Refine your search
Collections
Co-Authors
Journals
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
T, Mohanasundaram
- Cloud Computing in a Realm of Ever-Increasing Diverse Consumer Expectations Towards Security Challenges that Impact Consumer’s Loyalty: A Data Driven Approach
Abstract Views :81 |
PDF Views:0
Authors
Affiliations
1 Research Scholar, IN
2 Associate professor2, Department of Management Studies, Ramaiah Institute of Technology, Bengaluru, Karnataka, India 560054., IN
1 Research Scholar, IN
2 Associate professor2, Department of Management Studies, Ramaiah Institute of Technology, Bengaluru, Karnataka, India 560054., IN
Source
Journal of Mines, Metals and Fuels, Vol 71, No 3 (2023), Pagination: 464 - 472Abstract
Cloud computing had become the new paradigm of the future, as it is the most widely used of all the technologies which are available, allowing consumers to readily maneuver their innovative digital demands. In this study, it is revealed that consumers’ expectations are more inclined towards data security and challenges associated with it but, data storage location was not found too much of importance in consumers mind. Furthermore, terms of service agreement between consumer and cloud service provider with declaration of rights was found to be having an anchoring effect on consumer loyalty. This security level perception in consumers mind was a raised due threat created by cyber hackers, data leaks, data misuse and extortion that frequently happened now and then, these events had spurred negative security and threat perception in minds of consumers. The sample size used in the study for consumer survey is 147. The sample unit consist of consumers and employees working on cloud platforms, regular users of cloud services. Consumers are however expecting a robust security measures with more security practices and also expect more clarity in service agreements terms and conditions, as it clear from our study that 32.3% consumers tend to read those lengthy instruction manuals and also those long cloud service providers service agreements, due to which they end up with correct choices. Results confirms that addressing diverse consumer’s expectation towards security challenges positively influences consumer’s loyalty.Keywords
Cloud computing, security expectation, consumer loyalty, data, CSP, data location1References
- Singh, R. (2021): Cloud computing and Covid-19. 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, 552–557. https://doi.org/ 10.1109/ICSPC51351.2021.9451792
- Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $500 Billion in 2022. (n.d.). Retrieved May 28, 2022, from https://www.gartner.com/en/ newsroom/press-releases/2022-04-19-gartner-forecastsworldwide-public-cloud-end-user-spending-to-reachnearly-500-billion-in-2022 (accessed May 28, 2022).
- Rob Barry and Dustin Volz. (n.d.). Ghosts in the Clouds: Inside China’s Major Corporate Hack. Retrieved May 23, 2022, from https://robbarry.org/assets/pdfs/Ghosts in the Clouds.pdf
- Popoviæ, K., & Hocenski, •. (2010): Cloud computing security issues and challenges.
- Zissis, D., & Lekkas, D. (2012): Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/ J.FUTURE.2010.12.006
- Vemula, D. H. L., Khichi, T., Murugesan, G., ValderramaPlasencia, L., Salazar-Gonzales, M., & Ventayen, R. J. M. (2022): Role of cloud computing and its impact on consumer behavior in financial sector. Materials Today: Proceedings, 51, 2190–2193. https://doi.org/10.1016/ J.MATPR.2021.11.146
- Chen, Y., Paxson, V., & Katz, R. H. (2010): What’s New About Cloud Computing Security? http://www.eecs.berkeley.edu/ Pubs/TechRpts/2010/EECS-2010-5.html.
- Lee, J. H., Park, M. W., Eom, J. H., and Chung, T. M. (2011, February): Multi-level intrusion detection system and log management in cloud computing. In 13th International Conference on Advanced Communication Technology (ICACT2011) (pp. 552-555). IEEE.
- Khan, A. W., Khan, M. U., Khan, J. A., Ahmad, A., Khan, K., Zamir, M., Kim, W. and Ijaz, M. F. (2021): Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach. IEEE Access, 9, 107309–107332.
- Vatsa, M., Rastogi, S., Tiwari, A., & Jain, S. (2021): Impacts of Cloud Computing in Digital Marketing. Proceedings of the 5th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2021, 1170–1174.
- Jyothi, R. N. S., Sireesha, J., Mahitha, A., Ruchitha, B. and Deepthi, E. (2022): Protection and Saving of Delicate Data by using Cloud Computing. 2022 International Conference on Electronics and Renewable Systems (ICEARS), 1660– 1667. https://doi.org/10.1109/ICEARS53579.2022.9752329.
- Alshammari, M. M. (2020): Psychological Dimensions in Trust-Based Models in Cloud Computing. Proceedings 2020 19th Distributed Computing and Applications for Business Engineering and Science, DCABES 2020, 87–91.https://doi.org/10.1109/DCABES50732.2020.00031
- Aljumah, A., & Ahanger, T. A. (2018): Fog computing and security issues: A review. 2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings, 237–239. https://doi.org/ 10.1109/ICCCC.2018.8390464
- Hay, B., Nance, K., & Bishop, M. (2011): Storm clouds rising: Security challenges for IaaS cloud computing. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.1109/ HICSS.2011.386
- Rodero-Merino, L., Vaquero, L. M., Caron, E., Muresan, A., & Desprez, F. (2012): Building safe PaaS clouds: A survey on security in multitenant software platforms. Computers & Security, 31(1), 96–108. https://doi.org/ 10.1016/J.COSE.2011.10.006
- Hawedi, M., Talhi, C., & Boucheneb, H. (2018): Security as a Service for Public Cloud Tenants(SaaS). Procedia Computer Science, 130, 1025–1030. https://doi.org/ 10.1016/J.PROCS.2018.04.143
- Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062
- Tiwari, P. K., & Mishra, B. (2012): Cloud computing security issues, challenges and solution. International journal of emerging technology and advanced engineering, 2(8), 306-310.
- Ahmed, A.A., & Hussan, M.I.T. (2018): Adnaan Arbaaz Ahmed, B.Tech Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus.Guru Nanak Institutions Technical Campus, 7(4). https:// www.researchgate.net/publication/33968866.
- Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062
- Doshi, R., & Kute, V. (2020): A Review Paper on Security Concerns in Cloud Computing and Proposed Security Models. International Conference on Emerging Trends in Information Technology and Engineering, Ic-ETITE 2020. https://doi.org/10.1109/IC-ETITE47903.2020.37
- Barona, R., & Anita, E. A. M. (2017): A survey on data breach challenges in cloud computing security: Issues and threats. Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017. https://doi.org/10.1109/ICCPCT.2017.8074287.