{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:27Z","timestamp":1761007107744,"version":"build-2065373602"},"reference-count":9,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The present study explores individual end\u2010users' perspectives of cloud computing, especially issues regarding their trust\/distrust of cloud services. While current cloud computing service development focuses on adoption by enterprises and organizations, individual end\u2010users who use cloud services in their everyday lives also constitute an important consumer group. Challenges of trust in cloud computing have gained social and scholarly attention accompanied with the rise of privacy and data security concerns. Studies that investigate individual end\u2010users' views of trust in cloud services, however, are rare. Using semi\u2010structured interviews and a survey questionnaire, the present study aims to capture how ordinary individuals think about cloud computing and how they form their trust\/distrust of cloud services and service providers. In this poster, authors present preliminary results of analysis of interview data.<\/jats:p>","DOI":"10.1002\/meet.14504901267","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-3","source":"Crossref","is-referenced-by-count":1,"title":["Do I trust google? An exploration of how people form trust in cloud computing"],"prefix":"10.1002","volume":"49","author":[{"given":"Sarah","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ayoung","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"Chopra K.andWallace W. A.2003.Trust in electronic environments. Proceedings of the 36th Hawaii International Conference on System Sciences 1\u201310.","DOI":"10.1109\/HICSS.2003.1174902"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.177"},{"key":"e_1_2_8_4_1","doi-asserted-by":"crossref","unstructured":"Habib S. M. Ries S. &Muhlhauser M.2010.Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation. 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC\/ATC) 410\u2013415.","DOI":"10.1109\/UIC-ATC.2010.48"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.86"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.128"},{"key":"e_1_2_8_7_1","unstructured":"Kim K.&Prabhakar B.2000.Initial trust perceived risk and the adoption of internet banking. ICIS '00 Proceedings of the twenty first international conference on Information systems Atlanta GA 537\u2013543."},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_2_8_9_1","doi-asserted-by":"crossref","unstructured":"Pearson S. &Benameur A.2010.Privacy Security and Trust Issues Arising from Cloud Computing 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom) 693\u2013702.","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_2_8_10_1","first-page":"1","article-title":"Digital natives, digital immigrants Part 1","volume":"5","author":"Prensky M.","year":"2001","journal-title":"On the Horizon. 9"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901267","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:38:33Z","timestamp":1760960313000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901267"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901267","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}