IDEAS home Printed from https://ideas.repec.org/a/eee/ininma/v50y2020icp387-394.html
   My bibliography  Save this article

An empirical study on business analytics affordances enhancing the management of cloud computing data security

Author

Listed:
  • Wang, Zhiying
  • Wang, Nianxin
  • Su, Xiang
  • Ge, Shilun

Abstract

The mechanism of business analytics affordances enhancing the management of cloud computing data security is a key antecedent in improving cloud computing security. Based on information value chain theory and IT affordances theory, a research model is built to investigate the underlying mechanism of business analytics affordances enhancing the management of cloud computing data security. The model includes business analytics affordances, decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and the management of cloud computing data security. Simultaneously, the model considers the role of data-driven culture and IT business process integration. It is empirically tested using data collected from 316 enterprises by Partial Least Squares-based structural equation model. Without data-driven culture and IT business process integration, the results suggest that there is a process from business analytics affordances to decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and to the management of cloud computing data security. Moreover, Data-driven culture and IT business process integration have a positive mediation effect on the relationship between business analytics affordances and decision-making affordances of cloud computing data security. The conclusions in this study provide useful references for the enterprise to strengthen the management of cloud computing data security using business analytics.

Suggested Citation

  • Wang, Zhiying & Wang, Nianxin & Su, Xiang & Ge, Shilun, 2020. "An empirical study on business analytics affordances enhancing the management of cloud computing data security," International Journal of Information Management, Elsevier, vol. 50(C), pages 387-394.
  • Handle: RePEc:eee:ininma:v:50:y:2020:i:c:p:387-394
    DOI: 10.1016/j.ijinfomgt.2019.09.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0268401218302603
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijinfomgt.2019.09.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mohammad Taghi Taghavifard & Setareh Majidian, 2022. "Identifying Cloud Computing Risks based on Firm’s Ambidexterity Performance using Fuzzy VIKOR Technique," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 23(1), pages 113-133, March.
    2. Shahriar Akter & Katina Michael & Muhammad Rajib Uddin & Grace McCarthy & Mahfuzur Rahman, 2022. "Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics," Annals of Operations Research, Springer, vol. 308(1), pages 7-39, January.
    3. D'Ambra, John & Akter, Shahriar & Mariani, Marcello, 2022. "Digital transformation of higher education in Australia: Understanding affordance dynamics in E-Textbook engagement and use," Journal of Business Research, Elsevier, vol. 149(C), pages 283-295.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:50:y:2020:i:c:p:387-394. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.