Current and Future Contributing Factors and Trends in the Usage of IT Cloud Computing in Manufacturing and Service Sectors

Vipin K Agrawal, Vijay K Agrawal, Ngan N. Chau, Matthew Miller, Sherri Harms

Abstract


Cloud computing provides organisations with the ability to quickly change infrastructure, provider and service levels. The study looks at factors affecting the usage of cloud computing by organisations in the manufacturing and service sectors in the United States. Extrinsic motivation was found to be a significant factor for change in cloud computing budget allocation in manufacturing, whereas intrinsic motivation was a significant factor in the service sector. The study also shows that organisations’ future budgets include internal and external sources to fulfil their IT needs.

Keywords:

Cloud Computing; IT Management and Strategy; Optimum Investment on IT Resources; Predictive Models

Full Text:

PDF

References


D. Knarr, “NVidia Graphics Card Specification Chart,” Studio 1 Productions, 27 01 2020. [Online]. Available: studio1productions.com/Articles/NVidia-GPU-Chart.htm.

L. Columbus, Forbes, 7 April 2019. [Online]. Available: forbes.com/sites/louiscolumbus/2019/04/07/public-cloud-soaring-to-331b-by-2022-according-to-gartner/#4b8e9e835739.

S. Moore, “Gartner Says 28 Percent of Spending in Key IT Segments Will Shift to the Cloud by 2022,” Gartner, 18 09 2018. [Online]. Available: gartner.com/en/newsroom/press-releases/2018-09-18-gartner-says-28-percent-of-spending-in-key-IT-segments-will-shift-to-the-cloud-by-2022.

K. Costello, “Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17.5 Percent in 2019,” Gartner, 2 04 2019. [Online]. Available: gartner.com/en/newsroom/press-releases/2019-04-02-gartner-forecasts-worldwide-public-cloud-revenue-to-g.

M. Carroll, A. v. d. Merwe and P. Kotzé, “Secure cloud computing: Benefits, risks and controls,” Computer Science, 2011 Information Security for South Africa, Johannesburg, pp. 1–9, 2011. https://doi.org/10.1109/ISSA.2011.6027519

N. Statt, “US Interior Department is grounding its drone fleet due to risks of Chinese spying,” The Verge, 30 10 2019. [Online]. Available: theverge.com/2019/10/30/20940921/us-interior-department-drone-grounding-china-spying-cybersecurity-risk.

L. C. Baldor, “Pentagon restricts use of fitness trackers, other devices,” Associated Press, 06 08 2018. [Online]. Available: apnews.com/d29c724e1d72460fbf7c2e999992d258/Pentagon-restricts-use-of-fitness-trackers,-other-devices.

D. Volz, “Trump signs into law U.S. government ban on Kaspersky Lab software,” Reuters, 12 12 2017. [Online]. Available: reuters.com/article/us-usa-cyber-kaspersky/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4.

P. M. a. T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, September 2011. [Online]. Available: faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf.

V. Vladimirskiy, “10 Popular Software as a Service (SaaS) Examples,” Nerdio, 20 10 2016. [Online]. Available: https://getnerdio.com/academy/10-popular-software-service-examples/.

Tech Target, “Platform as a Service (PaaS),” TechTarget.com, November 2019. [Online]. Available: searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS.

S. Watts and M. Raza, “SaaS vs PaaS vs IaaS: What’s The Difference and How To Choose,” BMC Software, Inc, 15 06 2019. [Online]. Available: bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/.

V. K. Agrawal, V. K. Agrawal, A. R. Taylor and N. N. Chau, “An Exploratory Study of Factors Driving Decision Makers to Adopt Cloud Computing,” Information Technology and Management Science, Vol. 22, pp. 37–46, 2019. https://doi.org/10.7250/itms-2019-0006

E. Kaynak, E. Tatoglu and V. Kula, “An analysis of the factors affecting the adoption of electronic commerce by SMEs: Evidence from an emerging market,” International Marketing Review, vol. 22, no. 6, 2005. https://doi.org/10.1108/02651330510630258

A. Caldarelli, L. Ferri and M. Maffei, “Expected benefits and perceived risks of cloud computing: an investigation within an Italian setting,” Technology Analysis & Strategic Management, vol. 29, no. 2, pp. 167–180, 2017. https://doi.org/10.1080/09537325.2016.1210786

C. Y. Yeun and S. A. Almulla, “Cloud computing security management,” in Second International Conference on Engineering System Management and Applications, 2010.

B. Hayes, “Cloud Computing,” Communications of the ACM , vol. 51, pp. 9–11, 2008. https://doi.org/10.1145/1364782.1364786

Distributed Management Task Force, Inc. (DMTF), “Open Virtualization Format Specification,” Distributed Management Task Force, Inc. (DMTF), 2013. [Online]. Available: dmtf.org/sites/default/files/standards/documents/DSP0243_2.1.0.pdf.

N. Loutas, E. Kamateri, F. Bosi and K. Tarabanis, “Cloud Computing Interoperability: The State of Play,” in 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp. 752–757. https://doi.org/10.1109/CloudCom.2011.116

Kynetix Technology Group, “Cloud Computing: A Strategy Guide for Board Level Executives,” 2009. [Online]. Available: docplayer.net/amp/6003889-Cloud-computing-a-strategy-guide-for-board-level-executives.html.

S. J. Andriole, “Viewpoint: Ready Technology,” Communications of the ACM, vol. 57, pp. 40–42, 2014. https://doi.org/10.1145/2556941

E. M. Rogers, Diffusion of Innovations. New York: The Free Press, 2010.

L. Kappelman, E. McLean, V. Johnson, R. Torres, Q. Nguyen, C. Maurer and M. and Snyder, “The 2016 SIM IT Issues and Trends Study,” MIS Quarterly Executive, vol. 16, no. 1, p. 6, 2017.

Dutta, G. C. A. Peng and A. Choudhary, “Risks in Enterprise Cloud Computing: The Perspective of it Experts,” Journal of Computer Information Systems, vol. 53, no. 4, 2013. https://doi.org/10.1080/08874417.2013.11645649

Y. S. Patel, N. Mehrotra and S. Soner, “Green Cloud Computing: A Review on Green IT Areas for Cloud Computing Environment,” in International Conference on Futuristic trend in Computational Analysis and Knowledge Management, Noida, India, 2015. https://doi.org/10.1109/ABLAZE.2015.7155006

K. Dahbur, B. Mohammad and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing,” in Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, 2011. https://doi.org/10.1145/1980822.1980834

United States Government, “Health Insurance Portability & Accountability Act,” 2019. [Online]. Available: dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00WhatisHIPAA.aspx.

Intersoft Consulting, “General Data Protection Regulation GDPR,” [Online]. Available: gdpr-info.eu/.

T. Mather, S. Kumaraswamy and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Oreilly, 2009.

S. Gallagher, “Baltimore’s bill for ransomware: Over $18 million, so far,” Arstechnica, 05 06 2019. [Online]. Available: arstechnica.com/information-technology/2019/06/baltimores-bill-for-ransomware-over-18-million-so-far/.

J. Miller, “Were warnings about city government cybersecurity missed?,” WBALTV, May 2019. [Online]. Available: wbaltv.com/article/cyber-security-warnings-baltimore-government/27482509#.

Z. Zhang, C. Wu and D. W. Cheung, “A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice,” ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, 2013. https://doi.org/10.1145/2479942.2479945

N. G. Carr, “IT Doesn’t Matter,” Harvard Business Review, May 2003.

N. Carr, The Big Switch. New York: W. W. Norton & Company, 2008.

Y. L. Antonucci and J. J. Tucker III, “IT Outsourcing: Current Trends, Benefits, and Risks,” Information Strategy: The Executive's Journal, vol. 14, no. 2, pp. 16–26, 1998. https://doi.org/10.1080/07438613.1998.10744580

S. J. Andriole, “Who Owns IT?,” Communications of the ACM, vol. 58, pp. 50–57, 2015. https://doi.org/10.1145/2660765

Jared Spataro, Corporate Vice President for Microsoft 365, “Update #2 on Microsoft cloud services continuity,” 29 03 2020. [Online]. Available: microsoft.com/en-us/microsoft-365/blog/2020/03/29/update-2-microsoft-cloud-services-continuity/.

I. Son, D. Lee, J.-N. Lee and Y. B. Chang, “Market perception on cloud computing initiatives in organizations: An extended resource-based view,” Information & Management, vol. 51, no. 6, pp. 653–669, 2014. https://doi.org/10.1016/j.im.2014.05.006

M. Sena and J. Sena, “Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software,” in Conference on Information Systems Applied Research, Nashville, 2010.

N. Sultan, “Cloud computing: A democratizing force?,” International Journal of Information Management, vol. 33, no. 5, pp. 810–815, 2013. https://doi.org/10.1016/j.ijinfomgt.2013.05.010

D. A. Dillman, Mail and Telephone Surveys: The Total Design Method. John Wiley and Sons, New York, 1978.

D. A. Dillman, Mail and internet surveys: The tailored design method. John Wiley and Sons, New York, 2000.

A. B. Blankenship, G. Breen and A. Dutka, “State of the Art Marketing Research,” American Marketing Association, 1998.

H. F. Kaiser, “A second-generation little jiffy,” Psychometrika vol. 35, pp. 401–415, 1970. https://doi.org/10.1007/BF02291817

H. F. Kaiser and J. Rice, “Little Jiffy, Mark IV,” Educational and Psychological Measurement, pp. 111–117, 1974. https://doi.org/10.1177/001316447403400115

J.-O. Kim and C. W. Mueller, Factor Analysis: Statistical Methods and Practical Issues. Sage Publications Inc., 1978. https://doi.org/10.4135/9781412984256

M. Bartlett, “Tests of significance in factor analysis,” British Journal of Psychology, vol. III, part II, pp. 77–85, June 1950. https://doi.org/10.1111/j.2044-8317.1950.tb00285.x

J. F. Hair, R. L. Tatham, R. E. Anderson and W. C. Black, Multivariate Data Analysis. Englewood Cliffs, Prentice-Hall, 1995.

B. G. Tabachnick and L. S. Fidell, Using Multivariate Statistics (7th Edition). Pearson, 2007.

J. Joseph F. Hair, W. C. Black, B. J. Babina and R. E. Anderson, Multivariate Data Analysis A Global Perspective. Boston: Pearson, 2014.

P. Mahatanankoon, H. J. Wen and B. Lim, “Consumer-based m-commerce: exploring consumer perception of mobile applications,” Computer Standards & Interfaces, vol. 27, no. 4, pp. 347–357, 4 2005. https://doi.org/10.1016/j.csi.2004.10.003

D. A. Kenny, B. Kaniskan and D. B. McCoach, “The Performance of RMSEA in Models With Small Degrees of Freedom,” Sociological Methods & Research, 2014. https://doi.org/10.1177/0049124114543236

J. C. Nunnally, Introduction to psychological measurement. McGraw-Hill Inc., 1970.

J. Quinlan, “Induction of Decision Trees,” Machine Learning, vol. 1, pp. 81–106, March 1986. https://doi.org/10.1007/BF00116251

A. Mathur, “Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates,” in USNIX Conference, 2017.

V. Venkatesh and F. D. Davis, “A model of the antecedents of perceived ease of use: Development and test,” Decision Sciences, pp. 451–481, 1996. https://doi.org/10.1111/j.1540-5915.1996.tb01822.x

E. Smith and M. Shirer, “Worldwide Public Cloud Services Spending Forecast to Reach $210 Billion This Year,” 28 02 2018. [Online]. Available: idc.com/getdoc.jsp?containerId=prUS44891519.




DOI: 10.7250/itms-2020-0001

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Vipin K Agrawal, Vijay K Agrawal, Ngan N. Chau, Matthew Miller, Sherri Harms

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.