An Exploratory Study of Factors Driving Decision Maker Intentions to Adopt Cloud Computing

Vipin K Agrawal, Vijay K Agrawal, A Ross Taylor, Ngan Chau

Abstract


United States based companies have invested more heavily in cloud services than companies in other nations. Despite numerous benefits claimed by cloud service providers, many organisations are still uncertain about the implementation of cloud computing. The aim of this study is to gain a better understanding of the factors that are important to the usage adoption decision of this information technology delivery model and the implications for organisations in the United States. Decision makers were surveyed to discover which attributes were important in their determination of cloud computing utilisation. Using a sample of executives from manufacturing and service sectors in the United States, multiple factors contributing to the recent growth in cloud computing have been identified using a factor analysis. Four factors emerged from the data analysis include extrinsic motivation, intrinsic motivation, perceived risks, and resource constraint.


Keywords:

Cloud computing; cloud services; information technology; outsourcing

Full Text:

PDF

References


M. Ali, S. U. Khan, A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges”, Information Sciences, vol. 305, pp. 357–383, 2015. https://doi.org/10.1016/j.ins.2015.01.025

A. Aljabre, “Cloud computing for increased business value”, International Journal of Business and Social Science, vol. 3, no. 1, pp. 234–239, 2012.

S. A. Almulla and C. Y. Yeun, “Cloud computing security management”, in Engineering Systems Management and Its Applications (ICESMA), IEEE Second International Conference, pp. 1–7, 2010.

S. J. Andriole, “Ready technology”, Communications of the ACM, vol. 57, no. 2, pp. 40–42, 2014. https://doi.org/10.1145/2556941

S. J. Andriole, “Who owns IT?”, Communications of the ACM, vol. 58, no. 3, pp. 50–57, 2015. https://doi.org/10.1145/2660765

Y. L. Antonucci and J. J. Tucker III, “IT outsourcing: Current trends, benefits, and risks”, Information Strategy: The Executive’s Journal, vol. 14, no. 2, pp. 16–26, 1998. https://doi.org/10.1080/07438613.1998.10744580

C. A. Ardagna et al., “Scalability patterns for platform-as-a-service”, in Cloud Computing (CLOUD), IEEE 5th International Conference, 2012, pp. 718–725. https://doi.org/10.1109/CLOUD.2012.41

C. A. Ardagna et al., “From security to assurance in the cloud: A survey”, in ACM Computing Surveys, vol. 48, no. 1, 2015. https://doi.org/10.1145/2767005

M. Armbrust et al., “A view of cloud computing”, Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. https://doi.org/10.1145/1721654.1721672

M. Bayramusta and V. A. Nasir, “A fad or future of IT? A comprehensive literature review on the cloud computing research”, International Journal of Information Management, vol. 36, no. 4, pp. 635–644, 2016. https://doi.org/10.1016/j.ijinfomgt.2016.04.006

A. B. Blankenship, G. Breen, and A. Dutka, State of the Art Marketing Research. Chicago, IL: American Marketing Association, 1998.

R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities”, in High Performance Computing and Communications, 10th IEEE International Conference, 2008, pp. 5–13. https://doi.org/10.1109/HPCC.2008.172

A. Caldarelli, L. Ferri, and M. Maffei, “Expected benefits and perceived risks of cloud computing: an investigation within an Italian setting”, Technology Analysis & Strategic Management, vol. 29, no. 2, 2017, pp. 167–180. https://doi.org/10.1080/09537325.2016.1210786

N. G. Carr, “IT doesn’t matter”, in Harvard Business Review, vol. 38, 2003, pp. 24–38.

N. G. Carr, The big switch: Rewiring the world, from Edison to Google. New York: WW Norton & Company, 2008.

K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing”, Proceedings of the International conference on intelligent semantic Web-services and applications, p. 12, April, 2011. https://doi.org/10.1145/1980822.1980834

C. De Meijer, and A. Brown, “Transaction banking in the cloud: Towards a new business model”, Journal of Payments Strategy & Systems, vol. 8, no. 2, pp. 206–223, 2014.

S. Dhar, “From outsourcing to Cloud computing: evolution of IT services”, Management Research Review, vol. 35, no. 8, pp. 664–675, 2012. https://doi.org/10.1108/01409171211247677

D. A. Dillman, Mail and telephone surveys: The total design method (Vol.19). New York: Wiley Intersciences, 1978.

D. A. Dillman, Mail and internet surveys: The tailored design method. New York: John Wiley Co, 2000.

S. Domberger, The contracting organisation: A strategic guide to outsourcing. Oxford, UK: Oxford University Press, 1998. https://doi.org/10.1093/0198774575.001.0001

A. Dutta, G. C A. Peng, and A. Choudhary, “Risks in enterprise cloud computing: the perspective of IT experts”, Journal of Computer Information Systems, vol. 53, no. 4, pp. 39–48, 2013. https://doi.org/10.1080/08874417.2013.11645649

D. A. Fernandes et.al., “Security issues in cloud environments: a survey”, International Journal of Information Security, vol. 13, no. 2, pp. 113–170, 2014. https://doi.org/10.1007/s10207-013-0208-7

C. H. Fine, R. Vardan, R. Pethick, and J. El-Hout, “Rapid-response capability in value-chain design”, MIT Sloan Management Review, vol. 43, no. 2, 2002.

A. Goscinski, and M. Brock, “Toward dynamic and attribute based publication, discovery and selection for cloud computing”, Future Generation Computer Systems, vol. 26, no. 7, pp. 947–970, 2010. https://doi.org/10.1016/j.future.2010.03.009

J. F. Hair, W. C. Black, B. J., Babin, & R. E. Anderson, Multivariate Data Analysis 7th Edition. Harlow: Pearson Education Limited, UK, 2014.

M. A. Himmel, and F. Grossman, “Security on distributed systems: Cloud security versus traditional IT”, IBM Journal of Research and Development, vol. 58, no. 1, pp. 1–3, 2014. https://doi.org/10.1147/JRD.2013.2287591

B. N. Hwang, C. Y. Huang, and C. L. Yang, “Determinants and their causal relationships affecting the adoption of cloud computing in science and technology institutions”, Innovation, vol. 18, no. 2, pp. 164–190, 2016. https://doi.org/10.1080/14479338.2016.1203729

S. Ibrahim, B. He, and H. Jin, “Towards pay-as-you-consume cloud computing”, in Services Computing (SCC), 2011 IEEE International Conference on Services Computing, 2011, pp. 370–377. https://doi.org/10.1109/SCC.2011.38

A. Juels, and A. Oprea, “New approaches to security and availability for cloud data”, Communications of the ACM, vol. 56, no. 2, pp. 64–73, 2013. https://doi.org/10.1145/2408776.2408793

A. Kakabadse, and N. Kakabadse, “Trends in outsourcing: Contrasting USA and Europe”, European Management Journal, vol. 20, no. 2, pp. 189–198, 2002. https://doi.org/10.1016/S0263-2373(02)00029-4

J. R. Kalyvas, M. R. Overly, and M. A. Karlyn, “Cloud computing: a practical framework for managing cloud computing risk – part I”, Intellectual Property & Technology Law Journal, vol. 25, no. 3, pp. 7–18, 2013.

J. R. Kalyvas, M. R. Overly, and M. A. Karlyn, “Cloud computing: A practical framework for managing cloud computing risk – part II”, Intellectual Property & Technology Law Journal, vol. 25, no. 4, pp. 19–27, 2013.

L. Kappelman, et.al., “The 2016 SIM IT issues and trends study”, MIS Quarterly Executive, vol. (1), Article 6, 2017. Available: https://aisel.aisnet.org/misqe/vol16/iss1/6. [Accessed September 2019].

D. A. Kenny, B. Kaniskan, and D. B. McCoach, “The performance of RMSEA in models with small degrees of freedom”, Sociological Methods & Research, vol. 44, no. 3, pp. 486–507, 2015. https://doi.org/10.1177/0049124114543236

N. Kshetri, “Privacy and security issues in cloud computing: The role of institutions and institutional evolution”, Telecommunications Policy, vol. 37, no. 4–5, pp. 372–386, 2013. https://doi.org/10.1016/j.telpol.2012.04.011

Kynetix Technology Group, “Cloud computing – a strategic guide for board level executives”, 2009. [Online]. Available: https://www.scribd.com/document/50992268/Kyne-Tix-CloudComputing-Strategy-Guide. [Accessed: June 12, 2012].

P. Lal, and S. S. Bharadwaj, “Understanding the impact of cloud-based services adoption on organisational flexibility: An exploratory study”, Journal of Enterprise Information Management, vol. 29, no. 4, pp. 566–588, 2016. https://doi.org/10.1108/JEIM-04-2015-0028

J. Lawler, et al., “A case study of determinants of an effective cloud computing strategy”, The Review of Business Information Systems, vol. 16, no. 3, pp. 145–156, 2012. https://doi.org/10.19030/rbis.v16i3.7132

L. S. Lee, and Jr, R. D. Mautz, “Using cloud computing to manage costs”, Journal of Corporate Accounting & Finance, vol. 23, no. 3, pp. 11–15, 2012. https://doi.org/10.1002/jcaf.21748

A. Y. Lewin, and C. Peeters, “Offshoring work: business hype or the onset of fundamental transformation?”, Long Range Planning, vol. 39, no. 3, pp. 221–239, 2006. https://doi.org/10.1016/j.lrp.2006.07.009

A. Lin, and N. C. Chen, “Cloud computing as an innovation: Perception, attitude, and adoption”, International Journal of Information Management, vol. 32, no. 6, pp. 533–540, 2012. https://doi.org/10.1016/j.ijinfomgt.2012.04.001

S. Liu, et al., “The business value of cloud computing: the partnering agility perspective”, Industrial Management & Data Systems, vol. 116, no. 6, pp. 1160–1177, 2016. https://doi.org/10.1108/IMDS-09-2015-0376

P. Mahatanankoon, H. J. Wen, and B. Lim, “Consumer-based mcommerce: exploring consumer perception of mobile applications”, Computer standards & interfaces, vol. 27, no. 4, pp. 347–357, 2005. https://doi.org/10.1016/j.csi.2004.10.003

P. Maresova, V. Sobeslav, and O. Krejcar, “Cost–benefit analysis–evaluation model of cloud computing deployment for use in companies”, Applied Economics, vol. 49, no. 6, pp. 521–533, 2017. https://doi.org/10.1080/00036846.2016.1200188

S. Marston, et al., “Cloud computing—The business perspective”, Decision Support Systems, vol. 51, no. 1, pp. 176–189, 2011. https://doi.org/10.1016/j.dss.2010.12.006

P. Mell, and T. Grance, “The NIST definition of cloud computing – recommendations of the National Institute of Standards and Technology”, 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. [Accessed: March, 2019].

D. Naukam, “Finance must adapt to cloud-based subscription models”, Financial Executive, vol. 30, no. 2, pp. 100–104, 2014.

P. G. Neumann, “Risks and myths of cloud computing and cloud storage”, Communications of the ACM, vol. 57, no. 10, pp. 25–27, 2014. https://doi.org/10.1145/2661049

F. T. Neves, F. C. Marta, A. M. R. Correia, and M. D. C. Neto, “The adoption of cloud computing by SMEs: identifying and coping with external factors”, in Proceedings of the 11th Conference of Portugues Association of Information Systems, 2011, October 19–21, Lisbon, Portugal. [Online]. Available: http://run.unl.pt/bitstream/10362/6166/1/Neves_Marta_Correia_Neto_20 11.pdf. [Accessed: Feb. 3, 2012].

Z. Perunović, M. Christoffersen, and R. N. Mefford, “Deployment of vendor capabilities and competences throughout the outsourcing process”, International Journal of Operations & Production Management, vol. 32, no. 3, pp. 351–374, 2012. https://doi.org/10.1108/01443571211212619

C. K. Prahalad, and M. S. Krishnan, The new age of innovation-driving co-created value through global networks. New York: McGraw-Hill, 2008.

J. Pyke, “Now is the time to take the cloud seriously. White Paper”, 2009. [Online]. Available: www.cordys.com/cordyscms_sites/objects/bb1a0bd7f47b1c9ddf36ba7db88241d/time_to_take_the_cloud_seriously_online_1_.pdf. [Accessed: Jan. 16, 2012].

D. Reisinger, “Cloud spending will soar as enterprise reliance on SaaS grows: IDC”. Jan. 24, 2018. [Online]. Available: http://www.eweek.com/cloud/cloud-spending-will-soar-as-enterprisereliance-on-saas-grows-idc. [Accessed: Feb. 25, 2018).

V. Sambamurthy, A. Bharadwaj, and V. Grover, “Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms”, in MIS quarterly, vol. 27, no. 2, 2003, pp. 237–263. https://doi.org/10.2307/30036530

P. B. Seddon, S. Cullen, and L. P. Willcocks, “Does Domberger’s theory of ‘The Contracting Organisation’ explain why organisations outsource IT and the levels of satisfaction achieved?” European Journal of Information Systems, vol. 16, no. 3, pp. 237–253, 2007. https://doi.org/10.1057/palgrave.ejis.3000664

E. Smith, and M. Shirer, “Worldwide Public Cloud Services Spending Forecast to Reach $210 Billion This Year, According to IDC”. [Online]. Available: https://www.idc.com/getdoc.jsp?containerId=prUS44891519 [Accessed: Feb. 28, 2019].

I. Son, D. Lee, J. N. Lee, and Y. B. Chang, “Market perception on cloud computing initiatives in organisations: An extended resource-based view”, Information & Management, vol. 51, no. 6, pp. 653–669, 2014. https://doi.org/10.1016/j.im.2014.05.006

N. Su, “Emergence of cloud computing: An institutional innovation perspective”, in Proceedings of the 32nd International Conference on Information Systems, Shanghai, China, 2011.

N. Sultan, “Cloud computing: A democratizing force?” International Journal of Information Management, vol. 33, no. 5, pp. 810–815, 2013. https://doi.org/10.1016/j.ijinfomgt.2013.05.010

P. P. Tallon, K. L. Kraemer, and V. Gurbaxani, “Executives’ perceptions of the business value of information technology: a process-oriented approach”, Journal of Management Information Systems, vol. 16, no. 4, pp. 145–173, 2000. https://doi.org/10.1080/07421222.2000.11518269

A. N. Toosi, R. N. Calheiros, and R. Buyya, “Interconnected cloud computing environments: Challenges, taxonomy, and survey”, ACM Computing Surveys, vol. 47, no. 1, p. 7, 2014. https://doi.org/10.1145/2593512

E. Verwaal, H. Commandeur, and W. Verbeke, “Value creation and value claiming in strategic outsourcing decisions: a resource contingency perspective”, Journal of Management, vol. 35, no. 2, pp. 420–444, 2009. https://doi.org/10.1177/0149206308328502

W. Voorsluys, J. Broberg, and R. Buyya, “Introduction to cloud computing”, in Cloud computing: Principles and paradigms, R. Buyya, J. Broberg, and A. Goscinski (Eds.). New Jersey: John Wiley & Sons Inc., 2011, pp. 1–41. https://doi.org/10.1002/9780470940105.ch1

S. Iqbal, and L. Pipon-Young, “Methods-The Delphi method--A guide from Susanne Iqbal and Laura Pipon-Young”, Psychologist, vol. 22, no. 7, p. 598, 2009.




DOI: 10.7250/itms-2019-0006

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Vipin K Agrawal, Vijay K Agrawal, A Ross Taylor, Ngan Chau

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.