Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents

Published: 24 June 2016 Publication History

Abstract

Trust is an important facilitator for successful business relationships and an important technology adoption determinant. However, thus far trust has received little attention in the context of cloud computing, resulting in a lack of understanding of the dimensions of trust in cloud services and trust-building antecedents. Although the literature provides various conceptual models of trust for contexts related to cloud computing that may serve as a reference, in particular trust in IT outsourcing providers and trust in IT artifacts, idiosyncrasies of trust in cloud computing require a novel conceptual model of trust. First, a cloud service has a dual nature of being an IT artifact and a service provided by an organization. Second, cloud services are offered in impersonal cloud marketplaces and build upon a nested network of cloud services within the cloud ecosystem. In this article, we first analyze the concept of trust in cloud contexts. Next, we develop a conceptual model that describes trust in cloud services. The conceptual model incorporates the duality of trust in a cloud provider organization and trust in an IT artifact, as well as trust types for the impersonal environment and the cloud computing ecosystem. Using the conceptual model as a lens we then review 43 empirical studies on trust in IT outsourcing and trust in IT artifacts that were identified by a structured literature search. The resulting conceptual model provides a conceptual typology of constructs for trust in cloud services, defines trust-building antecedents, and develops 19 propositions describing the relationships between trust constructs and between trust constructs and trust-building antecedents. The conceptual model contributes to research by creating grounds for future theory-building on trust in cloud contexts, integrating two previously disjoint strands in the trust literature, and identifying knowledge gaps. Based on the conceptual model, we furthermore provide practical advice for managers from service providers, platform providers, customers, and institutional authorities.

References

[1]
AIS (2011). "Senior Scholars' Basket of Journals.". Available online at http://home.aisnet.org/displaycommon.cfm?an=1&subarticlenbr=346 (access: 6/29/2012).
[2]
Al-Natour, S., Benbasat, I., and Cenfetelli, R. (2011). "The Adoption of Online Shopping Assistants: Perceived Similarity as an Antecedent to Evaluative Beliefs." Journal of the Association for Information Systems, Vol. 12, No. 5: pp. 347--374.
[3]
Amazon Web Services (2014). "AWS Products & Services." Available online at http://aws.amazon.com/products (access: 5/20/2014).
[4]
Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R., Joseph, A. D. et al. (2010). "A View of Cloud Computing." Communications of the ACM, Vol. 53, No. 4: pp. 50--58.
[5]
Ashleigh, M. J., and Nandhakumar, J. (2007). "Trust and technologies: Implications for organizational work practices." Decision Support Systems, Vol. 43, No. 2: pp. 607--617.
[6]
Bardhan, I. R., Demirkan, H., Kannan, P. K., Kauffman, R. J., and Sougstad, R. (2010). "An Interdisciplinary Perspective on IT Services Management and Service Science." Journal of Management Information Systems, Vol. 26, No. 4: pp. 13--64.
[7]
Bekmamedova, N., Prananto, A., McKay, J., and Vorobiev, A. (2008). "Towards a Conceptualisation of Trust in IS Outsourcing." Proceedings of the 29th International Conference on Information Systems (ICIS 2008), Paris, France.
[8]
Benlian, A., and Hess, T. (2011). "Opportunities and risks of software-as-a-service: Findings from a survey of IT executives." Decision Support Systems, Vol. 52, No. 1: pp. 232--246.
[9]
Carr, C. L. (2006). "Reciprocity: The Golden Rule of IS-User Service Relationship Quality and Cooperation." Communications of the ACM, Vol. 49, No. 6: pp. 77--83.
[10]
Cassell, J., and Bickmore, T. (2000). "External Manifestations of Trustworthiness in the Interface." Communications of the ACM, Vol. 43, No. 12: pp. 50--56.
[11]
Chandra, S., Srivastava, S., and Theng, Y.-L. (2010). "Evaluating the Role of Trust in Consumer Adoption of Mobile Payment Systems: An Empirical Analysis." Communications of the Association for Information Systems, Vol. 27, No.
[12]
Dibbern, J., Goles, T., Hirschheim, R., and Jayatilaka, B. (2004). "Information Systems Outsourcing: A Survey and Analysis of the Literature." ACM SIGMIS - Database for Advances in Information Systems, Vol. 35, No. 4: pp. 6--102.
[13]
Doney, P. M., and Cannon, J. P. (1997). "An Examination of the Nature of Trust in Buyer-Seller Relationships." Journal of Marketing, Vol. 61, No. 2: pp. 35--51.
[14]
Doney, P. M., Cannon, J. P., and Mullen, M. R. (1998). "Understanding the Influence of National Culture on the Development of Trust." Academy of Management Review, Vol. 23, No. 3: pp. 601--620.
[15]
Fishbein, Martin; Ajzen, Icek (1975). "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research." Reading, MA: Addison-Wesley.
[16]
Garrison, G., Kim, S., and Wakefield, R. L. (2012). "Success Factors for Deploying Cloud Computing." Communications of the ACM, Vol. 55, No. 9: pp. 62.
[17]
Gartner Research (2012a). "Forecast Overview: Public Cloud Services, Worldwide, 2011--2016, 2Q12 Update Forecast Overview: Public Cloud Serv Worldwide, 2011--2016, 2Q12 Update." (access: 6/11/2013).
[18]
Gartner Research (2012b). "Gartner Says That Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016." Available online at http://www.gartner.com/newsroom/id/2060215 (access: 11/13/2012).
[19]
Gefen, D. (2004). "What Makes an ERP Implementation Relationship Worthwhile: Linking Trust Mechanisms and ERP Usefulness." Journal of Management Information Systems, Vol. 21, No. 1: pp. 263--288.
[20]
Gefen, D., Benbasat, I., and Pavlou, P. A. (2008a). "A Research Agenda for Trust in Online Environments." Journal of Management Information Systems, Vol. 24, No. 4: pp. 275--286.
[21]
Gefen, D., Karahanna, E., and Straub, D. W. (2003). "Trust and TAM in Online Shopping: An Integrated Model." MIS Quarterly, Vol. 27, No. 1: pp. 51--90.
[22]
Gefen, D., Pavlou, P. A., Benbasat, I., McKnight, D. H., Stewart, K., and Straub, D. W. (2006). "ICIS Panel Summary: Should Institutional Trust Matter in Information Systems Research?" Communications of the Association for Information Systems, Vol. 17, No. 1: pp. 205--222.
[23]
Gefen, D., Wyss, S., and Lichtenstein, Y. (2008b). "Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts." MIS Quarterly, Vol. 32, No. 3: pp. 531--542.
[24]
Goo, J., and Huang, C. D. (2008). "Facilitating Relational Governance Through Service Level Agreements in IT Outsourcing: An Application of the Commitment-Trust Theory." Decision Support Systems, Vol. 46, No. 1: pp. 216--232.
[25]
Goo, J., Kishore, R., Rao, H. R., and Nam, K. (2009). "The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study." MIS Quarterly, Vol. 33, No. 1: pp. 119--145.
[26]
Google (2014). "Google Apps Marketplace." Available online at http://www.google.com/enterprise/marketplace (access: 5/19/2014).
[27]
Gregory, R., Prifling, M., and Beck, R. (2009). "The Role of Cultural Intelligence for the Emergence of Negotiated Culture in IT Offshore Outsourcing Projects." Information Technology & People, Vol. 22, No. 3: pp. 223--241.
[28]
Grover, V., Myun Joong Cheon, and Teng, J. T. C. (1996). "The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions." Journal of Management Information Systems, Vol. 12, No. 4: pp. 89--116.
[29]
Heart, T. (2010). "Who is Out There? Exploring the Effects of Trust and Perceived Risk on Saas Adoption Intentions." ACM SIGMIS - Database for Advances in Information Systems, Vol. 41, No. 3: pp. 49--68.
[30]
Heiskanen, A., Newman, M., and Eklin, M. (2008). "Control, Trust, Power, and the Dynamics of Information System Outsourcing Relationships: A Process Study of Contractual Software Development." Journal of Strategic Information Systems, The, Vol. 17, No. 4: pp. 268--286.
[31]
Hess, T. J., Fuller, M. A., and Campbell, D. (2009). "Designing Interfaces with Social Presence: Using Vividness and Extraversion to Create Social Recommendation Agents." Journal of the Association for Information Systems, Vol. 10, No. 12: pp. 889--919.
[32]
Iyer, B., and Henderson, J. C. (2010). "Preparing for the Future - Understanding the Seven Capabilities of Cloud Computing." MIS Quarterly Executive, Vol. 9, No. 2: pp. 117--131.
[33]
Janowicz, M., and Noorderhaven, N. (2006), Levels of Inter-Organizational Trust: Conceptualization and Measurement. In R. Bachmann, A. Zaheer (Eds.), Handbook of Trust Research, Cheltenham, UK, Northampton, MA: Edward Elgar: pp. 264--279.
[34]
Jarvenpaa, S. L., Shaw, T. R., and Staples, D. S. (2004). "Toward Contextualized Theories of Trust: The Role of Trust in Global Virtual Teams." Information Systems Research, Vol. 15, No. 3: pp. 250--267.
[35]
Kelly, S., and Noonan, C. (2008). "Anxiety and psychological security in offshoring relationships: the role and development of trust as emotional commitment." Journal of Information Technology, Vol. 23, No. 4: pp. 232--248.
[36]
Khan, K. M., and Malluhi, Q. (2013). "Trust in Cloud Services: Providing More Controls to Clients." Computer, Vol. 46, No. 7: pp. 94--96.
[37]
Kim, G., Shin, B., and Lee, H. G. (2009). "Understanding dynamics between initial trust and usage intentions of mobile banking." Information Systems Journal, Vol. 19, No. 3: pp. 283--311.
[38]
Kim, M.-S., and Ahn, J.-H. (2007). "Management of trust in the e-marketplace: the role of the buyer's experience in building trust." Journal of Information Technology, Vol. 22, No. 2: pp. 119--132.
[39]
Komiak, S. X., and Benbasat, I. (2004). "Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce." Information Technology and Management, Vol. 5, No. 1/2: pp. 181--207.
[40]
Komiak, S. Y. X., and Benbasat, I. (2006). "The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents." MIS Quarterly, Vol. 30, No. 4: pp. 941--960.
[41]
Komiak, S. Y. X., and Benbasat, I. (2008). "A Two-Process View of Trust and Distrust Building in Recommendation Agents: A Process-Tracing Study." Journal of the Association for Information Systems, Vol. 9, No. 12: pp. 727--747.
[42]
Lacity, M. C., Khan, S., Yan, A., and Willcocks, L. P. (2010). "A review of the IT outsourcing empirical literature and future research directions." Journal of Information Technology, Vol. 25, No. 4: pp. 395--433.
[43]
Lander, M. C., Purvis, R. L., McCray, G. E., and Leigh, W. (2004). "Trust-building Mechanisms Utilized in Outsourced IS Development Projects: A Case Study." Information & Management, Vol. 41, No. 4: pp. 509--528.
[44]
Lankton, N. K., and McKnight, D. H. (2011). "What Does it Mean to Trust Facebook? Examining Technology and Interpersonal Trust Beliefs." ACM SIGMIS - Database for Advances in Information Systems, Vol. 42, No. 2: pp. 32--54.
[45]
Lee, C. B. P., and Wan, G. (2010). "Including Subjective Norm and Technology Trust in the Technology Acceptance Model: A Case of E-Ticketing in China." ACM SIGMIS - Database for Advances in Information Systems, Vol. 41, No. 4: pp. 40--51.
[46]
Lee, J. D., and See, K. A. (2004). "Trust in Automation: Designing for Appropriate Reliance." Human Factors, Vol. 46, No. 1: pp. 50--80.
[47]
Lee, J.-N., and Choi, B. (2011). "Effects of Initial and Ongoing Trust in IT Outsourcing: A Bilateral Perspective." Information & Management, Vol. 48, No. 2--3: pp. 96--105.
[48]
Lee, J.-N., Huynh, M. Q., and Hirschheim, R. (2008). "An Integrative Model of Trust on IT Outsourcing: Examining a Bilateral Perspective." Information Systems Frontiers, Vol. 10, No. 2: pp. 145--163.
[49]
Lee, J.-N., and Kim, Y.-G. (1999). "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation." Journal of Management Information Systems, Vol. 15, No. 4: pp. 29--61.
[50]
Leimeister, S., Böhm, M., Riedl, C., and Krcmar, H. (2010). "The Business Perspective of Cloud Computing: Actors, Roles and Value Networks." Proceedings of the 18th European Conference on Information Systems, Pretoria, South Africa.
[51]
Lewicki, R. J., McAllister, D. J., and Bies, R. J. (1998). "Trust and Distrust: New Relationships and Realities." Academy of Management Review, Vol. 23, No. 3: pp. 438--458.
[52]
Li, D., Browne, G. J., and Wetherbe, J. C. (2006). "Why Do Internet Users Stick with a Specific Web Site? A Relationship Perspective." International Journal of Electronic Commerce, Vol. 10, No. 4: pp. 105--141.
[53]
Li, X., Hess, T. J., and Valacich, J. S. (2008). "Why do we trust new technology? A study of initial trust formation with organizational information systems." Journal of Strategic Information Systems, The, Vol. 17, No. 1: pp. 39--71.
[54]
Lim, J. (2004). "The Role of Power Distance and Explanation Facility in Online Bargaining Utilizing Software Agents." Journal of Global Information Management, Vol. 12, No. 2: pp. 27--43.
[55]
Lippert, S. K. (2007). "Investigating Postadoption Utilization: An Examination Into the Role of Interorganizational and Technology Trust." IEEE Transactions on Engineering Management, Vol. 54, No. 3: pp. 468--483.
[56]
Luftman, J., Zadeh, H. S., Derksen, B., Santana, M., Rigoni, E. H., and Huang, Z. ((2013). "Key information technology and management issues 2012--2013: an international study." Journal of Information Technology, Vol. 28, No. 4: pp. 354--366.
[57]
Mao, J.-Y., Lee, J.-N., and Deng, C.-P. (2008). "Vendors? perspectives on trust and control in offshore information systems outsourcing." Information & Management, Vol. 45, No. 7: pp. 482--492.
[58]
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., and Ghalsasi, A. (2011). "Cloud Computing - The Business Perspective." Decision Support Systems, Vol. 51, No. 1: pp. 176--189.
[59]
Mayer, R. C., Davis, J. H., and Schoorman, F. (1995). "An Integrative Model of Organizational Trust." Academy of Management Review, Vol. 20, No. 3: pp. 709--734.
[60]
McKnight, D. H. (2005), Trust in Information Technology. In G. B. Davis (Ed.), The Blackwell Encyclopedia of Management, Vol. 7: Management Information Systems, Maiden, MA: Blackwell: pp. 329--331.
[61]
McKnight, D. H., Carter, M., Thatcher, J. B., and Clay, P. F. (2011). "Trust in a Specific Technology: An Investigation of Its Components and Measures." ACM Transactions on Management Information Systems, Vol. 2, No. 2: pp. 1--25.
[62]
McKnight, D. H., and Chervany, N. L. (2001). "What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology." International Journal of Electronic Commerce, Vol. 6, No. 2: pp. 35--59.
[63]
McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology." Information Systems Research, Vol. 13, No. 3: pp. 334--359.
[64]
McKnight, D. H., Cummings, L. L., and Chervany, N. L. (1998). "Initial Trust Formation in New Organizational Relationships." Academy of Management Review, Vol. 23, No. 3: pp. 473--490.
[65]
Mell, P., and Grance, T. (2011). "The NIST Definition of Cloud Computing." NIST Special Publication 800--145. National Institute of Standards and Technology. Gaithersburg.
[66]
Microsoft (2012). "Windows Azure Marketplace." Available online at https://datamarket.azure.com (access: 5/26/2012).
[67]
Montoya, M. M., Massey, A. P., and Khatri, V. (2010). "Connecting IT Services Operations to Services Marketing Practices." Journal of Management Information Systems, Vol. 26, No. 4: pp. 65--85.
[68]
Nicolaou, A. I., and McKnight, D. H. (2006). "Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use." Information Systems Research, Vol. 17, No. 4: pp. 332--351.
[69]
NIST (2013). "NIST Cloud Computing Standards Roadmap." Special Publication 500--291, Version 2. National Institute of Standards and Technology (access: 5/20/2014).
[70]
Olfman, L., and Kim, D. (2011). "Determinants of Corporate Web Services Adoption: A Survey of Companies in Korea." Communications of the Association for Information Systems, Vol. 29, No. 1: pp. 1--24.
[71]
Park, J. Y., Im, K. S., and Kim, J. S. (2011). "The Role of IT Human Capability in the Knowledge Transfer Process in IT Outsourcing Context." Information & Management, Vol. 48, No. 1: pp. 53--61.
[72]
Pavlou, P. A. (2002). "Institution-based Trust in Interorganizational Exchange Relationships: the Role of Online B2B Marketplaces on Trust Formation." Journal of Strategic Information Systems, The, Vol. 11, No. 3--4: pp. 215--243.
[73]
Pavlou, P. A., and Gefen, D. (2004). "Building Effective Online Marketplaces with Institution-Based Trust." Information Systems Research, Vol. 15, No. 1: pp. 37--59.
[74]
Rai, A., Maruping, L. M., and Venkatesh, V. (2009). "Offshore Information Systems Project Success: The Role of Social Embeddedness and Cultural Characteristics." MIS Quarterly, Vol. 33, No. 3: pp. 617--641.
[75]
Ray, S., Ow, T., and Kim, S. S. (2011). "Security Assurance: How Online Service Providers Can Influence Security Control Perceptions and Gain Trust." Decision Sciences, Vol. 42, No. 2: pp. 391--412.
[76]
Reeves, Byron; Nass, Clifford (1996). "How People Treat Computers, Television, and New Media Like Real People and Places.". New York, NY: Cambridge University Press ).
[77]
Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. (1998). "Not So Different After All - A Cross-Discipline View of Trust." Academy of Management Review, Vol. 23, No. 3: pp. 393--404.
[78]
Rustagi, S., King, W. R., and Kirsch, L. J. (2008). "Predictors of Formal Control Usage in IT Outsourcing Partnerships." Information Systems Research, Vol. 19, No. 2: pp. 126--143.
[79]
Sabherwal, R. (1999). "The Role of Trust in Outsourced IS Development Projects." Communications of the ACM, Vol. 42, No. 2: pp. 80--86.
[80]
Salesforce (2012). "trust.salesforce.com." Available online at http://trust.salesforce.com (access: 2/8/2012).
[81]
Salesforce (2014). "AppExchange." Available online at http://appexchange.salesforce.com (access: 5/19/2014).
[82]
Saunders, C. (2005). "MIS Journal Rankings." Available online at http://aisnet.org/?JournalRankings (access: 6/29/2012).
[83]
Schneider, S., and Sunyaev, A. (2016). "Determinant Factors of Cloud-Sourcing Decisions: reflecting on the IT Outsourcing Literature in the Era of Cloud Computing." Journal of Information Technology, Vol. 31, No. 1: pp. 1--31.
[84]
SpotCloud (2012). "SpotCoud - Cloud Capacity Clearing House." Available online at http://spotcloud.com (access: 2/10/2012).
[85]
Sunyaev, A., and Schneider, S. (2013). "Cloud Services Certification." Communications of the ACM, Vol. 56, No. 2: pp. 33--36.
[86]
Tan, Y.-H., and Thoen, W. (2000). "Toward a Generic Model of Trust for Electronic Commerce." International Journal of Electronic Commerce, Vol. 5, No. 2: pp. 61--74.
[87]
Teo, T. S., Srivastava, S. C., and Jiang, L. (2008). "Trust and Electronic Government Success: An Empirical Study." Journal of Management Information Systems, Vol. 25, No. 3: pp. 99--132.
[88]
Thatcher, J. B., Loughry, M. L., Lim, J., and McKnight, D. H. (2007). "Internet anxiety: An empirical study of the effects of personality, beliefs, and social support." Information & Management, Vol. 44, No. 4: pp. 353--363.
[89]
Thatcher, J. B., McKnight, D. H., Baker, E. W., Arsal, R. E., and Roberts, N. H. (2011). "The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems." IEEE Transactions on Engineering Management, Vol. 58, No. 1: pp. 56--70.
[90]
Thong, J. Y. L., Venkatesh, V., Brown, S. A., Hu, P. J.-H., and Tam, K. (2010). "Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology." Journal of the Association for Information Systems, Vol. 11, No. 10.
[91]
Tripp, J., McKnight, D. H., and Lankton, N. K. (2011). "Degrees of Humanness in Technology: What Type of Trust Matters?" Proceedings of the 17th Americas Conference on Information Systems (AMCIS 2011), Detroit, Michigan.
[92]
Vance, A., Elie-Dit-Cosaque, C., and Straub, D. W. (2008). "Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture." Journal of Management Information Systems, Vol. 24, No. 4: pp. 73--100.
[93]
Venkatesh, S., Urban, G. L., and Sultan, F. (2002). "Online trust: a stakeholder perspective, concepts, implications, and future directions." Journal of Strategic Information Systems, The, Vol. 11, No. 3--4: pp. 325--344.
[94]
Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J.-H., and Brown, S. A. (2011). "Extending the Two-Stage Information Systems Continuance Model: Incorporating UTAUT Predictors and the role of context." Information Systems Journal, Vol. 21, No. 6: pp. 527--555.
[95]
Venters, W., and Whitley, E. A. (2012). "A critical review of cloud computing: researching desires and realities." Journal of Information Technology, Vol. 27, No. 3: pp. 179--197.
[96]
Wang, W., and Benbasat, I. (2005). "Trust in and Adoption of Online Recommendation Agents." Journal of the Association for Information Systems, Vol. 6, No. 3: pp. 72--101.
[97]
Wang, W., and Benbasat, I. (2008). "Attributions of Trust in Decision Support Technologies: A Study of Recommendation Agents for E-Commerce." Journal of Management Information Systems, Vol. 24, No. 4: pp. 249--273.
[98]
Webster, J., and Watson, R. T. (2002). "Analyzing the Past to Prepare for the Future: Writing a Literature Review." MIS Quarterly, Vol. 26, No. 2: pp. xiii--xxiii.
[99]
Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T., Michalk, W., and Stößer, J. (2009). "Cloud Computing -- A Classification, Business Models, and Research Directions." Business & Information Systems Engineering, Vol. 1, No. 5: pp. 391--399.
[100]
Westner, M., and Strahringer, S. (2010). "Determinants of success in IS offshoring projects: Results from an empirical study of German companies." Information & Management, Vol. 47, No. 5/6: pp. 291--299.
[101]
Wixom, B. H., and Todd, P. A. (2005). "A Theoretical Integration of User Satisfaction and Technology Acceptance." Information Systems Research, Vol. 16, No. 1: pp. 85--102.
[102]
Wu, W.-W., Lan, L. W., and Lee, Y.-T. (2011). "Exploring decisive factors affecting an organization's SaaS adoption: A case study." International Journal of Information Management, Vol. 31, No. 6: pp. 556--563.
[103]
Yao, Y., and Murphy, L. (2005). "A State-Transition Approach to Application Service Provider Client-Vendor Relationship Development." ACM SIGMIS - Database for Advances in Information Systems, Vol. 36, No. 3: pp. 8--25.
[104]
Zaheer, A., McEvily, B., and Perrone, V. (1998). "Does Trust Matter - Exploring the Effects of Interorganizational and Interpersonal Trust on Performance." Organization Science, Vol. 9, No. 2: pp. 141--159.
[105]
Zucker, L. G. (1986). "Production of Trust: Institutional Sources of Economic Structure, 1840-1920." Research in Organizational Behavior, Vol. 8: pp. 53--111.

Cited By

View all
  • (2024)A Multi-Layered Trust Model in the Internet of Things Smart Home Ecosystem2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)10.1109/WINCOM62286.2024.10655530(1-7)Online publication date: 23-Jul-2024
  • (2024)Systematic Literature Review of Cloud Computing Research Between 2010 and 2023Digital Transformation in the Viral Age10.1007/978-3-031-60003-6_5(64-88)Online publication date: 21-May-2024
  • (2023)Adoption of Cloud Computing in the organizations: a bibliometric analysis of this technology within a digital transformation contextRevista de Administração da UFSM10.5902/198346597532616:3(e1)Online publication date: 3-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGMIS Database: the DATABASE for Advances in Information Systems
ACM SIGMIS Database: the DATABASE for Advances in Information Systems  Volume 47, Issue 2
May 2016
88 pages
ISSN:0095-0033
EISSN:1532-0936
DOI:10.1145/2963175
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2016
Published in SIGMIS Volume 47, Issue 2

Check for updates

Author Tags

  1. cloud computing
  2. conceptual
  3. it artifact
  4. it outsourcing
  5. trust

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)72
  • Downloads (Last 6 weeks)12
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Multi-Layered Trust Model in the Internet of Things Smart Home Ecosystem2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)10.1109/WINCOM62286.2024.10655530(1-7)Online publication date: 23-Jul-2024
  • (2024)Systematic Literature Review of Cloud Computing Research Between 2010 and 2023Digital Transformation in the Viral Age10.1007/978-3-031-60003-6_5(64-88)Online publication date: 21-May-2024
  • (2023)Adoption of Cloud Computing in the organizations: a bibliometric analysis of this technology within a digital transformation contextRevista de Administração da UFSM10.5902/198346597532616:3(e1)Online publication date: 3-Aug-2023
  • (2023)Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspectiveJournal of Enterprise Information Management10.1108/JEIM-07-2022-022736:6(1583-1609)Online publication date: 22-Sep-2023
  • (2023)An investigation of causes and effects of trust in Boundary ArtefactsInformation and Software Technology10.1016/j.infsof.2023.107170158(107170)Online publication date: Jun-2023
  • (2023)Examining the case of French hesitancy toward IDaaS solutions: Technical and social contextual factors of the organizational IDaaS privacy calculusInformation & Management10.1016/j.im.2023.10377960:4(103779)Online publication date: Jun-2023
  • (2022)Probing Determinants Affecting Intention to Adopt Cloud Technology in E-Government SystemsSustainability10.3390/su14231559014:23(15590)Online publication date: 23-Nov-2022
  • (2022)Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT)Computational Intelligence and Neuroscience10.1155/2022/97668442022Online publication date: 1-Jan-2022
  • (2022)Trust in artificial intelligence: From a Foundational Trust Framework to emerging research opportunitiesElectronic Markets10.1007/s12525-022-00605-432:4(1993-2020)Online publication date: 28-Nov-2022
  • (2022)Natural disasters management using social internet of thingsMultimedia Tools and Applications10.1007/s11042-021-11486-881:24(34447-34461)Online publication date: 1-Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media