The effect of Privacy, Security Reliability in SaaS Continuance Use

Size: px
Start display at page:

Download "The effect of Privacy, Security Reliability in SaaS Continuance Use"

Transcription

1 The effect of Privacy, Security Reliability in SaaS Continuance Use The National Taipei University of Technology Taipei, Taiwan Abstract Software-as-a-service (SaaS) can increase the competence of the small and medium sized enterprises as that of a globally integrated enterprise. However, the SaaS provider has total control over the underlying cloud infrastructure while the customer has little control. As numerous surveys show, security and privacy are the top concerns preventing firms from moving to SaaS. This study applied the Information Systems Continuance Model and adopted privacy and security reliability as a new construct of interest. The study contributed to a more sophisticated understanding of the role of privacy and security reliability for customer satisfaction and continued SaaS usage intentions. As an academic contribution, this study enriched existing research models on SaaS continuance by adopting privacy/security reliability construct which existing SaaS continuance models have not addressed. This study also identified whether, and in what way specific privacy/ security reliability construct contributes to explain SaaS satisfaction and continuance intention. Keywords: Software-As-A-Service (SaaS), Privacy, Security Reliability, Continuance Model 1. Introduction Cloud computing has been recognized as one of the most important developments in information technology in the past 60 years (Francoise Gilbert, 2010).Software-as-a-service (SaaS), where software applications are accessed via a web browser on a pay-as-you use basis, is a form of cloud computing. With SaaS, a provider licenses an application to customers for use as an on-demand service, either through a time subscription or a "pay-as-you-go" model. The SaaS model allows vendors to develop, host and operate software for a customer to use, rather than having them purchase the software (Seth Fineberg, 2010; Anirban Kundu et al. 2010). SaaS strengthens the small and medium sized enterprises capabilities similar to those of a globally integrated enterprise by enabling them to access software, services and infrastructure they would not otherwise be able to afford (Anita Hawser, 2009).Thus, SaaS is a way of offering the small and medium sized enterprises infrastructure which takes them away from having to worry about capital expenditure for servers and operating systems or security infrastructure in their data center. However, the SaaS provider has total control over the underlying cloud infrastructure, including network, servers, operating systems, storage, and even individual application capabilities. The SaaS customer just receives access to the provider s applications running on a cloud infrastructure and has administrative control that is limited to customer-specific application configuration settings. The customer has little control over the underlying technology (Francoise Gilbert, 2010). As recent reports show, there has been an increase in instances where the provision of SaaS offerings has missed customers service quality expectations (Weier, 2009). Failing to fulfill customers expectations regarding service quality, such as application availability or vendor responsiveness, may have critical consequences not only for customers, but also for the vendor. In a Gartner study (2009) of 333 US- and UK-based organizations, the top three reasons why organizations discontinue SaaS or put SaaS on hold are security/privacy issues, technical integration problems, and low-quality customer support. Although previous researchers had approached models to examine the influence of IS service quality confirmation on satisfaction and of continued IS usage intentions (e.g. Bhattacherjee 2001; Deng et al. 2010;Alexander Benlian, Marios Koufaris and Thomas Hess 2010), they used rather general facets of service quality that influence customer satisfaction and paid more attention on technical integration problems, and low-quality customer support issues. As such, most SaaS continuance models have not addressed how security and privacy issues are the top concerns discontinuing or preventing firms from moving to SaaS. However, in order to offer more Journal of Convergence Information Technology(JCIT) Volume7, Number7, April 2012 doi: /jcit.vol7.issue

2 diagnostic and thus prescriptive advice, a more in-depth conceptualization of security and privacy for SaaS continuance is required. 2. Theory Background 2.1. Cloud Service Models and Benefits The Infrastructure as a Service model provides the customer with processing, storage, networks, and other fundamental computing resources, which the customer rents. Dale Vile and Tony Lock (2010) draw upon the experience of the Freeform Dynamics analyst team advising mainstream IT departments on the practical application of emerging ideas and technologies in a business context. There is a great deal of emphasis in the industry at the moment on technology and services, cloud computing is as much a philosophy as anything else. Francoise Gilbert (2010) introduced several examples of IaaS service providers include Amazon Web Services, Amazon Elastic Compute Cloud, IBM, and Rackspace Cloud. Platform as a Service provides a computing platform and deploys customer-provided applications to a cloud. This model is most appropriate for developers that address niche markets. Examples of PaaS service providers include Windows Azure and Force.com (a division of Salesforce.com ), OrangeScape, and Wolf PaaS. Software as a Service provides the customer with the ability to use the provider s applications over a network. The vendor may host the application on its own Web servers or upload the application to the customer s device and disable it after use or after expiration of the contract. Examples of SaaS service providers include G-Mail, Yahoo Mail, Google Apps, Mint, and Salesforce.com. Choudhary (2007) made a comparison of software quality under perpetual licensing and SaaS. They mentioned that SaaS was followed by the application service provider (ASP) model where the user could purchase a perpetual license but execute the software on hardware owned by a third party as well as the ASP model is different from SaaS in several aspects. Anita(2009) analysed that the economic benefits of cloud computing will ultimately outweigh the barriers, and the IT services [that] companies can access in the cloud are probably better quality than what they will get from their own internal IT department anyway. Seth (2010) concluded that effective use of SaaS solutions would keep small firms staying competitive. If a small firm doesn't keep up with technology, it will lose to the firms who are a bit bigger and who do have it. It's the one place a small firm can actually compete easily with bigger firms. Because of size, the nature of business and geographic dispersion of small firms, they have made a considered, strategic decision to adopt cloud computing to satisfy their information technology needs. Many of their business applications are provided via the SaaS. This is a sound business decision, as it reduces risk, cost and management overheads of small firms, and allows small firms to focus on their core business. Anita (2009) mentioned that most of the commentary and advice that is published tends to focus on the benefits. Currently valued at $36 billion, the cloud computing market is expected to more than quadruple in value to $160 billion by As soon as 2012, Gartner predicts, 20% of firms will rely on cloud computing for significant parts of their IT environment. A recent report from tech researcher Gartner Inc. stated that SaaS revenue rose 27 percent year over year, to $6.4 billion and that figure may double by 2012 (Seth fineberg, 2010). 2.2 Privacy and Security on cloud computing Privacy advocates have raised many concerns about cloud computing. These concerns typically mix security and privacy. Yuliang Shi et al. (2011) mentioned that tenants are facing the new secure data storage challenge, including data privacy and secure data possession at untrustworthy servers. Tim Mather et al. (2009) mentioned that users should be aware of some considerations as follows: Access: Data subjects have a right to know what personal information is held and, in some cases, can make a request to stop processing it. Compliance: what are the privacy compliance requirements in the cloud? Storage: where is the data in the cloud stored? Retention: how long is personal information retained? 284

3 Destruction: how does the cloud provider destroy personal information at the end of the retention period? Privacy refers to the claim of persons to determine when, how, and to what extent information about themselves is communicated to others (Harry Katzan, Jr., 2010). Some privacy issues of cloud computing are summarized as follows: the location of information in the cloud may have significant effects on the privacy and confidentiality protection of information and on the privacy obligations of those who process or store the information. Legal uncertainties make it difficult to assess the status of information in the cloud as well as the privacy and confidentiality protections available to users (Gellman, R. 2009). There is no denying that the main issue is identity, which serves as the basis of privacy or lack of it, and undermines the trust of individuals and organizations in other entities (Harry Katzan, Jr., 2010). Regarding to the Privacy and Security reliability, Tim Mather et al. (2009) described the implications of computing on compliance with various privacy regulations. In U.S., there are Patriot Act of 2001, Electronic Communications Privacy Act (ECPA), and Federal Information Security Management Act of 2002 (FISMA), Health Insurance Portability and Accountability Act of 1996 (HIPAA). In additionally, the international regulatory environment is driven by two approaches : one represented by EU Directive 95/46EC on the protection of individuals with regard to the processing of personal data, and another reflected by the APEC Privacy Framework. 2.3 Previous SaaS Quality Research and IS continuance The service quality literature and the SERVQUAL scale have been adapted to the IS context through several studies investigating the service quality of IS functions and departments from the perspective of users or IS professionals (Jiang, J.J., Klein, G., and Carr, C.L. 2002). The new architecture has important implications for customers service quality perceptions. While the findings in IS SERVQUAL and ASP research can be borrowed to guide research in SaaS service quality, SaaS differs in several aspects from previous models: software applications and IT infrastructure are shared across customers in the SaaS model, the SaaS model constrains clients options for customization of the main functionality and data structures of the software, the architecture of SaaS allows for the separation of maintenance responsibilities between the SaaS vendor and the client and so on(choudhary 2007). Syed A. Ahson and Mohammad Ilyas (2009) introduced that Saas simple maturity model by Microsoft corporation (2006)and model by forrester research (2008). They also presented the initial version of an SaaS QoS evaluation model. However, the substance of the 4 SaaS maturity levels is not well-defined and corresponding quality approaches are not clarified clearly. Noura Limam and Raouf Boutaba (2010) described a framework for reputation-aware software service selection and rating. A selection algorithm is devised for service recommendation, providing SaaS consumers with the best possible choices based on quality, cost, and trust. Alexander Benlian, Marios Koufaris and Thomas Hess (2010) developed a Zone-of-Tolerance (ZOT)-based SaaS-QUAL scale and validate it in a model of IS continuance based on two empirical surveys of SaaS using firms. They examined the importance of SaaS service quality factors for shaping customer satisfaction and SaaS continuance intentions. However, privacy/security issue was established as only one of the six facets of SaaS service quality and wasn t highlighted. 3. Research Model Bhattacherjee s (2001) work built on different theoretical foundations by examining the influence of IS service quality confirmation on satisfaction and of continued IS usage intentions has been validated in several follow-up studies (e.g. Benlian et al.;deng et al. 2010) and thus has proven its theoretical value. However, cloud computing which allows the IT systems to be managed from very remote locations where data is accessed and manipulated via a server is quite different from the traditional IS operation. Drawing on previous SaaS continuance literature, there are numerous of privacy and security issues such as encrypted technology, physical security measures like facilities, surveillance, guards, fire fighting preparedness, disaster management arrangements, security records, anti-virus technology, investment in technical standards in privacy, database separation, schema/table separation, data 285

4 separation etc. Privacy/security issues turn out to be the main reason why organizations discontinue SaaS or put SaaS on hold. Realizing the need to better understand SaaS continuance, however, requires adopting privacy/security as a new construct of interest. Figure 1. SaaS continuance model based on Bhattacherjee (2001) by Benlian et al.(2010) Incorporating the ideas described in the previous sections into Bhattacherjee s Post-Acceptance Model of IS Continuance (2001) and Benlian s (2010) SaaS continuance model, this study developed the rationale for the relationships as Figure 2. Figure 2. Research Model This study provided the following hypothesis: H1: Privacy/security reliability has a positive association with perceived usefulness. H2: Privacy/security reliability has a positive association with confirmation of saas service quality. H3: Perceived usefulness has a positive association with satisfaction. H4: Confirmation of saas service quality has a positive association with satisfaction. H5: Satisfaction has a positive association with continuance intention. 4. Research Methodology 4.1 Structural Equation Model (SEM) To validate the model we utilize Structural Equation Modeling (SEM) as it allows the simultaneous modeling of independent and dependent constructs and the intricate causal networks enabled by SEM characterize real-world processes better than simple correlation-based models (Carmen Barroso, et al., 2010) 4.2 Data Collection 286

5 Data was collected via a web-based survey from the staffs who served in the Taiwanese small and medium sized enterprises. The online questionnaire of this study began on September 23th, 2011 and went until October 20th, After filtering invalid and incomplete responses, a final net sample of 130 observations was obtained. 4.3 Development of Measurement Scales The five constructs of interest in our research model are the Privacy/Security (PS), Perceived Usefulness (PU), Confirmation of SaaS service quality (CSQ), Satisfaction (SA), and SaaS Continuance Intention (CI). To ensure the content validity of the scales, the items selected must represent the concept about which generalizations are to be made (Bohmstedt, 1970). Therefore, measurements selected for the constructs were mainly adapted from prior studies to ensure content validity. All constructs were measured using five-point Likert scales anchored with strongly disagree and strongly agree. The definitions and measurements of the constructs were summarized in Table1. Construct Name Privacy/ Security reliability,ps Confirmation of SaaS service quality, CSQ Perceived Usefulness, PU Satisfaction, SA Table 1. The definitions and measurements of the constructs Definition Number Measurement Sources of Indicators users perception 3 PS1: of the information Identification is security of SaaS use users perception of the congruence between expectation of SaaS use and its actual performance users perceptions of the expected benefits of SaaS use a users postacceptance affect, recorded as positive (satisfied), required to access the information. PS2: The SaaS system adopts information security standards like ISO certification. PS3: User Access Administration is set up. 2 CSQ1: The service level provided by SaaS was better than what I expected. CSQ2: Overall, the experience with using SaaS was better than what I expected. 2 PU1: Using SaaS will improve my job performance PU2: Using SaaS will increase my productivity 2 SA1: After using SaaS, I am satisfied. SA2: Harry Katzan, Jr., 2010) Tim Mather et al. (2009) Bhattacherjee (2001) Bhattacherjee, A., & Premkumar, G. (2004) Bhattacherjee (2001) Davis et al.(1989) Bhattacherjee, A., & Premkumar, G. (2004) Bhattacherjee (2001) Mckinney (2002) 287

6 Continuance Intention, CI indifferent, or negative (dissatisfied) users intention to continue using the SaaS After using SaaS, I am pleased. 2 CI1: I expect my use of SaaS to continue in the future CI2: I agree the business will purchase SaaS in the future Bhattacherjee (2001) Davis (1989) 5. Data Analysis and Results 5.1 The reliability of the construct measurement scales Cronbach s Alpha is computed in order to evaluate Internal Consistency, which measures the reliability of the construct measurement scales. Hair et al. (1998) recommended that Cronbach alpha values from 0.6 to 0.7 were deemed the lower limit of acceptability. An alpha of more than 0.7 would indicate that the items are homogeneous and measuring the same constant. Table 2 showed the reliability of the measurement scales. Cronbach s alpha for each latent construct except continuance intention ranged from to and indicated good internal consistency. The Cronbach s alpha value of the continuance intention construct is also acceptable. Hence, all the scale items exhibited acceptable internal consistency and were validated in previous studies. The results demonstrated that the questionnaire was a reliable measurement instrument. Table 2. The reliability of the construct measurement scales results Construct Number of Cronbach s Alpha indicators Privacy/security 3.79 Perceived usefulness Confirmation of SaaS service quality Satisfaction Continuance intention The goodness of fit analysis of structural model A confirmatory factor analysis using LISREL 8.3 was conducted to test the structural model. eight common model-fit measures were used to assess the models overall goodness of fit: X2/df, goodnessof-fit index (GFI), adjusted goodness-of-fit index (AGFI), normalized fit index (NFI), non-normalized fit index (NNFI), comparative fit index (CFI), and standardized root mean square residual (SRMR). As illustrated in Table 3. The goodness-of-fit indices of the proposed model of continuance intentions fitted the data reasonably well, as confirmed by the X2/df = 2.28, GFI = 0.90, AGFI = 0.82, NFI = 0.96, NNFI = 0.97, CFI = 0.98, RFI=0.94, RMSR = Thus, we could proceed to examine the path coefficients of the structural model. 288

7 Goodness of fit indicator X2/df Table 3. The goodness of fit of each of the model s indicator Description Suggestive References values the ratio of X2 to 3 Hair et al. degrees-of-freedom (2005) (df) 0.90 Hair et al.(2006) relative amount of variances and GFI a measure of the AGFI covariances jointly accounted for by the model. adjusted goodness of fit index NFI a ratio of the difference in the χ2 value for the proposed model and a null model divided by the χ2 value for the null model NNFI CFI (comparative fit index ) NNFI uses a similar logic but adjusts the NFI for the number of degrees of freedom in the model test the significance of change test the significance of change Hair et al.(2006) RFI Relative fit index Hair et al.(2006) RMSR an average of the residuals between individual observed and estimated variance and covariance terms < 0.08 < 0.08 Hair et al.(2006) Structural model Structural model results Figure 3. indicated the construct path relations estimated by the structural equation modeling (SEM). The path value is the standardized coefficient. The five assumptions of the research model all reached the significance level of α =0.05. Hypotheses H1, H2 were supported. The privacy/security reliability had significant positive effects on perceived usefulness and confirmation of SaaS service quality. Hypotheses H3 was supported, in that perceived usefulness had a significant positive effect on satisfaction. Hypotheses H4 was supported, in that confirmation of saas service quality had a significant positive effect on satisfaction. Hypotheses H5 was supported, in that satisfaction had a significant positive effect on continuance intention. 289

8 Figure 3. Structured Equation Model results *p < 0.05; **p < 0.01; ***p < Discussion and implications This study was a pioneering effort in applying IS continuance to the newly emerging context of SaaS services, which has become available and popular recently. The hypotheses of original model were also supported: H3: perceived usefulness has a positive association with satisfaction, H4: confirmation of SaaS service quality has a positive association with satisfaction., H5: satisfaction has a positive association with continuance intention. Many studies found that perceived usefulness to be the most dominant predictor of satisfaction (e.g., Limayem and Cheung, 2008; Roca et al., 2006). Our finding was in line with this in the sense that we also found that perceived usefulness dominantly impacts satisfaction. our results also suggested that in the post-adoption stage, confirmation of SaaS service quality can shaping users satisfaction as indicated in the IS continuance theory. According to our findings, satisfaction dominantly affected continuance intention. Thus, the SaaS vendors should develop strategies that will help increase user satisfaction with the SaaS. We found strong support for all added hypotheses in our extended IS continuance model: H1: privacy/security reliability has a positive association with perceived usefulness.h2: privacy/security reliability has a positive association with confirmation of SaaS service quality. These results are in line with the prior research about the privacy and security concerns are the top reason to discontinue using SaaS system. In order to retain SaaS users perceived usefulness and confirmation, appropriate data protection actions should be taken and advertised by the venders. 6. Conclusions Building on recognized theories of IS continouse, this paper took a systematic approach to empirically identify the impact "privacy/security reliability" on SaaS Use. The obtained results suggested that the privacy/security reliability is the important factor in explaining users perceived usefulness and confirmation of SaaS service quality which are important features in explaining the satisfaction. This study contributed to a more sophisticated understanding of security and privacy reliability for the SaaS continuance use. For researchers, this study enriched existing research models on SaaS continuance by adopting privacy/ security reliability construct which existing IS continuance models have not addressed. This research also contributed to emerge service science and service management literature. This research had practical implications too. Appropriate data protection actions should be taken and advertised by the venders to increase SaaS users continuance use indirectly. 7. References [1] Anita Hawser, Cloud Control Businesses Looking For Cost Effective Data and IT Infrastructure Solutions Are Increasingly Finding the Answer Is in the Cloud, Global Finance, pp.59-61,

9 [2] Bhattacherjee, A., Understanding Information Systems Continuance: An Expectation- Confirmation Model, MIS Quarterly 25(3), pp , [3] Choudhary, V., "Comparison of Software Quality under Perpetual Licensing and Software as a Service", Journal of Management Information Systems 24(2), pp , [4] Dale Vile and Tony Lock., Applied Cloud Computing A Practical Guide to Identifying the Potential in Your Environment, Orientation guide, pp. 1-15, [5] Deng, L., Turner, D.E., Gehling, R., and Prince, B., "User Experience, Satisfaction, and Continual Usage, European Journal of Information Systems, 19(1), pp , [6] Francoise Gilbert, Cloud Service Contracts May Be Fluffy: Selected Legal Issues to Consider before Taking off, Journal of Internet Law, pp.17-30, [7] Carmen Barroso, Gabriel Cepeda Carrión and José L. Roldán, Computing and Software Services Theory and Techniques, [8] Harry Katzan, Jr., Identity Analytics and Belief Structures, Journal of Business & Economics Research, 6(8), pp , [9] Bhattacherjee, A., & Premkumar, G., Understanding Changes in Belief and Attitude Toward Information Technology Usage A Theoretical Model and Longitudinal Test, MIS Quarterly, 28(2), pp , [10] Davis, F. D., Bagozzi, R. P., & Warshaw, P. R., User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science, 35(8), pp , [11] McKinney, V., Yoon, K., Zahedi, F.M., The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach, Information System Research, 13(3), pp , [12] Bentler, P. M., & Bonett, D. G., Significance Tests and Goodness-of-Fit in the Analysis of Covariance Structures, Psychological Bulletin, 88(3), pp , [13] Limayem, M. and Cheung, C. M. K., Understanding Information Systems Continuance: the Case of Internet-Based Learning Technologies, Information & Management, 45(4), pp , [14] Roca, J. C., Chiu, C. M. and Martínez, F. J., Understanding E-Learning Continuance Intention: An Extension of the Technology Acceptance Model, International Journal of Human Computer Studies, 64(8), pp , [15] Hair, J., Anderson, R., Tatham, R. & Black, W., Multivariate Data Analysis (5th ed.), New York: Prentice Hall, [16] Gellman, R., Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, World Privacy Forum, [17] Jiang, J.J., Klein, G., and Carr, C.L., "Measuring Information System Service Quality: Servqual from the Other Side," MIS Quarterly, 26(2), pp , [18] Noura Limam, Raouf Boutaba, Assessing Software Service Quality and Trustworthiness at Selection Time, IEEE Transactions on Software Engineering, 36(4), pp , [19] Seth Fineberg, To SaaS or not to SaaS, at [20] Alexander Benlian, Thomas Hess and Marios Koufaris, The Role of Saas Service Quality for Continued Saas Use: Empirical Insights From Saas Using Firms, International Conference on Information Systems, [21] Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, Inc., [22] Mary Hayes Weier, "Google, Workday Outages Show Saas Isn't Perfect," at [23] Syed A. Ahson and Mohammad Ilyas, Cloud Computing and Software Services, CRC Press, [24] Bohmstedt, G. W., Reliability and Validity Assessment in Attitude Measurement, Chicago: Rand- McNally, [25] Davis, F. D., Perceived usefulness, perceived ease of use and user acceptance of information technology, MIS Quarterly, 13(3), pp , [26] Anirban Kundu, Chandan Banerjee, Priya Saha, "Introducing New Services in Cloud Computing Environment", JDCTA, 4(5), pp , [27] Yuliang Shi, Kun Zhang, Qingzhong Li, "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS", JDCTA, 5(1), pp ,

The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools

The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools RONG-JYUE FANG 1, HUA- LIN TSAI 2, CHI -JEN LEE 3, CHUN-WEI LU 4 1,2 Department of

More information

Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System

Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System Wen-Hung Wang Department of Shipping and Transportation Management National Taiwan Ocean University,

More information

USING MULTIPLE GROUP STRUCTURAL MODEL FOR TESTING DIFFERENCES IN ABSORPTIVE AND INNOVATIVE CAPABILITIES BETWEEN LARGE AND MEDIUM SIZED FIRMS

USING MULTIPLE GROUP STRUCTURAL MODEL FOR TESTING DIFFERENCES IN ABSORPTIVE AND INNOVATIVE CAPABILITIES BETWEEN LARGE AND MEDIUM SIZED FIRMS USING MULTIPLE GROUP STRUCTURAL MODEL FOR TESTING DIFFERENCES IN ABSORPTIVE AND INNOVATIVE CAPABILITIES BETWEEN LARGE AND MEDIUM SIZED FIRMS Anita Talaja University of Split, Faculty of Economics Cvite

More information

Understanding the Continued Usage of Business e-learning Courses in HK Corporations

Understanding the Continued Usage of Business e-learning Courses in HK Corporations Understanding the Continued Usage of Business e-learning Courses in HK Corporations Paul Yeung Ernest Jordan Macquarie Graduate School of Management, Macquarie University, Australia e-mail : pyeung@vtc.edu.hk

More information

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption , pp.155-164 http://dx.doi.org/10.14257/ijsh.2013.7.5.16 An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption Kwang-Kyu Seo Department of Management Engineering, Sangmyung

More information

A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations

A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations December 2010, Volume 9, No.12 (Serial No.90) Chinese Business Review, ISSN 1537-1506, USA A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations

More information

Portable Privacy: Mobile Device Adoption

Portable Privacy: Mobile Device Adoption Portable Privacy: Mobile Device Adoption Joseph H. Schuessler Bahorat Ibragimova 8 th Annual Security Conference Las Vegas, Nevada April 15 th & 16 th 2009 Relying on the government to protect your privacy

More information

The Relationships between Perceived Quality, Perceived Value, and Purchase Intentions A Study in Internet Marketing

The Relationships between Perceived Quality, Perceived Value, and Purchase Intentions A Study in Internet Marketing The Relationships between Quality, Value, and Purchase Intentions A Study in Internet Marketing Man-Shin Cheng, National Formosa University, Taiwan Helen Cripps, Edith Cowan University, Australia Cheng-Hsui

More information

SEM Analysis of the Impact of Knowledge Management, Total Quality Management and Innovation on Organizational Performance

SEM Analysis of the Impact of Knowledge Management, Total Quality Management and Innovation on Organizational Performance 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com SEM Analysis of the Impact of Knowledge Management, Total Quality Management and Innovation

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan The Study of Implementation and Assessment of a Cloud Computer Room Pai-shu Huang, Shih-hao Shen 0178 WuFeng University, Taiwan The Asian Conference on Technology in the Classroom 2012 2012 Abstract: The

More information

Contextual factors that influence learning effectiveness: Hospitality students perspectives

Contextual factors that influence learning effectiveness: Hospitality students perspectives Contextual factors that influence learning effectiveness: Hospitality students perspectives Sung Mi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State

More information

Presentation Outline. Structural Equation Modeling (SEM) for Dummies. What Is Structural Equation Modeling?

Presentation Outline. Structural Equation Modeling (SEM) for Dummies. What Is Structural Equation Modeling? Structural Equation Modeling (SEM) for Dummies Joseph J. Sudano, Jr., PhD Center for Health Care Research and Policy Case Western Reserve University at The MetroHealth System Presentation Outline Conceptual

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

An Empirical Study on the Effects of Software Characteristics on Corporate Performance

An Empirical Study on the Effects of Software Characteristics on Corporate Performance , pp.61-66 http://dx.doi.org/10.14257/astl.2014.48.12 An Empirical Study on the Effects of Software Characteristics on Corporate Moon-Jong Choi 1, Won-Seok Kang 1 and Geun-A Kim 2 1 DGIST, 333 Techno Jungang

More information

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT 1 E-learning: Students perceptions of online learning in hospitality programs Sungmi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State University ABSTRACT

More information

APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR

APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR Su-Houn Liu, Chung Yuan Christian University, vandy@mis.cycu.edu.tw Hsiu-Li Liao, Chung Yuan Christian

More information

Issues in Information Systems Volume 16, Issue I, pp. 163-169, 2015

Issues in Information Systems Volume 16, Issue I, pp. 163-169, 2015 A Task Technology Fit Model on e-learning Linwu Gu, Indiana University of Pennsylvania, lgu@iup.edu Jianfeng Wang, Indiana University of Pennsylvania, jwang@iup.edu ABSTRACT In this research, we propose

More information

Information Technology Adoption Behavior Life Cycle: Toward a Technology Continuance Theory (TCT).

Information Technology Adoption Behavior Life Cycle: Toward a Technology Continuance Theory (TCT). Information Technology Adoption Behavior Life Cycle: Toward a Technology Continuance Theory (TCT). By: Chechen Liao, Prashant Palvia and Jain-Liang Chen Liao, C, Palvia, P., and Chen, J-L. Information

More information

Examining acceptance of information technology: A longitudinal. Study of Iranian high school teachers

Examining acceptance of information technology: A longitudinal. Study of Iranian high school teachers 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore Examining acceptance of information technology: A longitudinal Study of Iranian

More information

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Cloud Computing: Current Market Trends and Future Opportunities

Cloud Computing: Current Market Trends and Future Opportunities Cloud Computing: Current Market Trends and Future Opportunities by Martin Tantow, Editor-in-Chief, CloudTimes.org Commodity Infrastructure as a Service Cloud computing continues to gain more mainstream

More information

Factors affecting the Satisfaction of China s Mobile Services Industry Customer. Su-Chao Chang a, Chi-Min Chou a, *

Factors affecting the Satisfaction of China s Mobile Services Industry Customer. Su-Chao Chang a, Chi-Min Chou a, * Factors affecting the Satisfaction of China s Mobile Services Industry Customer Su-Chao Chang a, Chi-Min Chou a, * a Dept. of Business Administration, National Cheng Kung University, 1 University Rd.,

More information

Constructing a Technology Readiness Scale for Sports Center RFID Door Security System Users

Constructing a Technology Readiness Scale for Sports Center RFID Door Security System Users Constructing a Technology Readiness Scale for Sports Center RFID Door Security System Users Mu-Cheng Wu, National Chin-Yi University of Technology, Taiwan Chao-Chien Chen, Asia University, Taiwan Chih-Hung

More information

THE FACTORS AFFECTING ADOPTION of CLOUD COMPUTING TECHNOLOGY in EDUCATION INSTITUTIONS

THE FACTORS AFFECTING ADOPTION of CLOUD COMPUTING TECHNOLOGY in EDUCATION INSTITUTIONS THE FACTORS AFFECTING ADOPTION of CLOUD COMPUTING TECHNOLOGY in EDUCATION INSTITUTIONS Nupur Gupta 1, Sanjeev Thakur 2 Researcher, Department of Computer Science, Amity University, ida, U.P, India 1 Professor,

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072 Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Does Trust Matter to Develop Customer Loyalty in Online Business?

Does Trust Matter to Develop Customer Loyalty in Online Business? Does Trust Matter to Develop Customer Loyalty in Online Business? Pattarawan Prasarnphanich, Ph.D. Department of Information Systems, City University of Hong Kong Email: pprasarn@cityu.edu.hk Abstract

More information

IMPACT OF CORE SELF EVALUATION (CSE) ON JOB SATISFACTION IN EDUCATION SECTOR OF PAKISTAN Yasir IQBAL University of the Punjab Pakistan

IMPACT OF CORE SELF EVALUATION (CSE) ON JOB SATISFACTION IN EDUCATION SECTOR OF PAKISTAN Yasir IQBAL University of the Punjab Pakistan IMPACT OF CORE SELF EVALUATION (CSE) ON JOB SATISFACTION IN EDUCATION SECTOR OF PAKISTAN Yasir IQBAL University of the Punjab Pakistan ABSTRACT The focus of this research is to determine the impact of

More information

E-Business Technology

E-Business Technology E-Business Technology Presented to: Prof. Dr. Eduard Heindl By: Bhupesh Sardana BCM WS 2010-11 Date: 21-Jan-2011 Business Case Your business is growing exponentially. Your computing need & usage is getting

More information

Big Data & Its Bigger Possibilities In The Cloud

Big Data & Its Bigger Possibilities In The Cloud Big Data & Its Bigger Possibilities In The Cloud Chhavi Gupta Software Engineer, EMC Corporation Sai Pattem Professional MBA Candidate 2013 August 15 th, 9:30 10:30 AM Session 13860 Room 200 (Hynes Convention

More information

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

SEYED MEHDI MOUSAVI DAVOUDI*; HAMED CHERATI**

SEYED MEHDI MOUSAVI DAVOUDI*; HAMED CHERATI** THE LINK BETWEEN INFORMATION TECHNOLOGY ALIGNMENT AND FIRMS FINANCIAL AND MARKETING PERFORMANCE: A QUESTIONNAIRE SURVEY IN IRAN S MANUFACTURING COMPANIES ABSTRACT SEYED MEHDI MOUSAVI DAVOUDI*; HAMED CHERATI**

More information

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha Cloud Computing Key Considerations for Adoption Ramkumar Dargha Abstract Cloud Computing technology and services have been witnessing quite a lot of attention for the past couple of years now. We believe

More information

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing Goals Cloud Computing COMP755 Understand what cloud computing is and how it functions Understand the challenges and advantages of cloud computing Many slides were created by Peter Mell, Tim Grance of NIST

More information

A Casual Structure Analysis of Smart phone Addiction: Use Motives of Smart phone Users and Psychological Characteristics

A Casual Structure Analysis of Smart phone Addiction: Use Motives of Smart phone Users and Psychological Characteristics A Casual Structure Analysis of Smart phone Addiction: Use Motives of Smart phone Users and Psychological Characteristics Dept. of Social Welfare, BaekSeok Culture University, ijoo65@hanmail.net Abstract

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed

More information

The Online Banking Usage in Indonesia: An Empirical Study

The Online Banking Usage in Indonesia: An Empirical Study DOI: 10.7763/IPEDR. 2012. V54. 19 The Online Banking Usage in Indonesia: An Empirical Study Sulistyo Budi Utomo 1 + 1 Indonesia School of Economics (STIESIA) Surabaya Abstract. Many Indonesian banks have

More information

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs The security challenges cloud computing presents are formidable, including those

More information

Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling

Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Andre F.G. Castro, Raquel F.Ch. Meneses and Maria R.A. Moreira Faculty of Economics, Universidade do Porto R.Dr.

More information

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Will Be Presented Today? My interest in cloud computing What is cloud computing? Who did I

More information

Investigating the Integration of Cloud Computing in Medical Information Systems Using a Two-Stage Model

Investigating the Integration of Cloud Computing in Medical Information Systems Using a Two-Stage Model Investigating the Integration of Cloud Computing in Medical Information Systems Using a Two-Stage Model Chen-Lin Lee 1 *, Li-Chuan Chu 2, Kuo-Chung Huang 2 1 Department of Business Administration in Nanhua

More information

Empirical Analysis of the Customer Loyalty Problem in the International Logistics Market

Empirical Analysis of the Customer Loyalty Problem in the International Logistics Market Empirical Analysis of the Customer Loyalty Problem in the International Logistics Market CHAO-HUA CHEN 1 and HUI-YU LEE 2 1 Department of Transportation Technology and Logistics Management 2 Institute

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs

More information

Cloud Computing: A Brief Introduction

Cloud Computing: A Brief Introduction Cloud Computing: A Brief Introduction LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122 February 20, 2010 By: David Burford, CFA, MBA, MCP Cloud Computing: A Brief Introduction Numerous surveys

More information

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220 Studying the Factors Influencing the Relational Behaviors of Sales Department Staff (Case Study: The Companies Distributing Medicine, Food and Hygienic and Cosmetic Products in Arak City) Aram Haghdin

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

Vormetric Data Security Securing and Controlling Data in the Cloud

Vormetric Data Security Securing and Controlling Data in the Cloud Vormetric Data Security Securing and Controlling Data in the Cloud Vormetric, Inc. Tel: 888.267.3732 Email: sales@vormetric.com www.vormetric.com Table of Contents Executive Summary.........................................................3

More information

White Paper. Cloud Computing. Effective Web Solution Technology Investment. January 2011. www.k-bc.co.uk

White Paper. Cloud Computing. Effective Web Solution Technology Investment. January 2011. www.k-bc.co.uk White Paper Cloud Computing Effective Web Solution Technology Investment January 2011 www.k-bc.co.uk Cloud Computing The future of effective technology investment The benefit of web solution technology

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS

More information

Improvement of E-Commerce Quality through Cloud Computing Benefits

Improvement of E-Commerce Quality through Cloud Computing Benefits Improvement of E-Commerce Quality through Cloud Computing Benefits Naser Azad Department of Management, South Tehran Branch, Islamic Azad University. Tehran, Iran Corresponding Author: n_azad@azad.ac.ir

More information

Presented by Mike Jennings President BEI

Presented by Mike Jennings President BEI Presented by Mike Jennings President BEI Cloud Computing Defined Benefits of Cloud Computing Risks of Cloud Computing When and How to Utilize Cloud Computing Recommendations 2 Cloud Computing Defined 3

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

An Empirical Study on the e-crm Performance Influence Model for Service Sectors in Taiwan

An Empirical Study on the e-crm Performance Influence Model for Service Sectors in Taiwan An Empirical Study on the e-crm Performance Influence Model for Service Sectors in Taiwan Te-Ming Chang Lin-Li Liao Wen-Feng Hsiao Department of Information Management, Department of Information Management,

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY

INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY Chun-Hua Hsiao, Department of Marketing, Kainan University, Taoyuan, Taiwan, R.O.C., maehsiao@gmail.com Mei-Chun Chen,

More information

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market Cloud Computing Contents What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market What is Cloud Computing? Definitions: Cloud computing

More information

Applications of Structural Equation Modeling in Social Sciences Research

Applications of Structural Equation Modeling in Social Sciences Research American International Journal of Contemporary Research Vol. 4 No. 1; January 2014 Applications of Structural Equation Modeling in Social Sciences Research Jackson de Carvalho, PhD Assistant Professor

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

Lifting the Fog: The High Potential of Cloud Computing Paul Daugherty, Chief Technology Architect February 19, 2010

Lifting the Fog: The High Potential of Cloud Computing Paul Daugherty, Chief Technology Architect February 19, 2010 Lifting the Fog: The High Potential of Cloud Computing Paul Daugherty, Chief Technology Architect February 19, 2010 IT leaders are looking to the clouds Cloud 75% of IT decision makers knowledgeable or

More information

High Performance Computing Cloud Computing. Dr. Rami YARED

High Performance Computing Cloud Computing. Dr. Rami YARED High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline

More information

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education Chen-Feng Wu Department of Information Management, Yu Da University No 168, Hsueh-fu Rd, Tanwen Village, Chaochiao Township,

More information

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................

More information

IMPLEMENTATION OF INTEGRATED MARKETING COMMUNICATION ON MARKET PERFORMANCE OF BRANDS IN THE FIELD OF OTC PRODUCTS

IMPLEMENTATION OF INTEGRATED MARKETING COMMUNICATION ON MARKET PERFORMANCE OF BRANDS IN THE FIELD OF OTC PRODUCTS Bruno Završnik University of Maribor, Faculty of Economics & Business, Maribor, Slovenia Damjana Jerman University of Primorska, Faculty of Tourism Studies Turistica, Portorož, Slovenia IMPLEMENTATION

More information

Disruptive Innovation & Enabling Technology

Disruptive Innovation & Enabling Technology Disruptive Innovation & Enabling Technology Authors: John Keagy (CEO & Co-Founder of GoGrid/ServePath) Michael Sheehan (Technology Evangelist of GoGrid/ServePath) August 2008 August 2008-1 - The Cloud

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Customer satisfaction, perceived value and customer loyalty: the mobile services industry in China

Customer satisfaction, perceived value and customer loyalty: the mobile services industry in China Vol. 7(18), pp. 1730-1737, 14 May, 2013 DOI: 10.5897/AJBM10.383 ISSN 1993-8233 2013 Academic Journals http://www.academicjournals.org/ajbm African Journal of Business Management Full Length Research Paper

More information

A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE

A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE International Journal of Electronic Business Management, Vol. 10, No. 3, pp. 213-223 (2012) 213 A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE Hsiu-Li Liao * and

More information

Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN.

Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Service Oriented Cloud Computing Architectures Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Overview Cloud Computing What is cloud computing Types of cloud computing Service Oriented

More information

COMMUNICATIONS ALLIANCE LTD

COMMUNICATIONS ALLIANCE LTD COMMUNICATIONS ALLIANCE LTD Communications Alliance Response to ACS Discussion Paper on a Potential Cloud Computing Consumer Protocol - 1 - TABLE OF CONTENTS INTRODUCTION 2 SECTION 1 OVERVIEW OF RESPONSE

More information

Quick guide: Using the Cloud to support your business

Quick guide: Using the Cloud to support your business Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

Assessing a theoretical model on EFL college students

Assessing a theoretical model on EFL college students ABSTRACT Assessing a theoretical model on EFL college students Yu-Ping Chang Yu Da University, Taiwan This study aimed to (1) integrate relevant language learning models and theories, (2) construct a theoretical

More information

Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model

Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model Authors Eko Agus Prasetio, School of Business and Management, Bandung Institute of Technology, eko.prasetio@sbm-itb.ac.id

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Influence of Tactical Factors on ERP Projects Success

Influence of Tactical Factors on ERP Projects Success 2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Influence of Tactical Factors on ERP Projects Success Shahin Dezdar + Institute for International

More information

Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology

Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology INTRODUCTION Previous studies (e.g., Jiang & Benbasat, 2005; Algharabat & Dennis, 2010 a, b, c) regarding online

More information

PowerVCS and Security

PowerVCS and Security White Paper Sept. 2009 E. Crane Computing PowerVCS and Security Cloud computing is the newest technology buzz word. But the Cloud is more than a fad -- the concepts and technologies have been evolving

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School A Study of the Relationship Between a Successful Enterprise Risk Management System, a Performance Measurement System and the Financial Performance of Thai Listed Companies Kittipat Laisasikorn Thammasat

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES

DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES Sreekala P.K., Jayasree V & Dr. M D Baby Sreekala P.K. is working as Professional Assistant at Cochin University of Science

More information

White Paper. Are SaaS and Cloud Computing Your Best Bets?

White Paper. Are SaaS and Cloud Computing Your Best Bets? White Paper Are SaaS and Cloud Computing Your Best Bets? Understanding SaaS and Cloud Computing and Service Delivery Options for Real Estate Technology Solutions Joseph Valeri, MBA, MS President, Lucernex

More information

Factors Affecting Demand Management in the Supply Chain (Case Study: Kermanshah Province's manufacturing and distributing companies)

Factors Affecting Demand Management in the Supply Chain (Case Study: Kermanshah Province's manufacturing and distributing companies) International Journal of Agriculture and Crop Sciences. Available online at www.ijagcs.com IJACS/2013/6-14/994-999 ISSN 2227-670X 2013 IJACS Journal Factors Affecting Demand Management in the Supply Chain

More information