Skip to main content

Table 2 Metrically measured indicators

From: Adoption of security as a service

Construct

Indicator(s)

Reference(s)

Adoption (refl.)

Actual use

[22, 23, 26]

 

Use intent short-term (next 3 years)

 
 

Use intent mid-term (4–7 years)

 
 

Use intent long-term (≥ 7 years)

 

Adoption (form.)

Actual use/intent of Endpoint Security applications

[13, 14, 23]

 

Actual use/intent of content security applications (appl.)

 
 

Actual use/intent of application security applications

 
 

Actual use/intent of compliance & IT security management appl.

 
 

Actual use/intent identity & access management appl.

 
 

Actual use/intent of managed devices applications

 
 

Actual use/intent of security information & event management appl.

 
 

Actual use/intent of threat & vulnerability management appl.

 

Perceived ease of use (refl.)

General ease of use

[26, 34]

 

Ease of learning

 
 

Ease of target achievement

 

Perceived ease of use (form.)

Ease of initial integration/deployment of the service

[1315, 36]

 

Usability of the service

 
 

Ease of customizing the service

 
 

Comprehensive support by service provider

 

Perceived usefulness (refl.)

Increase in performance

[26, 34]

 

General usefulness

 
 

Increase in effectiveness

 

Perceived cost & liquidity benefits (form.)

Reduction in costs of operation and maintenance

[11, 1315, 25, 37]

 

Variabilization of IT security costs

 
 

Reduction in recovery costs

 

Perceived quality benefits (form.)

Transparency & control of security department

[11, 1316, 25]

 

Increase in organizational level of security

 
 

Improvement of legal and regulative compliance

 

Perceived flexibility benefits (form.)

Flexibility of IT and security processes

[11, 13, 14, 25]

 

Flexibility of business processes

 
 

Reactivity regarding security-related problems

 

Increased focus on core business (form.)

Decrease in employee errors

[11, 1315, 25, 37, 38]

 

Time savings in security management

 

Improved resource access (form.)

Enablement of access to new technologies

[11, 15, 25]

 

Access to external know-how

 
 

Independence from dedicated systems

 

Trust (refl.)

Overall trust in adoption

[22, 23, 26]

 

Trust in certified service providers

 
 

Hesitation due to uncertainty

 

Perceived security risks (form.)

Vulnerability to unauthorized service access

[2, 11, 14]

 

Deficient data mitigation and security

 
 

Vulnerability regarding network-based attacks

 
 

Deficient service continuity

 

Perceived strategy & compliance risks (form.)

Dependence on service providers

[14, 15, 25, 37]

 

Inability to comply with obligations to produce supporting documents

 
 

Non-compliance with data protection regulations

 

Perceived social risks (form.)

Internal resistance

[23, 25]

 

Loss of image

 

Perceived financial & operational risks (form.)

Unexpected costs of integration

[11, 15, 25, 42, 45]

 

Deficient provider’s compliance with SLAs

 

Attitude (refl.)

General attitude toward cloud technologies

[22, 23, 26]

 

Relative advantage over managed security

 
 

Relative advantage over on-premises systems

 

Strategic value of IT security (refl.)

Criticality of IT security for business

[23]