Analysis of Role of Cloud Computing in Providing Internet Banking Services: Case Study Bank Melli Iran

Document Type : Original Article

Authors

1 Department of Industrial, K. N. Toosi University of Technology, Tehran, Iran, Tehran, Iran

2 Department of Information Technology, Islamic Azad University E-Campus, Tehran, Iran

Abstract

In this paper, the cloud-computing model proposed by Davis has been used to explain the main parameters of cloud computing by the use of information systems. This paper investigates influential factors in decision to use cloud computing among employees of the national bank information technology organization based on the cloud-computing model. To analyze and investigate the use of cloud computing in national bank services, the designed questionnaire was distributed among 230 experts and acquainted with the information technology industry in the national bank information technology organization; which resulted in the questionnaire’s Cronbach's alpha 0.84. After conducting exploratory and confirmatory factor analysis with regard to analytical coefficients, utility factors were proved to have the most critical influence on the decision of using cloud computing in the electronic banking system. The findings of this research can be considered as guidelines used by national bank managers to employ cloud computing technology.

Keywords

Main Subjects


  1. Langmead, B. and Nellore, A., "Cloud computing for genomic data analysis and collaboration", Nature Reviews Genetics, Vol. 19, No. 4, (2018), 208-219, doi: 10.1038/nrg.2017.113.
  2. Huang, D. and Wu, H., "Mobile cloud computing: Foundations and service models, Morgan Kaufmann, (2017).
  3. Wang, Y., Li, J. and Wang, H.H., "Cluster and cloud computing framework for scientific metrology in flow control", Cluster Computing, Vol. 22, No. 1, (2019), 1189-1198, doi: 10.1007/s10586-017-1199-3.
  4. Yu, Y., Miyaji, A., Au, M.H. and Susilo, W., Cloud computing security and privacy: Standards and regulations. 2017, Elsevier.1-2.
  5. Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H. and You, I., "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing", Information Sciences, Vol. 379, (2017), 42-61, doi: 10.1016/j.ins.2016.04.015.
  6. Timothy, D.P. and Santra, A.K., "A hybrid cryptography algorithm for cloud computing security", in 2017 International conference on microelectronic devices, circuits and systems (ICMDCS), IEEE. (2017), 1-5.
  7. Arunkumar, R.J. and Anbuselvi, R., "Enhancement of cloud computing security in health care sector", International Journal of Computer Science and Mobile Computing, Vol. 6, No. 8, (2017), 23-31.
  8. Pham, V.V.H., Liu, X., Zheng, X., Fu, M., Deshpande, S.V., Xia, W., Zhou, R. and Abdelrazek, M., "Paas-black or white: An investigation into software development model for building retail industry saas", in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), IEEE. (2017), 285-287.
  9. Aljawarneh, S., Cloud security engineering concept and vision: Concept and vision, in Cyber security and threats: Concepts, methodologies, tools, and applications. 2018, IGI Global.93-101.
  10. Hamidi, H., Vafaei, A. and Monadjemi, A., "Algorithm based fault tolerant and check pointing for high performance computing systems", Journal of Applied Sciences, Vol. 9, No. 22, (2009), 3947-3956, doi: 10.3923/jas.2009.3947.3956.
  11. Khan, N. and Al-Yasiri, A., Cloud security threats and techniques to strengthen cloud computing adoption framework, in Cyber security and threats: Concepts, methodologies, tools, and applications. 2018, IGI Global.268-285.
  12. Hamidi, H. and Mohammadi, K., "Modeling fault tolerant and secure mobile agent execution in distributed systems", International Journal of Intelligent Information Technologies, Vol. 2, No. 1, (2006), 21-36, doi: 10.4018/jiit.2006010102.
  13. Khalil, I.M., Khreishah, A. and Azeem, M., "Cloud computing security: A survey", Computers, Vol. 3, No. 1, (2014), 1-35, doi: 10.3390/computers3010001.
  14. Bahrami, L., Safaie, N., "Effect of motivation, opportunity and ability on human resources information security management considering the roles of attitudinal, behavioral and organizational factors", International Journal of Engineering, Transactions C: Aspects, Vol. 34, No. 12, (2021), 2624-2635., doi: 10.5829/ije.2021.34.12c.07.
  15. Subashini, S. and Kavitha, V., "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34, No. 1, (2011), 1-11, doi: 10.1016/j.jnca.2010.07.006.
  16. Nilchi, A.N., Vafaei, A. and Hamidi, H., "Evaluation of security and fault tolerance in mobile agents", in 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN'08), IEEE. (2008), 1-5.
  17. Kandukuri, B.R. and Rakshit, A., "Cloud security issues", in 2009 IEEE International Conference on Services Computing, IEEE. (2009), 517-520.
  18. Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L.L., "On technical security issues in cloud computing", in 2009 IEEE international conference on cloud computing, IEEE. (2009), 109-116.
  19. Hamidi, H. and Kamankesh, A., "An approach to intelligent traffic management system using a multi-agent system", International Journal of Intelligent Transportation Systems Research, Vol. 16, No. 2, (2018), 112-124, doi: 10.1007/s13177-017-0142-6.
  20. Alvanchi, A., Didehvar, N., Jalilehvand, M., Adami, P. and Shahmir, S., "Semi-augmented reality, a novel approach to improve customer safety in the pre-sale process of under construction buildings", International Journal of Engineering, Transactions C: Aspects, Vol. 34, No. 10, (2021), doi: 10.5829/ije.2021.34.10a.01.
  21. Torabi, A., Hamidi, H. and Safaie, N., "Effect of sensory experience on customer word-of-mouth intention, considering the roles of customer emotions, satisfaction, and loyalty", International Journal of Engineering, Transactions C: Aspects, Vol. 34, No. 3, (2021), 682-699, doi: 10.5829/ije.2021.34.03c.13.
  22. Daraei, A. and Hamidi, H., "An efficient predictive model for myocardial infarction using cost-sensitive j48 model", Iranian Journal of Public Health, Vol. 46, No. 5, (2017), 682, doi. http://ijph.tums.ac.ir/index.php/ijph/article/view/9918
  23. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Konwinski, A., Lee, G., Rabkin, A., Stoica, I. and Zaharia, M., "A view of cloud computing, communications of the acm", Vol, Vol. 53, No., (2010), 5058, doi: 10.1145/1721654.1721672.
  24. Jansen, W.A., "Cloud hooks: Security and privacy issues in cloud computing", in 2011 44th Hawaii International Conference on System Sciences, IEEE. (2011), 1-10.
  25. Mohammadi, S. and Jahanshahi, H., "A study of major mobile payment systems' functionality in europe", in 2008 11th International Conference on Computer and Information Technology, IEEE. (2008), 605-610.