DOI QR코드

DOI QR Code

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Received : 2024.09.05
  • Published : 2024.09.30

Abstract

The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Keywords

References

  1. CISCO. "Mobility: Transforming the Internet for the future," In CISCO Reports. Retrieved January 9, 2023, from https://www.cisco.com/c/dam/en/us/solutions/collateral/executive-perspectives/annual-internet-report/air-executive-summary-pgr-mobility.pdf
  2. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Communications and Mobile Computing, vol. 13, no. 18, pp. 1587-1611, 2013. https://doi.org/10.1002/wcm.1203
  3. M. Almaiah and A. Al-Khasawneh, "Investigating the main determinants of mobile cloud computing adoption in university campus," Education and Information Technologies, vol. 25, pp. 3087-3107, 2020. https://doi.org/10.1007/s10639-020-10120-8
  4. W. Al-Ghaith, "Extending protection motivation theory to understand security determinants of anti-virus software usage on mobile devices," International Journal of Computers, vol. 10, pp. 125-138, 2016.
  5. S. Furnell and N. Clarke, "Power to the people? The evolving recognition of human aspects of security," Computers & Security, vol. 31, no. 8, pp. 983-988, 2012. https://doi.org/10.1016/j.cose.2012.08.004
  6. R. Willison and M. Warkentin, "Beyond deterrence: An expanded view of employee computer abuse," MIS Quarterly, vol. 37, no. 1, pp. 1-20, 2013. https://doi.org/10.25300/MISQ/2013/37.1.01
  7. S. Abraham and I. Chengalur-Smith, "An overview of social engineering malware: Trends, tactics, and implications," Technology in Society, vol. 32, no. 3, pp. 183-196, 2010. https://doi.org/10.1016/j.techsoc.2010.07.001
  8. M. Maray and J. Shuja, "Computation offloading in mobile cloud computing and mobile edge computing: survey, taxonomy, and open issues." Mobile Information Systems, 2022.
  9. J. Wan, C. Zou, S. Ullah, C. Lai, M. Zhou and X. Wang, "Cloud-enabled wireless body area networks for pervasive healthcare," IEEE Network, vol. 27, no. 5. pp.56-61, 2013. https://doi.org/10.1109/MNET.2013.6616116
  10. X. Jin, W. Hua, Z. Wang and Y. Chen, "A survey of research on computation offloading in mobile cloud computing," Wireless Networks, vol. 28, no. 4, pp.1563-1585, 2022.
  11. M. I. Sahu and U. Pandey, ''Mobile cloud computing: Issues and challenges,'' in Proc. Int. Conf. Adv. Comput., Commun. Control Netw. (ICAC-CCN), Oct. 2018, pp. 247_250.
  12. A.S. Al-Ahmad, H. Kahtan, F. Hujainah and H.A. Jalab, "Systematic literature review on penetration testing for mobile cloud computing applications," IEEE Access, VOL. 7, pp. 173524-173540, 2019. https://doi.org/10.1109/ACCESS.2019.2956770
  13. R. W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal Of Psychology, vol. 91, no. 1, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
  14. R. W. Rogers, "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation," in Social Psychophysiology, New York, Guilford Press, 1983, p. 153-176.
  15. W. Al-Ghaith, "Extending protection motivation theory to understand security determinants of anti-virus software usage on mobile devices," International Journal of Computers, vol. 10, pp. 125-138, 2016.
  16. S. Milne, P. Sheeran and S. Orbell, "Prediction and intervention in health-related behavior: a meta-analytic of protection motivation theory," Journal of Applied Social Psychology, vol. 30, no. 1, p. 106-143, 2000. https://doi.org/10.1111/j.1559-1816.2000.tb02308.x
  17. B. T. McClendon and S. Prentice-Dunn, "Reducing skin cancer risk: an intervention based on protection motivation theory," Journal of Health Psychology, vol. 6, p. 321-328, 2001. https://doi.org/10.1177/135910530100600305
  18. C. Pechimann, G. Zhao, M. E. Goldberg and E. T. Reibling, "What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message theme," Journal of Marketing, vol. 67, no. April, p. 1-18, 2003. https://doi.org/10.1509/jmkg.67.2.1.18607
  19. H. M. Alnajrani and A. A. Norman, "The effects of applying privacy by design to preserve privacy and personal data protection in mobile cloud computing: An exploratory study," Symmetry, vol. 12, pp. 2039, 2020.
  20. H. R. Nikkhah, V. Grover and R. Sabherwal, "Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers," Information & Computer Security, vol. ahead-of-print, no. ahead-of-print, 2023.
  21. R. Palanisamy and Y. Shi, "Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China," Information & Computer Security, vol. 31, no. 1, pp. 65-87, 2023. https://doi.org/10.1108/ICS-03-2022-0048
  22. M. Al-Emran, M. N. Al-Nuaimi, I. Arpaci, M. A. , Al-Sharafi and B. Anthony Jnr, "Towards a wearable education: Understanding the determinants affecting students' adoption of wearable technologies using machine learning algorithms," Education and Information Technologies, vol. 28, no. 3, pp. 2727-2746, 2023.
  23. H. Al-Samarraie and N. Saeed, "A systematic review of cloud computing tools for collaborative learning: Opportunities and challenges to the blended-learning environment," Computers & Education, vol. 124, pp. 77-91, 2018. https://doi.org/10.1016/j.compedu.2018.05.016
  24. K. Kumar, D. Liu and L. Carter, "Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy," Computers & Security, vol.132, pp. 103375, 2023.
  25. Y. Lee and K. R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, vol. 18, pp. 177-187, 2009. https://doi.org/10.1057/ejis.2009.11
  26. J. H. Wu and S. C. Wang, "What drives mobile commerce? An empirical evaluation of the revised technology acceptance model," Information & Management, vol. 42, no. 5, p. 719-729, 2005. https://doi.org/10.1016/j.im.2004.07.001
  27. J. L. Reardon and E. Davidson, "An organizational learning perspective on the assimilation of electronic medical records among small physician practices.," European Journal of Information Systems, vol. 16, no. 6, pp. 681-694, 2007. https://doi.org/10.1057/palgrave.ejis.3000714
  28. D. Marikyan, S. Papagiannidis, O. F. Rana and R. Ranjan, "Blockchain adoption: A study of cognitive factors underpinning decision making," Computers in Human Behavior, vol. 131, pp. 107207, 2022.
  29. M. Al-Emran, A. Granic, M. A. Al-Sharafi, N. Ameen and M. Sarrab, "Examining the roles of students' beliefs and security concerns for using smartwatches in higher education," Journal of Enterprise Information Management, vol. 34, no. 4, pp. 1229-1251, 2021. https://doi.org/10.1108/JEIM-02-2020-0052
  30. W. Al-Ghaith, "Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015. https://doi.org/10.14569/IJACSA.2015.060813
  31. B. Sheppard, J. Hartwick and P. Warshaw, "The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research," Journal of Consumer Research, vol. 15, no. 3, p. 325-343, 1988. https://doi.org/10.1086/209170
  32. S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models," Information Systems Research, vol. 6, no. 2, pp. 144-176, 1995. https://doi.org/10.1287/isre.6.2.144
  33. L. Chen, L. M. Gillenson and L. D. Sherrell, "Consumer acceptance of virtual stores: a theoretical model and critical success factors for virtual stores," ACM SIGMIS Database, vol. 35, no. 2, pp. 8-31, 2004. https://doi.org/10.1145/1007965.1007968
  34. W. Al-Ghaith, "Using the Theory of Planned Behavior to Determine the Social Network Usage Behavior in Saudi Arabia," International Journal of Research in Computer Science, vol. 5, no. 1, pp. 1-8, 2015.
  35. E. Bell, A. Bryman and B. Harley, Business research methods. Oxford university press, 2022.
  36. W. G. Zikmund, Business research methods (7th ed.), Cincinnati, OH: Thomson, 2003.
  37. I. M. Y. Woon, G. W. Tan and R. T. Low, "A protection motivation theory approach to home wireless security," in The Twenty-Sixth International Conference on Information Systems (Avison, D., Galletta, D., & DeGross, J., Eds), Las Vegas, 2005.
  38. V. Venkatesh, M. Morris, M. G. Rris, G. B. Davis and F. D. Davis, "User acceptance of information technology: toward a unified view," MIS Quarterly, vol. 27, no. 3, p. 425-478, 2003. https://doi.org/10.2307/30036540
  39. G. A. Marcoulides and C. Saunders, "Editor's comments: PLS: a silver bullet?," MIS quarterly, pp. iii-ix, 2006.
  40. K. K. K. Wong, "Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS," Marketing Bulletin, vol. 24, no. 1, pp. 1-32, 2013.
  41. G. Premkumar and K. Ramamurthy, "The role of Interorganizational and organizational factors of the decision mode for adoption of interorganizational systems," Decision Science, vol. 26, no. 3, pp. 303-336, 1995. https://doi.org/10.1111/j.1540-5915.1995.tb01431.x
  42. A. L. Comrey and H. B. Lee, A first course in factor analysis, L., NJ: Erlbaum Associates, 1992.
  43. H. B. Asher, Causal modeling, Newbury Park: Sage University Press, 1983.
  44. M. Lee, "Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit," Electronic Commerce Research and Applications, vol. 8, no. 3, pp. 130-141, 2009. https://doi.org/10.1016/j.elerap.2008.11.006
  45. W. Al-Ghaith, "Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015. https://doi.org/10.14569/IJACSA.2015.060813