{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T02:46:44Z","timestamp":1770518804213,"version":"3.49.0"},"reference-count":77,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,11,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to develop a scale to measure the cloud provider\u2019s performance and it investigates the factors that impact that performance from the users\u2019 perspective.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This paper proposes a research framework, develops hypotheses and conducts a survey to test the framework.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results from both ordinary least square regression and structural equation modeling analyzes indicate that information technology complexity negatively and significantly affects users\u2019 perception of the cloud computing providers\u2019 performance. Additionally, the trust in the supervisor significantly enhances the otherwise insignificant positive relationship between providers\u2019 cybersecurity capability and users\u2019 perception of their providers\u2019 performance.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The research makes important contributions to the cloud computing literature, as it measures users\u2019 perception of the cloud computing provider\u2019s performance and links it with cybersecurity, technical complexity and incorporates both the trust in the client firm\u2019s supervisor and the strength of cybersecurity offered by cloud computing provider.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-09-2020-0153","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T07:58:45Z","timestamp":1623139125000},"page":"816-835","source":"Crossref","is-referenced-by-count":18,"title":["Users\u2019 perception of cybersecurity, trust and cloud computing providers\u2019 performance"],"prefix":"10.1108","volume":"29","author":[{"given":"Hongjiang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Sakthi","family":"Mahenthiran","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"issue":"1","key":"key2021111012415608600_ref001","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1108\/info-09-2014-0042","article-title":"Explaining the role of trust in cloud computing services","volume":"17","year":"2015","journal-title":"Info"},{"issue":"1","key":"key2021111012415608600_ref002","first-page":"234","article-title":"Cloud computing for increased business value","volume":"3","year":"2012","journal-title":"International Journal of Business and Social Science"},{"issue":"1","key":"key2021111012415608600_ref003","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/s13677-016-0072-x","article-title":"An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model","volume":"6","year":"2017","journal-title":"Journal of Cloud Computing"},{"issue":"10","key":"key2021111012415608600_ref004","first-page":"50","article-title":"Heads in the cloud","volume":"39","year":"2011","journal-title":"Entrepreneur"},{"issue":"4","key":"key2021111012415608600_ref005","article-title":"A view of cloud computing","volume":"53","year":"2010","journal-title":"Communications of the ACM"},{"issue":"3","key":"key2021111012415608600_ref006","first-page":"1","article-title":"Cyber security considerations when moving to public cloud computing","volume":"12","year":"2012","journal-title":"Communications of the IIMA"},{"issue":"12","key":"key2021111012415608600_ref007","first-page":"46","article-title":"Backup plans","volume":"39","year":"2011","journal-title":"Entrepreneur"},{"key":"key2021111012415608600_ref008","article-title":"Netflix finishes its massive migration to the Amazon cloud","year":"2016"},{"issue":"3","key":"key2021111012415608600_ref009","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1177\/014920639101700307","article-title":"Toward understanding and measuring conditions of trust: evolution of a conditions of trust inventory","volume":"17","year":"1991","journal-title":"Journal of Management"},{"issue":"6","key":"key2021111012415608600_ref010","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility","volume":"25","year":"2009","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"key2021111012415608600_ref011","first-page":"783","article-title":"Characteristics of the cloud computing model as a disruptive innovation","volume":"14","year":"2013","journal-title":"Revista de Management Comparat International"},{"issue":"1","key":"key2021111012415608600_ref012","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.dss.2007.04.006","article-title":"Factors affecting the adoption of electronic signature: executives\u2019 perspective of hospital information department","volume":"44","year":"2007","journal-title":"Decision Support Systems"},{"key":"key2021111012415608600_ref013","doi-asserted-by":"crossref","unstructured":"Chen, D. and Zhao, H. (2012), \u201cData security and privacy protection issues in cloud computing\u201d, Paper presented at the 2012 International Conference on Computer Science and Electronics Engineering.","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"key2021111012415608600_ref014","article-title":"Cloud computing and decision-making: determinants, modelling and impacts","year":"2017"},{"issue":"4","key":"key2021111012415608600_ref015","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1080\/08874417.2016.1261377","article-title":"The effect of innovation characteristics on cloud computing diffusion","volume":"58","year":"2018","journal-title":"Journal of Computer Information Systems"},{"issue":"3","key":"key2021111012415608600_ref016","first-page":"310","article-title":"The role of affect- and cognition-based trust in complex knowledge sharing","volume":"17","year":"2005","journal-title":"Journal of Managerial Issues"},{"key":"key2021111012415608600_ref017","volume-title":"The Innovator's Dilemma: when New Technologies Cause Great Firms to Fail","year":"2013"},{"issue":"1","key":"key2021111012415608600_ref018","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1111\/j.2044-8325.1980.tb00005.x","article-title":"New work attitude measures of trust, organizational commitment and personal need non-fulfilment","volume":"53","year":"1980","journal-title":"Journal of Occupational Psychology"},{"issue":"8","key":"key2021111012415608600_ref019","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1536616.1536633","article-title":"CTO roundtable: cloud computing","volume":"52","year":"2009","journal-title":"Communications of the ACM"},{"key":"key2021111012415608600_ref020","article-title":"A technology acceptance model for empirically testing new end-user information systems: Theory and results","year":"1985"},{"issue":"8","key":"key2021111012415608600_ref021","first-page":"34","article-title":"Tile storage trends in cloud computing era","volume":"14","year":"2011","journal-title":"Siliconindia"},{"issue":"8","key":"key2021111012415608600_ref022","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1108\/01409171211247677","article-title":"From outsourcing to cloud computing: evolution of IT services","volume":"35","year":"2012","journal-title":"Management Research Review"},{"issue":"5","key":"key2021111012415608600_ref023","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/1735223.1735242","article-title":"Why cloud computing will never be free","volume":"53","year":"2010","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2021111012415608600_ref024","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/08874417.2013.11645649","article-title":"Risks in enterprise cloud computing: the perspective of it experts","volume":"53","year":"2013","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2021111012415608600_ref025","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1108\/JEIM-08-2013-0065","article-title":"Understanding determinants of cloud computing adoption using an integrated TAM-TOE model","volume":"28","year":"2015","journal-title":"Journal of Enterprise Information Management"},{"issue":"3","key":"key2021111012415608600_ref026","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1177\/009102609802700303","article-title":"An examination of organizational trust antecedents","volume":"27","year":"1998","journal-title":"Public Personnel Management"},{"issue":"5","key":"key2021111012415608600_ref027","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","article-title":"The usage and adoption of cloud computing by small and medium businesses","volume":"33","year":"2013","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2021111012415608600_ref028","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.clsr.2009.03.001","article-title":"Hey, you, get off of that cloud?","volume":"25","year":"2009","journal-title":"Computer Law and Security Review"},{"key":"key2021111012415608600_ref029","doi-asserted-by":"crossref","unstructured":"Kamara, S. and Lauter, K. (2010), \u201cCryptographic cloud storage\u201d, Paper presented at the Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization.","DOI":"10.1007\/978-3-642-14992-4_13"},{"issue":"3","key":"key2021111012415608600_ref030","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.cose.2012.01.003","article-title":"Applying security policies and service level agreement to IaaS service model to enhance security and transition","volume":"31","year":"2012","journal-title":"Computers and Security"},{"issue":"4","key":"key2021111012415608600_ref031","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","article-title":"Data security in the world of cloud computing","volume":"7","year":"2009","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"5","key":"key2021111012415608600_ref032","first-page":"29","article-title":"Cloud computing performance evaluation: issues and challenges","volume":"3","year":"2013","journal-title":"International Journal on Cloud Computing: Services and Architecture"},{"issue":"4","key":"key2021111012415608600_ref033","doi-asserted-by":"crossref","first-page":"967","DOI":"10.2307\/2578601","article-title":"Trust as a social reality","volume":"63","year":"1985","journal-title":"Social Forces"},{"key":"key2021111012415608600_ref034","doi-asserted-by":"crossref","unstructured":"Li, A., Yang, X., Kandula, S. and Zhang, M. (2010), \u201cCloudCmp: comparing public cloud providers\u201d, Paper presented at the 10th ACM SIGCOMM Conference on Internet Measurement.","DOI":"10.1145\/1879141.1879143"},{"issue":"11","key":"key2021111012415608600_ref035","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1080\/0951192X.2011.592994","article-title":"Towards the business information technology alignment in cloud computing environment: an approach based on collaboration points and agents","volume":"24","year":"2011","journal-title":"International Journal of Computer Integrated Manufacturing"},{"key":"key2021111012415608600_ref036","unstructured":"Li, Y. and Chang, K. (2012), \u201cA study on user acceptance of cloud computing: a multi-theoretical perspective\u201d, Paper presented at the AMCIS 2012."},{"issue":"1","key":"key2021111012415608600_ref037","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.ijinfomgt.2013.09.004","article-title":"An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital","volume":"34","year":"2014","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2021111012415608600_ref038","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1007\/s10916-010-9580-2","article-title":"Critical factors influencing hospitals\u2019 adoption of HL7 version 2 standards: an empirical investigation","volume":"36","year":"2012","journal-title":"Journal of Medical Systems"},{"issue":"4","key":"key2021111012415608600_ref039","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1089\/tmj.2010.0184","article-title":"Key factors influencing the intention of telecare adoption: an institutional perspective","volume":"17","year":"2011","journal-title":"Telemedicine and e-Health"},{"issue":"7","key":"key2021111012415608600_ref040","article-title":"Understanding the determinants of cloud computing adoption","volume":"111","year":"2011","journal-title":"Industrial Management and Data Systems"},{"key":"key2021111012415608600_ref041","volume-title":"Trust and Power","year":"1979"},{"issue":"11","key":"key2021111012415608600_ref042","first-page":"124","article-title":"What every CEO needs to know about the cloud","volume":"89","year":"2011","journal-title":"Harvard Business Review"},{"key":"key2021111012415608600_ref043","volume-title":"The Meanings of Trust","year":"1996"},{"issue":"3","key":"key2021111012415608600_ref044","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4018\/irmj.2011070102","article-title":"A decision table for the cloud computing decision in small business","volume":"24","year":"2011","journal-title":"Information Resources Management Journal"},{"issue":"1","key":"key2021111012415608600_ref045","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","article-title":"Cloud computing \u2013 the business perspective","volume":"51","year":"2011","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2021111012415608600_ref046","doi-asserted-by":"crossref","first-page":"874","DOI":"10.5465\/amj.2005.18803928","article-title":"Trust in management and performance: who minds the shop while the employees watch the boss?","volume":"48","year":"2005","journal-title":"Academy of Management Journal"},{"issue":"3","key":"key2021111012415608600_ref047","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","year":"1995","journal-title":"Academy of Management Review"},{"key":"key2021111012415608600_ref048","article-title":"The NIST definition of cloud computing: recommendations of the National Institute of Standards and Technology","year":"2011"},{"issue":"1","key":"key2021111012415608600_ref049","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1080\/09585190210158510","article-title":"Employee involvement, organizational change and trust in management","volume":"14","year":"2003","journal-title":"The International Journal of Human Resource Management"},{"key":"key2021111012415608600_ref050","volume-title":"Psychometric Theory","year":"1978","edition":"2nd ed"},{"issue":"5","key":"key2021111012415608600_ref051","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1177\/0193841X9702100505","article-title":"Development and psychometric properties of organizational trust inventory","volume":"21","year":"1997","journal-title":"Evaluation Review"},{"issue":"5","key":"key2021111012415608600_ref052","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","article-title":"Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2021111012415608600_ref053","volume-title":"Zaufanie w Zarz\u0105dzaniu [Trust in Management]","year":"2013"},{"issue":"3","key":"key2021111012415608600_ref054","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/08874417.2019.1571459","article-title":"Information security policy compliance: leadership and trust","volume":"59","year":"2019","journal-title":"Journal of Computer Information Systems"},{"issue":"2","key":"key2021111012415608600_ref055","first-page":"116","article-title":"Organizational trust as a foundation for knowledge sharing and its influence on organizational performance","volume":"1","year":"2013","journal-title":"The Online Journal of Applied Knowledge Management"},{"issue":"3","key":"key2021111012415608600_ref056","first-page":"94","article-title":"Determinants of the adoption of enterprise resource planning within the technology-organization-environment framework: Taiwan\u2019s communications industry","volume":"48","year":"2008","journal-title":"Journal of Computer Information Systems"},{"issue":"4","key":"key2021111012415608600_ref057","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/08874417.2014.11645719","article-title":"Cloud ERP: a new dilemma to modern organisations?","volume":"54","year":"2014","journal-title":"Journal of Computer Information Systems"},{"key":"key2021111012415608600_ref058","article-title":"Does cloud computing deliver the promised benefits for IT industry?","year":"2012"},{"issue":"5","key":"key2021111012415608600_ref059","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"key2021111012415608600_ref060","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/S0305-0483(98)00071-1","article-title":"Adoption of new information technologies in rural small business","volume":"27","year":"1999","journal-title":"OMEGA \u2013 International Journal of Management Science"},{"issue":"2","key":"key2021111012415608600_ref061","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/07421222.1994.11518044","article-title":"Implementation of electronic data interchange: an innovation diffusion perspective","volume":"11","year":"1994","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2021111012415608600_ref062","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1504\/IJCAT.2017.082865","article-title":"Cloud computing security: challenges and future trends","volume":"55","year":"2017","journal-title":"International Journal of Computer Applications in Technology"},{"issue":"4","key":"key2021111012415608600_ref063","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.ijinfomgt.2016.03.005","article-title":"Towards performance evaluation of cloud service providers for cloud data security","volume":"36","year":"2016","journal-title":"International Journal of Information Management"},{"issue":"8","key":"key2021111012415608600_ref064","first-page":"719","article-title":"Performance evaluation of a computer network in a cloud computing environment","volume":"13","year":"2019","journal-title":"ICIC Express Letters"},{"key":"key2021111012415608600_ref065","volume-title":"Diffusion of Innovations","year":"2003","edition":"5th ed."},{"key":"key2021111012415608600_ref066","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.chb.2016.03.073","article-title":"Predicting motivators of cloud computing adoption: a developing country perspective","volume":"62","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2021111012415608600_ref067","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021111012415608600_ref068","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/08956308.2009.11657590","article-title":"Computing in the cloud","volume":"52","year":"2009","journal-title":"Research-Technology Management"},{"issue":"6","key":"key2021111012415608600_ref069","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.im.2003.06.001","article-title":"An exploratory study to identify the critical factors affecting the decision to establish internet-based interorganizational information systems","volume":"41","year":"2004","journal-title":"Information and Management"},{"issue":"4","key":"key2021111012415608600_ref070","first-page":"126","article-title":"Security and privacy in cloud computing: a survey","volume":"2","year":"2013","journal-title":"Parallel and Cloud Computing"},{"key":"key2021111012415608600_ref071","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.protcy.2014.10.071","article-title":"Impacts on the organizational adoption of cloud computing: a reconceptualization of influencing factors","volume":"16","year":"2014","journal-title":"Procedia Technology"},{"issue":"3","key":"key2021111012415608600_ref072","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.ijinfomgt.2010.08.001","article-title":"Reaching for the \u2018cloud\u2019: how SMEs can manage","volume":"31","year":"2011","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2021111012415608600_ref073","first-page":"28","article-title":"Innovation characteristics and innovation adoption-implementation: a meta-analysis of findings","volume":"29","year":"1982","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"12","key":"key2021111012415608600_ref074","doi-asserted-by":"crossref","first-page":"15057","DOI":"10.1016\/j.eswa.2011.05.039","article-title":"Developing an explorative model for SaaS adoption","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"key2021111012415608600_ref075","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1080\/08874417.2018.1429957","article-title":"The impacts of cloud computing architecture on cloud service performance","volume":"60","year":"2020","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2021111012415608600_ref076","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/07421222.2004.11045797","article-title":"Information technology payoff in e-business environments: an international perspective on value creation of e-business in the financial services industry","volume":"21","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"key2021111012415608600_ref077","article-title":"Netflix on AWS","author":"aws.amazon.com","year":"2020"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2020-0153\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2020-0153\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:12Z","timestamp":1753406592000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/5\/816-835\/105785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,10]]},"references-count":77,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,6,10]]},"published-print":{"date-parts":[[2021,11,12]]}},"alternative-id":["10.1108\/ICS-09-2020-0153"],"URL":"https:\/\/doi.org\/10.1108\/ics-09-2020-0153","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6,10]]}}}