A Research on the Key Factor of Enterprise to Use the Cloud Information Security System

碩士 === 輔仁大學 === 資訊管理學系 === 101 === Title of Thesis:A Research on the Key Factor of Enterprise to Use the Cloud Information Security System Name of Institute:Department of Information Management, College of Management, Fu Jen Catholic University Name of Student:Wu, Hung-Yu Advisor:Chang, Yin-Yih...

Full description

Bibliographic Details
Main Authors: Wu, Hung-Yu, 吳弘裕
Other Authors: Chang, Yin-Yih
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/52324395703737796611
Description
Summary:碩士 === 輔仁大學 === 資訊管理學系 === 101 === Title of Thesis:A Research on the Key Factor of Enterprise to Use the Cloud Information Security System Name of Institute:Department of Information Management, College of Management, Fu Jen Catholic University Name of Student:Wu, Hung-Yu Advisor:Chang, Yin-Yih Total Pages:97 Keywords: Cloud Computing, Information Security, Trust, Behavioral Intention. Abstract With the rise of cloud computing, we can observe more and more information security vendor starting to provide cloud computing technology of information security system to enterprise. Companies can cost less to build a complete information security environment by chose cloud computing. This research is designed for information security managers of enterprise, and find out what is the key point for them to choose cloud computing information security system. My research are mainly focus on the "perceived usefulness", "perceived ease of use" and "trust" which to explore the intentions of enterprise adoption of cloud information security systems. In the past, the research of cloud computing information security are mostly focus on technical; my research is based on the enterprise behavioral intentions of adoption of cloud computing information security solutions as research direction. Data were collected by questionnaire in order to understand the factors that enterprise product purchase intentions, and to study their understanding and awareness for the product. This research used convenience sampling method to collect information from the managers of information security department by questionnaires; which issued 200 and received a total of 80 valid questionnaires. This research got four results: First, cloud computing information security vendors provide experiential marketing and subjective norms, which have a significant impact on perceived usefulness of their product. Second, cloud computing information security products perceived ease of use and perceived usefulness have a significant impact. Third, Goodwill and commitment of vendors have a significant impact to customer’s trust. Last, cloud computing information security products perceived usefulness, and customer’s trust for manufacturers, has a significant impact on behavioral intentions for customers decide whether to use their products. Therefore, according to the results of this research, information security managers of corporate believe information security products are useful and valuable, and they could trust on cloud computing information security vendors. In addition, the results of the questionnaire can be given recommendations to clouding-computing information security vendors, and also give information security managers of enterprise as an indicator of reference.