Information Technology Reference
In-Depth Information
RQ3: Success Factors. For the determination of the success factors, the panel
had to rate each hypothesized item on a 5-point Likert scale with following se-
mantics: [1] absolutely not critical ,[2] rather not critical ,[3] neutral ,[4] rather
critical ,[5] absolutely critical .Anitemisconsideredtobea weak success factor
[+] when its median is significantly equal to or greater than 4.0, a moderate
success factor [++] when it is (additionally) equal to or greater than 4.5, or a
strong success factor [+++] for a median equals 5.0. The remaining items were
evaluated to be no success factor at all [o] causing the falsification of the corre-
sponding hypotheses. The factors already eliminated after R2 are also enlisted
(labelled [*]). The analysis of all success factor candidates is summarized by ta-
ble 4 ( method -related), table 5 ( system -related) and table 6 ( provider -related)
Tabl e 4. Evaluation of Factors at the Method Level
Factor
Mean SD Median Min Max Relevance
H
Ease of use and user acceptance
4.88 0.34
5
4
5
+++
H22+
Transparency & data protection performance
4.29 0.81
4,5
3
5
++
H23+
Independence from dedicated hardware or software 4.00 0.78
4
2
5
+
H20+
Security and strength of the authentication
3.96 0.75
4
2
5
+
H24+
Time-ecient usability
3.92 0.65
4
2
5
+
H21+
Reachability of confidentiality
3.42 1.06
3,5
2
5
o
H27-
Reachability of non-repudiation
3.33 1.01
3
2
5
o
H26-
Scalability of the strength of authentication
3.17 0.76
3
2
5
o
H25-
Tabl e 5. Evaluation of Factors at the System Level
Factor
Mean SD Median Min Max Relevance
H
Transparency and usability of the system
4.50 0.51
4,5
4
5
++
H31+
Data security from the consumers' point of view 4.42 0.72
5
3
5
++
H32+
Service access and use by any device
4.29 0.81
4,5
3
5
++
H37+
Ease of technical service integration
4.29 0.62
4
3
5
++
H29+
Comprehensibly secure system interfaces
4.00 0.78
4
2
5
+
H34+
High availability and immediate service recovery 3.96 0.69
4
3
5
+
H33+
Low total costs for service use
3.92 0.72
4
3
5
+
H28+
Reachability of a high strength of authentication 3.83 0.64
4
2
5
+
H36+
Ability to scale and to customize function range 3.50 0.83
3
2
5
o
H38-
Existing integration with relevant target systems 3.42 1.06
3,5
2
5
o
H30-
Management and provisioning of user attributes 3.25 0.94
3
2
5
o
H39-
Ability to (ex-)port user application data*
3.10 0.98
3
2
5
o
H35-
Usability in private and business environments* 2.87 1.18
3
1
5
o
H40-
Tabl e 6. Evaluation of Factors at the Provider Level
Factor
Mean SD Median Min Max Relevance
H
Market visibility and reputation of the ASP
4.42 0.65
4,5
3
5
++
H45+
(External) Auditability
3.92 0.78
4
3
5
+
H47+
Flexible and customer-oriented licensing models 3.88 0.85
4
2
5
+
H41+
Transparent spec. of legal consequences & effects 3.83 0.70
4
3
5
+
H44+
Location of the ASP and its infrastructure
3.79 1.06
4
1
5
o
H50-
Comprehensive certification
3.71 0.95
4
2
5
o
H46-
Differentiated & standardized SLA
3.67 0.64
4
3
5
o
H42-
Customer support
3.58 0.72
4
2
5
o
H48-
Ability to customize SLA*
3.10 0.72
4
1
5
o
H43-
Synergy effects with other services*
2.70 0.72
4
1
5
o
H49-
 
Search WWH ::




Custom Search