NotesFAQContact Us
Search Tips
ERIC Number: ED554136
Record Type: Non-Journal
Publication Date: 2013
Pages: 158
Abstractor: As Provided
Reference Count: N/A
ISBN: 978-1-3031-3103-5
An Assessment of Security Vulnerabilities Comprehension of Cloud Computing Environments: A Quantitative Study Using the Unified Theory of Acceptance and Use
Venkatesh, Vijay P.
ProQuest LLC, Ph.D. Dissertation, Capella University
The current computing landscape owes its roots to the birth of hardware and software technologies from the 1940s and 1950s. Since then, the advent of mainframes, miniaturized computing, and internetworking has given rise to the now prevalent cloud computing era. In the past few months just after 2010, cloud computing adoption has picked up pace and is currently a mainstay particularly within larger enterprises. Despite some well-known security concerns, stakeholders implicitly trust cloud computing solutions, including those that incorporate third party or managed service providers. This implicit trust bestowed upon cloud computing has necessitated the need to comprehend the gaps endemic to the cloud computing solutions' adoption process. Validated models such as the technology acceptance model (TAM) and the unified theory of acceptance and use of technology (UTAUT) are employed to better comprehend the implicit trust placed in cloud computing environments. In mid 2012, an online survey collected data from 430 technology professionals in the Americas. The study leveraged the multiple regression quantitative methodology to determine the relationship between the implicit trust placed in cloud computing architectures and key behavioral factors such as perceived usefulness, perceived ease of use, attitude (to competing technology options), security apprehension (to the type of cloud solution), and compatibility (of the solution to the respondents' computing environ). The research resulted in a fundamental model to predict whether implicit trust would be placed in a cloud computing solution. Nearly 81.17% of the implicit trust placed in cloud computing solutions can be sufficiently accounted for by the model's factors. In specific, respondents from the government have a penchant to implicitly trust cloud computing architectures. In contrast, respondents from corporations were least likely to trust solutions based on cloud computing. Most enterprises resonated with the perceived ease of use and security apprehension factors but felt that the other factors may not have direct independent effects to the outcome of implicit trust. Overall, a clear comprehension of the salient technology acceptance factors is critical to both stakeholders and technology adopters of cloud computing solutions. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page:]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site:
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A