Date of Conferral

2-24-2026

Degree

Doctor of Information Technology (D.I.T.)

School

Information Systems and Technology

Advisor

Alan Dawson

Abstract

Cloud computing is a virtual pool of services that provides confidentiality, availability, integrity, and authenticity for customers and cloud service providers, yet many organizations underutilize available cloud resources. This underutilization is a concern for organizational information technology (IT) leaders because solving it would improve secure scalability, operational efficiency, and return on investment. Grounded in the Technology Acceptance Model (TAM3) and the Unified Theory of Acceptance and Use of Technology (UTAUT3), the purpose of this multiple case study was to explore the security measures that IT Security managers can implement to ensure their organizations remain secure when using cloud computing infrastructure. The participants included are six IT security managers from the U.S.A. Data were collected using semistructured interviews, field notes, and public archival records. Data were analyzed using thematic analysis and within‑methods triangulation, which resulted in seven major themes: (a) User perception and corporate culture; (b) security adoption; (c) security balance and performance indicators; (d) emerging technology security landscape; (e) stakeholder participation and engagement; (f) security risk management; and (g) regulatory activities and compliance procedures. A key recommendation is that IT leaders should consider a strategic plan that addresses underlying behavioral issues and strengthens technical, human, and security controls. The implications for positive social change include greater individual empowerment and protection, stronger community resilience, and more adaptable institutions with improved digital safety.

Share

 
COinS