Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Dihal, H. Bouwman, M. Reuver, M. Warnier, C. Carlsson (2013)
Mobile cloud computing: state of the art and outlookInfo, 15
J. Adjei, H. Olesen (2011)
Keeping Identity PrivateIEEE Vehicular Technology Magazine, 6
Won Kim (2009)
Cloud Computing: Today and TomorrowJ. Object Technol., 8
K. Kifayat, M. Merabti, Y. Younis (2012)
Secure Cloud Computing for Critical Infrastructure: A Survey
Nicholas Carr, W. Norton (2009)
The Big Switch: Rewiring the World, from Edison to GoogleJournal of Information Privacy and Security, 5
P. Mell, T. Grance (2011)
SP 800-145. The NIST Definition of Cloud Computing
J. Lewis, A. Weigert (1985)
Trust as a Social RealitySocial Forces, 63
R. Burt (1997)
The contingent value of social capital.Administrative Science Quarterly, 42
R. Mayer, J. Davis, F. Schoorman (1995)
An integrative model of organizational trust, Academy of Management Review, : ., 20
(2001)
th IFLA Council and General Conference August 16-25, 2001
P. Mell, T. Grance (2011)
The NIST Definition of Cloud Computing, 23
Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Anand Ghalsasi (2011)
Cloud Computing - The Business Perspective2011 44th Hawaii International Conference on System Sciences
M. Tongco (2007)
Purposive Sampling as a Tool for Informant SelectionEthnobotany Research and Applications, 5
J. Camenisch (2012)
Information privacy?!Comput. Networks, 56
Samuel Tweneboah-Koduah, Anthony Tsetse, B. Endicott-Popovsky (2014)
BARRIERS TO GOVERNMENT CLOUD ADOPTION: THE GHANAIAN PERSPECTIVEInternational Journal of Managing Information Technology, 6
Ronnie Caytiles, Byungjoo Park (2013)
Future Directions of Information and Telecommunication Systems Through the Technological Advancement Convergence
R. Mayer, J. Davis, F. Schoorman (1995)
An Integrative Model Of Organizational TrustAcademy of Management Review, 20
R. Schaller (1997)
Moore's law: past, present and futureIEEE Spectrum, 34
E. Deci, J. Connell, R. Ryan (1989)
Self-determination in a work organization.Journal of Applied Psychology, 74
Denzil Ferreira, Christian Koehler, E. Karapanos, V. Kostakos (2013)
Ubiquitous mobile instrumentationProceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
A. Goscinski, Michael Brock (2010)
Toward dynamic and attribute based publication, discovery and selection for cloud computingFuture Gener. Comput. Syst., 26
B. Rosen, T. Jerdee (1977)
Influence of subordinate characteristics on trust and use of participative decision strategies in a management simulation.Journal of Applied Psychology, 62
R. Yin (1984)
Case Study Research: Design and Methods
T. Grance, W. Jansen (2012)
Guidelines on Security and Privacy in Public Cloud Computing | NIST
J. Manyika, Michael Chui, J. Bughin, R. Dobbs, Peter Bisson, Alex Marrs (2013)
Disruptive technologies: Advances that will transform life, business, and the global economy
Atsede Woldie, R. Hinson, Habib Iddrisu, R. Boateng (2008)
Internet banking: an initial look at Ghanaian Bank Consumer PerceptionsBanks and Bank Systems, 3
L. Fry, D. Smith (1987)
Congruence, Contingency, and Theory BuildingAcademy of Management Review, 12
Acklesh Prasad, Peter Green, J. Heales (2013)
On governance structures for cloud resources and assessing their effectiveness
W. Jansen, T. Grance (2011)
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
J. Adjei (2013)
Towards a trusted national identities frameworkInfo, 15
Siani Pearson, Azzedine Benameur (2010)
Privacy, Security and Trust Issues Arising from Cloud Computing2010 IEEE Second International Conference on Cloud Computing Technology and Science
C. Low, Yahsueh Chen, Mingchang Wu (2011)
Understanding the determinants of cloud computing adoptionInd. Manag. Data Syst., 111
M. Weiser (1993)
Some computer science issues in ubiquitous computingCommun. ACM, 36
Diego Gambetta (2000)
Can We Trust Trust
James Anderson, James Narus (1990)
A Model of Distributor Firm and Manufacturer Firm Working PartnershipsJournal of Marketing, 54
Y. Wei, M. Brian, B. bullet (2010)
Service-Oriented Computing and Cloud Computing: Challenges and OpportunitiesIEEE Internet Computing, 14
Yazan Alshamaila, S. Papagiannidis, Feng Li (2013)
Cloud computing adoption by SMEs in the north east of England: A multi-perspective frameworkJ. Enterp. Inf. Manag., 26
Samuel Tweneboah-Koduah, Anthony Tsetse, B. Endicott-Popovsky (2014)
BARRIERS TO GOVERNMENT CLOUD ADOPTIONInternational Journal of Managing Information Technology, 6
Kevin Corley, Dennis Gioia (2011)
Building theory about theory building: What constitutes a theoretical contribution? Academy of Management Review, , ., 36
A. Cavoukian (2008)
Privacy in the cloudsIdentity in the Information Society, 1
Purpose – The purpose of this paper is to explain the role of trust in cloud computing services based on empirical evidence from interviewing executives of financial institutions in Ghana. The paper answers the questions: what is the role of trust in cloud computing service acquisition, and what policies promote trusted cloud computing services? Design/methodology/approach – This is an explanatory paper that is based on literature review and empirical data on exploring reasons for cloud computing service acquisitions. A combination of interviews and focus group discussions was used as methods for data collection. Information technology and electronic banking executives of five major commercial banks in Accra, Ghana, between January and July 2013 were interviewed. A total of ten respondents were interviewed, two in each of the selected banks. A purposive sampling technique was used in the selection of informants. This approach allows the selection of qualified informants to ensure extensiveness and diversity of opinion. Findings – Although previous literature proffers various factors as key to cloud computing adoption, uses or provisioning, this study brings trust to the fore as an imperative for cloud computing service acquisition by financial institutions. It also shows that trust increases if users perceive that cloud computing service providers act in honesty and in users’ interest, making trust a fundamental factor that informs financial institutions’ decision to acquire cloud computing services. Research limitations/implications – The research introduces a new dimension about the widely held perceptions of the factors that influence adoption of cloud computing services. Practical implications – Developers of cloud computing solutions that are targeted at corporate users must focus on systems that enhances their trustworthiness, as it is a primary criteria for user buy-in. Similarly, any trust-building effort by cloud computing service providers minimizes users’ concerns and pushes the services providers closer to the trust threshold. Originality/value – The paper outlines the trust factors that are imperative for cloud computing uses by financial institutions. This is one of the pioneering papers that address trust issues in cloud computing from the perspective of financial institutions.
Info – Emerald Publishing
Published: Jan 12, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.