sharing to unknown users
2. ¼ of the total respondents are neither in favour, nor against no interference with
their personal photos and the remainder ¾ is evenly distributed across for and
against sharing data through physical distribution.
- 84 -
It is here where open-source software’s can be best employed to create usernames
and passwords
9. Technology which can prove its made to suit end-user needs and has long-term
benefits cannot fail
10. End-users belonging to different genders and age-groups may feel differently
about kinds of uncertainties. For instance, only 25% females feel compatibility
of industry standards is crucial to the success of a given technology, whilst
almost half of the male population opted in favour for it. Similarly, more than
50% end-users in the age-groups of 50-64 years old are concerned about
visibility of results of a given technology and whether the service provider is
taking into account any unanticipated side-effects. In comparison, less than 1/3rd
of the younger population are apprehensive about these uncertainty factors.
- 85 -
6.3. Significance of the Research
The findings of this research support the fact that security is a primary concern for
end-users when adopting cloud-based storage solutions. This is more significant when
the data sensitivity is measured. Through this research, the data sensitivity was
considered by analysing the web-usage of the end-users. Results prove that an
element of risk of data security such as data access to unknown users may be adequate
for more than 50% end-users not to use web-based services where their data
(irrespective whether sensitive or non-sensitive) needs to be stored on cloud-based
storage systems. In practice, this offers the cloud-vendors an incentive to develop
secured cloud-solutions targeted to all kinds of end-users with no separate investment
of time and money for different data types. The study established a few interesting
findings such as evenly distributed responses between end-users who prefer no
interference with their data by using physical distribution mechanisms against other
end-users who are in favour of data intervention rather than using physically
transmitting data through USB sticks, CD’s and DVD’s.
The cloud service providers can be benefited by this study as it encompasses certain
facts which may be practically employed when marketing cloud-storage solutions.
The ease in uploading data was one such determinant of the popularity of cloud-based
services amongst end-users, particularly those who backup their hard-drive to an
online website and others who store videos online. The significance of peer’s
experiences in the acceptance of technology rose as an empirical evidence through
this study. While this research provides knowledge to the cloud service provider of
what’s required to enable them to effectively market these solutions, it does highlight
on some not too important areas which can be overlooked so as utilise available
resources effectively. The study does suggest, knowledge about physical data location
is not the most crucial factor which was contrary to studies by Jahankhani et. al
(2009). Firstly, in lieu of such knowledge, the list of people authorised to access
information entered while using cloud-services on websites does generate confidence
in the minds of the end-users. Cloud providers can be best served by investing in
educating the end-users by following authorisation procedures to create such lists.
- 86 -
To second that, the use of open-source software and virtual infrastructure should be
encouraged. This involves a dynamic mapping of the available resources to one’s
business, which will result not only in decreasing the cost of efficiencies, but would
also help increasing responsiveness and efficiencies. With a selection of such
infrastructure in place, creation of user-names and passwords by following
authentication practices can only help cloud-vendors tackling the challenge of data
security and privacy revolving over the Cloud Computing technology.
As studied in the literature, the research study proved that culture is an integral
constituent when dealing with the acceptance of technology. By studying individual
characteristics, such as age, gender, ethnicity, first language / preferred language, etc.
this study was aimed at exploring the effects of culture on data security and privacy
issues related to data storage using Cloud-based storage systems. Although linguistic
effects were not tested during this research, it was included in the questionnaire
design to verify if language was a barrier in end-users comprehensibility of the term
“Cloud-computing”. The fact that 88.5% of respondents responded affirmatively
about the awareness of the term was an adequate enough piece of evidence based on
which the decision to neglect language effect in this research was taken. In addition,
the research does emphasise that despite of cultural differences, a common
observation across cultures is that effect of other’s / peers experiences in feeling
secured about publishing data using cloud-based storage systems.
- 87 -
To conclude, the findings of this research enhance our knowledge about data security
and privacy from an end-users perspective. The factors considered by these end-users
as important can be useful for service providers in formulating a new business
strategy whilst developing suitable solutions which are more secured and ensure
protection of data stored through Cloud Computing technology.
- 88 -
7. RECOMMENDATIONS
These recommendations for cloud-vendors after studying the end-users through this
study are as follows:
b) Cashing-on the known benefits: The responses obtained from the end-users
suggests there are some core-deliverables like ease in uploading which is one of the
core benefits of cloud services. Marketing issues such as privacy and security have
prevailed for a number of years in the software industry. However, as this study
suggests certain known benefits like ease in uploading, other’s / peers experiences
about feeling secured should be utilised more often by cloud-vendors as these are the
core factors why end-users adopt for such cloud-services.
- 89 -
c) Acknowledging cultural differences in technology acceptance: The research
findings emphasised the impact of cultural differences on end-users willingness to use
cloud-based solutions. Cloud vendors are aware about it. However, through this study
it is clear; acknowledging such end-users characteristics and differences will enable
them to tackle the uncertainty revolving around the acceptance of technology as
studied in the Technology Acceptance Model. Similarly, the gender-differences and
age-differences if studied before formulating a marketing plan will pay rich dividend
to the efforts of the cloud vendors.
- 90 -
8. LIMITATIONS
b) Data Sensitivity:
This research assumes that end-users regard data as sensitive and non-sensitive
data. The bifurcation of data sensitivity is based on their web-usage. For instance,
pictures / photos which are normally published on social networking websites are
considered to be as non-sensitive data, whilst when a professional who uses a pay-
per-use Cloud based service to backup the organisational data, is considered to be
a user of sensitive data. This research does not take into consideration the time
effect or the circumstances change consequences. An end-user, for instance; a
news reporter may have exclusive pictures to be transmitted using an online-
service such as Picasa to his colleague for publishing the news, may consider this
data as most sensitive. Similarly, after a period of time, the same data may be non-
sensitive data if it has been published and available to everyone. Thus, the time-
effect of data sensitivity has a profound impact on the end-users choice.
- 91 -
Considering the same example, if the reporter has been asked to resign from the
job before sharing the news and updating his boss about the exclusive pictures
being captured and available with them, the data sensitivity also alters due to a
change in circumstances.
- 92 -
9. AREAS OF FURTHER RESEARCH
As pointed out by the limitations of this research, there is a scope of further research
on analysing the data sensitivity factor amongst the end-users. If opportunity presents,
I would like to take this research on a more sensitive scale of measuring the
sensitivity of data in the minds of end-users. In addition to the sensitivity of data, the
fact that 20% of respondents in this research are undecided about no interference with
their data for using open-access flexible solutions offered by cloud-vendors is another
interesting observation which can be meaningful if these respondents are interviewed
or invited to be a part of a focus-group.
- 93 -
REFERENCES
Bell, J. (2005), “Doing Your Research Project”, 4th Ed., Open University
Press, Buckingham
- 94 -
Bryman, A. and Bell, E. (2007), “Business Research Methods”, 2nd Ed.,
Oxford University Press, Oxford
Buchanan, D., Boddy, D. and McCalman, J. (1988), “Getting in, getting on,
getting out and getting back”, in Bryman, A, “Doing Research in
Organisations”, Routledge, pp. 53-67, London
Dillon, W.R., Madden. T.J., and Firtle, N.H. (1993), “Essentials of marketing
research”, Irwin, Illinois
- 95 -
Easterby-Smith, M., Thorpe, R. Jackson, P. and Lowe, A.(2008),
“Management Research”, 3rd ed., Sage, London
Fishbein, M., and Ajzen, I.(1975), “Belief, Attitude, Intention and Behavior:
An Introduction to Theory and Research”, Addison-Wesley, Reading, MA
Gill, J., and Johnson, P. (2002), “Research Methods for Managers”, 3rd Ed.,
Sage Publications, London
- 96 -
Gralla, P. (2009), “Google Docs Vs Microsoft Office: It’s a matter of trust”,
Computer World
Accessed On: March 9th, 2010
Accessed At - URL:
http://www.computerworld.com/s/article/343002/Google_vs._Microsoft_It_s_
a_Matter_of_Trust
Hoyer, W.D and Maccinis, D.J (2009), “Consumer Behaviour”, 5th Ed.,
South-Western : Cengage Learning, USA
IDC Enterprise Panel (2008a), “IDC findings”, pp. 154 in Rittinghouse, J.W.
and Ransome, J.F. (2010), “Cloud Computing – Implementation, Management
and Security”,CRC Press, London
Jacoby, Jacob, Szybillo, G.J. and Berning, C.K. (1976), “Time and Consumer
Behavior : An Interdisciplinary Overview”, Journal of Consumer Research, pp
320-339
Jahankhani, H., Hessami, A.G., and Hsu, F (2009), “Global Security, Safety,
and Sustainability: 5th International Conference”, London, UK
- 97 -
Leonard-Barton, D., and Deschamps, I. (1988), "Managerial Influence in the
Implementation of New Technology," Management Science (34:10), 1988, pp.
1252-1265
March, J. and Simon, H. (1958), “Organisations”, John Wiley & Sons, New
York
McBurney, D.H. and White, T.L. (2007), “Research Methods”, 8th Ed.,
Cengage Learning, Wadsworth
Miles, M.B. and Huberman, A.M. (1994), “Qualitative Data Analysis”, 2nd
Ed., Thousand Oaks, Sage, CA
- 98 -
Miller, M. (2009), “Cloud Computing : Web-Based Applications That Change
the Way you Work and Collaborate Online”, Que Publishing, USA
Page, C., and Meyer, D. (2000), “Applied research design for business and
management”, Irwin, Sydney
- 99 -
Raimond, P. (1993), “Management Projects”, Chapman & Hall, London
Saunders, M., Lewis, P., and Thornhill, A. (2009), “Research Methods for
Business Students”, 5th ed., Prentice Hall, London
- 100 -
Schumpeter, J.A. (1934), “The Theory of Economic Development”, Harvard
University Press, Cambridge
Spears, Nancy, Ziaohua, and Mowen, J.C. (2001), “Time Orientations in the
United States, China and Mexico: Measurement and Insights of Promotional
Strategy”, Journal of International Consumer Marketing, pp. 57-75
Usunier, J. and Lee, J.A. (2009), “Marketing Across Cultures”, 5th ed.,
Prentice Hall, Harlow
- 101 -
Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), “User
Acceptance of Information Technology”, MIS Quarterly, Vol. 27, No. 3, pp
425 – 478
Witmer, D.F., Colman, R.W., and Katzman, S.L. (1999), “From paper and
pen to screen and keyboard: Towards a methodology for survey research on
the Internet, in S. Jones(ed.) “Doing Internet Research, Thousand Oaks, Sage,
CA, pp. 145-62
Worthen, Ben and Jessica E. Vascellaro (2009), “Gmail glitch shows pitfalls:
Failure spurs concern over reliability of online software”, The Wall Street
Journal.
Accessed On April 10, 2010
Accessed At: http://online.wsj.com/article/SB123561652440078567.html
- 102 -
APPENDICES
About Yourself: A set of preliminary questions. Please tick the appropriate answer
1. E-mail Address
[ ] 17 / Under
[ ] 18 – 29 years
[ ] 30 – 49 years
[ ] 50 – 64 years
[ ] 65 and above
3. Gender
[ ] Male
[ ] Female
- 103 -
About Technology Awareness & Acceptance
Q6) Have you come across the term “Cloud Computing” or ever used such
technology? (Single choice)
[ ] May be – I have heard the term, but not sure what it is exactly– Aware user
Q7) Select all the web-based services you use when online?
(Multiple choice – Select all possible options)
[ ] Store videos
NOTE: Using any of the above services is an indicator that you are using the
Cloud technology, knowingly or unknowingly
Q8) When you hear about a new technology, you first consider?
(Multiple choice – Select all possible options)
- 104 -
[ ] Whether any un-anticipated / side-effects of the new technology are looked
upon by the service-provider
Q9) What describes you best amongst the following options in reference to
adaptation to new technology? (Single choice answer)
[ ] An opinion leader, ready to try out new ideas (technology) before others do
[ ] Person who is thoughtful, careful but accepts changes more swiftly then others
[ ] A skeptical person who will use technology only after majority is using it
[ ] Traditional person who will accept technology once it has become mainstream
and universally used
Q10) Which of the following factors influence you most in accepting / rejecting a
new technology? (Multiple choice answer)
Case 1: Organisations allow you to use their web-applications for various different
purposes, e.g. storing millions of images and share them on Picasa, or uploading
personal photos on social networking website such as Facebook, thereby allowing
you to use their data storage infrastructure with minimal or no cost
Case 2: The data which you actually stored, resides on a physical location
unknown to most data storage companies through Cloud service-providers where
such data can be shared or hacked by expert hackers
- 105 -
On a rating of 1-5, where 1 is Completely Disagree and 5 is Completely Agree,
select the option what you believe you would be most appropriate according to
you while considering using storage services
[ ] You will use open-access and flexible data storage facility with minimal or no
cost to store your data which is accessible everywhere through internet which may
be at cost of taking risks where it may be shared to unknown users
[ ] You will want no interference with personal photos and documents for benefits
such as free storage space, rather prefer to send physical hard-copies to ensure
complete data-security
[ ] You will continue to use their web-space as it offers ease in uploading pictures
preferred through such web-services rather than using other modes of
transferring or sharing pictures
[ ] You will observe others experiences and feel secured about such risks and
continue to use such services without being concerned about it
Q12) On visiting websites, they may collect and store your personal information
to let you access their services, For e.g. Accessing information about air-tickets,
etc. According to you as an end-user, if given a choice what privacy measures will
you impose to protect your identity ? (Multiple Choice)
[ ] To identify whether websites visited, have either collected, stored, and possibly
sharing personal information
- 106 -
Q13) When adopting to a Cloud solution, or using cloud web-services what
according to you as a user, if given a choice what security measures will you add
to your wish-list? (Multiple Choice)
- 107 -
Studynama’s BDS Community is one of India’s Largest Community of Dental Students. About
19,232 Indian Dental Course students are members of this community and share FREE study
material, cases, projects, exam papers etc. to enable each other to do well in their semester exams.
• Lecture Notes • Lecture Notes • Lecture Notes • Lecture Notes • Lecture Notes
• Project Reports • Project Reports • Project Reports • Project Reports • Project Reports
• Solved Papers • Solved Papers • Solved Papers • Solved Papers • Solved Papers
View More » View More » View More » View More » View More »
Please note none of the content or study material in this document or content in this file is prepared or
owned by Studynama.com. This content is shared by our student partners and we do not hold any
copyright on this content.
Please let us know if the content in this file infringes any of your copyright by writing to us at:
info@studynama.com and we will take appropriate action.