Document Type : Articles

Authors

1 M.A. student of information management at Shahid Beheshti University, Tehran, Iran

2 Associate Prof., Department of Knowledge and Information Science , University of Tabriz, Tabriz, Iran

3 M.A. student of scientometrics, University of Tabriz, Tabriz, Iran

Abstract

Cloud storage technology is attracting more attention due to the increasing implementation of technology in everyday life. The present study aims to assess Iranian iCloud users' richness of information security awareness at the three levels of knowledge, attitude, and behavior, based on six aspects required for adhering to information security policies. Accordingly, in this study, the self-reported data of 384 Iranian users of Apple products (IUAP) were investigated using a questionnaire designed by a researcher. Then, the data were analyzed using Microsoft Excel software. This research showed that the average information security awareness of IUAP is 3.22 out of 5, a slightly higher than average score using a quantitative approach and descriptive statistics,. Almost three-quarters of them use iCloud, mainly because of its easy access to information. It also assesses various aspects and examples of information security awareness and behaviors that indicate compliance with information security policies. Finally, the general knowledge of Iranian iCloud users about the components of information security awareness is estimated to be 73.83, which is relatively low and unsatisfactory, showing that more attention and training are needed. Moreover, this study prioritizes different components of information security awareness.

Keywords

AlAhmad, A. S., Kahtan, H., Alzoubi, Y. I., Ali, O. & Jaradat, A. (2021). Mobile cloud computing models security issues: A systematic review. Journal of Network and Computer Applications, 190. 103152. https://doi.org/10.1016/j.jnca.2021.103152
Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218-226. https://doi.org/10.1016/j.chb.2018.04.003
Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Lawrence Erlbaum Associates Publishers.
Deighton, T. & Wakefield, M. (2020). Keep security top of mind when moving into the cloud. Network Security, 2020(6), 17-19. https://doi.org/10.1016/s1353-4858(20)30069-6
Elahi, Sh., Taheri, M. & Hassanzadeh, A. (2009). A framework for the role of human factors in information systems security. Journal of Management Research in Iran, 13 (2), 1-22. Retrieved from https://mri.modares.ac.ir/article_186_ae391fb02bfd0cd274bc728f56e2842e.pdf?lang=en [in Persian]
Fornell, C. & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research;18(3), 382-388. https://doi.org/10.1177/002224378101800313
 Ghasemi, S., Kiumarsi, F. & Zamani Dehkordi, B. (2017) Review of secure data storage and transmission in cloud-based networks. in National Conference on Vision 2041 and Technological Advances in Electrical Engineering, Computer and Information Technology, Shiraz: Iran Modern Education Development Center (Metana). [in Persian]
Hair, J. F., Ringle, C. M. & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-152. https://doi.org/10.2753/MTP1069-6679190202
Henseler, J., Ringle, C.M. & Sinkovics, R.R. (2009), The use of partial least squares path modeling in international marketing, Sinkovics, R.R. and Ghauri, P.N. (Ed.) New Challenges to International Marketing (Advances in International Marketing, Vol. 20), Emerald Group Publishing Limited, Bingley, pp. 277-319. https://doi.org/10.1108/S1474-7979(2009)0000020014 
Jahangiri, N. (2011). A conceptual framework for assessing the richness and awareness of users information security (Case study: Post Bank), Master Thesis in Information Technology Management, Faculty of Engineering, Payame Noor University, Central Branch, Tehran. [in Persian]
Jarno, A. D. B., Baharom, S. B. & Shahpasand, M. (2017). Cloud testing: Requirements, tools and challenges. Journal Of Applied Technology And Innovation, 1(2), 79-93. Retrieved from https://dif7uuh3zqcps.cloudfront.net/wp-content/uploads/sites/11/2018/07/17035751/2017_Issue2_Paper8.pdf
kaur, A. & kaur, R. (2018). Cloud computing: A focus on security issues in cloud computing region. International Journal of Advanced Research in Computer Science, 9(2), 267-269. https://doi.org/10.26483/ijarcs.v9i2.5556   
Kazempourian Mamghani, S. & Mirahmadi, J. (2016) Information technology risk management in cloud computing. in 3rd International Conference on Research in Engineering, Science and Technology. [in Persian]
Khan, B., Alghathbar, K. S., Nabi, S. I. & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management5(26), 10862-10868. https://doi.org/10.5897/AJBM11.067
Kruger, H. A. & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers & Security, 25(4), 289-296. https://doi.org/10.1016/j.cose.2006.02.008
Makarevich, O., Mashkina, I. & Sentsova, A. (2013, November). The method of the information security risk assessment in cloud computing systems. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 446-447).
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. & Pattinson, M. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156. https://doi.org/10.1016/j.chb.2016.11.065
McLeod, A. & Dolezel, D. (2022). Information security policy non-compliance: Can capitulation theory explain user behaviors?. Computers & Security, 112, 102526. https://doi.org/10.1016/j.cose.2021.102526
Motahari, F., Rouhani, S. & Zare Rawasan, A. (2014). Introduction of cloud computing: Security and threats. in 1st National Conference on Researches of Computer Engineering, Tehran: Farzin Center for Sustainable Development of Science and Technology. [in Persian]
Prajapati, P. & Shah, P. (2020). A review on secure data deduplication: Cloud storage security issue. Journal of King Saud University-Computer and Information Sciences, 34(7), 3996-4007. https://doi.org/10.1016/j.jksuci.2020.10.021 
Vurukonda, N. &  Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92,128-135. https://doi.org/10.1016/j.procs.2016.07.335
Sehgal, N. K., Bhatt, P. C. P. & Acken, J. M. (2020). Future trends in cloud computing. In Cloud Computing with Security (pp. 235-259). Springer, Cham.
Talib, S., Clarke, N. L., & Furnell, S. M. (2010, February). An analysis of information security awareness within home and work environments. In 2010 International Conference on Availability, Reliability and Security (pp. 196-203). IEEE.
Tenenhaus, M., Amato, S. & Esposito Vinzi, V. (2004, June). A global goodness-of-fit index for PLS structural equation modelling. In Proceedings of the XLII SIS scientific meeting (Vol. 1, No. 2, pp. 739-742).
 Tolah, A., Furnell, S. M. & Papadaki, M. (2021). An Empirical Analysis of the Information Security Culture Key Factors Framework. Computers & Security, 108. 102354. https://doi.org/10.1016/j.cose.2021.102354
Tsohou, A., Karyda, M. & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & Security, 52, 128-141. https://doi.org/10.1016/j.cose.2015.04.006
Von Solms, B. & Von Solms, R. (2004). The 10 deadly sins of information security management. Computers & security, 23(5), 371-376. https://doi.org/10.1016/j.cose.2004.05.002
Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. IEEE Access, 8, 131723-131740. https://doi.org/1109/ACCESS.2020.3009876
Zandvakili, M., Salehi, S. & Rashidi, A. (2012). Conceptual expression of brand and its essence in marketing communication development; Case Study: Apple's Brand. Journal of Visual and Applied Arts, 5(9), 71-91. https://doi.org/10.30480/vaa.2012.261 [in Persian]
Zeinali Khosroshahi, A., Babaei, Sh. & Ghasemi, E. (2018) Review of security challenges in cloud computing. in 13th Conference on Recent Research in Science and Technology, Kerman: Aseman Mehvaran Company. [in Persian]
Zhang, Y., Xu, C. & Shen, X. S. (2020). Summary and future research directions. In Data Security in Cloud Storage (pp. 167-171). Springer, Singapore.