{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:03:20Z","timestamp":1748837000013,"version":"3.41.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T00:00:00Z","timestamp":1452729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11416-015-0262-y","type":"journal-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T11:05:17Z","timestamp":1452769517000},"page":"151-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis"],"prefix":"10.1007","volume":"12","author":[{"given":"Do Yeon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Guozhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Seong Taek","family":"Park","sequence":"additional","affiliation":[]},{"given":"Mi Hyun","family":"Ko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"issue":"1","key":"262_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11416-012-0173-0","volume":"9","author":"V Broucek","year":"2013","unstructured":"Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the \u2018cloud\u2019\u2013a forensic computing perspective. J. Comput. Virol. Hack. Tech. 9(1), 27\u201333 (2013)","journal-title":"J. Comput. Virol. Hack. Tech."},{"issue":"3","key":"262_CR2","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11416-015-0240-4","volume":"11","author":"A Lee","year":"2015","unstructured":"Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hack. Tech. 11(3), 149\u2013155 (2015)","journal-title":"J. Comput. Virol. Hack. Tech."},{"issue":"3","key":"262_CR3","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11416-015-0246-y","volume":"11","author":"S Choi","year":"2015","unstructured":"Choi, S.: Study on model fostering for cloud service brokerage. J. Comput. Virol. Hack. Tech. 11(3), 181\u2013192 (2015)","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"262_CR4","doi-asserted-by":"crossref","unstructured":"Barakat, O.L., Hashim, S.J., Abdullah, R.S.A.B.R., Ramli, A.R., Hashim, F., Samsudin, K., Ab Rahman, M.: Malware analysis performance enhancement using cloud computing. J. Comput. Virol. Hack. Tech. 10(1), 1\u201310 (2013)","DOI":"10.1007\/s11416-013-0187-2"},{"key":"262_CR5","unstructured":"Mullins, R.: IDC Survey: Risk in the Cloud. http:\/\/www.networkcomputing.com\/cloud-infrastructure\/idc-survey-risk-in-the-cloud\/d\/d-id\/1231608? (2010)"},{"key":"262_CR6","unstructured":"Johnston, S.: Cloud computing types: public cloud. Hybrid cloud. Private cloud, CircleID (2009)"},{"issue":"3","key":"262_CR7","doi-asserted-by":"crossref","first-page":"291","DOI":"10.9728\/dcs.2013.14.3.291","volume":"14","author":"SH Gu","year":"2013","unstructured":"Gu, S.H., Kim, D.W., Park, C.M., Kim, K.H.: Influence of LTE characteristic and personal innovativeness on LTE smart phone acceptance. J. Digit. Contents Soc. 14(3), 291\u2013301 (2013)","journal-title":"J. Digit. Contents Soc."},{"issue":"4","key":"262_CR8","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1007\/s11277-013-1266-x","volume":"73","author":"E Park","year":"2013","unstructured":"Park, E., Pobil, A.P.: Technology acceptance model for the use of tablet PCs. Wirel. Pers. Commun. 73(4), 1561\u20131572 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"262_CR9","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1108\/10662240510590324","volume":"15","author":"JH Cheong","year":"2005","unstructured":"Cheong, J.H., Park, M.C.: Mobile internet acceptance in Korea. Internet Res. 15(2), 125\u2013140 (2005)","journal-title":"Internet Res."},{"key":"262_CR10","unstructured":"Carlsson, C., Hyv\u00f6nen, K., Repo, P., Walden, P.: Adoption of mobile services across different technologies. In: 18th Bled Conference on Integration in Action, pp. 1\u201313 (2005)"},{"issue":"3","key":"262_CR11","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"262_CR12","volume-title":"Attitude, Intention, and Behavior: An Introduction to Theory and Research","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.B.: Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)"},{"key":"262_CR13","doi-asserted-by":"crossref","unstructured":"Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"262_CR14","unstructured":"Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Report (2008)"},{"key":"262_CR15","unstructured":"Carl, A.: A Practical Guide to Cloud Computing Security. A white paper from Accenture and Microsoft. Avanade Inc., Seattle. http:\/\/www.avanade.com\/~\/media\/documents\/research%20and%20insights\/practicalguidetocloudcomputingsecurity574834.pdf (2009)"},{"issue":"3","key":"262_CR16","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gen. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gen. Comput. Syst."},{"key":"262_CR17","doi-asserted-by":"crossref","unstructured":"Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and Eucalyptus. In: Cloud Computing. IEEE International Conference on 2009, pp. 151\u2013154 (2009)","DOI":"10.1109\/CLOUD.2009.70"},{"issue":"1","key":"262_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2010","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"262_CR19","unstructured":"Services. AWS Security Whitepaper. https:\/\/appirio.com\/pdf\/amazon-web-services-security.pdf (2008)"},{"key":"262_CR20","volume-title":"Cloud Computing: Implementation. Management and Security","author":"WR John","year":"2010","unstructured":"John, W.R., James, F.R.: Cloud Computing: Implementation. Management and Security. CRC Press, New York (2010)"},{"key":"262_CR21","unstructured":"Tarrant, D., Brody, T., Carr, L.: From the desktop to the cloud: leveraging hybrid storage architectures in your repository. In: International Conference on Open Repositories (2009)"},{"issue":"3","key":"262_CR22","first-page":"85","volume":"7","author":"GG Lee","year":"2006","unstructured":"Lee, G.G., Noh, Y.: An effect of innovation characteristics on perceived usefulness and ease of use in the internet banking. e-Bus. Stud. 7(3), 85\u2013107 (2006)","journal-title":"e-Bus. Stud."},{"key":"262_CR23","doi-asserted-by":"crossref","unstructured":"Featherman, M.S., Fuller, M.: Applying TAM to e-services adoption: the moderating role of perceived risk. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)","DOI":"10.1109\/HICSS.2003.1174433"},{"issue":"5","key":"262_CR24","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","volume":"42","author":"JH Wu","year":"2005","unstructured":"Wu, J.H., Wang, S.C.: What drives mobile commerce, an empirical evaluation of the revised technology acceptance model. Inf. Manag. 42(5), 719\u2013729 (2005)","journal-title":"Inf. Manag."},{"issue":"3","key":"262_CR25","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce 7(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commerce"},{"key":"262_CR26","unstructured":"Lui, H.K., Jamieson, R.: Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. In: ECIS, pp. 1154\u20131170 (2003)"},{"issue":"5","key":"262_CR27","first-page":"1","volume":"1","author":"M Tan","year":"2000","unstructured":"Tan, M., Teo, T.S.H.: Factors influencing the adoption of internet banking. J. Assoc. Inf. Syst. 1(5), 1\u201342 (2000)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"2","key":"262_CR28","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","volume":"9","author":"R Agarwal","year":"1998","unstructured":"Agarwal, R., Prasad, J.A.: Conceptual and operational definition of personal innovativeness in the domain of IT. Inf. Syst. Res. 9(2), 204\u2013215 (1998)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"262_CR29","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 19(2), 189\u2013211 (1995)","journal-title":"MIS Q."},{"issue":"14","key":"262_CR30","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","volume":"22","author":"FD Davis","year":"1992","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111\u20131132 (1992)","journal-title":"J. Appl. Soc. Psychol."},{"issue":"2","key":"262_CR31","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144\u2013176 (1995)","journal-title":"Inf. Syst. Res."},{"key":"262_CR32","doi-asserted-by":"crossref","unstructured":"Thompson, A.M., Brown, J.C., Kay, J.W., Titterington, D.M.: A study of methods of choosing the smoothing parameter in image restoration by regularization. IEEE Trans. Pattern Anal. Mach. Intell. 13, 326\u2013339 (1991)","DOI":"10.1109\/34.88568"},{"issue":"2","key":"262_CR33","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"45","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186\u2013204 (2000)","journal-title":"Manag. Sci."},{"issue":"3","key":"262_CR34","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"1","key":"262_CR35","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/3250981","volume":"24","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Morris, M.G.: Why don\u2019t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24(1), 115\u2013139 (2000)","journal-title":"MIS Q."},{"issue":"6","key":"262_CR36","first-page":"1","volume":"22","author":"JY Lee","year":"2010","unstructured":"Lee, J.Y.: Characteristics of cloud computing and current status of services provided by business operator. Inf. Soc. Dev. Res. 22(6), 1\u201322 (2010)","journal-title":"Inf. Soc. Dev. Res."},{"issue":"1","key":"262_CR37","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"P Pavlou","year":"2004","unstructured":"Pavlou, P., Gefen, D.: Building effective online marketplaces with institution-based trust. Inf. Syst. Res. 15(1), 37\u201359 (2004)","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"262_CR38","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/3468.852434","volume":"30","author":"S Grazioli","year":"2000","unstructured":"Grazioli, S., Jarvenpaa, S.: Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395\u2013410 (2000)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"262_CR39","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1009886520142","volume":"4","author":"GT Lau","year":"1999","unstructured":"Lau, G.T., Lee, S.H.: Consumers\u2019 trust in a brand and the link to brand loyalty. J. Mark. Focus. Manag. 4, 341\u2013370 (1999)","journal-title":"J. Mark. Focus. Manag."},{"key":"262_CR40","unstructured":"The Savola Group: 2010 annual report. http:\/\/www.savola.com\/SavolaE\/pdf\/Savola_Annual_Report_2010_E.pdf (2010)"},{"issue":"1","key":"262_CR41","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."},{"key":"262_CR42","volume-title":"Psychometric Theory","author":"J Nunnally","year":"1978","unstructured":"Nunnally, J.: Psychometric Theory. McGraw-Hill, New York (1978)"},{"issue":"2","key":"262_CR43","first-page":"285","volume":"2","author":"D Barclay","year":"1995","unstructured":"Barclay, D., Higgins, C., Thompson, R.: The partial least squares (PLS) approach to causal modeling: personal computer adoption and use as an illustration. Technol. Stud. 2(2), 285\u2013309 (1995)","journal-title":"Technol. Stud."},{"issue":"2\u20133","key":"262_CR44","first-page":"42","volume":"26","author":"WW Chin","year":"1995","unstructured":"Chin, W.W., Gopal, A.: Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database 26(2\u20133), 42\u201364 (1995)","journal-title":"ACM SigMIS Database"},{"key":"262_CR45","volume-title":"A Primer for Soft Modeling","author":"RF Falk","year":"1992","unstructured":"Falk, R.F., Miller, N.B.: A Primer for Soft Modeling. University of Akron Press, Ohio (1992)"},{"issue":"4","key":"262_CR46","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1023\/B:ISFI.0000046377.32617.3d","volume":"6","author":"TL Lai","year":"2004","unstructured":"Lai, T.L.: Service quality and perceived value\u2019s impact on satisfaction, intention and usage of short message service (SMS). Inf. Syst. Front. 6(4), 353\u2013368 (2004)","journal-title":"Inf. Syst. Front."},{"issue":"3","key":"262_CR47","doi-asserted-by":"crossref","first-page":"479","DOI":"10.2307\/30036541","volume":"27","author":"TA Carte","year":"2003","unstructured":"Carte, T.A., Russell, C.J.: In pursuit of moderation: nine common errors and their solutions. MIS Q. 27(3), 479\u2013501 (2003)","journal-title":"MIS Q."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0262-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-015-0262-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0262-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T03:57:58Z","timestamp":1748750278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-015-0262-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,14]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["262"],"URL":"https:\/\/doi.org\/10.1007\/s11416-015-0262-y","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2016,1,14]]}}}