HOME JOURNALS CONTACT

Asian Journal of Scientific Research

Year: 2018 | Volume: 11 | Issue: 4 | Page No.: 532-539
DOI: 10.3923/ajsr.2018.532.539
Understanding Individuals’ Intention to Use Mobile Cloud Services: Cognitive and Security Perspectives
Sanghyun Kim and Hyunsun Park

Abstract: Background and Objective: The use of mobile cloud services continues to grow and attract considerable attention. The purpose of this study was to develop a research model that helps the IT community understand the determinants motivating individuals to adopt mobile cloud services. The proposed research model suggests several variables, including control, comfort, trust, vulnerability and unauthorized access, that affect an individual’s intention to use mobile cloud services. Materials and Methods: A total of 427 responses from mobile cloud users were collected to test the proposed model. First, the measurement model was evaluated by performing a confirmatory factor analysis along with Cronbach’s alpha for testing reliability. Covariance-based structural equation modeling using AMOS 22.0 was then used to test the proposed hypotheses. Results: Findings indicated that three cognitive factors: Intimacy, control and trust and two security factors: Vulnerability and unauthorized access had a significant impact on intention to use mobile cloud services. The most influential variable was intimacy but the security-related variables, particularly vulnerability, were also found to be important to users. Conclusion: This study revealed various factors that should be considered not only in academic research but also in mobile cloud service development for service providers.

Fulltext PDF Fulltext HTML

How to cite this article
Sanghyun Kim and Hyunsun Park, 2018. Understanding Individuals’ Intention to Use Mobile Cloud Services: Cognitive and Security Perspectives. Asian Journal of Scientific Research, 11: 532-539.

Keywords: Mobile cloud service, individual factor, intention to use, technology acceptance model and cognitive factors

INTRODUCTION

Research on cognitive and security factors for using mobile cloud services plays an important role in activating these services for both users and providers1. With the advancement of information technology, individuals and organizations have used various information technologies in a rapidly changing environment. In particular, as customers’ needs change and business environments become more difficult to predict, many organizations must cope with a rapidly changing enterprise Information Technology (IT) environment. Thus, those companies dedicate resources for developing innovative smart or mobile devices to ensure user convenience2. Recently, user interest in mobile cloud computing technology has been growing. Changes in the concept of document storage space led to the development of mobile cloud computing technology, along with consumer awareness of the mobile cloud, which allows users to open files anytime and anywhere1. Thus, mobile cloud computing technology often ensures user convenience. A user can access stored information through a server that is connected to the Internet via a personal computer or portable device.

At the individual user level, mobile cloud computing services have gradually expanded and various synergies are required with services combining cloud computing and smart devices2. As such, mobile cloud computing is recognized as an important trend in the IT field both domestically and abroad and is considered an important factor in changing the perception of difficulty in using information resources. In addition, interest in mobile cloud computing has led to the expansion or establishment of businesses that target individual users. However, despite the awareness of the convenience of mobile cloud computing, there is still a lack of clear conceptualization in terms of understanding user behaviors regarding mobile cloud computing adoption3. Most research on mobile cloud computing stems from technical and engineering perspectives; however, research on the user perspective is very limited4. For this reason, empirical research for understanding the psychological behavior of mobile cloud service users is meaningful and necessary.

Despite the many advantages of mobile cloud services, there are several vulnerabilities, including privacy invasion, possibility of personal data disclosure and lack of identity protection. For example, in 2014, Snapchat’s photo text messaging service was exploited by a hacker to launch a denial of service (DoS) attack. Given such high-profile data breaches, it is questionable that mobile cloud services remain popular and heavily used. Therefore, this study was conducted to shed light on the unchanged behaviors of individuals despite the potential risks of mobile cloud services or the perception there of. This study seeks to find empirical answers to two research questions. First, do individuals’ behavioral control factors positively influence their intention to use cloud-based services? Second, do factors associated with privacy concerns negatively impact individuals’ intention to use cloud-based services?

Therefore, this study developed a research model incorporating variables of the Theory of Planned Behavior (TPB) and other factors such as trust, vulnerability and unauthorized access from relevant research5 to explain individual behavior regarding mobile cloud services. The 427 responses collected from mobile cloud service users were analyzed using the structural equation model to test the proposed hypotheses. Hypotheses were developed based on the results of the study. The findings provide academic and practical implications for mobile cloud services.

According to the TPB6, the intention of individual behavior is a function of related information and psychological processes, connecting beliefs to behaviors. The TPB includes several distinct variables such as subjective norms, attitude and perceived behavioral control that can be used to predict an individual’s behavioral intentions6. Prior studies reported that attitude, subjective norms and perceived behavioral control have a significant positive impact on an individual’s behavior regarding technology use3. Each variable is represented by subcategorized factors, which include personal motivation for attitude, encouragement for subjective norms and familiarity and self-efficacy for perceived behavioral control. This study expected these factors to play an important role in predicting an individual’s intention to use a mobile cloud service.

Intimacy is defined as the degree of previous experience or knowledge of an individual about something that serves as important internal information7. In addition, intimacy can reduce the resources (e.g., time and effort) used for acquiring knowledge about a given subject, technology or service, thereby reinforcing the intention to adopt while reducing uncertainty and perceived risk7. In this context, when individuals are familiar with mobile cloud services, they are more likely to adopt them. Hence, hypothesis 1 proposes that "Intimacy is positively associated with the intention to use a mobile cloud service".

In this study, control is the degree to which individuals believe that information about themselves can be controlled while sharing it with other people even if they are unaware of when, where and for what purpose their information is shared. On this aspect, Phelps et al.8 claimed that individuals want to have control over their information.

Fig. 1:Proposed research model

Without such control, they tend to be concerned about using mobile services. With mobile cloud services, service providers often hold control and users of their services remain vulnerable. Liu et al.9 report that even if cloud service providers offer new features that increase users’ concerns regarding their own information, users are pacified as long as they can control that information. Thus, when users of a mobile cloud service have more control over their own information, they are more likely to intend to use the service. This leads to the second hypothesis, "Control is positively associated with the intention to use a mobile cloud service".

Trust is defined as an individual’s belief and expectation regarding the integrity and ability of the actor providing the service10. Rousseau et al.11 defined trust as "a psychological state comprising the intention to accept vulnerability based upon positive expectations of the intentions or behavior of another". In a social environment where it is difficult to regulate by means of rules and customs, individuals make decisions about their behavior through trust12. Thus, trust can be an important mechanism through which individuals can make decisions in complex and highly variable ways. Similar logic can be applied to mobile cloud services in which users must trust service providers to act in an ethical, socially desirable manner. Prior studies have claimed that trust helps increase intention to purchase from electronic commerce (e-commerce) websites13. Furthermore, Pavlou and Chai14 found that customers who trust online retailers have confidence in the retailers’ behavioral actions. Therefore, hypothesis 3 proposes that "Trust is positively associated with the intention to use a mobile cloud service".

In this study, vulnerability is defined as the extent to which an individual experiences a harmful situation caused by a specific behavior15. According to the protection motivation theory, an individual’s behavior is determined by the evaluation of vulnerability and the ability to deal with potential threats16. That is, if mobile cloud services are considered to increase user vulnerability, individuals will not use the service to avoid threats. In contrast, if mobile cloud services leave individuals with little to no feelings of vulnerability to an actor, they are more likely to use the service, leading to hypothesis 4, "Vulnerability is negatively associated with the intention to use a mobile cloud service".

Unauthorized access refers to the extent to which an individual is concerned about access by unauthorized individuals or other entities to his/her data17. Unauthorized access includes security breaches involving various types of harmful activities, such as stealing personal information, data or fraud. Although mobile cloud services provide many benefits, security concerns are perceived as a major hurdle for individuals to continue to use the services9. Prior studies have found that privacy concerns, including unauthorized access, have a significant impact on individuals’ intention to use e-commerce services. For example, Dinev et al.18 examined an individual’s online purchase decisions in both the U.S. and Italy. They found that both countries showed that the fear of security, such as improper access, had an adverse effect on the intention to use e-commerce. As mobile cloud services are considered a type of e-commerce, a negative relationship has been proposed in previous studies between unauthorized access and user intention to adopt mobile cloud services. Therefore, the study proposes hypothesis 5, "Unauthorized access is negatively associated with the intention to use a mobile cloud service". The research model in Fig. 1 showed the direct effects model as well as the expected relationships between five external variables and intention to use mobile cloud service.

MATERIALS AND METHODS

Sample: Data for analysis were collected through online and offline surveys. The unit of analysis was an individual who has used mobile cloud services for various purposes. Of the 452 responses collected, 25 were discarded due to incompletion. Therefore, 427 responses were used for the analysis. Table 1 describes the demographic characteristics of the survey participants.

Measurement: The items used to measure the latent variables included in the research model were developed based on existing research. However, each item was revised and supplemented for mobile cloud services. All of the items developed were tested for content validity for IT professionals (e.g., professors and Ph.D. candidates), thereby improving the contextual accuracy and relevance of the items. Each item assesses individuals’ psychological feelings with respect to the intention to use mobile cloud services. All items were developed on a seven-point Likert-type scale, ranging from (1) strongly disagree to (7) strongly agree to answer the degree of individual agreement or disagreement related to the use of mobile cloud services.

Analysis of the measurement model: Before testing the proposed hypotheses, the measurement model was evaluated by performing a confirmatory factor analysis with AMOS 22.0. First, the overall fit of the measurement model was evaluated using several indices, such as the Normed Fit Index (NFI), Goodness-of-Fit Index (GFI), Adjusted Goodness-of-Fit Index (AGFI), Comparative Fit Index (CFI), relative χ22/df) and root mean square of approximation (RMSEA). To demonstrate the overall fit, NFI, GFI and CFI should be equal to or greater than 0.90 19, the threshold of AGFI equal to or greater than 0.8 and RMSEA equal to or less than 0.1 20. Finally, the value for the relative chi-square (χ2/df) should be equal to or less than 3.0 21. As shown in Table 2, all indices fulfilled the thresholds, implying that the data fit well into the measurement model, indicating it could be used for further analyses.

Reliability and construct validity: After testing the overall fit of data, the reliability and validity of each latent variable were examined. Cronbach’s alpha, a commonly used test method, was used to check for reliability. To demonstrate the reliability of the measurement model, the value of alpha should be 0.7 or greater22. As shown in Table 3, Cronbach’s alpha for all latent variables exceeds the minimum requirement (0.7). Thus, the reliability of the measurement model was confirmed. Next, convergent validity was verified by three indicators: (1) Factor loadings, (2) Average Variance Extracted (AVE) and (3) Composite Reliability (CR).

Table 1:Demographic characteristics (n = 427)

Table 2:Summary of the overall fit indices for the measurement model

The factor loading for each item and the CR value of latent variables should be 0.7 or higher and the AVE should be 0.5 or higher to ensure convergent validity23. The results are shown in Table 3. The factor loadings of all measurement items were above 0.7 and the AVE and CR values of each latent variable were above their thresholds, confirming the convergent validity of the measurement model.

The discriminant validity was tested as the last step of the verification of the measurement model to prove that the latent variables are not related to the items to be measured and other potential variables. The discriminant validity can be examined by comparing the square root of the AVE value of each latent variable with the correlation. The square root of AVE should be larger than the correlation value in the diagonal to ensure the discriminant validity. As shown in Table 4, all values in the diagonal were greater than all correlation values; thus, the discriminant validity was confirmed.

Table 3:Construct loading and reliabilities of the measurement model
Items with asterisk (*) are fixed as "1" in the analysis

Table 4:Discriminant validity test by comparing the square root of AVE and correlation
*The values at the diagonal are the square root values of AVE

RESULTS AND DISCUSSION

Analysis of the structure model (Hypothesis test): Using AMOS 22.0, the hypotheses proposed in the research model were verified through a Structural Equation Model (SEM) analysis. Through the SEM analysis, the overall fit of the structural model, the standardized path coefficient (β) for each path and the squared multiple correlation (R2) of endogenous variables can be determined. The path coefficient and t-value are used to decide whether to adopt each hypothesis. First, the overall fit of the structural model was judged based on the index used in the fit test of the measurement model. The results show that all fit indices were greater than their thresholds-NFI (0.951), GFI (0.945), AGFI (0.903), CFI (0.958), RMSEA (0.029) and the relative c2 (1.920)-implying that the characteristics of the data collected in this study fit well with the characteristics of the structural model.

The findings provided strong support for all proposed hypotheses. Intimacy and control were significantly related to the intention to use a mobile cloud service. Moreover, Trust in mobile cloud service providers has a significant impact on the intention to use the service. Thus, H1, H2 and H3 were supported. These results are consistent with the results of previous studies9,7 on acceptance of various technologies. In other words, individuals are more likely to use a technology or service when they have more control over their information and intimacy with the information technology they want to use. Furthermore, individuals are more likely to use the service when their trust in the mobile cloud service provider is higher. These results are also consistent with previous studies11,12. In other words, trust in an information technology application or service plays an important role in users adopting the application or service.

Research results show that unauthorized access and vulnerability negatively affect the intention to use mobile cloud services. Vulnerability and unauthorized access had a significant negative impact on intention to use a mobile cloud service. Thus, H4 and H5 were supported at p<0.01. These results are related to security concerns about mobile cloud services. In other words, unauthorized actors having frequent access to the information of mobile cloud service users creates a negative perception regarding using these services. Furthermore, if there is a weakness in the security of a mobile cloud service, individuals may be less likely to use the service.

Fig. 2:Results of the structural equation model (SEM)
  χ2/df = 1.920, NFI = 0.951, GFI = 0.945, AGFI = 0.903, CFI = 0.958, RMSEA = 0.029, **p<0.01

Table 5:Hypotheses evaluation for the proposed research model
**p<0.01, S: Supported

These results agree with those previously reported in the literature15,17. Figure 2 showed the SEM analysis and Table 5 summarized the results for each hypothesis.

The five exogenous variables (control, intimacy, trust, unauthorized access and vulnerability) proposed in this study account for 70.3% of the information regarding the intention to use a mobile cloud service. In other words, 70.3% of the information regarding the endogenous variable-intention to use a mobile cloud service-has moved in the same direction of the five exogenous variables. Based on the result of the analysis, the multiple linear regression model is given as follows:

In the mobile environment, various cloud services are available for individual users. If existing cloud services are applied to the mobile environment, users can enjoy more features and benefits. In light of the various academic and practical implications of cloud computing research, the results of this study have some important implications. First, this study contributes to the knowledge about individuals’ behaviors regarding mobile cloud services both from cognitive- and security-related perspectives. Straub et al.24 claimed that two important factors of an individual’s behavior in information technology are the perceptions of security and psychological aspects. This study increased the understanding of users’ behaviors with regard to mobile cloud services by including these two factors. Another academic contribution of this study is related to the development and validation of the measures. In the cases in which measurement items to assess variables in the proposed research model were adopted from the literature, they were modified to suit the mobile cloud service context. Therefore, these measures can now be used in future research on mobile cloud services.

As research topics related to cloud computing are attracting considerable attention in recent years, the results of this study can be an important basis for cloud services research in the future. In particular, the results of this study indicate that mobile cloud service providers should consider important aspects of service delivery. For example, users of mobile cloud services have important psychological factors to consider, such as control of information, trust and intimacy when adopting services. Thus, based on these results, mobile cloud service providers can develop or modify their services to meet users’ needs. In addition, this study shows that mobile cloud service users demand a high level of security for their personal information. Therefore, cloud service providers should ensure the security of personal information technically and politically by developing policies and regulations.

CONCLUSION

This study introduced cognitive- and security-related factors affecting the intention of individuals to use mobile cloud services. Findings indicated that three cognitive factors; intimacy, control and trust and two security factors; vulnerability and unauthorized access had a significant impact on intention to use mobile cloud services. The most influential variable was intimacy but the security-related variables, particularly vulnerability, were also found to be important to users. Despite the significant contribution of this study, more diverse perspectives on mobile cloud services are needed.

SIGNIFICANCE STATEMENTS

This study empirically analyzed the impact of cognitive (intimacy, control and trust) and security (vulnerability and unauthorized access) factors on intention to use mobile cloud services by individuals. The results of this study provide various implications for both academic and practical applications. In particular, this study will help researchers and practitioners develop new theories dealing with innovative technology from an individual perspective, as well as security features for mobile cloud services.

ACKNOWLEDGMENT

Authors would like to thank the editor of the journal as well as anonymous reviewers for their valuable comments. This research was supported by Kyungpook National University Bokhyeon Research Fund, 2015.

REFERENCES

  • Mell, P. and T. Grance, 2011. The NIST definition of cloud computing. NIST Special Publication No. 800-145, National Institute of Standards and Technology (NIST), USA., September 2011.


  • Carcary, M., E. Doherty and G. Conway, 2014. The adoption of cloud computing by Irish SMEs-an exploratory study. Electron. J. Inform. Syst. Eval., 17: 3-14.
    Direct Link    


  • Garrison, G., C.M. Rebman Jr. and S.H. Kim, 2018. An identification of factors motivating individuals’ use of cloud-based services. J. Comput. Inform. Syst., 58: 19-29.
    CrossRef    Direct Link    


  • Kim, S.H., 2008. Moderating effects of job relevance and experience on mobile wireless technology acceptance: Adoption of a smartphone by individuals. Inform. Manage., 45: 387-393.
    CrossRef    Direct Link    


  • French, D.P., S. Sutton, S.J. Hennings, J. Mitchell and N. J. Wareham et al., 2005. The importance of affective beliefs and attitudes in the theory of planned behavior: Predicting intention to increase physical activity. J. Applied Soc. Psychol., 35: 1824-1848.
    CrossRef    Direct Link    


  • Ajzen, I., 1991. The theory of planned behavior. Organiz. Behav. Hum. Decis. Process., 50: 179-211.
    CrossRef    Direct Link    


  • Sanchez-Franco, M.J. and J.L. Roldan, 2015. The influence of familiarity, trust and norms of reciprocity on an experienced sense of community: An empirical analysis based on social online services. Behav. Inform. Technol., 34: 392-412.
    CrossRef    Direct Link    


  • Phelps, J., G. Nowak and E. Ferrell, 2000. Privacy concerns and consumer willingness to provide personal information. J. Public Policy Market., 19: 27-41.
    CrossRef    Direct Link    


  • Liu, C., J.T. Marchewka, J. Lu and C.S. Yu, 2005. Beyond concern-a privacy-trust-behavioral intention model of electronic commerce. Inform. Manage., 42: 289-304.
    CrossRef    Direct Link    


  • McKnight, D.H., V. Choudhury and C. Kacmar, 2002. Developing and validating trust measures for e-commerce: An integrative typology. Inform. Syst. Res., 13: 227-359.
    CrossRef    Direct Link    


  • Rousseau, D.M., S.B. Sitkin, R.S. Burt and C. Camerer, 1998. Not so different after all: A cross-discipline view of trust. Acad. Manage. Rev., 23: 393-404.
    Direct Link    


  • Cho, D.Y., H.J. Kwon and H.Y. Lee, 2007. Analysis of trust in internet and mobile commerce adoption. Proceedings of the 40th Hawaii International Conference on System Science, January 2007, Waikoloa, HI., USA., pp: 50-.


  • Gefen, D., 2000. E-commerce: The role of familiarity and trust. Omega, 28: 725-737.
    CrossRef    Direct Link    


  • Pavlou, P.A. and L. Chai, 2002. What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior. J. Electron. Commerce Res., 3: 240-253.
    Direct Link    


  • Sun, Y., N. Wang, X. Guo and Z. Peng, 2013. Understanding the acceptance of mobile health services: A comparison and integration of alternative models. J. Electron. Commerce Res., 14: 183-200.
    Direct Link    


  • Rogers, R.W., 1975. A protection motivation theory of fear appeals and attitude change1. J. Psychol., 91: 93-114.
    CrossRef    Direct Link    


  • Smith, H.J., S.J. Milberg and S. Burke, 1996. Information privacy: Measuring individual's concerns about organizational practices. MIS Quart., 20: 167-196.
    CrossRef    Direct Link    


  • Dinev, T., M. Bellotto, P. Hart, V. Russo, I. Serra and C. Colautti, 2006. Privacy calculus model in e-commerce-a study of Italy and the United States. Eur. J. Inform. Syst., 15: 389-402.
    CrossRef    Direct Link    


  • Bentler, P.M., 1990. Comparative fit indexes in structural models. Psychol. Bull., 107: 238-246.
    CrossRef    PubMed    Direct Link    


  • Browne, M.W. and R. Cudeck, 1992. Alternative ways of assessing model fit. Soc. Meth. Res., 21: 230-258.
    CrossRef    Direct Link    


  • Goodhue, D.L., 1995. Understanding user evaluations of information systems. Manage. Sci., 41: 1827-1844.
    Direct Link    


  • Teo, T.S.H., V.K.G. Lim and R.Y.C. Lai, 1999. Intrinsic and extrinsic motivation in internet usage. Omega, 27: 25-37.
    CrossRef    Direct Link    


  • Fornell, C. and D.F. Larcker, 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res., 18: 39-50.
    CrossRef    Direct Link    


  • Straub, D., M. Limayem and E. Karahanna-Evaristo, 1995. Measuring system usage: Implications for IS theory testing. Manage. Sci., 41: 1328-1342.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved