Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity

Authors

  • Sandesh Achar Application Management Advisor, Dell Technologies, Round Rock, Texas, USA

DOI:

https://doi.org/10.18034/ei.v4i2.633

Keywords:

Technological Complexity, Cloud Computing, SaaS, Security Issues

Abstract

The software delivery model known as Software as a service (SaaS) has evolved from cutting-edge innovation to an essential technology for many companies. However, due to the extensive range of cloud services that companies offer as part of their SaaS offerings, it is indispensable to thoroughly comprehend the dangers associated with using these services. This article describes those dangers and recommendations for the most effective methods of control that are open to managers. This study's objective is to investigate the factors of Technological Complexity, Security and Risk, and Technical Support within an organization to determine how these factors can influence an organization's end-use intention regarding cloud technology. The availability of technical support, the complexity of use, and the organization's training have been highlighted as the most crucial factors of this aim. The findings suggest that complexity negatively influences intention to use, although training and assistance are vital, with a similar weight. Shared or collective knowledge is essential in the adoption of cloud computing technologies.

Downloads

Download data is not yet available.

References

Achar, S. (2015). Requirement of Cloud Analytics and Distributed Cloud Computing: An Initial Overview. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 12–18. Retrieved from https://upright.pub/index.php/ijrsps/article/view/70

Ajzen, I. & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.

Bueno, S., & Salmerón, J. (2008). TAM-based success modeling in ERP. Interacting with Computers, 20(6), 515-523.

Burda, D., and Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving. Journal of High Technology Management Research, 25(2), 172-187.

Buyya, R., Yeo, C., Venugopa, S., Broberg, J., and Brandic, I. (2009). Cloud computing and emerging platforms: vision, hype, and reality for delivering computing as the fifth utility. Future Generation Computer Systems, 25(6), 599-616.

Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295–336.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008

Fishbein, M., & Ajzen, I. (1975). Belief, Attitűd, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.

Fortes, N., Pereira, J. H., & Costa, J. F. D. (2016). A adogăo de serviços cloud computing pelas empresas portuguesas: O papel dos esforços de marketing. RISTI - Revista Ibérica de Sistemas e Tecnologías de Informaçăo, 18, 33-48.

Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. Information Technology, Journal of Enterprise Information, 28(1), 107-130.

Hashizume, K., Rosado, D. G., Fernández-Medina, E. & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), https://doi.org/10.1186/1869-0238-4-5

Martens, B. & Teuteberg, F., (2012). Decision-making in cloud computing environments: A cost and risk-based approach. Information Systems Frontiers, 14(4), 871-893.

Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, 27(4), 467-484.

Sá, F., & Rocha, Á. (2012). Definiçao da arquitetura de informaçao em organismo da administraçao pública local. RISTI - Revista Ibérica de Sistemas e Tecnologías de Informagăo, 10, 51-64.

Torres, J. (2011). Empresas en la Nube. Ventajas y retos del Cloud Computing. Barcelona: Libros de Cabecera.

Tsai, M., Lee, W. & Wu, H. (2010). Determinants of RFID adoption intention: evidence from Taiwanese retail chains. Information Management, 47, 255-261.

Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009). A break in the clouds: Towards a cloud definition. Computer Communication Review, 39(1), 50-55.

Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information systems research, 11(4), 342–365.

Vouk, M. (2008). Cloud computing - issues, research, and implementations. Journal Computer Information Technology, 16, 235- 246.

Wang, C., Chow, S., Wang, Q., Ren, K. & Lou, W., (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362-375.

Workman, M. (2007). Advancements in Technology: New Opportunities to Investigate Factors Contributing to Differential Technology and Information Use. International Journal of Management and Decision Making, 8(2), 318–342.

--0--

Downloads

Published

2016-12-31

How to Cite

Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79–88. https://doi.org/10.18034/ei.v4i2.633

Issue

Section

Peer Reviewed Articles