International Journal of Empirical Research Methods

ISSN NO : 2995-6110

The International Journal of Empirical Research Methods is dedicated to promoting and advancing empirical research methodologies across various disciplines. This journal aims to provide a platform for researchers, scholars, educators, and practitioners to share insights, methodologies, and findings that contribute to the improvement of empirical research practices and the enhancement of evidence-based decision-making.

  • 505
    Views
  • 0
    CrossRef citations to date

Unveiling The Determinants Of Actual Use Among Google Drive Users: A Comprehensive Analysis

1 Marketing, Innovation & Technology, Department Of Business Administration, Politeknik Negeri Samarinda,,Indonesia   |   2 Victoria University Business School, Victoria University Melbourne,,Australia

Volume 2

Issue 1

Page: [1 - 15]

Published Online: March 5, 2024

  • Abstract

    Purpose: This Study Aims To Examine And Demonstrate The Impact Of Perceived Security, Perceived Privacy, System Quality, And Utilitarian Motives On Users’ Actual Use Of Google Drive In Indonesia.
    Design/Methodology/Approach: This Study Focuses On Attitudes Toward Use And Trust As Mediating Variables In This Relationship. The Sample Consisted Of 115 Google Drive Users Who Had Completed The Questionnaire. A Quantitative Methodology Was Adopted, Utilizing Path Analysis With IBM SPSS Statistics 23 And Structural Equation Modeling (SEM) Using AMOS- 5. An Accidental Random Sampling Technique Was Employed, And The Questionnaire Was Distributed To 120 Google Drive Users In Indonesia.
    Findings: The Structural Model Results Indicate That Perceived Security And Privacy Influence Attitudes And Actual Use. The Relationship Between Attitudes Toward Use Significantly Affects The Actual Use Of Google Drive Among Users In Indonesia. Likewise, Perceived Security And Privacy Significantly Influence Usage Attitudes And Relationships With Actual Use.
    Practical Implications: The Current Research Is Valuable For Google Drive Users To Illustrate The Development Of A Relatively Secure Cloud-Based Google Drive.
    Originality/Value: To The Best Of Our Knowledge, The Current Study Is The First Academic Paper To Broaden Google Drive User Adoption By Examining The Determinants Of Usage Among Google Drive Users.

    Keywords: Google Drive Perceived Security Privacy Attitudes Actual Use Methodology

  • Figures

    Figure Image

  • References

      • [1]Adams, A., & Sasse, M. (2001). Privacy in Multimedia Communications: Protecting Users, Not Just Data. . Computer Science, pp. , 49-64. https://doi.org/10.1007/978-1- 4471-0353-0_4
      • [2]Ajzen, I. (1985). From intention to actions: A theory of planned behaviour. In J. Kuhl & J. Beckmann (Eds.), Springer Series in Social Psychology: Vol. 11. Action control: From cognition to behavior (pp. 11-39). Springer. In J. K. Beckmann, Springer Series in Social Psychology (Vol. 11). Springer. https://doi.org/10.1007/978-3-642- 69746-3_2
      • [3]Akturan, U., & Tezcan, N. (2012). Mobile banking adoption of the youth market: Perceptions and intentions. Marketing Intelligence and Planning, 30(4), 444-459. https://doi. org/10.1108/02634501211231928
      • [4]Alharbi, S., & Drew, S. (2014). An exploratory study of the determinants of cloud storage acceptance. Journal of Systems and Information Technology, 16(3), 243-263.
      • [5]Ali, F., Rana, N., Dwivedi, Y., & Dwivedi, Y. (2021). The role of perceived security, privacy, and trust in the adoption of e-Government services. International Journal of Information Management, 56, 102264.
      • [6]Ali, M., Zhou, J., Ali, M., & Khan, S. (2019). Privacy concern, attitude and intention to use cloud-based storage services. Information Systems Frontiers, 21(5), 961-976. https://doi.org/10.1007/ s10796-017-9820-7.
      • [7]Ali, O., Shrestha, A., Osmanaj, V., & Muhammed, S. (2021). Cloud computing technology adoption: an evaluation of key factors in local govertments. Information Technology & People, 34(2), 666-703. https://doi.org/10.1108/ITP-03- 2019-0119
      • [8]Almusharraf, N., Alqahtani, A., & Alshahrani, S. (2020). User adoption of cloudbased storage services: A study of individual-level factors. . Telematics and Informatics, 47.
      • [9]Al-Okaily, M., Alkhwaldi, A., Abdulmuhsin, A., Alqudah, H., & Al-Okaily, A. (2023). Cloud-based accounting information systems usage and its impact on Jordanian SMEs’ performance: the post- COVID-19 perspective. Journal of Financial Reporting and Accounting , 21(1), 126-155. https://doi.org/10.1108/JFRA-12- 2021-0476
      • [10]Aribake, F., & Aji, Z. (2020). The Mediating Role Of Perceived Security on The Relationship Between Internet Banking Users And Their Determinants. International Journal of Management, Accounting, and Economics, 7(12), 1392-1410.
      • [11]Asyary, A., & Djatna, T. (2022). The effect of utilitarian and hedonic motivation on the adoption of mobile payment in Indonesia. Journal of Open Innovation: Technology, Market, and Complexity, 8(1), 2-9.
      • [12]Chang, H., & Lin, C. (2021). Examining the determinants of mobile payment continuance usage intention: The roles of utilitarian motive, habit, and self-efficacy. Journal of Retailing and Consumer Services, 59(10), 24- 28.
      • [13]Chen, M., Liu, S., Yu, J., & Zhang, X. (2020). Determinants of continuous use intention of cloud storage services: A perspective of information system success model. Journal of Information Science, 46(2), 262-278.
      • [14]Cheng, Z., Zhu, Q., & Recker, J. (2013). Understanding the determinants of consumers’ behavioral intentions toward social networking sites in China. Journal of Computer Information Systems, 53(4), 64-73. https://doi.org/10.1080/08874417. 2013.11645647
      • [15]Cheng, Z., Zhu, Q., & Recker, J. (2013). Understanding the determinants of consumers’ behavioral intentions toward social networking sites in China. Journal of Computer Information Systems, 53(4), 64-73. https://doi.org/10.1080/08874417. 2013.11645647
      • [16]Chung, K., Chen, C., Tsai, H., & Chuang, Y. (2021). Social media privacy management strategies: A SEM analysis of user privacy behaviors. Computer Communications, 174(2), 122-130. https://doi.org/10.1016/j.comcom. 2021.04.012
      • [17]Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008
      • [18]Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340. MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008
      • [19]Delone, W., & McLean, E. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9-30. https://doi.org/10.1080/07421222. 2003.11045748
      • [20]Dhillon, G., & Moores, T. (2001). Internet banking adoption in Singapore: An empirical study. International Journal of Bank Marketing, 19(4), 170-182, 19(4), 170-182.
      • [21]Dhillon, G., & Moores, T. (2001). Internet banking adoption in Singapore: An empirical study. International Journal of Bank Marketing, 19(4), 170-182.
      • [22]Drogra, N., & Adil, M. (2022). Should we or should we not? Examining travelers’ perceived privacy, perceived security and actual behavior in online travel purchases. Journal of Vacation Marketing, 2022/08/29, DOI:10.1177/13567667221122103. https://doi. org/10.1177/13567667221122103
      • [23]Duong, V., & Guan, B. (2020). The role of privacy self-efficacy and privacy concern in online privacy protection behavior: A study of social networking sites users in Vietnam. Computers in Human Behavior, 111, 106421.
      • [24]Dwivedi, Y., Rana, N., Jeyaraj, A., Clement, M., & Williams, M. (2015). Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model. Information Systems Frontiers, 17(6), 1183-1208.
      • [25]Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site. Industrial Management & Data Systems, 106(5), 601-620. https://doi. org/10.1108/02635570610666403
      • [26]Gao, Q., Bai, X., & Shen, X. (2022). The role of attitude in shaping user engagement with social media: A dual-process perspective. Information & Management, 59(1), 103520.
      • [27]Gella, T., & Bernal, J. (2022). Perceived security in e-commerce: The mediating role of trust and the moderating role of prior experience. Journal of Retailing and Consumer Services, 67(10), 25- 38.
      • [28]Hair, J., Black, W., Babin, B., & Anderson, R. (2019). Multivariate data analysis (Vol. (8th ed.)).
      • [29]Hardi, S., & Nababan, M. (2021). Examining the factors affecting the intention to adopt cloud storage services in Indonesia: An extension of the UTAUT model. International Journal of Innovation, Creativity and Change, 15(8), 31-50.
      • [30]Hardi, S., & Nababan, M. (2021). Examining the factors affecting the intention to adopt cloud storage services in Indonesia: An extension of the UTAUT model. International Journal of Innovation, Creativity and Change, 15(8), 31-50.
      • [31]Hardi, S., & Nababan, M. (n.d.). Examining the factors affecting the intention to adopt cloud storage services in Indonesia: An extension of the UTAUT model. International Journal of Innovation, Creativity and Change, 15(8), 31-50.
      • [32]Hoque, M., & Sorwar, G. (2021). Exploring factors influencing actual use behavior of cloud storage services among university students: A mixed-methods approach. Journal of Organizational and End User Computing, 33(2), 1-23. https://doi.org/10.4018/ JOEU.
      • [33]Hossain, M., & Prybutok, V. (2008). Consumer acceptance of RFID technology: An exploratory study. I. IEEE transactions on engineering management, 55(2), 316-328. https://doi.org/10.1109/ TEM.2008.919728
      • [34]Huang, J., Duan, Y., & Zhuang, Y. (2021). Security and privacy concerns in cloud storage adoption: An integrative perspective of the technology acceptance model and privacy calculus model. Journal of Organizational Computing and Electronic Commerce, 31(2), 109- 132.
      • [35]Kavitha, K., & Kannan, D. (2020). Factors Influencing Consumers’ Attitude Towards Mobile Payment Applications. International Journal of Innovation, Creativity and Change, 11(4), 140- 150.
      • [36]Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2012). Cloud migration: A case study of migrating an enterprise IT system to IaaS. IEEE 5th International Conference on Cloud Computing (pp. 450-457). IEEE.
      • [37]Khan, S., Umer, R., Umer, S., & Naqvi, S. (2020). Antecedents of Trust in Using Social Media for E-government Services: An Empirical Study in Pakistan. International Journal of Electronic Government Research, 16(3), 24-43.
      • [38]Kim, C., Tao, W., Kim, M., & Kim , H. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9(1), 84-85. Electronic Commerce Research and Applications, 9(1), 84- 85. https://doi.org/10.1016/j.elerap. 2009.04.014
      • [39]Kim, W., Choi, J., & Kim, H. (2013). An empirical study of factors affecting the adoption of cloud storage services by individuals. Journal of the Korean Society for Information Management, 30(3), 179-197.
      • [40]Kwon, O., & Wen, Y. (2010). An empirical study of the factors affecting social network service use. Computers in Human Behavior, 26(2), 254-263. https://doi.org/10.1016/j. chb.2009.04.011
      • [41]Lee, D., & Turban, E. (2021). A dual-factor perspective on mobile payment systems: Security and privacy concerns. Information & Management, 58(1), 33-83.
      • [42]Li, J., & Liu, M. (2022). Understanding user satisfaction and continued use intention of cloud storage services: A triadic perspective of user experience, system quality, and perceived value. International Journal of Information Management, 64, 102341.
      • [43]Li, Y., Tan, X., & Zhang, X. (2018). The effect of privacy concerns on users’ continuance intention to use mobile social networking sites. Information Systems Frontiers, 20(4), 789-805.
      • [44]Luo, X., Li, H., Zhang, J., & Shim, J. (2021). Examining the effects of self-disclosure on trust and attitude toward mobile social networking sites: A comparative study of the United States and China. International Journal of Information Management, 58, 102315.
      • [45]Maharani, E., Wicaksana, I., & Astuti, P. (2020). The effects of perceived benefits, perceived risks, and perceived trust on the intention to adopt cloud storage services in Indonesia. Journal of Theoretical and Applied Information Technology, 98(18), 3896- 3906.
      • [46]Miftahussurur, M., & Arifianto, M. (2021). Understanding determinants of cloud storage adoption in the Indonesian context. Journal of Open Innovation: Technology, Market, and Complexity, 7(4), 111.
      • [47]Nair, S., & Paul, J. (2018). Influence of perceived security, privacy concerns and trust on mobile wallet adoption. Journal of Enterprise Information Management, 31(6), 908-925.
      • [48]Nguyen, A., Nguyen, T., & Dang, G. (2020). Determinants of E-invoice Adoption: Empirical Evidence from Vietnam. Journal of Asian Finance, Economics and Business, 7(7), 311-321. https://doi.org/10.13106/ jafeb.2020.vol7.no7.311
      • [49]Niu, J., Wang, Y., Zhang, X., & Lu, Y. (2020). An examination of the factors influencing user acceptance of online banking: A self-determination theory perspective. International Journal of Information Management, 54, 102141.
      • [50]Oh, J., Lee, G., & Kim, S. (2021). Understanding factors affecting continuous use intention of cloud storage services: An integrated model of trust, perceived value, and satisfaction. Information Development, 37(2), 250-266. https://doi.org/10.1177/026666. Information Development, 37(2), 250-266. https://doi. org/10.1177/026666.
      • [51]Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2021). Mobile banking usage: A systematic review of the literature. International Journal of Information Management, 57, 102312.
      • [52]Omar, A., Anuar, N., & Karim, H. (2021). Trust factors influencing the adoption of mobile banking services among university students in Malaysia: A proposed model. Journal of Theoretical and Applied Electronic Commerce Research, 16(6), 2516-2532.
      • [53]Park, S., & Kim, Y. (2003). A framework of dynamic CRM: Linking marketing with information strategy. Business Process Management Journal, 9(5), 652-671. Park, S., & Kim, Y. (2003). A framework of dynamic CRM: Linking marketing with information strategy. Business Process Management Journal, 9(5), 652-671. https://doi. org/10.1108/14637150310496749
      • [54]Pham, Q., Nguyen, H., & Pham, C. (2019). Determinants of continued cloud storage adoption: An integrated perspective of expectation-confirmation and technology acceptance models. Journal of Organizational Computing and Electronic Commerce, 29(3), 212-236.
      • [55]Pham, Q., Tran, T., Nguyen, T., & Nguyen, D. (2022). Understanding privacy concerns in social media usage: A privacy calculus perspective. International Journal of Information Management, 62(10), 24-32.
      • [56]Pozzebon, M. (2000). Combining a structuration approach with a behavioural-based model to investigate ERP usage. AMCIS Proceedings (p. 124). AMCIS.
      • [57]Prasad, S., & Garg, A. (2019). The purchase decision of Generation Y in an online environment. . Marketing Intelligence & Planning, 37(4), 492-508. https://doi.org/10.1108/MIP-02- 2018-0070
      • [58]Pusad, H., & Lee, K. (2020). The influence of perceived security on consumers’ continuous intention to use e-payment systems: The moderating role of trust. International Journal of Electronic Commerce, 25(3), 338- 367.
      • [59]Rosdiana, F., & Susanto, A. (2021). Determinants of cloud storage adoption in the context of Indonesian small and medium- sized enterprises. Journal of
      • [60]Shin, D. (2009). Towards an understanding of the consumer acceptance of mobile wallets. Computers in Human Behavior, 25(6), 1343-1354. https://doi.org/10.1016/j. chb.2009.06.001
      • [61]Shin, D. (2010). The effects of trust, security and privacy in of trust, social networking: A security-based approach to understand the adoption pattern. Interacting with computers, 22(5), 428-438. https://doi.org/10.1016/j.intcom. 2010.05.001
      • [62]Son, J., Kim, D., Kim, J., & Lee, E. (2017). The effects of consumers’ perceived security and privacy on trust in mobile commerce. Information Systems Frontiers, 19(3), 533-549. https:// doi.org/10.1007/s10796-015-9614- 1.
      • [63]Straub, D., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring System Usage: Implications for IS Theory Testing. Management Science, 41(8), 1328- 1342. https://doi.org/10.1287/ mnsc.41.8.1328
      • [64]Sugiyono. (2012). Metode Penelitian Kuantitatif Kualitatif dan R&D. Bandung: Alfabeta.
      • [65]Suryani, L., & Soesanto, R. (2020). Factors influencing cloud computing adoption intention: A study of individual cloud users in Indonesia. Journal of Business and Retail Management Research, 14(4), 145-153.
      • [66]Teo, T., & Tan, B. (2003). A contingency perspective on Internet adoption and competitive advantage. European Journal of Information Systems, 12(2), 78-92. https://doi.org/10.1057/palgrave. ejis.3000448
      • [67]Van Slyke, C., Iliev, R., & Sivo, S. (2022). Privacy concerns and trust in government: Exploring the role of perceived security and service quality. Government Information Quarterly, 39(3), 101620.
      • [68]Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478. https://doi.org/10.2307/30036540
      • [69]Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478. https://doi.org/10.2307/30036540
      • [70]Vrinda, M., Jaisingh, J., & Sarkar, A. (2019). Factors influencing users’ adoption and continuous use of cloud storage services: An integrated model. Journal of Enterprise Information Management, 32(1), 69-88. https://doi. org/10.1108/JEIM-09-2018-0207. Journal of Enterprise Information Management, 32(1), 69-88. https:// doi.org/10.1108/JEIM-09-2018- 0207.
      • [71]Wang, D., Chen, W., & Lu, Y. (2020). Examining the role of trust in privacy concern and social influence in social networking site adoption: A longitudinal study. International Journal of Information Management, 51(102043), https:// doi.org/10.1016/j.ijinf .
      • [72]Xu, H., Dinev, T., Smith, H., & Hart, P. (2020). Information privacy self-control: A cross-cultural investigation. Journal of Management Information Systems, 37(4), 1117-1145.
      • [73]Xu, H., Dinev, T., Smith, H., & Hart, P. (2020). Information privacy self-control: A cross-cultural investigation. Journal of Management Information Systems, 37(4), 1117-1145.
      • [74]Yang, K., Zhang, Q., Wang, C., & Guo, X. (2019). Understanding users’ intentions to adopt cloud storage services: Evidence from China. Information Systems Frontiers, 21(2), 343- 359.
      • [75]Yousafzai, S., Pallister, J., & Foxall, G. (2003). A proposed model of e-trust for electronic banking. Technovation, 23(11), 847-860. https://doi.org/10.1016/S0166- 4972(03)00130-5
      • [76]Yousafzai, S., Pallister, J., & Foxall, G. (2003). A proposed model of e-trust for electronic banking. Technovation, 23(11), 847-860. https://doi.org/10.1016/S0166- 4972(03)00130-5
      • [77]Zhang, L., Guo, X., & Chen, H. (2022). Security and privacy concerns in smart home adoption: A dual-factor approach. Computers in Human Behavior, 128(107239), https://doi. org/10.1016/j.chb.2021.107239. https://doi.org/10.1016/j. chb.2022.107239
      • [78]Zhang, T., Wang, W., Cao, L., & Wang, Y. (2019). The roles of virtual try-on technology in online purchase decisions from consumers’ aspects. Internet Research, 29(6), 1360-1378. https://doi.org/10.1108/IntR-12- 2017-0540
      • [79]Zhang, Z., & Chen, X. (2018). Understanding the role of perceived security in mobile payment adoption: An empirical investigation. Information & Management, 55(7), 840-850.
  • Article Metrics

    Views

    505
  • Copyright and Permissions

    At Guinness Press, authors retain the copyright for all articles published in our journals. These articles are licensed under the open-access Creative Commons CC BY 4.0 license, granting free access for reading and download. Additionally, the original published version must be appropriately cited when reusing or quoting the article. These terms ensure widespread accessibility while ensuring proper attribution to the authors.

    All content published by Guinness Press is safeguarded by international copyright and intellectual property regulations. We kindly request that you honor these protections when utilizing our materials.

    For further information, please contact us at info@guinnesspress.org.