You are on page 1of 12

Int. J. Computer Applications in Technology, Vol. 56, No.

1, 2017 65

An extended UTAUT model for understanding


of the effect of trust on users’ acceptance of
cloud computing

Saad Alharbi
Computer Science Department
Taibah University
Medina, Saudi Arabia
Email: stharbi@taibahu.edu.sa

Abstract: In this paper, we propose an extended Unified Theory of Acceptance and Use of
Technology (UTAUT) model with trust to investigate the effect of trust on users’ behavioural
intention to use cloud computing. Structural Equation Modelling (SEM) was used to analyse the
collected data and to assess the proposed model. The results indicated that trust, performance
expectancy and facilitating conditions have significant effects on behavioural intention to use
cloud computing. However, we also found that effort expectancy and social influence do not
significantly affect users’ behavioural intention to use cloud computing. In addition, the five
constructs (effort expectancy, performance expectancy, social influence, facilitating conditions
and trust) accounted for 70% of the variance in the attitude toward adopting cloud computing.
The paper concludes with the limitations of the study, implications for academic research and
practical institutions and some directions for future work..

Keywords: behavioural intention; cloud computing; technology acceptance; trust; UTAUT.

Reference to this paper should be made as follows: Alharbi, S. (2017) ‘An extended UTAUT
model for understanding of the effect of trust on users’ acceptance of cloud computing’,
Int. J. Computer Applications in Technology, Vol. 56, No. 1, pp.65–76.

Biographical notes: Saad Alharbi is an Associate Professor at the Department of Computer


Science, Computer Science and Engineering Faculty in Taibah University in the Kingdom of
Saudi Arabia. He earned his PhD in Computer Science, Human Computer Interaction (HCI) from
University of Bradford, UK. His current research interests are in cloud computing and
optimisation especially bio-inspired evolutionary algorithms. He has got several published
articles in journals and conferences. He served as the head of department for three years and
served as the dean of information technology at Taibah University for four years. Currently, he is
serving as consultant for several IT organisations.

1 Introduction are used almost daily in our life, such as iCloud, Dropbox,
OneDrive and Google Drive. The largest companies in the
Cloud computing is an innovative paradigm that is shifting market, such as Microsoft, Amazon, Google, Dell and
the world of computing and how business is achieved. The VMware, have begun to offer cloud solutions. Furthermore,
idea behind cloud computing is that enterprises outsource IT cloud computing is considered currently to be a utility such
infrastructure and services to a third party, called the cloud as electricity, gas and water. In fact, the International Data
provider, where resources can be shared and accessed by Corporation (IDC) predicts that by 2020, the term cloud will
multiple organisations. According to Sabi et al. (2016), no longer be used because cloud will be the new way of
the National Institute of Standards and Technology (NIST) how information technology is supplied.1 The IDC also
defined cloud computing as ‘a model for enabling ubiquitous, predicted that investment would reach $127 billion by
convenient, on-demand network access to a shared pool of 2018.2 The benefits of adopting cloud computing are well
configurable computing resources (e.g. networks, servers, documented and explained in the literature, and the most
storage, applications, and services) that can be rapidly important benefits are the reduced cost, scalability (pay as
provisioned and released with minimal management you use), collaborative support and location independence.
effort or service provider interaction’. Cloud computing is Cloud computing is served to users via three service
therefore becoming more popular over the years and is delivery models: Infrastructure as a Service (IaaS), Platform
becoming one of the predominant research trends in the as a Service (PaaS) and Software as a Service (SaaS). In
domain of information technology. Several cloud services IaaS, the complete infrastructure for cloud computing is

Copyright © 2017 Inderscience Enterprises Ltd.


66 S. Alharbi

delivered. Amazon S3 and EC2 platforms are actual 1980s, researchers have begun studying how to develop
examples of IaaS. In PaaS, platforms are provided that can TAMs. The main objective of such models is to investigate
be managed remotely by cloud users, such as web servers the attitude of users towards new technologies. Several
and databases. Microsoft Azure is one of the well-known models were developed over the past years, such as Theory
commercial PaaS available today. In SaaS, users are of Reasoned Action (TRA), TAM, Motivational Model
provided with applications or services that run on the cloud (MM) and UTAUT. UTAUT is one of the most recent and
provider data centre and do not require any technical widely used models and was developed by Venkatesh et al.
involvement of the users. Despite this structure of delivering (2003). UTAUT has been extensively adopted in the literature
services and the anticipated benefits of cloud computing, some in various domains; for instance, students’ attitudes towards
challenges and barriers exist that might result in the reluctance new technologies such as using LMS and digital libraries
of enterprises and users to use cloud solutions and services. were investigated using UTAUT by numerous researchers
According to our literature survey (see Subsection 2.2), trust is (Alrawashdeh et al., 2012; Attuquayefio and Addo, 2014;
one of the most critical factors preventing users from adopting Bellaaj et al., 2015; Orji, 2010; Tan, 2013). Furthermore,
cloud computing. Lack of trust can result from concerns with UTAUT has been adopted to investigate the attitude of users
security, privacy, control, etc. Furthermore, the majority of towards internet banking and payment (Al-Ghazali et al., 2015;
such studies tried to examine the effect of trust on cloud Dahlberg et al., 2003; Suh and Han, 2002; Yu, 2012; Zhou
computing adoption but focused only on particular cloud et al., 2010), e-government (AlAwadhi and Morris, 2008;
services (e.g. file storage service) or a specific domain such Alzahrani and Goodwin, 2012) and healthcare (Briz-Ponce
as healthcare and education. In this paper, we do not focus and García-Peñalvo, 2015; Hennington and Janz, 2007;
on a particular domain or service; however, we believe that Kijsanayotin et al., 2009; Moon and Hwang, 2016).
a model that would be applicable to examine the attitude of Trust has become a critical factor in the adoption of new
users towards cloud computing solutions and services in technology, and research on trust of technology is rapidly
enterprises in different domains is highly demanded. growing in the literature. Numerous studies have been carried
Numerous validated Technology Acceptance Models out to investigate the effect of trust on the adoption of
(TAMs) are available in the literature to examine the attitude technology in different areas, such as government (Emad,
of users towards new technologies including cloud 2014; Mohammed et al., 2012; Taiwo et al., 2012) and
computing. However, the majority of these models do not internet banking and mobile payment (Min et al., 2008; Slade
consider trust as a main factor in the model. Therefore, this et al., 2015; Zhou, 2012; Zhou et al., 2010). Furthermore,
paper proposes an extended Unified Theory of Acceptance trust has been extensively adopted as the main construct in
and Use of Technology (UTAUT) model that adopts trust as several acceptance models such as TAM and UTAUT. In
the main construct. UTAUT was employed in this study for such models, trust is usually directly linked to the behavioural
several reasons. First, it has been successfully validated in the intention to use construct (Foon and Fah, 2011) or equivalent
context of cloud computing and other technologies. Second, constructs based on the model used. In most of these studies,
UTAUT was also successfully adopted in several regions trust was found to significantly affect the attitude of users
including Middle East where the proposed study carried out. towards a new technology. However, other researchers
Third, it is one of the most recent and comprehensive argued that this relationship likely can be moderated by other
instruments for investigating technology acceptance where it factors such as age and gender. However, several studies
was developed based on eight acceptance technology models. adopted this relationship in acceptance models by indirectly
The rest of the paper is organised as follows. In Section 2, linking it to intention to use. Lee and Song (2013), for
we review related work on employing trust within TAMs and instance, developed a revised UTAUT by incorporating trust
cloud computing trust. Section 3 describes the proposed to investigate the acceptance of the Certified e-Document
research model and hypotheses. Section 4 demonstrates the Authority (CeDA) in Korea. Trust was linked with almost
methodology implemented in our study and specifically all of the main constructs in the UTAUT, specifically
describes the sample that participated in our survey. Statistical performance expectancy, effort expectancy and perceived
analysis of the collected data is conducted in Section 5. Finally, risk. The main purpose of this is to assess the impact of trust
the paper concludes with a discussion of the obtained results, on the main constructs of the UTAUT in the proposed
research implications and limitations of the study.
context. Schaupp et al. (2010) also incorporated trust in the
UTAUT in the context of e-government; however, it was not
linked directly with any of the basic UTAUT constructs.
2 Research background
Schaupp et al. adopted a new construct called perceived risk
that is directly linked with Trust and Behavioural intention to
2.1 Technology acceptance and trust
use. Trust can consist of a set of items based on the study
People usually form attitudes towards using and accepting domain. Table 1 shows the items that are most frequently
new technology (Oye et al., 2012); therefore, from the late used to investigate trust in the literature.
An extended UTAUT model for understanding 67

Table 1 Most often used trust items

Articles

Chen et al. (2015)


Lui and Jamieson

Fink et al. (2015)


Cody-Allen and
Kishore (2006)

Siau and Shen

Lankton et al.

Isabirye et al.
Lee and Song

Ratnasingam
Emad (2014)

Hannu et al.

Zhou (2012)
Items

(2013)

(2003)

(2015)

(2003)

(2013)

(2015)

(2002)
Ability √ √ √ √ √ √ √ √
Integrity √ √ √ √ √ √ √ √ √
Benevolence √ √ √ √ √ √
Privacy √ √ √
Confidentiality √ √
Authentication √ √
Information quality √ √ √ √ √
Security control √ √ √
Reliability √ √ √ √
Reputation √ √ √ √
Consistency

2.2 Cloud computing trust over data and assets, in addition to unclear security
regulations and policy. Khan and Malluhi highlighted some
The benefits of adopting cloud computing in enterprises
of the critical factors that directly affect users’ trust in the
have become clear and well-known, for instance, cloud
cloud, such as control, ownership, prevention and security.
computing has become a means for enhancing applications
Furthermore, the challenges and obstacles of adopting cloud
and IT services (Giunta et al., 2015). Furthermore, the
computing have been extensively studied in the literature.
benefits of adopting cloud computing have exceeded
The availability of services and data confidentiality were
applications and software where it has been recently
found to be some of the top obstacles to the growth of cloud
adopted for improving telecommunications and satellite
computing because enterprises are still refusing to store
services, e.g. Menaka et al. (2015). However, users are still
sensitive data in the cloud (Fox et al., 2009). However,
reluctant to adopt cloud solutions in their organisations.
Subashini and Kavitha (2011) claimed that the current
Zhang et al. (2010) shed light on some of the challenges that
architecture of the cloud is the main reason behind users’
would affect the attitude of users towards adopting cloud
security concerns. Subashini and Kavitha (2011) recommended
computing. For example, Zhang et al. claimed that cloud
a new model that has more advanced security aspects and
computing is still not mature in many aspects such as
highlighted the security issues of the cloud in terms of the
automatic resources provisioning, power management and
service delivery models (SaaS, PaaS, IaaS).
security management. However, based on our literature Thus, researchers have recently started investigating ways
survey, it can be noticed that the main reason behind users’ to improve the attitude of users towards cloud computing
hesitation is lack of trust in cloud providers and security because such revolutionary technology could become a huge
concerns. Security has become today one of the most critical failure. Technical and non-technical solutions have been
concerns that would prevent users using new technology as proposed in the literature. The existence of a Service Level
systems attacks and intrusions significantly increasing Agreement (SLA) between the enterprise and the cloud
(Czekster et al., 2016). Kaufman (2009) noted that trust and provider can change the attitude of users towards adopting
security are synonymous, meaning that security issues and cloud solutions (Takabi et al., 2010). Ramgovind et al. (2010)
concerns will directly affect users’ trust in adopting cloud proposed various features for a good SLA. For instance, a
solutions. Takabi et al. (2010) stated that lack of trust in the good SLA should contain the services that will be delivered,
cloud comes from the lack of users’ control over their data tracking and reporting, legal compliance, dispute resolution,
and cloud equipment. Furthermore, Takabi et al. noted that responsibilities and confidential information termination.
transparency, such as data disclosure risk and store location, Furthermore, Kaufman (2009) stated that users’ cloud
is one of the main factors affecting users’ trust. Khan and providers must provide some technical capabilities that would
Malluhi (2010) insisted that trusting cloud computing is a improve enterprise trust, such as tested encryption schemes and
dominant concern of most enterprises. Khan and Malluhi scheduled data backup. In contrast, Krautheim et al. (2010)
stated that the problem is not only about mistrusting cloud proposed a technical solution to enhance trust in cloud
providers but also about having doubts about the technical computing. Krautheim et al. introduced a mechanism called the
capabilities of cloud computing. In addition, Khan and Trusted Environment Module (TVEM), which helps to solve
Malluhi noted that lack of trust stems from loss of control the core security challenge of the cloud by enabling parties to
68 S. Alharbi

establish trust relationships. TVEM is a software application all six theories strongly affected the intention of users to use a
that enables information owners to create and run a virtual cloud classroom. However, such a study again cannot be
environment on a platform owned by a separate service generalised to other cloud services because this study only
provider (Krautheim et al., 2010). However, the study only focuses on a service within the academic system. Furthermore,
presented the design and requirements of the proposed tool and the unified model seems very complex to use and will most
did not provide any experimental results for the performance, likely cause users frustration. With the same approach, Li and
especially in terms of security. Zissis and Lekkas (2012) also Chang (2012) conducted a study to identify how individuals
proposed a model called Trusted Third Party (TTP), which accept cloud computing by integrating the TAM and TPB. Li
employed cryptography to ensure the confidentiality and and Chang stated that the attitude of users towards the cloud
integrity of data communication. It is considered to be a is directly affected by subjective norms and perceived
Trusted Authority responsible for addressing security issues in behaviour. Meanwhile, risk and trust have an indirect effect
a multilevel distributed environment. on the intention to use the cloud. Furthermore, Tashkandi
Other researchers believe that the acceptance of cloud and Al-Jabri (2015) found that technological, organisational
computing is far beyond technology and therefore have and environmental factors influence the adoption of
started to investigate and develop frameworks and models to cloud solutions. Tashkandi and Al-Jabri also found that
assess users’ attitudes towards this revolutionary technology the acceptance rate of cloud computing in large educational
and to understand factors affecting their attitude. Because organisations is higher than in smaller educational
trust is one of the main challenges behind the adoption of organisations. In an effort to build a framework to identify
cloud computing (Stieninger et al., 2014), numerous studies factors affecting students adopting mobile storage services,
have been carried out to investigate the effect of trust on Arpaci (2016) adopted a revised TAM with trust adopted as a
users’ acceptance of cloud solutions and services. For main construct. The results demonstrated that TAM constructs
instance, Lian (2015) proposed an integrated model based and Trust have a significant positive affect on the attitude of
on UTAUT to examine the critical factors in the adoption of students towards the mobile cloud storage service. However,
e-invoice services based on the cloud. The study integrated the study also focuses on a specific service in a specific
three factors into the main factors of UTAUT: security domain, that is, education. In addition, TAM was adopted even
concerns regarding e-government, trust in e-government
though more recent and updated models are available in the
and perceived risk. The results indicated that these three
literature such as UTAUT. Similarly, Yadegaridehkordi
factors along with social influence and effort expectancy
et al. (2015) employed TAM to study users’ acceptance of
significantly affected the intention of users to adopt cloud
cloud computing in an educational environment. Again,
service. Performance expectancy and facilitating conditions,
more updated acceptance models are available in the
on the one hand, were not found to significantly affect
literature, and Yadegaridehkordi et al. also did not provide
intention to adopt cloud service. However, such results
any experimental results.
cannot be generalised to other cloud services and solutions
because the study focused only on a specific service, Figure 1 Proposed research model
whereas the cloud can be presented through various delivery
models and methods. Moryson and Moeser (2016), on the
other hand, found that the relationship between trust and the
intention of users to use cloud services is not significant,
whereas social influence, performance expectancy and
perceived security risk had a significant effect on the
intention to use cloud services.
The acceptance of cloud computing in education has
received considerable attention from researchers. Sabi et al.
(2016) proposed a model that takes into account contextual,
economic and technical influences in the acceptance of
cloud computing at newly established universities. A pilot
study was performed at one of the African universities,
where the initial results demonstrated the reliability and
validity of the model. However, the effects of factors on the
adoption of cloud were not studied, the study is still under
investigation, and the presented results were preliminary.
Shiau and Chau (2016) also performed a study to investigate
students’ behaviour towards cloud classrooms. Shiau
and Chau first compared users’ behaviour towards the cloud 3 Research model and hypotheses
classroom using six theories: service quality (SQ), self-
efficacy (SE), motivational model (MM), TAM, TRA or This study employed the UTAUT as a basis for a research
Theory of Planned Behaviour (TRA/TPB) and Innovation model. The research context of the study is the adoption of
Diffusion Theory (IDT). Second, these theories were integrated cloud computing. Various studies in the literature have
and unified in one acceptance model. The results indicated that explored the adoption of cloud computing; however, the
An extended UTAUT model for understanding 69

majority of these studies focused mainly on a specific cloud provider play an important role in the acceptance of the
service or a specific domain (see Subsection 2.2). Unlike cloud (see Subsection 2.2). Additionally, providers who
such studies, our study does not focus on particular services have accreditation from respected parties and apply policy
such as online payment or cloud storage because such compliance will most likely be more accepted than other
services are well established and widely used. In the providers. Thus, we propose five hypotheses: the first three
present study, we mainly focus on enterprises’ adoption of hypotheses were inferred from the original UTAUT defined
cloud computing solutions to serve their customers. More by Venkadesh, and the other two hypotheses were inferred
specifically, are enterprises willing to transfer their data from the extension and modification that was carried out.
centres or part of their services to the cloud? Therefore, These hypotheses are as follows:
users in this paper are defined as those who have a
relationship, via a direct or indirect effect, with the decision Hypothesis 1: Performance expectancy will positively affect
to adopt cloud solutions and can be decision-makers, the intention of users to use cloud computing.
executives, IT technical staff or administrative staff. Hypothesis 2: Effort expectancy will positively affect the
Trust has been found to be one of the main factors that intention of users to use cloud computing.
affect the attitude of users towards the adoption of cloud
computing (see Subsection 2.2). Because it did not exist in Hypothesis 3: Social influence will positively affect the
the UTAUT, we propose an extended UTAUT model that intention of users to use cloud computing.
adopts trust as the main construct. Figure 1 shows the Hypothesis 4: Facilitating conditions will positively affect
proposed new model. Furthermore, the model was also the intention of users to use cloud computing.
modified by the removal of the actual use construct and linking
Hypothesis 5: Trust in the cloud will positively affect the
facilitating conditions directly to the behavioural intention to
intention of users to use cloud computing.
use construct. The reason behind this modification is that this
study was conducted in a region, Saudi Arabia, where cloud
adoption and usage are still not adequately mature. Therefore,
4 Methodology
we believed that facilitating conditions would affect intention
to use the cloud, copying the same effect on actual use that was 4.1 Data collection method
proposed in the original model. Similar modifications were
made by other studies in the literature, such as Moryson and A web-based questionnaire was designed to be used as the
Moeser (2016). Moderating factors such as age and gender data collection instrument of this study and was based
were not considered in the present study because we aimed on the six main constructs of the UTAUT defined by
first to ensure the validity of the proposed model and to Venkatesh et al. (2003) in addition to the proposed construct
examine the relationships among constructs, and then (i.e. trust) in this study. Statements used in previous studies
moderating factors such as age and gender can be examined were reviewed and modified to suit our study framework.
in further work. The questionnaire was divided into nine sections. The first
In the present study, trust consists of four aspects: section consisted of five questions asking subjects about
control, security, service continuity and cloud provider. We personal information such as age, gender, job domain and
believed that the attitude of users towards cloud computing education level. All of the questions in this section were
and their trust level would be affected by how much control multi-item questions. Sections 2 to 9 consisted of five-point
Likert scales statements ranging from strongly agree to
the users have over the cloud. For instance, users’ trust will
strongly disagree; each of these sections represented a main
most likely improve if the users have adequate control
construct in the proposed model. The last section of the
over their data on the cloud as well as the physical location
questionnaire consisted of two multi-item questions
of the datacentre hosting the services, and its profile
asking subjects about cloud adoption and usage in their
would significantly affect users’ trust. Furthermore, security
organisations. The questionnaire was distributed by email to
concerns, as seen in Subsection 2.2, are one of the main
subjects who are employees working in information
barriers that prevent users from adopting cloud services.
technology centres and IT departments in the public and
More specifically, the existence of a clear policy and
private sectors in the kingdom of Saudi Arabia. All of the
procedures of privacy and auditability and applying a good
subjects were kindly asked to forward the survey hyperlink
encryption system would improve users’ trust in the cloud.
to their counterparts. It was available online using Google
Users are usually concerned about the continuity of the services forms from 1 October 2015 to 1 January 2016.
provided in the cloud; therefore, it was recommended that a
well-structured SLA be provided to users before adopting
cloud solutions. A good SLA should clearly mention 4.2 Sample
backup procedures and compensation in case of any failure. We received a total of 239 responses; however, before
Therefore, we believed that service continuity would commencing the statistical analysis, a data screening
significantly affect users’ trust in cloud computing. Finally, process was performed to ensure that the data were usable,
we also believed that cloud providers are one of the main reliable and valid. All of the responses with missing data as
critical factors that would affect users’ trust in cloud well as outliers were deleted; for example, all of the
computing. Transparency and the reputation of the cloud questions that received responses of 4 or 1 were deleted. 20
70 S. Alharbi

responses were deleted, and therefore, statistical analysis 5.1 Assessment of measures and instruments
was performed on 219 completed responses (86.8% from
Before investigating the relationships in the proposed
males and 13.2% from females). Most of the subjects were
between 25 and 34 years old (36.5%), and none of them model, several steps need to be carried out to ensure the
was over 64 years old. The subjects had backgrounds in validity and reliability of the variables and measures.
various IT domains such as hardware, software and Exploratory Factor Analysis (EFA), using SPSS 20, was
management and worked in different administrational used to investigate the measures’ validity. The first step
levels ranging from technical support to CIO. A detailed performed in EFA is the factors defining process. All of the
descriptive analysis of the subjects’ characteristics is shown construct items were rotated on the six factors (Performance
in Table 2. expectancy, Effort expectancy, Social influence, Facilitating
conditions, Trust, Behavioural intention to use). The maximum
Table 2 Sample profile likelihood (ML) extraction method was used with Promax
rotation. The results at the beginning indicated some factor
Measure Value Frequency Percentage
loading issues. For instance, items T1, T2, T3, T4, T5, T11,
18–24 10 4.6 T12, S1 and S2 did not load successfully with other items in
25–34 80 36.5 their factors, although their loadings exceeded the
Age 35–44 57 26.0 recommended level suggested by Takabi et al. (2010).
45–54 60 27.4 Therefore, these items were removed, and EFA was
55–64 12 5.5 performed for a second time. Factors loadings for all of the
HW 22 10.0 items were generated, and corresponding factor scoring was
SW 81 37.0 computed. Table 3 shows the factor loading for each item,
Job domain where it clearly can be noticed that all of the items have
Management 82 37.4
larger values than the recommended level. In addition,
Other 34 15.5
Table 4 shows the factor loading matrix, where it can be
Male 190 86.8
Gender seen that the items effectively reflected their constructs.
Female 29 13.2 Furthermore, it can be noticed from the factor loading
High School 5 2.3 matrix (Table 4) that variables within a single factor are
Diploma 15 6.8 highly correlated, where all loadings above 0.5 mean that
Education Bachelor’s 62 28.3 the convergent validity of the model is within acceptable
Master’s 39 17.8 level. To test the discriminant validity of the model, a factor
PhD 98 44.7 correlation matrix was produced (see Table 5). The results
Dean/Vice Dean of indicated that the majority of the factors do not highly
25 11.4 correlate; the majority of factor correlations do not exceed
Information Technology
Director/Deputy of IT 6 2.7 the recommended level by Hair et al. (2010), which is 0.7,
Network Consultant 15 6.8 meaning that the discriminant validity of our model is
System Consultant 14 6.4 within an acceptable level. However, the correlation
between effort expectancy and trust is slightly higher than
Director of Department 37 16.9
Job 0.7, although effort expectancy and trust do not correlate
Senior Engineer 12 5.5
with other factors. Therefore, these two factors will be
Junior Engineer 16 7.3
observed during the statistical analysis.
Senior Technician 17 7.8 The reliability of the instrument measures was tested using
Junior Technician 4 1.8 Cronbach’s alpha, which was applied on 22 items grouped into
Technical Support 11 5.0 six constructs. The results are shown in Table 3, where it can
Other 62 28.3 clearly be noted that the values ranged from 0.81 (Facilitating
Condition) to 0.93 (Trust). All of the constructs exceeded the
limit suggested by Nunnally and Bernstein (1994). Therefore,
5 Results the reliability of the instrument used is within a good range. In
addition, the Kaiser–Meyer–Olkin (KMO) and Bartlett
Structural Equation Modelling (SEM) was adopted in this sphericity test were carried out on the collected data to measure
study to validate the proposed model and to investigate the the sample adequacy. The results indicated that the KMO value
relationships among constructs in the model. This statistical was 0.88, and the result of Bartlett sphericity was statistically
approach was used because of its capability to test mediation significant (chi = 4140.06, df = 231, p < 0.01). Therefore,
and interaction between constructs (Diamantopoulos and the sample responses to the instrument were adequate, and
Siguaw, 2000). LISREL 9 was used in the present study to the collected data are appropriate for performing factor
perform SEM. analysis.
An extended UTAUT model for understanding 71

Table 3 Validity and reliability: factor loadings, alpha values, Table 5 Factor correlation matrix
CR and AVE
Factor Trust Effort EXP FC BI Social
Factor Cronbach’s CR AVE
Constructs Items Trust 1.0 0.60 0.71 0.43 0.64 0.43
loading alpha > 0.7 >0.5
EXP1 0.80 Effort 0.61 1.0 0.69 0.52 0.61 0.59
Performance EXP2 0.87 EXP 0.71 0.69 1.0 0.42 0.65 0.39
0.91 0.94 0.86
expectancy EXP3 0.72 FC 0.43 0.52 0.42 1.0 0.65 0.51
EXP4 0.61 BI 0.64 0.62 0.65 0.65 1.0 0.54
EFFORT 1 0.60
Social 0.43 0.59 0.39 0.51 0.54 1.0
Effort EFFORT 2 0.65
0.88 0.87 0.72
expectancy EFFORT 3 0.70 After completing EFA, Confirmatory Factor Analysis (CFA)
EFFORT 4 0.74 was performed to investigate and examine the factor structure
FC1 0.62 extracted using EFA, test the model fitness and ensure
Facilitating
FC2 0.60 0.81 0.84 0.66 convergent validity. CFA was performed by specifying one
condition
FC3 0.60 factor model for each construct using LISREL 9. The chi-
Social SOCIAL 3 0.74 square value was large enough to indicate that the proposed
0.82 0.83 0.71
influence SOCIAL 4 0.67 model was a good fit (chi = 237.8, df = 194, p = 0.02).
Behavioural BI1 0.82 However, the chi-square test is not sufficient on its own to
intention to BI2 0.83 0.93 0.97 0.97 indicate goodness of the model. Several measures were
use BI3 0.81 computed besides the chi-square. Table 6 shows the value
T6 0.64 of these measures with their acceptable thresholds as
T7 0.70 recommended by Jöreskog and Sörbom (1993) and Hair et al.
T8 0.83 (2010). All of the measures exceeded the recommended level,
Trust 0.93 0.92 0.62
T9 0.80 indicating that our proposed model is a good fit with the data.
T10 0.66 Furthermore, the reliability and validity were also measured
T13 0.60 using the CFA. Composite Reliability (CR) was measured
to test the reliability of the model, that is, the amount of
Table 4 Rotated item loadings variance in an item due to the construct rather than to error.
Average Variance Extracted (AVE) was computed to test the
Factors
Items convergent validity of the model. The purpose of assessing
Trust Effort EXP FC BI Social such measures is to make sure that all of the variables within
Trust8 1.020 a single factor correlate well together. Table 6 shows the
Trust9 0.899 recommended and actual values of these measures for all of
Trust7 0.822 the constructs. The results indicated that the reliability and
Trust10 0.749 convergent validity of the proposed model are within a good
Trust13 0.598 level. Discriminant validity was computed to ensure that the
Trust6 0.567 variables do not correlate highly with the variables in the
Effort4 0.935 constructs that they do not belong to. To accept the
Effort3 0.741 discriminant validity level of the model, the square root of the
Effort2 0.717 AVE should be greater than the inter-construct correlation
Effort1 0.677 (Hair et al., 2010; Nunnally and Bernstein, 1994). Table 7
ExP2 0.891 shows the correlation and square root of AVE. The diagonal
ExP1 0.857 elements represent the square root of AVE, whereas the
ExP3 0.761 values below the diagonal are the inter-correlation. It can
ExP4 0.677 clearly be noted that all of the inter-correlations are lower
FC1 0.779 than the square root of AVE, which indicates discriminant
FC3 0.717 validity.
FC2 0.713
BI2 0.860 Table 6 Model fit indices
BI3 0.835
Value Chi/df GFI AGFI NFI RMSEA CFI
BI1 0.835
Social3 0.829 Recommended <3 >0.80 >0.80 >0.90 <0.05 >0.90
Social4 0.682 Actual 1.23 0.92 0.89 0.94 0.032 0.98
72 S. Alharbi

Table 7 Square root of AVE behavioural intention to use (β = 0.23, t = 2.44, p < 0.05). This
result confirmed the relationship between performance
Factor Trust Effort EXP FC BI Social
expectancy and the behavioural intention to use in the original
Trust 0.96 UTAUT model. Facilitating conditions were also found to
Effort 0.61 0.93 strongly affect the attitude of users towards the use of cloud
EXP 0.71 0.69 0.97 computing (β = 0.41, t = 5.80, p < 0.001). This result also
validates the original UTAUT model. On the other hand, it
FC 0.43 0.52 0.42 0.92
was observed that neither effort expectancy nor social
BI 0.64 0.62 0.65 0.65 0.98 influence had a significant effect on behavioural intention to
Social 0.43 0.59 0.39 0.51 0.54 0.91 use. The obtained statistical values for the effect of effort
expectancy and social influence on behavioural intention
to use were (β = –0.02, t = –0.20, p = 0.30) and (β = 0.16,
5.2 Assessment of structural model
t = 1.90, p = 0.061). These results contradict the relationships
After ensuring the model goodness of fit and the validity and suggested in the original UTAUT model. Furthermore, the
reliability of the instruments, path analysis for the proposed proposed new construct in the UTAUT was found to
structural model was carried out to investigate the relationships significantly affect user behavioural intention to use cloud
between constructs. The path coefficients of the relationships computing (β = 0.23, t = 2.90, p < 0.001). In addition, the five
were calculated, which were used to validate the hypotheses constructs (effort expectancy, performance expectancy, social
under investigation. Figure 2 shows the structural model influence, facilitating conditions and trust) accounted for 70%
generated by LISREL and the estimated coefficients between of the variance in the attitude towards adopting cloud
constructs. The results indicated that the performance computing (R2 = 0.705). Hence, Hypotheses 1, 4 and 5 were
expectancy of cloud computing had a significant effect on user accepted, whereas Hypotheses 2 and 3 were rejected.

Figure 2 Structural results (see online version for colours)


An extended UTAUT model for understanding 73

6 Discussion and research implications continuity of the service, for example, through the existence
of a clear SLA wherein clear compensation for failure and
This study aimed to investigate the effect of trust on downtime is stated. A clear backup policy was also found to
enterprises’ attitude towards the adoption of cloud computing be one of the important items that is required by users before
by extending the UTAUT with the addition of trust as a main adoption of the cloud. Furthermore, security procedures and
construct. The results at the beginning showed some construct policy are essential items in cloud trust; users need to be
validity issues in the proposed model, and consequently, assured about various security aspects such as encryption,
the proposed model was revised and amended accordingly. authentication and the existence of audit systems before
Specifically, amendments were performed on trust and social adopting the cloud in their organisations. The reputation of
influence constructs, and all of the items with loading issues cloud providers plays a crucial role in the adoption of cloud
were removed. The proposed model was then tested in terms solutions. For instance, users would not trust a cloud provider
of validity and reliability, and the results showed a validated if the cloud provider had previous security or service
model. A high reliability of all of the constructs in the continuity incidents. On the contrary, users will most likely
model was presented (see Section 5). Furthermore, all of the be happy to adopt a cloud provider’s services if recognised
constructs demonstrated a good level for convergent and accreditation or certificates were presented.
discriminant validity; the AVE and CR values exceeded the This study has some limitations. First, besides trust,
recommended values for all of the constructs. only the main constructs of the UTAUT were examined.
In line with the results found in the literature, the obtained Moderating factors such as gender, age, experience and
results from this study indicated that performance expectancy administration level may have some effects on these constructs.
and facilitating conditions are vital factors for the adoption of Second, direct effects among constructs in the proposed model
cloud computing. This finding also complies with the original were investigated only where indirect effects were not
UTAUT model defined by Venkatesh. This means that users examined, which may lead to new findings. Third, the study
will most likely adopt cloud computing if the users are was conducted in Saudi Arabia, where cloud computing is still
reassured that the features offered by cloud computing will in its infancy, and restrictions are employed by the government
improve the quality and effectiveness of their work. Therefore, on the adoption of cloud computing, especially in terms of
it is highly recommended that users should be aware of cloud hosting government data outside the country. This means that
technical capabilities because this will positively affect the some users may not have experienced cloud computing
attitude of users towards using cloud computing. Furthermore, services in their organisations. Additionally, many responses
having the appropriate infrastructure, knowledge and support were deleted before starting the statistical analysis, which is
(Facilitating Conditions) to use the cloud would strongly affect most likely because some respondents faced difficulties in
the attitude of users towards the use of the cloud. Opposite to filling out the survey owing to unfamiliarity with English.
our expectation and contrary to the original UTAUT, our An Arabic/English survey would improve users’ responses.
results indicated that social influence and effort expectancy Owing to these limitations, we are currently working on a
are not critical factors to the adoption of cloud computing, further study that takes into consideration these limitations.
which means that organisations would not change their This work will mainly focus on moderating factors and how
attitude towards the use of cloud computing because other these moderating factors affect the relationships between
organisations think the use of cloud computing is important. constructs; indirect relationships will also be investigated.
In addition, users will not adopt cloud computing because
cloud computing is recommended to them by friends or other
important people. Ease of use and effort expectancy seem to 7 Conclusion
be surprisingly unimportant factors in the decision of users to
use cloud services. Similar results were also obtained by other It is predicted that cloud computing will shift the concept of
studies in the literature such as Nyembezi and Bayaga (2015) current information technology. Adopting such technology
and Bellaaj et al. (2015). However, such a result does not would improve business in various aspects such as cost
mean that the relationship between these constructs and reduction, disaster recovery, resource scalability and
intention to use the cloud does not exist at all. The effect is collaboration. However, prior studies have highlighted several
likely indirect and could be moderated by other factors such obstacles and challenges, particularly trust, that might prevent
as age and gender and will be investigated in future work. the adoption of such technology. Based on UTAUT, this paper
However, the obtained results indicated that trust has a aimed to investigate the effect of trust on users’ behavioural
significant effect on the intention to use cloud computing, intention to use cloud computing. An extended model was
meaning that it is a crucial factor to the adoption of cloud proposed. Data were collected using a web survey targeting
computing. In fact, trust in this study consisted of various users in private and government organisations. SEM was
aspects: security, service continuity and cloud provider. It applied to analyse the collected data using LISREL 9. The
was found that enterprises would not adopt cloud computing results confirmed the validity and goodness of fit of the
services and solutions until they were assured about the proposed model. Moreover, all of the constructs together
74 S. Alharbi

accounted for 70% of the variance in the attitude towards Cody-Allen, E. and Kishore, R. (2006) ‘An extension of the UTAUT
adopting cloud computing (R2 = 0.705). Trust was found to model with e-quality, trust, and satisfaction constructs’, Paper
presented at the Proceedings of the 2006 ACM SIGMIS CPR
significantly affect users’ behavioural intention to use cloud Conference on Computer Personnel Research: Forty Four Years
computing. Performance expectancy and facilitating conditions of Computer Personnel Research: Achievements, Challenges &
were also found to significantly affect users’ behavioural the Future, ACM, Claremont, CA, USA.
intention to use cloud computing. Social influence and effort Czekster, R.M., Gatti, C., Pilz, B. and Webber, T. (2016)
expectancy, conversely, were not found to significantly ‘Requirements for designing mobile and flexible applications for
affect the attitude of users towards the adoption of cloud online invasion detection and remote control’, International
computing. Generally, the present study contributes to the Journal of Computer Applications in Technology, Vol. 54, No. 2,
pp.138–149.
literature by extending the UTAUT to understand the effect
Dahlberg, T., Mallat, N. and Öörni, A. (2003) ‘Trust enhanced
of trust on the adoption of cloud computing solutions
technology acceptance model-consumer acceptance of mobile
regardless of the domain in which the UTAUT is adopted; payment solutions: tentative evidence’, Stockholm Mobility
the present study also has implications for existing academic Roundtable, Vol. 22, pp.22–23.
research and technical practices. Based on these findings, Diamantopoulos, A. and Siguaw, J.A. (2000) Introducing LISREL:
further research will be carried out to overcome the A Guide for the Uninitiated (Introducing Statistical Methods
limitations of this study as well as investigating mediations Series), 1st ed., Sage Publications Ltd., London.
and indirect effects. Emad, A-S. (2014) ‘Antecedents of trust in e-government services:
an empirical test in Jordan’, Transforming Government:
People, Process and Policy, Vol. 8, No. 4, pp.480–499.
References Fink, M.R., Ma, X. and Traue, H.C. (2015) ‘Trust in digital
technology: reliability and validity’, Paper presented at
AlAwadhi, S. and Morris, A. (2008) ‘The use of the UTAUT the International Symposium on Companion Technology,
model in the adoption of e-government services in Kuwait’, 23–25 September, Springer-Verlag, Berlin.
Paper presented at the Proceedings of the 41st Annual Hawaii
Foon, Y.S. and Fah, B.C.Y. (2011) ‘Internet banking adoption in
International Conference on System Sciences, 7–10 January,
Kuala Lumpur: an application of UTAUT model’, International
IEEE, Waikoloa, HI, USA.
Journal of Business and Management, Vol. 6, No. 4, pp.161–167.
Al-Ghazali, B.M., Rasli, A.M. and Yusoff, R.M. (2015) ‘A review
Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G.,
of theories on technology acceptance: the case of mobile
Patterson, D.A., Rabkin, A. and Stoica, I. (2009) Above the
banking user retention in Saudi Arabia’, Jurnal Teknologi,
Clouds: A Berkeley View of Cloud Computing, University of
Vol. 72, No. 5, pp.19–26.
California, Berkeley, CA.
Alrawashdeh, T.A., Muhairat, M.I. and Alqatawnah, S.M. (2012)
‘Factors affecting acceptance of web-based training system: Giunta, R., Messina, F., Pappalardo, G. and Tramontana, E. (2015)
using extended UTAUT and structural equation modeling’, ‘Enhancing applications with cloud services by means of
International Journal of Computer Science, Engineering and aspects’, International Journal of Computer Applications in
Information Technology, Vol. 2, No. 2, p.45. Technology, Vol. 51, No. 4, pp.273–282.
Alzahrani, M. and Goodwin, R. (2012) ‘Towards a UTAUT-based Hair Jr., J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2010)
model for the study of e-government citizen acceptance in Multivariate Data Analysis, 7 ed., Pearson India, New Delhi.
Saudi Arabia’, World Academy of Science, Engineering and Hannu, K., Akseli, L. and Petri, H. (2013) ‘Antecedents of
Technology, Vol. 64, pp.8–14. information technology trust and the effect of trust on
Arpaci, I. (2016) ‘Understanding and predicting students’ intention perceived performance improvement’, International Journal
to use mobile cloud storage services’, Computers in Human of Social and Organizational Dynamics in IT (IJSODIT),
Behavior, Vol. 58, pp.150–157. Vol. 3, No. 3, pp.17–32.
Attuquayefio, S.N. and Addo, H. (2014) ‘Using the UTAUT model Hennington, A. and Janz, B.D. (2007) ‘Information systems and
to analyze students’ ICT adoption’, International Journal of healthcare XVI: physician adoption of electronic medical
Education and Development Using Information and records: applying the UTAUT model in a healthcare context’,
Communication Technology, Vol. 10, No. 3, pp.75–86. Communications of the Association for Information Systems,
Vol. 19, No. 1, pp.60–80.
Bellaaj, M., Zekri, I. and Albugami, M. (2015) ‘The continued use
of e-learning system: an empirical investigation using Isabirye, N., Flowerday, S., Nanavati, A. and Von Solms, R.
UTAUT model at the University of Tabuk’, Journal of (2015) ‘Building technology trust in a rural agricultural
Theoretical & Applied Information Technology, Vol. 72, e-marketplace: a user requirements perspective’, The Electronic
No. 3, pp.464–474. Journal of Information Systems in Developing Countries,
Vol. 70, No. 4, pp.1–20.
Briz-Ponce, L. and García-Peñalvo, F.J. (2015) ‘An empirical
assessment of a technology acceptance model for apps in Jöreskog, K.G. and Sörbom, D. (1993) LISREL 8: Structural
medical education’, Journal of Medical Systems, Vol. 39, Equation Modeling with the SIMPLIS Command Language,
No. 11, pp.1–5. Scientific Software International, Hilllsdale, NJ.
Chen, J.V., Jubilado, R.J.M., Capistrano, E.P.S. and Yen, D.C. Kaufman, L.M. (2009) ‘Data security in the world of cloud
(2015) ‘Factors affecting online tax filing – an application of computing’, IEEE Security & Privacy, Vol. 7, No. 4, pp.61–64.
the IS success model and trust theory’, Computers in Human Khan, K.M. and Malluhi, Q. (2010) ‘Establishing trust in cloud
Behavior, Vol. 43, pp.251–262. computing’, IT Professional, Vol. 12, No. 5, pp.20–27.
An extended UTAUT model for understanding 75

Kijsanayotin, B., Pannarunothai, S. and Speedie, S.M. (2009) ‘Factors Oye, N.D., A.Iahad, N. and Ab.Rahim, N. (2012) ‘The history of
influencing health information technology adoption in Thailand’s UTAUT model and its impact on ICT acceptance and usage
community health centers: applying the UTAUT model’, by academicians’, Education and Information Technologies,
International Journal of Medical Informatics, Vol. 78, No. 6, Vol. 19, No. 1, pp.251–270.
pp.404–416. Ramgovind, S., Eloff, M.M. and Smith, E. (2010) ‘The management
Krautheim, F.J., Phatak, D.S. and Sherman, A.T. (2010) ‘Introducing of security in cloud computing’, Paper presented at the
the trusted virtual environment module: a new mechanism for Information Security for South Africa (ISSA), 2–4 August, IEEE,
rooting trust in cloud computing’, in Acquisti, A., Smith, S.W. Johannesburg, South Africa.
and Sadeghi, A-R. (Eds): Trust and Trustworthy Computing: Ratnasingam, P. (2002) ‘The importance of technology trust in web
Third International Conference, TRUST 2010, 21–23 June, services security’, Information Management & Computer
Springer Berlin, pp.211–227. Security, Vol. 10, No. 5, pp.255–260.
Lankton, N.K., McKnight, D.H. and Tripp, J. (2015) ‘Technology, Sabi, H.M., Uzoka, F-M.E., Langmia, K. and Njeh, F.N. (2016)
humanness, and trust: rethinking trust in technology’, Journal ‘Conceptualizing a model for adoption of cloud computing in
of the Association for Information Systems, Vol. 16, No. 10, education’, International Journal of Information Management,
pp.880–918. Vol. 36, No. 2, pp.183–191.
Lee, J-H. and Song, C-H. (2013) ‘Effects of trust and perceived Schaupp, L.C., Carter, L. and McBride, M.E. (2010) ‘E-file adoption:
risk on user acceptance of a new technology service’, Social a study of U.S. taxpayers’ intentions’, Computers in Human
Behavior and Personality: An International Journal, Vol. 41, Behavior, Vol. 26, No. 4, pp.636–644.
No. 4, pp.587–597.
Shiau, W-L. and Chau, P.Y.K. (2016) ‘Understanding behavioral
Li, Y. and Chang, K-C. (2012) ‘A study on user acceptance of cloud intention to use a cloud computing classroom: a multiple model
computing: a multi-theoretical perspective’, Proceedings of the comparison approach’, Information & Management, Vol. 53,
AMCIS, Association for Information Systems, Detroit, MI. No. 3, pp.355–365.
Lian, J-W. (2015) ‘Critical factors for cloud based e-invoice service Siau, K. and Shen, Z. (2003) ‘Building customer trust in
adoption in Taiwan: an empirical study’, International Journal of mobile commerce’, Communications of the ACM, Vol. 46, No. 4,
Information Management, Vol. 35, No. 1, pp.98–109. pp.91–94.
Lui, H.K. and Jamieson, R. (2003) ‘Integrating trust and risk Slade, E.L., Dwivedi, Y.K., Piercy, N.C. and Williams, M.D. (2015)
perceptions in business to consumer electronic commerce with ‘Modeling consumers’ adoption intentions of remote mobile
technology acceptance model’, ECIS 2003 Proceedings, Naples, payments in the United Kingdom: extending UTAUT with
Italy, p.60. innovativeness, risk, and trust’, Psychology & Marketing,
Menaka, E., Kumar, S.S. and Bharathi, M. (2015) ‘Cloud removal Vol. 32, No. 8, pp.860–873.
using efficient cloud detection and removal algorithm for high- Stieninger, M., Nedbal, D., Wetzlinger, W., Wagner, G. and
resolution satellite imagery’, International Journal of Computer Erskine, M.A. (2014) ‘Impacts on the organizational adoption
Applications in Technology, Vol. 51, No. 1, pp.54–61. of cloud computing: a reconceptualization of influencing
Min, Q., Ji, S. and Qu, G. (2008) ‘Mobile commerce user acceptance factors’, Procedia Technology, Vol. 16, pp.85–93.
study in China: a revised UTAUT model’, Tsinghua Science & Subashini, S. and Kavitha, V. (2011) ‘A survey on security issues
Technology, Vol. 13, No. 3, pp.257–264. in service delivery models of cloud computing’, Journal of
Mohammed, A., Steve, D., Thamer, A. and Rayed, A. (2012) ‘The Network and Computer Applications, Vol. 34, No. 1, pp.1–11.
impact of trust on e-government services acceptance: a study of Suh, B. and Han, I. (2002) ‘Effect of trust on customer acceptance
users’ perceptions by applying UTAUT model’, International of internet banking’, Electronic Commerce Research and
Journal of Technology Diffusion (IJTD), Vol. 3, No. 2, pp.50–61. Applications, Vol. 1, Nos. 3–4, pp.247–263.
Moon, Y-J. and Hwang, Y-H. (2016) ‘A study of effects of UTAUT- Taiwo, A.A., Mahmood, A.K. and Downe, A.G. (2012) ‘User
based factors on acceptance of smart health care services’, in acceptance of e-government: integrating risk and trust dimensions
Park, H.J.J., Chao, H-C., Arabnia, H. and Yen, Y.N. (Eds): with UTAUT model’, Paper presented at the 2012 International
Advanced Multimedia and Ubiquitous Engineering: Future Conference on Computer & Information Science (ICCIS),
Information Technology Volume 2, Springer, Berlin, pp.317–324. 12–14 June, IEEE, Kuala Lumpur, Malaysia.
Moryson, H. and Moeser, G. (2016) ‘Consumer adoption of cloud Takabi, H., Joshi, J.B. and Ahn, G-J. (2010) ‘Security and privacy
computing services in Germany: investigation of moderating challenges in cloud computing environments’, IEEE Security
effects by applying an UTAUT model’, International Journal & Privacy, Vol. 8, No. 6, pp.24–31.
of Marketing Studies, Vol. 8, No. 1, p.14. Tan, P.J.B. (2013) ‘Students’ adoptions and attitudes towards
Nunnally, J.C. and Bernstein, I. (1994) Elements of Statistical electronic placement tests: a UTAUT analysis’, American
Description and Estimation, McGraw-Hill, New York. Journal of Computer Technology and Application, Vol. 1, No. 1,
Nyembezi, N. and Bayaga, A. (2015) ‘The extent to which the pp.14–23.
determinants explain the usage of cloud computing’, Journal Tashkandi, A.N. and Al-Jabri, I.M. (2015) ‘Cloud computing adoption
of Communication, Vol. 6, No. 1, pp.129–136. by higher education institutions in Saudi Arabia: an exploratory
Orji, R. (2010) ‘Impact of gender and nationality on acceptance of a study’, Cluster Computing, Vol. 18, No. 4, pp.1527–1537.
digital library: an empirical validation of nationality based Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003)
UTAUT using SEM’, Journal of Emerging Trends in Computing ‘User acceptance of information technology: toward a unified
and Information Sciences, Vol. 1, No. 2, pp.68–79. view’, MIS Quarterly, Vol. 27, No. 3, pp.425–478.
76 S. Alharbi

Yadegaridehkordi, E., Iahad, N.A. and Asadi, S. (2015) ‘Cloud Zhou, T., Lu, Y. and Wang, B. (2010) ‘Integrating TTF and UTAUT
computing adoption behaviour: an application of the technology to explain mobile banking user adoption’, Computers in Human
acceptance model’, Journal of Soft Computing and Decision Behavior, Vol. 26, No. 4, pp.760–767.
Support Systems, Vol. 2, No. 2, pp.11–16. Zissis, D. and Lekkas, D. (2012) ‘Addressing cloud computing
Yu, C-S. (2012) ‘Factors affecting individuals to adopt mobile security issues’, Future Generation Computer Systems, Vol. 28,
banking: empirical evidence from the UTAUT model’, No. 3, pp.583–592.
Journal of Electronic Commerce Research, Vol. 13, No. 2,
pp.104–121.
Zhang, Q., Cheng, L. and Boutaba, R. (2010) ‘Cloud computing: Notes
state-of-the-art and research challenges’, Journal of Internet
Services and Applications, Vol. 1, No. 1, pp.7–18. 1 IDC Cloud Research four pillars research area, http://www.
idc.com/prodserv/4Pillars/cloud
Zhou, T. (2012) ‘Understanding users’ initial trust in mobile
banking: an elaboration likelihood perspective’, Computers in 2 IDC 2014 forecast, http://www.idc.com/getdoc.jsp?containerId
Human Behavior, Vol. 28, No. 4, pp.1518–1525. =prUS25219014

You might also like