Document Type : Articles


1 M.A. student of information management at Shahid Beheshti University, Tehran, Iran

2 Associate Prof., Department of Knowledge and Information Science , University of Tabriz, Tabriz, Iran

3 M.A. student of scientometrics, University of Tabriz, Tabriz, Iran


Cloud storage technology is attracting more attention due to the increasing implementation of technology in everyday life. The present study aims to assess Iranian iCloud users' richness of information security awareness at the three levels of knowledge, attitude, and behavior, based on six aspects required for adhering to information security policies. Accordingly, in this study, the self-reported data of 384 Iranian users of Apple products (IUAP) were investigated using a questionnaire designed by a researcher. Then, the data were analyzed using Microsoft Excel software. This research showed that the average information security awareness of IUAP is 3.22 out of 5, a slightly higher than average score using a quantitative approach and descriptive statistics,. Almost three-quarters of them use iCloud, mainly because of its easy access to information. It also assesses various aspects and examples of information security awareness and behaviors that indicate compliance with information security policies. Finally, the general knowledge of Iranian iCloud users about the components of information security awareness is estimated to be 73.83, which is relatively low and unsatisfactory, showing that more attention and training are needed. Moreover, this study prioritizes different components of information security awareness.


AlAhmad, A. S., Kahtan, H., Alzoubi, Y. I., Ali, O. & Jaradat, A. (2021). Mobile cloud computing models security issues: A systematic review. Journal of Network and Computer Applications, 190. 103152.
Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218-226.
Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Lawrence Erlbaum Associates Publishers.
Deighton, T. & Wakefield, M. (2020). Keep security top of mind when moving into the cloud. Network Security, 2020(6), 17-19.
Elahi, Sh., Taheri, M. & Hassanzadeh, A. (2009). A framework for the role of human factors in information systems security. Journal of Management Research in Iran, 13 (2), 1-22. Retrieved from [in Persian]
Fornell, C. & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research;18(3), 382-388.
 Ghasemi, S., Kiumarsi, F. & Zamani Dehkordi, B. (2017) Review of secure data storage and transmission in cloud-based networks. in National Conference on Vision 2041 and Technological Advances in Electrical Engineering, Computer and Information Technology, Shiraz: Iran Modern Education Development Center (Metana). [in Persian]
Hair, J. F., Ringle, C. M. & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-152.
Henseler, J., Ringle, C.M. & Sinkovics, R.R. (2009), The use of partial least squares path modeling in international marketing, Sinkovics, R.R. and Ghauri, P.N. (Ed.) New Challenges to International Marketing (Advances in International Marketing, Vol. 20), Emerald Group Publishing Limited, Bingley, pp. 277-319. 
Jahangiri, N. (2011). A conceptual framework for assessing the richness and awareness of users information security (Case study: Post Bank), Master Thesis in Information Technology Management, Faculty of Engineering, Payame Noor University, Central Branch, Tehran. [in Persian]
Jarno, A. D. B., Baharom, S. B. & Shahpasand, M. (2017). Cloud testing: Requirements, tools and challenges. Journal Of Applied Technology And Innovation, 1(2), 79-93. Retrieved from
kaur, A. & kaur, R. (2018). Cloud computing: A focus on security issues in cloud computing region. International Journal of Advanced Research in Computer Science, 9(2), 267-269.   
Kazempourian Mamghani, S. & Mirahmadi, J. (2016) Information technology risk management in cloud computing. in 3rd International Conference on Research in Engineering, Science and Technology. [in Persian]
Khan, B., Alghathbar, K. S., Nabi, S. I. & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management5(26), 10862-10868.
Kruger, H. A. & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers & Security, 25(4), 289-296.
Makarevich, O., Mashkina, I. & Sentsova, A. (2013, November). The method of the information security risk assessment in cloud computing systems. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 446-447).
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. & Pattinson, M. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156.
McLeod, A. & Dolezel, D. (2022). Information security policy non-compliance: Can capitulation theory explain user behaviors?. Computers & Security, 112, 102526.
Motahari, F., Rouhani, S. & Zare Rawasan, A. (2014). Introduction of cloud computing: Security and threats. in 1st National Conference on Researches of Computer Engineering, Tehran: Farzin Center for Sustainable Development of Science and Technology. [in Persian]
Prajapati, P. & Shah, P. (2020). A review on secure data deduplication: Cloud storage security issue. Journal of King Saud University-Computer and Information Sciences, 34(7), 3996-4007. 
Vurukonda, N. &  Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92,128-135.
Sehgal, N. K., Bhatt, P. C. P. & Acken, J. M. (2020). Future trends in cloud computing. In Cloud Computing with Security (pp. 235-259). Springer, Cham.
Talib, S., Clarke, N. L., & Furnell, S. M. (2010, February). An analysis of information security awareness within home and work environments. In 2010 International Conference on Availability, Reliability and Security (pp. 196-203). IEEE.
Tenenhaus, M., Amato, S. & Esposito Vinzi, V. (2004, June). A global goodness-of-fit index for PLS structural equation modelling. In Proceedings of the XLII SIS scientific meeting (Vol. 1, No. 2, pp. 739-742).
 Tolah, A., Furnell, S. M. & Papadaki, M. (2021). An Empirical Analysis of the Information Security Culture Key Factors Framework. Computers & Security, 108. 102354.
Tsohou, A., Karyda, M. & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & Security, 52, 128-141.
Von Solms, B. & Von Solms, R. (2004). The 10 deadly sins of information security management. Computers & security, 23(5), 371-376.
Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. IEEE Access, 8, 131723-131740.
Zandvakili, M., Salehi, S. & Rashidi, A. (2012). Conceptual expression of brand and its essence in marketing communication development; Case Study: Apple's Brand. Journal of Visual and Applied Arts, 5(9), 71-91. [in Persian]
Zeinali Khosroshahi, A., Babaei, Sh. & Ghasemi, E. (2018) Review of security challenges in cloud computing. in 13th Conference on Recent Research in Science and Technology, Kerman: Aseman Mehvaran Company. [in Persian]
Zhang, Y., Xu, C. & Shen, X. S. (2020). Summary and future research directions. In Data Security in Cloud Storage (pp. 167-171). Springer, Singapore.