Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2018, 6(1), 1-7
DOI: 10.12691/iscf-6-1-1
Open AccessArticle

A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs

Kunle Elebute1,

1Department of Computer Science, University of Maryland University College, Largo, Maryland, USA

Pub. Date: December 03, 2018

Cite this paper:
Kunle Elebute. A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs. Information Security and Computer Fraud. 2018; 6(1):1-7. doi: 10.12691/iscf-6-1-1

Abstract

This study utilized Glaser’s classic grounded theory to investigate the critical security and technical barriers to the continuance use of cloud storage services by small and medium enterprises (SMEs) and to also determine which of these factors was of higher priority to decision-makers. In addition to observation, research data was collected through a semi-structured interview of twenty IT specialists with current cloud storage service experience. Participants were decision-makers directly in charge of technology adoption in SMEs based in the United States. Results from the data analysis uncovered the major security and technical concerns of cloud storage service users. Furthermore, the results indicated that security vulnerability was of higher concern and the most influential barrier to the continuance use of cloud storage service by SMEs. This study expanded discussions on the security and technical inhibitors or barriers to the continuance use of cloud storage service from the perspective of IT decision-makers.

Keywords:
cloud storage continuance use security threat SMEs grounded theory

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Yang, H., & Lin, S. (2015). User continuance intention to use cloud storage service. Computers in Human Behavior, 52, 219-232.
 
[2]  Glaser, B. G., & Strauss, A. L. (1999). Discovery of grounded theory (1st ed.), Routledge, New York.
 
[3]  Alkhater, N., Walters, R., & Wills, G. (2018). An empirical study of factors influencing cloud adoption among private sector organizations. Telematics and Informatics, 35, 1, 38-54.
 
[4]  Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218-226.
 
[5]  Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, NIST Special Publication, 800, 145, 7.
 
[6]  Gupta, P., Seetharaman, A., & Raj, J. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33, 5, 861-874.
 
[7]  Phaphoom, N., Wang, X., Samuel, S., Helmer, S., & Abrahamsson, P. (2015). A survey study on major technical barriers affecting the decision to adopt cloud services. Journal of Systems and Software, 103, 167-181.
 
[8]  Nanath, K., & Pillai, R. (2013). A model for cost-benefit analysis of cloud computing. Journal of International Technology & Information Management, 22, 3, 93-117.
 
[9]  Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2018). Key issues for embracing the cloud computing to adopt a digital transformation: A study of Saudi public sector. Procedia Computer Science, 130, 1037-1043.
 
[10]  Elebute, K. (2018). Trust and Continuous Deployment of Cloud Computing: A Quantitative Analysis. Journal of Computer Sciences and Applications, 6(2), 69-74.
 
[11]  Mital, M., Chang, V., Choudhary, P., Pani, A., & Sun, Z. (2016). Adoption of cloud based internet of things in India: A multiple theory perspective. International Journal of Information Management.
 
[12]  Ou, Z., Song, M., Hwang, Z. H., Yla-Jaaski, A., Wang, R., Cui, Y., & Hui, P. (2018). Is cloud storage ready? Performance comparison of representative IP-based storage systems. Journal of Systems and Software, 138, 206-221.
 
[13]  Lian, J. (2015). Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management, 35, 98-109.
 
[14]  Prasad, A., Green, P., & Heales, J. (2014). On governance structures for the cloud computing services and assessing their effectiveness. International Journal of Accounting Information Systems, 15, 335-356.
 
[15]  Shiau, W. L., & Chau, P. Y. (2016). Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach. Information & Management. 53, 355-365.
 
[16]  Arpaci, I. (2016). Understanding and predicting students' intention to use mobile cloud storage services. Computers in Human Behavior, 58, 150-157.
 
[17]  Trigueros-Preciado, S., Pérez-González, D., & Solana-González, P. (2013). Cloud computing in industrial SMEs: Identification of the barriers to its adoption and effects of its application. Electronic Markets, 23, 2, 105-114.
 
[18]  Hsu, P., Ray, S., & Li-Hsieh, Y. (2014). Examining cloud computing adoption intention, pricing mechanism and deployment model. International Journal of Information Management, 34, 474-488.
 
[19]  Carcary, M., Doherty, E., & Conway, G. (2014). The adoption of cloud computing by Irish SMEs-An exploratory study. Electronic Journal of Information Systems Evaluation, 17, 1, 3-14.
 
[20]  Creswell, J. W. (2014). Research design: Qualitative, quantitative and mixed methods approaches (4th ed.), Sage Publications, California.
 
[21]  Ramezani, M., Ahmadi, F., Mohammadi, E., & Kazemnejad, A. (2017). The grounded theory of “trust building”. Nursing Ethics, 1, 14.
 
[22]  Lakshman, C. (2007). Organizational knowledge leadership: A grounded theory approach. Leadership & Organization Development Journal, 28, 1, 51-75.
 
[23]  Corbin, J., & Strauss, A. (1990). Grounded theory research: Procedures, canons, and evaluative criteria, Qualitative Sociology, 13, 1.
 
[24]  Field, A. (2013). Discovering statistics using IBM SPSS Statistics (4th ed.), Sage Publications, California.
 
[25]  Bernard, H. R., & Ryan, G. W. (2010). Analyzing qualitative data: Systematic approaches, Sage Publications, California.