Conference PaperPDF Available

Analysis of Dissatisfiers That Inhibit Cloud Computing Adoption Across Multiple Customer Segments

Authors:

Abstract and Figures

Cloud computing in many ways can be viewed as both a technology offering and a business alternative. But its adoption today is driven more by economic rationale than by technology justifications. Though in delivery terms, cloud offering is a merger of state-of-the-art concepts like virtualization, server consolidation, interoperability and dynamic CPU provisioning, its risk-benefit analysis is purely driven by business imperatives. As a technology, Cloud Computing topped the Gartner’s Hype Cycle only as late as 2009. However since then the hype has settled down and ‘computing in the ethereal cloud’ is slowly emerging as a strong cost-effective alternative to traditional computing. This paper focuses on the customer side perceptions of cloud adoption with a purely India-centric perspective. Since cloud is a fairly new offering, there is bound to be a lot of inertia in its acceptance. This is because cloud offerings - from the product development lifecycle (PDLC) point of view - are at a nascent stage and hence perceived risks outweigh perceived gains. This paper focusses on the cloud adoption risks across four sectors – SME, BFS, Education and Hospitals. The four key risk categories identified in the context of cloud adoption are vendor related risk, security related risk, no-gain risk and efficiency related risk. The paper does a relative mapping of these four risks for each of the four mentioned industry clusters. Since cloud technology is only in the process of getting established and main stream adoption is still a few years away, many of the cloud adoption fears are nebulous and will be removed once critical volumes start building up. Till such a maturation happens, cloud vendors will have to assiduously work out ways and means of assuaging the fears that inhibit adoption – real or perceptional. This paper is posited to be a pointer in that direction. Key Words: Cloud Computing, Dissatisfiers, Segmented Risk Profiling, Risk Perception Management, Conjoint Regression
Content may be subject to copyright.
AnalysisofDissatisfiersThatInhibitCloudComputingAdoption
AcrossMultipleCustomerSegments
EaswarKrishnaIyer,ArathiKrishnan,GauravSareenandTapanPanda
GreatLakesInstituteofManagement,Chennai,India
easwar@greatlakes.edu.in
arathi.krishnan@greatlakes.edu.in
gaurav.sareen@greatlakes.edu.in
tapan@greatlakes.edu.in
Abstract:Cloudcomputinginmanywayscanbeviewedasbothatechnologyofferingandabusinessalternative.Butits
adoptiontodayisdrivenmorebyeconomicrationalethanbytechnologyjustifications.Thoughindeliveryterms,cloud
offeringisamergerofstateoftheartconceptslikevirtualization,serverconsolidation,interoperabilityanddynamicCPU
provisioning,itsriskbenefitanalysisispurelydrivenbybusinessimperatives.Asatechnology,CloudComputingtopped
theGartner’sHypeCycleonlyaslateas2009.Howeversincethenthehypehassettleddownand‘computinginthe
etherealcloud’isslowlyemergingasastrongcosteffectivealternativetotraditionalcomputing.Thispaperfocusesonthe
customersideperceptionsofcloudadoptionwithapurelyIndiacentricperspective.Sincecloudisafairlynewoffering,
thereisboundtobealotofinertiainitsacceptance.Thisisbecausecloudofferings‐fromtheproductdevelopment
lifecycle(PDLC)pointofview‐areatanascentstageandhenceperceivedrisksoutweighperceivedgains.Thispaper
focussesonthecloudadoptionrisksacrossfoursectorsSME,BFS,EducationandHospitals.Thefourkeyriskcategories
identifiedinthecontextofcloudadoptionarevendorrelatedrisk,securityrelatedrisk,nogainriskandefficiencyrelated
risk.Thepaperdoesarelativemappingofthesefourrisksforeachofthefourmentionedindustryclusters.Sincecloud
technologyisonlyintheprocessofgettingestablishedandmainstreamadoptionisstillafewyearsaway,manyofthe
cloudadoptionfearsarenebulousandwillberemovedoncecriticalvolumesstartbuildingup.Tillsuchamaturation
happens,cloudvendorswillhavetoassiduouslyworkoutwaysandmeansofassuagingthefearsthatinhibitadoption
realorperceptional.Thispaperispositedtobeapointerinthatdirection.
Keywords:cloudcomputing,dissatisfiers,segmentedriskprofiling,riskperceptionmanagement,conjointregression
1. Introduction
CloudComputingbeinganevolvingtechnology,currentglobalresearchonitisfocusedmoreontechnology
andlessonbusiness.Eventuallytheacidtestforanytechnologyisitsmarketacceptance.Asfarasmarket
adoptiongoes,cloudisonthevergeofcrossingthevitalchasmbetweentheearlyadoptersandtheearly
majority.Earlyadoptershaveapsychographicprofileofbeingventuresomeandtheyareknowntohavefewer
inhibitionsinacceptingacompletelynewtechnologyoffering.Thecurrentofferings,beitinapplications,
computingorstorageisbeinglappedupbythistargetmarket.Ontheotherhand,theearlymajority
comprisesofthepragmatistsinthemarketandtheycoverthebulkoftherealmarket.Theytendtoaccept
newtechnologyonlyaftermeasuresagainstfailurearereasonablyinplace.Needforreferralsisastrong
driverforabuyinthissegment.Technologyadoptionbythepragmaticearlymajorityisacrucialmilestonefor
anynascenttechnology.
Thispaperoffersamultisector,emergingmarket,customersideviewofcloudadoption,atechnologythatis
justonestepawayfromthe‘earlymajority’buyers.
Anynewtechnologycomesinwithasetofrisksreal,latentorperceived.Literaturesurveysupportedby
previousworkdonebysomeoftheauthorsandreportedelsewhereindicatesthattherearefourclearrisk
vectorsforcloudadoption.Theyarevendorrelatedrisk,datasecurityrelatedrisk,lackofsignificantcost
reductionriskandsystemefficiencyrisk.Theauthorspositvendorrelatedriskasthefirstdimensionof
perceivedrisk.Fearoflockinwithanincompatiblevendor,lackofguaranteeofbusinesscontinuityand
serviceavailability,reputationfatesharingwithavendorandunclearlicensingissuescomeunderthisrisk
profile.Thenextpositedriskcoversdatasecurity,dataprivacy,dataconfidentialityandlossofgovernance&
controlofITdelivery.Thethirdriskpositsthatthegainsthatcloudpurportstoofferintermsofreduced
capitalandoperativecostsmightnotbesufficientenoughtomovefromexistingsystemstocloudplatforms.
Thelastrisksumsuptheeffectsoflatency,downtime,databottlenecksandanyotherefficiencyimpediments.
Thepapercomparestherelativeweightageofthesefourrisksacrossfourcustomersegmentswhoseemtobe
145
EaswarKrishnaIyeretal.
potentialadoptersofcloudSMEsector,bankingsector,educationsectorandhospitalsector.Eachsegment
chosenispositedtohaveadifferentriskperceptiontowardstechnologyadoption.
Extensiveliteratureisavailabletodayoneachofthefourvectorsofpositedrisk.Inaddition,someworkhas
alreadybeendoneinlookingattheriskgainprofileofdifferentindustrysectorsthatarepoisedtomoveonto
cloudplatforms.Beforeanintersectorriskprofilingisundertaken,aringsideliteraturesurveyisprovided.
2. Literaturesurvey
Michael.Ambrustetal(2010)refertoCloudComputingasasymbiosisofapplicationsdeliveredasservices
overinternetcoupledwiththehardware/systemssoftwareinthedatacentersthatprovidethoseservices.A
paperwhichhasreceivedwidecitation,thisBerkeleyworkdelineatestherolesofthepurecloudproviderand
theintermediarySaaSmodelpackager.BrianGammageetal(2009)talkaboutthestrategicpossibilityofthe
‘powerofIT’shiftingtowardsexternalprovidersandusers.Thepaper,whichisessentiallyaGartnerreport,
triestoclearlydefinecorevs.noncorestrategiesinthecontextofITassetownershipandutilization.Jeanne
Capachin(2012)researchesandreportsontheslowyetsteadycloudcomputingadoptionbythebanking
sector.Thepapercoverscontractmanagementandregulationsmanagementinthecontextofkeyfinancial
datamovingtothepubliccloud.IthasgotapredominantUSbankingsectorperspective.PaulLBannerman
(2010)hasdoneanexhaustivecomparativesurveyofallcloudresearchpaperspublishedbetween2009and
2010andhascomeoutwithacomparativeanalysisofwhatarethevariousadoptionrisksrealand
perceptional.Thepaperdiscussesvariousbarrierstocloudadoptionbyreviewingopinionsofindustry
commentators.SarfrazNawazBrohietal(2011)comparethechallengesaswellasthebenefitsinwhatthey
callthenewParadigmCloudComputing.
ChinyaoLowetal(2011)investigatesthefactorsthataffectcloudadoptionbyfirmsbelongingtothehightech
industry.MaldenAVouk(2008)mapsthejourneyofcloudfromtechnologytoimplementation.Easwaretal
(yettobepublishedin2013)looksatthedriversandinhibitorsofcloudadoptionwithaspecificSMEsector
perspective.ThedatainthisworkisIndianSMEdata.TaraSBehrendetal(2011)examinescloudcomputing
initiativesintheeducationsector.ThepaperisintheUScontextandexaminesthefactorsthatleadto
adoptionofthistechnologyfromtheperspectiveofbothcollegesandstudentcommunity.VladimirVujin
(2011)looksattheeducationindustryandcloudcomputing,butmorefromaresearchsupportpointofview.
Thepapertalksaboutareliableandscalablecloudenvironmentthatcanfosterscientificresearchand
educationalprogress.
AlecNacamuli(2010)inwhatisessentiallyaneditorialpiecestressesontheimportanceofcloudinbankingin
thedaystocome.Thepapercitesthatregulation,datarecovery,customertrustandinnovationwouldbe
someofthekeythrustareaswhichcomeinthecuspofcloudcomputingandbanking.JeanneCapachin(2010)
inanotherwellresearchedarticleonbankingfocussesprimarilyonsecurityissuesthatwouldbeontopof
mindforbankerswhentheythinkof3rdpartydatastorage.ChrisChatman(2010)focussesonanothersector
whichhasaclearcloudadoptionfocushealthcaresector.Thepaperfocusesonthedualconcernsofdata
securityaswellasspeedofimplementationforthehealthcaresector.EdwardJGiniat(2011)offersmore
insightsoncloudvs.healthcare.
FinallyEaswarKrishnaIyeretal(2012)studiestheNetPresentValue(NPV)behaviorforfullvs.fractional
adoptionofcloud.Thestudylooksattheunknownfearsofcloudadoptionwhichstretchesacrossdimensions
likesecurity,privacy,variability,redundancy,downtime,contractbreachmanagementandthelikesand
developsamathematicalmodeltomonetizetheserisks.Tosumup,thereisabodyofliteratureavailable
todaywhichindividuallytalksaboutcloudadoptioninthecontextofSME,BFS,EducationandHospitals.This
paperproceedstodoacomparativeriskprofilingofcloudadoptionacrossallthese4sectors.
3. Problemformulationandresearchmethodology
Cloudasatechnologyhasalreadytransformeditselffromamerehypetoanimplementablerealityinthe
lastfewyears.Enlightenedtechnologymaturationandacceptancebythepragmatic‘earlymajority’usersare
thenextlogicalstepstowardsanallembracingacceptanceofthis‘payasyouuse’businessmodel.
Technologyvendorsarekeenlyworkingonsolutionslikeeaseofdeployment,interoperability,server
consolidation,economicsofdeploymentandlevelofcustomizationpossibleintheireffortstodemystifythe
etherealcloud.Alltheseactivitiesareactuallyhappeningtodayontheproductfront.Theauthorsofthiswork
146
EaswarKrishnaIyeretal.
feelthatthereshouldbealotofsimultaneousresearchthrustinpositioningthecloudofferingtopotential
enterpriselevelbuyers.Therehastobeaggregatestudiesonresistancepointstocloudadoption.Theresearch
methodologythatisproposedhereisastepinthatdirection.
Aspreviouslymentioned,thereisaclearinertiaattheclientendingoingforafullfledgedacceptanceofcloud
computing.Thisinertiaispartlydrivenbythefactthatmanyclientindustrieshavealreadyinvestedheavilyin
technologyandarereluctanttoevenpartiallyabandontheironpremisetraditionalITinfrastructure.Fora
technologyintensivecompany,theITinfrastructureinvestmentwouldbeasignificantportionoftheirassetsin
thebalancesheet.Anymovetoadopta‘payanduse’type3rdpartyplatformwouldhaveramificationson
sunkenassetsanddepreciationoftheseassets.Inadditiontocapitalinvestment,organizationscurrently
runningtheirITinthetraditionalnoncloudmodehaveinvesteddeeplyinpeopleandprocessestorunthe
welloiledinhouseITinfrastructure.Anysignificantcloudadoptionwillhavetotakeintoaccountamajor
peopleandprocesstransformation.
Anotherreasonfortheslackinadoptionisthatdespitethebuilduponcloudoverthelastfewyears,the‘real’
gainsfromthecloudofferinglookhazytothebuyer.Tocompoundthescenario,therisksoffullfledgedcloud
adoptionareyettobefullyquantified.Withmainstreamadoptionforcloudpredictedtohappeninthenext2
to5years,thisisthetimeforthecloudvendorindustrytointrospectonhowtheirnewofferingwillbe
perceivedbythecustomer.Theproblemformulationofthispaperisastepinthedirectionofsectorialrisk
profilingandassessmentofcloudadoption.Thepaperpositsthatdifferentsectorswillhavedifferentrelative
riskperceptionsandacorrectassessmentofthesamewillgoalongwayintailoringcustommadecloud
solutionsforeachsector.Incidentally,theprevioussubsectiononliteraturesurveyquotesatleastonepaper
whichhasdoneasignificantcloudadoptionstudyineachofthe4sectorsthatthispaperisworkingon.
Asmentionedintheabstract,thefourbroadriskdriversforthisstudyarevendorrelatedrisk,securityrelated
risk,nogainriskandefficiencyrelatedrisk.Theyhavebeenarrivedatbycollatingfromliteraturetherisk
studiesthathavebeenpreviouslydone.Subsequently,discussionswithindustryexpertsareusedtocondense
theriskmappingalongtheaforementionedfourvectors.Oncethefourkeyvectorshavebeenidentified,they
arepairedinallpossiblecombinationsoftwos,thusyielding4C2combinations;i.e.6combinationsofrisk.The
sixcombinationsarevendor+security,vendor+nogains,vendor+efficiency,security+nogains,security+
efficiencyandfinallynogains+efficiency.Therespondentsareaskedtodistributetheirrelativerisk
perceptionweightagesacrossthesixpairsinsuchawaythattheaggregateweightagecomesto100.Inthis
tradeoffscenario,therespondentsareforcedtostreamlinetheirrelativeperceptionofrisks.Inreality,risks
donotcomeinones,theyoccurtogether.Hence,seekingriskweightagesataoneononelevelwouldhave
‘disjointed’therisksintherespondent’smind.Theprocessofpairingthemistoenabletherespondentto
thinkin‘conjoint’termsbeforegoingforrelativeriskweightageassignment.
The4C2possiblecombinationscanberepresentedinbinomialtermsas1100,1010,1001,0110,0101and
0011.The1sand0sarebasicallydummyvariableswhichindicatethesimplepresence/absenceoftherisk(s)
understudy.Asimpleconjointregressionisdonebetweentherespondentriskperceptionsandthebinomial
combinations.Thepartworthofeachriskisderivedfromtheregressionoutput.Inall,5regressionsarerun‐4
individualregressionsforeachsectorsandacommonregressionforallrespondentstogetthemeanrisk
acrossallsectors.Allthe5regressionsyieldanR2valueofgreaterthan0.5witheducationsectorgivingthe
highestvalueof0.815andSMEgivinglowestvalueof0.574.Theaggregate‘allresponses’R2valueis0.639.
Carehasbeentakentoensurethatthereareatleast30respondentsfromeachsector.Thestudywas
eventuallydoneon150respondentsspreadoverSME(55),Hospitals(35),Education(30)andBFS(30).The
entiresampleconsistsofexanteusersandhencethepicturethatemergesispurelyoneofriskperceptionand
nowayreflectsapostbuyusagedrivenfeedback.Thequestionnaireitselfensuresthatatthepointof
submission,thetotalriskweightageisexactly100acrossthesixcombinationsofrisk.Else,submissionisnot
permitted.Thisensuresdataconsistency.
4. Analysisandinterpretation
Therelativeperceptionspreadofthe4risks,asgivenbytherespectivepartworthutilityfunctions,isplotted
forallthefoursectorsinFigure1.Inferencesonthisbehaviorbasedontheresultsobtainedaregivenona
sectorbysectorbasis.
147
EaswarKrishnaIyeretal.
Figure1:Relativeriskassessmentofcloudadoption:A4riskx4sectormapping
5. SMEsector
TheSMEsector’sriskperceptionspreadindicatesthatvendorrelatedfearsdominatethemindscapeofthe
SMEmarket.SinceCloudasanoffering‐isnewandtherearemultiplelayersofcloudvendors(ibidMichael.
Ambrustetal),thereisanambiguityonwhoisone’sactualvendor.Atonelayerwehavethecloudutility
vendorwhoprovidescomputingandstorageatthehardwarelevel.Atanotherlayer,wehavethecloud
applicationvendorwhopackages/bundlesapplicationslikeCRMandERPalongwithpureplayhardware.
Whattheusergetsisanamalgamofthesetwo,vendedouttohimbytheintermediarySaaS(Softwareasa
Service)provider.Thusthereisaperceivedambiguityofescalationpointfortheuserwhenheneedstrouble
shooting.Itisthisdilemmawhichhasgivenvendorrelatedriskthehighestriskranking.TheSMErespondents
themselvesareproactive/reactiveproblemsolversintheirdomain.Hence,theyinstinctivelyunderstandthe
valueoftroubleshooting.Therespondentscurrentlyperceiveaninabilitytoidentifyafeedbackpathbywhich
theycansolvetheircloudadoptionproblems.Thisopinion,whichwasobtainedfromrandomchatswithSME
respondentsaftertheyhavefilledupthequestionnaire,canbepositedasoneofthereasonsforthesector
givinghighestweightageforvendorrisk.
Thesecondriskismoreeasilyexplained.Datasecurity,dataprivacyanditsassociatedlosseswouldweigh
acrossalladoptionclassesandliteraturequotesthesameasthekeydeterrentforwidespreadcloudadoption.
Sincebothvendorriskandsecurityriskcanbeperceivedevenbeforeadoption,theygarnerthetoptwo
perceivedriskspots.Theriskon‘Efficiency’willbefeltonlypostadoptionandhenceitgetsrelegatedtothe
3rdspot.Theinabilitytosenseefficiencyrelatedriskbeforeadoptionisnotgenericacrosssectors.Thiswillbe
explainedinthecontextofthenexttwosectors.Comingtothelastperceivedrisk,theSMErespondentmarket
isapparentlycompletelysoldonthemonetarygainaspectofCloudComputing.Hencetheirriskperceptionof
a‘NoGain’isjust13%.
6. BFSsector
Thesecurityriskisobviouslythemostoverwhelmingriskforthedatasensitivebankingsector.Ofallthe16
partworthfunctionsthathavebeenarrivedat(spreadacross4sectorsx4risks),thereisonlyonepartworth
functionwhichhasgotavalueinexcessof50%.ThisisforSecurityRiskinthecontextofBFSsector.Fearsof
dataloss,privacyinvasion,confidentialityloss,accounthackingandthelikeswhichcancriticallyhamper
bankingoperationsadduptoensurethatsecurityriskgetsarelativeweightageofawhopping61%.Banking
likeanyothersectorinthevergeofcloudadoptiondefinitelystandstogainfromtheclassiccloudbenefitsof
elasticityofusage,granularityofscalingandflexibilityinpricing.Yet,thisstudyindicatesthatthedownside
duetosecurityfearsoverridelogicalupsideadvantages.
Comingtothe2ndrankedrisk,efficiencyconsiderationsand‘cost’ofinefficiencyarefarmorevisibleinbanking
sectorthaninagenericSMEsector.BFSindustry,whichuniversallyfollowsthenormofdailyaccountsclosing
148
EaswarKrishnaIyeretal.
andadaytodaytransactionreconciliationformat,recognizesexantethevalueofefficiency.Inadifferent
context,allonlinefinancialmarketslikestockmarkets,commoditymarkets,FOREXmarketsandcallmoney
marketsrequireminimaldowntimeand‘zero’latencyashygienefactors.Latencyincloudcanbeintroduced
bycloudelementsandinternetelements.Inaglobalonlinefinancialmarket,wheresnapshotexecutionof
tradedecisionsarecritical,lackofefficiencywillbeasignificantdeterrent.ItisforthesereasonsthatBFSgives
efficiencyrelatedriskthesecondhighestweightage.
BFSisaveryorganizedsectoranditsvendorcallsaretakenatnationallevel.Giventhescaleofoperations,
therewillbetightServiceLevelAgreements(SLAs)toensuresmoothoperations.Hencethesectordoesn’t
perceiveanysignificantvendorrelatedfears.The4thfearof‘nogain’wasn’tevenstatisticallysignificantfor
thissector.Thiswastheonlysectorforwhicha‘statisticallyinsignificant’riskwasobtained.Theconjoint
regressionwasrerunafterdroppingthe‘nogain’risktogettherelativemappingoftheremainingthreerisks.
7. Hospital/healthsector
HealthSectorandBFSsectorshowaremarkablesimilarityintheirperceptiontowardsall4risks.Sinceboth
thesectorsarepartoftheorganizedsectorandremainwellinformed,theirvendorrelatedriskperceptions
arelow.Hospitalsareaswaryaboutdataconfidentialityasbanks.Leakageofpatientinformationcanmake
thissectormorallyandlegallytenable.Todaymosthospitalshavemovedtoapaperlesshealthrecordformat.
Loss,temporaryloss,swaporleakageofpatient’smedicaldatacanbecalumnioustotheindustry.Thus,like
banks,datasecuritytakesthetopslotforHealthsectoralso.
Theimportantofavailabilityofrightdataattherighttimetotherightmedicalpersoncannotbeoverstatedin
thecontextofhealth.Thepossibilityofanetwork/systemfailureinbetweenamissioncriticalsituationsuch
asatimesensitivesurgerymightbehighlydetrimentaltotheactualoutcomeofthesurgeryitself.Thevery
credibilityofthemedicalfraternityishingedonavailabilityofdynamicallyupdatedpatientdata.Hence,
efficiencyriskcomesaclose#2todatasecurityforhealthsector.Hereagain,asinBFS,thereisaclearexante
judgementofefficiencylosses.Itisworthnotingthatamongstthe4sectors,thehealth/hospitalsector
recordsthehighestriskperceptionofefficiencyforthereasonscitedabove.Thenogainriskistheleast
perceived,arankthatitconsistentlymaintainsacrossall4sectors.
8. Educationsector
Theeducationsector’shighpitchingofvendorriskcouldbedrivenbythefactthatinthissector,studentsare
alsocloudusers[unlikesayinahospitalsectorwherethepatientsarenotexposedtothecloudenvironment].
Inauniversity,thestudentpopulationwouldrunintothousandsandhencetheloadvariabilityoncloudusage
wouldbehigh.Thiscreatesproblemswithprovisioning.Underprovisioningofcloudserviceswouldresultin
serviceoutageswhentheloadpeaksup.Ineducationsector,therewouldbedailyaswellasseasonalpeaking
ofload.IntheIndiancontext,postdinnerhourswouldbeheavyusagehoursifthesystemisconfiguredin
suchawaythatacademicmaterialhastobedownloadedfromthecloudplatform.Examination,placement
andadmissionstimewouldcreateseasonalspikesinusage.Totakecareofsuchaloadvariation,ifthe
universitygoesforoverprovisioning,itwouldleadtocapacityunderutilizationduringnonpeakhours.This
scenarioactuallytranslatestoa‘vendorfear’fortheexantemarket.Wehaverespondentstalkingtousabout
vendorunpredictabilityinthecontextofwhatessentiallyisaprovisioningdrivensystemoutage.Thisfear
likemanyothercloudadoptionrelatedfearsispurelyperceptional.Yet,itexistsinthepotentialcustomer’s
mindspaceasthestudysuggests.
Aftervendorrisk,securityandefficiencyrisksarealmostevenforeducationsector.Asearliermentioned,no
sectorhasgotasignificant‘nogains’fear.Thiscanbeattributedtothefactthatthecloudvendorindustryhas
really‘sold’theCAPEXandOPEXgainsofcloudcomputingtotheaspiringadoptermarkets.
Asmentionedearlier,5independentregressionsweredonethefirstfourforthe4independentsectorsand
the5thacrossall150respondents.Therelativeriskperceptionofeachsectorvisàvisthemeanriskofthe
totalsamplepopulationisplottedinFigure2.
149
EaswarKrishnaIyeretal.
Figure2:Relativesectorialriskvisavistheallsectormeanrisk
ItcanbeobservedthattheBFSsectorandtheHospitalsectortendtomovetogetherforalltheriskvectors.
SimilarlytheSMEsectorandEducationsectorshowsomesimilarityinriskmappingbehavior.Thisinterpair
correlationismappedinthematrixgiveninFigure3.Itisworthnotingthatexceptforthepairsmentioned
above,theriskperceptioncorrelationsarenothighforanyotherpairofindustrysectors.
Figure3:Correlationmatrixofintersectorriskmapping
Bywayofaconclusion,theauthorsfeelthatthisstudywillcruciallyhelpcloudservicevendorstosegment
theirpositioningstrategyaftertheyunderstandthekeyinhibitorsofcloudadoptionfordifferentmarkets.
CloudmarketingbeingpredominantlyB2B,brochures,mailers,adsinsectorspecificmagazinesandother
promotionalcampaignscanbetweakedatthelastdeliverymiletoreducefearsandincreaseacceptanceof
thisnascenttechnology.
Thoughtheauthorshavefragmentedthetotalriskalong4vectorsonly,inreality,eachoftheseriskvectors
consistoffairlyuncorrelatedandindependentsubvectors.Fearofservicecontinuity,fearofreputationfate
sharingandriskofmismatchbetweenvendorarchitectureandclientbusinessneedsareallpartofthebroad
umbrellaofvendorrisk.Sameisthecasewithprivacy,confidentialityandlackofcontrolinthecontextofdata
security.Adetailedrelativeanalysisofthesesubrisksismissinginthisstudy.Thatcanbeconstruedasoneof
thelimitationsofthisstudyatthispoint.
CloudasanalternativeisheretostayandthebusinessgainsofcloudadoptionintermsofbetterNetPresent
Valueismeasurable.Cloudchangestheparadigmfromownershipoftechnologytoutilizationoftechnology.
Theauthorsofthispaperfeelthatcustomercenteredresearchwillfacilitategoodproductaswellas
positioningstrategiesinsuchawaythatcloudadoptionfearsareplayeddownandgainsareusheredin.
150
EaswarKrishnaIyeretal.
9. Futuredirectionsofresearch
Thepapersthatarequotedfromliteratureofferperspectivesofcloudadoptionriskonlyonasectorbysector
basis.Thispaperattemptstocaptureareasonablygoodframeworkofintersectorrelativeriskcomparison.
Butasmentionedintheprevioussection,thisworkhasnotexploredthesubrisksthatresidewithineachrisk
category.Asegmentedandweightedstudyofeachsubcategoryofriskwillenablethemonetizationofallrisk
possibilities.SuchamonetaryassociationofriskwillgoalongwayindelineatingtheactualNetPresentValue
gainsofCloudComputing(ibidEaswarKrishnaIyeretall2012).Someoftheauthorsofthispaperare
currentlyworkingonsuchastudy.
Thesecondthrustinresearchwouldbeacountryspecificresearchapproach.Theriskperspectivesofferedin
thispaperarehighlyIndiacentric.Therelativeriskperceptionscenariocouldplayoutdifferentlyinanother
country.Again,someoftheauthorsofthisworkarecurrentlyworkingoncloudadoptionriskmeasurementin
someneighboringemergingeconomies.
References
ArmbrustMichaeletal(2010)AViewofCloudComputing”,CommunicationsoftheACM,Vol.53,IssueNo.4,April2010
BannermanPaulL(2010),“CloudComputingAdoptionRisks:StateofPlay”,AsiaPacificSoftwareEngineeringConference
(APSEC2010),CloudWorkshopNov2010
BehrendTaraSetal(2011),CloudComputingadoptionandusageincommunitycolleges”,BehaviorandInformation
Technology,Vol.30,No.2,MarchApril2011
CapachinJeanne(2010),”Changeonthehorizon:TheimpactofCloudComputingonTreasuryandTransactionBanking”,
JournalofPaymentsStrategy&Systems,Vol.4,No.4,2010
CapachinJeanne(2012),“HowtoManageVendorsinthePublicCloud”,AmericanBanker,Vol.177,Issue156,October
2012
ChatmanChris(2010),HowCloudComputingischangingthefaceofHealthCareInformationTechnology”,Journalof
HealthcareCompliance,MayJune2010
GammageBrianetal(2009),Gartner’sTopPredictorsforITOrganizationsandUsers,2010andBeyond:ANewBalance”,A
GartnerResearchReport,IDno.G00173482,December2009
GiniatEdwardJ(2011),CloudComputing:InnovatingtheBusinessofHealthCare”,HealthcareFinancialManagement,
May2011
KrishnaIyerEaswaretal(2012),CloudComputingandModellingofCashFlowsforFullvs.FractionalAdoptionofCloud”,
ProceedingsoftheInternationalConferenceonBusinessManagementandInformationSystems(ICBMIS),November
2012
KrishnaIyerEaswaretal(2013),DecisionvariablesinfluencingCloudadoptionbySMEsector:AConjointAnalysis
Mapping”,NationalConferenceonBusinessAnalyticsandBusinessIntelligence,January2013
LowChinyao,ChenYahsueh(2011),Understandingthedeterminantsofcloudcomputingadoption”,Industrial
ManagementandDataSystems,Vol.111,Issue7,2011
NacamuliAlec(2010),”AnEditorialonCloudAdoptioninBFS”,JournalofPaymentsStrategy&Systems,Vol.4,No.4,2010
NawazBrohiSarfraz,AdibBamiahMervat(2011),ChallengesandBenefitsforAdoptingtheParadigmofCloud
Computing”,InternationalJournalofAdvancedEngineeringSciencesandTechnologies,Vol.8IssueNo.2,2011
VoukMladenA.(2008),CloudComputingIssues,ResearchandImplementations”,JournalofComputingandInformation
Technology,CIT16,Vol4,2008
VujinVladimir(2011),CloudComputinginScienceandHigherEducation”,Management,IssueNo.59,2011
151
... For example, Chaptal [2] notes that between 2009 and 2012, interest in cloud computing by French banks was becoming more common, yet their two biggest concerns were security and the related issue of regulations (i.e., what a bank's regulatory responsibilities are when the data do not reside with them). Iyer and colleagues found that security was also a top concern to the banking sector in India [10,11]. The fact that security would be a highly ranked risk factor for banks should come as no surprise. ...
... Kuo, Kushniruk, and Borycki [16] found that security and privacy were the greatest sources of resistance to cloud adoption in the health care sector. As Iyer and colleagues note, patient health confidentiality is a moral and legal obligation [10], so it is not surprising that security is a high-ranking factor in the health sector. ...
... One final security concern involves vendor risk. Iyer and colleagues found that, because cloud computing is a rather new technology, organizations may not be familiar with vendors, and are concerned about vendor lock-in [10]. Although this is not a security concern in the way the word is typically used in IT, it is one in the broader sense of the word, because organizational leaders want to be secure from having to enter into a long-term contractual relationship with still unknown actors. ...
Article
Full-text available
This paper details some of the obstacles to cloud computing that have been identified in recent literature, grouping organizational concerns into four categories, namely security, organizational resistance, performance, and lack of economic gains. Following an analysis of concerns, we recommend a set of best practices for cloud providers. Technological measures include identifying and addressing potential flaws in data security, drafting policies for data responsibility, and increasing server space and contracting with multiple Internet providers in order to improve performance. Communicative measures include communicating with all stakeholders in order to mitigate against organizational resistance and outlining security and performance mechanisms in place to potential adopters in order to assuage their concerns about adopting cloud solutions.
... En réalité, peu de recherches se sont interrogées, jusqu'à présent, sur la décision organisationnelle d'adoption du Cloud Computing (Venters et Whitley, 2012). Certaines recherches s'interrogent sur les bénéfices attendus de l'adoption du Cloud Computing (Géczy et al. 2012), ainsi que sur ses impacts et les attentes qu'il comble (Venters et Whitley, 2012) ; de tels impacts sont souvent comparés aux risques potentiels du Cloud Computing (Géczy et al. 2012), tels que les risques liés aux vendeurs de solution, les risques de sécurité, le risque d'absence de gains, ou encore le risque de perte d'efficience (Iyer et al., 2013). Si ces recherches permet-tent d'établir des recommandations très utiles afin de gérer au mieux le passage au Cloud Computing (Géczy et al. 2012), elles ne s'interrogent pas en tant que tels sur les motifs et le processus de décision favorisant le passage au Cloud Computing. ...
... Le concept de « maturations multiples » émerge de nos données comme étant central. Ce concept, ainsi que l'envisagent Iyer et al. (2013), apparaît comme un concept d'une grande puissance heuristique. Nous explorons comment le concept de maturation est abordé dans la littérature. ...
... Sur le plan théorique, cette recherche permet de compléter la littérature existante sur l'adoption du Cloud-Computing ( (Bhattacherjee et Park, 2013). Si plusieurs auteurs ont étudié les bénéfices et risques potentiels associés à l'adoption du Cloud Computing en entreprise (Willcocks et al., 2014 ;Géczy et al. 2012 ;Iyer et al., 2013), rares sont les recherches à s'interroger sur le processus de maturation favorisant l'adoption du Cloud Computing et à tenter de le modéliser dans une approche holistique. Notons que Shimba (2010) propose un cadre guidant l'entreprise lors de son passage au Cloud-Computing. ...
Article
Full-text available
Cloud Computing is more and more described as the new paradigm of modern computing. In this article, our goal is to understand the mechanisms that lead to the decision to implement a cloud computing solution in organizations. This research adopts a qualitative methodology, based on the analysis of open and semi-structured interviews with people directly involved in the decision process of Cloud Computing implementation. Various trades and sectors are represented, amongst others we interviewed people working in consulting firms, software publishing companies and inside IT management departments of several businesses (which vary in size). This paper has several main contributions. First, the core category that emerged is the concept of multiple maturations. This multiple-maturation concept is seen as a process leading (or not) to an implementation decision. Second, this maturation process emerged at four different levels, as is evidenced by the identification of four different types of maturity : the organizational maturity, the security maturity, the maturity of the cloud solution, and the maturity of the legal environment. Third, our data also suggests that the decision to implement Cloud Computing at the organizational level is related to a broader pressure of the competitive environment and a pressure from users through the consumerization phenomenon. These contributions enrich the existing literature by emphasizing the fact that maturations are multiple and have their own configurations.
... Cloud providers build their reputation by their experience in managing enterprises' needs and concerns in a responsible manner (Jensen et al., 2011); (Malladi and Krishnan, 2012); (Nuseibeh, 2011). This is enabled by delivering the promised benefits from CC to enterprises and protecting their data from potential threats including fate sharing in case the cloud provider went out of business (Iyer et al., 2013); (Nuseibeh, 2011). Further, cloud providers' demonstration of successful business cases and models is likely to enable CC adoption decision (Lin and Chen, 2012); (Alshamaila and Papagiannidis, 2013). ...
... Trialability proved to have a positive impact on the adoption of CC (Alshamaila and Papagiannidis, 2013). There is a wide agreement on the significant influence of perceived benefits and risks on the adoption of cloud services (Alshamaila and Papagiannidis 2013); (Iyer et al., 2013). A survey study reported that the management's perception of security, costeffectiveness, and IT compliance are likely to have a significant impact on the decision to adopt CC (Opala and Rahman, 2013). ...
... With all these appealing benefits, yet some SMEs are still negative to adopt CC services (Alshamaila and Papagiannidis, 2013). They are concerned about various types of risks (Jensen et al., 2011); (Nkhoma et al., 2013); (Lin and Chen, 2012); (Iyer et al., 2013): (a) policy and organizational risks: this covers the risk of vendor and data lock-in. (b) technical risks: this includes loss of data, downtime, and cyber-attacks. ...
Article
Cloud computing (CC) has received an increasing interest from enterprises since its inception. With its innovative Information Technology (IT) services delivery model, CC could add technical and strategic business values to enterprises. However, it poses highly concerning, internal and external, issues. This paper presents a systematic literature review to explore cloud computing adoption processes in the context of enterprise users and the factors that affect these processes. This is achieved by reviewing 37 articles published about CC adoption. Using the grounded theory approach, articles are classified into eight main categories: internal, external, evaluation, proof of concept, adoption decision, implementation and integration, IT governance, and confirmation. This is concluded in two abstract categories: CC adoption factors and CC adoption processes whereas the former affect the latter. The results of this review indicate that there are serious issues need to be tackled before enterprises decide to adopt CC. Based on the findings of this review, the paper provides future Information Systems (IS) research directions toward the previously under-investigated areas regarding the phenomenon. This involved the call for further theoretical and indepth empirical contributions to the area of CC adoption by enterprises.
... Persona development is a different way of representing and communicating the demands of people [8]. A great deal of research has been conducted on persona templates [14,15], creating personas [13,16,17], and determining what they are good for [4,13,17]. Persona development is becoming more popular as a design technique as it identifies the fundamental characteristics of consumers, which can be exploited in templates [14,15], creating personas [13,16,17], and determining what they are good for [4,13,17]. ...
... A great deal of research has been conducted on persona templates [14,15], creating personas [13,16,17], and determining what they are good for [4,13,17]. Persona development is becoming more popular as a design technique as it identifies the fundamental characteristics of consumers, which can be exploited in templates [14,15], creating personas [13,16,17], and determining what they are good for [4,13,17]. Persona development is becoming more popular as a design technique as it identifies the fundamental characteristics of consumers, which can be exploited in product design and marketing [17]. ...
Article
Full-text available
Chatbots are computer programs that mimic human conversation using text or voice or both. Users’ acceptance of chatbots is highly influenced by their persona. Users develop a sense of familiarity with chatbots as they use them, so they become more approachable, and this encourages them to interact with the chatbots more readily by fostering favorable opinions of the technology. In this study, we examine the moderating effects of persona traits on students’ acceptance and use of chatbot technology at higher educational institutions in the UK. We use an Extended Unified Theory of Acceptance and Use of Technology (Extended UTAUT2). Through a self-administrated survey using a questionnaire, data were collected from 431 undergraduate and postgraduate computer science students. This study employed a Likert scale to measure the variables associated with chatbot acceptance. To evaluate the gathered data, Structural Equation Modelling (SEM) coupled with multi-group analysis (MGA) using SmartPLS3 were used. The estimated Cronbach’s alpha highlighted the accuracy and legitimacy of the findings. The results showed that the emerging factors that influence students’ adoption and use of chatbot technology were habit, effort expectancy, and performance expectancy. Additionally, it was discovered that the Extended UTAUT2 model did not require grades or educational level to moderate the correlations. These results are important for improving user experience and they have implications for academics, researchers, and organizations, especially in the context of native chatbots.
... technology, cloud computing comes with its own set of challenges and risks that may complicate its adoption and effective use. Iyer, Krishnan, Sareen, and Panda (2013) argued that as cloud computing is still in its infancy, perceived risks may outweigh any potential gains from adopting the technology. Jackson (2014) conceded that organizations face issues of transforming traditional IT delivery, costs, and other risks associated with data security and standardization when they adopt cloud computing. ...
... Given the varied IT security risks, threats, and vulnerabilities facing companies like ABC, it was vital to ask the overarching research question of this study, "How do IT leaders at ABC avoid data breaches in the cloud environment, which have cost their organization time and money?" A review of the methodological frameworks used in some of the studies cited in the literature review suggests that the qualitative methodology would be most appropriate for revealing specific data security threats facing IT leaders at ABC in the cloud environment and to explore strategies to avoid them (Dutta et al., 2013;Iyer et al., 2013;Lampe et al., 2013;Nicho & Hendy, 2013). The review of the literature also revealed that interview questions have provided rich data in qualitative studies and have been used in several empirical studies relevant to this study (Alkhater et al., 2014;Bharadwaj & Lal, 2012;Jackson, 2014;Lampe et al., 2013;Nicho & Hendy, 2013;Sobragi et al., 2014). ...
Research
Full-text available
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches by Osei-Amanfi, Michael, D.B.A. Grand Canyon University. 2018: 359 pages; 13423232.
... With virtualization and grid computing, cloud computing shares several features; nevertheless, it also has its own unique qualities and related dangers (Weinhardt et al., 2009). Different forms of threats affect SMEs (El-Gazzar, 2014;Onwudebelu and Chukuka, 2012;Iyer et al., 2013): ...
Article
Purpose Fundamental literature exists on the employment of diverse information technology (IT) innovations relied on utility computing, a little experimental literature exists on cloud computing adoption by medium enterprises. So, this essay aims to analyze the determinants of the acceptance of cloud computing in medium-sized organizations. It also targets the impact of cloud-depended services on employers' talent management in the analysis areas of research reports, hypotheses and frameworks used by them. Design/methodology/approach Cloud computing is a novel and notable development in the network application field with a novel IT viewpoint. The present investigation aims to assist and enrich the scientific argument regarding the phenomenon nominated cloud computing from a managerial perspective. A quantitative study design was utilized to gather and analyze the data. In total, 345 employees from different medium enterprises reported their perspectives via an online survey. Partial least squares was used to evaluate the model of the study. The investigation was performed from April 2020 to November 2020. Findings As expected, the empirical analysis results revealed that cloud computing adaption drivers positively and significantly associated with talent management. The results showed that organizational level is the most important factor in the effectiveness of talent management. Further, this study established a cloud strategy that moderates the relationships between cloud computing adaption drivers and talent management. As a general result, organization managers must implement cloud computing to improve organizational performance, reduce costs, enhance organizational innovation and reduce repetitive work. So, international trade facilitates and helps the country's economy. Research limitations/implications There are still some drawbacks of this analysis that require addressing the findings. Initially, the authors gathered a country's data. Second, by considering multiple significant structures from four aspects, they established the study model. Third, utilizing one-time cross-sectional data, the suggested model was evaluated. As a proposal, future researchers could investigate cloud computing adoption drivers' outcomes within other organizations. Originality/value This research presents a straightforward and easy model for understanding the cloud's effect on employee talent management. By systematizing the unrelated studies on the subject and organizing those contributions into strong managerial literature paradigms, such an aim has been accomplished.
... Cloud Computing is defined as a "business model that enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction". Cloud service latency is the systemic delay between a client request and a cloud service provider's response that is introduced by a mixture of cloud elements and internet elements [14]. This delay will be a significant dissatisfier for a sector like financial sector where 'zero' latency during live data streaming would be an expected de-facto standard. ...
Conference Paper
Full-text available
Classic studies on technology acceptance and adoption have primarily focused only on the driver constructs. Usefulness and Ease of Use of technology were the twin variables on which the technology adoption study started. The initial model later expanded to incorporate social as well as cognitive driver constructs that act as antecedents to Usefulness. All these drivers constructs talk only about the utility paradigm associated with technology. But in a real-world technology adoption scenario, inhibitors to technology acceptance play a crucial role in the eventual adoption of any technology. Some previous studies have touched upon the inhibitor space, but had restricted themselves to looking only at affective inhibitors. This paper theoretically proposes the extension of the Technology Adoption Model by the addition of cognitive inhibitors to technology adoption. It posits 'Dissatisfiers' and 'Risk' as two cognitive inhibitor constructs to any nascent technology adoption.
Chapter
This research aims to explore how to enhance student engagement in higher education institutions using novel chatbots. This study's principal research methodology is design science research, which is executed in three iterations: personas elicitation, a survey and development of student engagement factor models (SEFMs), and chatbot interaction analysis. This chapter focuses on the first iteration, personas elicitation, which proposes a data-driven persona development method (DDPDM) that utilises machine learning, precisely a k-means clustering technique. Data analysis is conducted using two datasets. Eight personas are produced from the two data analyses. The pragmatic findings from this study make two contributions to the current literature. Firstly, the proposed DDPDM uses machine learning, specifically k-means clustering, to build data-driven personas. Secondly, the persona template is designed for university students, which supports the construction of data-driven personas. Future work will cover the second and third iterations.
Thesis
Cloud computing is a paradigm for providing and delivering IT services over the Internet. The cloud can provide several benefits for organisations, including cost reduction and flexibility. In developing countries, such as Saudi Arabia, cloud computing is still not widely adopted. In fact, migrating an existing system to the cloud depends on a number of factors that may affect an organisation's decision to adopt the cloud in the private sector in Saudi Arabia. In order to encourage the adoption of cloud computing, it is important to understand why some organisations are willing to move to the cloud while others are not. Therefore, the aim of this research is to investigate the factors that may influence an organisation's decision regarding adopting cloud computing. An integrated model is proposed which incorporates critical factors derived from a literature review on technology adoption and cloud computing along with other factors (such as physical location) that have not been examined in previous studies as main factors that may affect the organisation’s decision to adopt cloud services. A study was conducted in private sector organisations in Saudi Arabia in order to improve the proposed model. Interviews were carried out with IT experts to review the identified factors and explore other factors that were not mentioned in previous studies. The second stage of this study was an online questionnaire which was used to confirm the existing factors in the cloud adoption model and other factors that were identified from interviews (trialability, external support, industry, and culture). Among the 17 factors examined, the results of the questionnaire revealed that only two, complexity and competitive pressure, did not significantly impact the adoption decision. Finally, a questionnaire was conducted with 300 IT staff in different organisations in the private sector in Saudi Arabia, in order to test the model for cloud adoption and to explore factors that were positively or negatively associated with cloud adoption. The findings of the evaluation study showed that there was both a direct and indirect effect of the factors on an organisation's intention to adopt the cloud. The findings of this study showed that quality of service and trust are the most influential determinants of cloud adoption. However, security and privacy concerns still prevent cloud adoption in this country. Furthermore, the physical location had a significant direct effect on compliance with regulation and privacy. This study also showed that the effect of these variables differed according to organisation size and in adopter and non-adopter companies. The results confirmed that the proposed model was well-fitted with the collected data. Thus, the developed model is valuable in explaining the adoption of the cloud at organisational level. Overall, the findings of this research provide great value in terms of guidelines to the organisations, cloud providers, managers, government and policy makers on ways of increasing the implementation and encouraging the spread of cloud computing in Middle Eastern countries particularly in Saudi Arabia.
Article
Full-text available
"Cloud" computing - a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. This paper discusses the concept of "cloud" computing, some of the issues it tries to address, related research topics, and a "cloud" implementation available today.
Article
Full-text available
To achieve lasting competitiveness through IT, according to the authors, companies face three enduring challenges: focusing IS efforts to support business strategies and using IT innovations to develop new, superior strategies; devising and managing effective strategies for the delivery of low-cost, high-quality IS services; and choosing the technical platform on which to mount IS services. Three strands of research - on the CIO's role and experience, the CIO's capabilities, and IS/IT outsourcing - demonstrate that businesses need nine core IS capabilities to address these challenges: 1. Leadership. Integrating IS/IT effort with business purpose and activity. 2. Business systems thinking. Envisioning,he business process that technology makes possible. 3. Relationship building. Getting the business constructively engaged in IS/IT issues. 4. Architecture planning. Creating the blueprint for a technical platform that responds to current and future business needs. 5. Making technology work. Rapidly achieving technical progress - by one means or another. 6. Informed buying. Managing the IS/IT sourcing strategy that meets the interests of the business. 7. Contract facilitation. Ensuring the success of existing contracts for IS/IT services. 8. Contract monitoring. Protecting the business's contractual position, cu:rent and future. 9. Vendor development. Identifying the potential added value of IS/IT service suppliers. IS professionals and managers need to demonstrate a changing mix of technical, business, and interpersonal skills. The authors trace the role these skills play in achieving the core IS capabilities and discuss the challenges of adapting core IS capabilities to particular organizational contexts. Their core IS capability model implies migration to a relatively small IS function, staffed by highly able people. To sustain their ability to exploit IT, the authors conclude, organizations must make the design of flexible IS arrangements a high-priority task and take an anticipatory rather than a reactive approach to that task.
Conference Paper
Full-text available
This paper looks at the drivers and inhibitors of Cloud Computing adoption, which the authors propose as a technology empowerment option for the Indian SME sector. The small to medium enterprise diaspora, spread over several million units and cutting across multiple industry sectors, today contributes to almost 50% of the total industrial production of India. Labor accessibility is a key driver to the current SME growth due to India’s demographic advantage. But with emergence of global markets cutting across national boundaries, information management will eventually hold the key for further growth in this sector. Information management needs technology empowerment. Cloud computing is today pitched as one of the most comprehensive as well as cost-competitive technology options for the future. The paper looks at the gain and risk perceptions of the SME sector vis-à-vis cloud adoption. These perceptions will act as a precursor for SME to go ahead and adopt Cloud Computing.
Conference Paper
Full-text available
This paper does a revenue–neutral cash flow modelling for fractional cloud computing adoption. The aim is to find out a mathematical fraction, other things being equal, for which the Net Present Value (NPV) maximizes with respect to cloud adoption. The impact of both deferred capital expenses and reduced operating expenses on NPV are treated in the model. The paper posits that the revenue generation and growth of the firms under consideration are independent of the way the IT resources are managed between cloud vs. traditional. In addition to NPV modelling, the paper also examines the fraction of the total product /solutions options that can be moved to the cloud today from the total universe of IT assets by running a statistical analysis of data collected from a vendor sample space.
Article
Full-text available
Use of the internet in the provision of services may prove an important advantage in improving the operation of local government, and an efficient means of providing citizens with better quality services. Although the implementation of corresponding practices depends on the ability of citizens in the community to adopt and use such service-providing systems. Actions taken by local government (1 st level) also promote this innovation to the benefit of both parties. The objective of this study is to examine citizens' conduct towards electronic municipal services and to define those factors affecting their conduct. It examines on the basis of a case study the attitude taken by citizens and the problems they face in relation to the provision of electronic services by 1 st level local government.
Article
Full-text available
In recent years, new technologies have emerged that promise to deliver efficiency, cost savings, and productivity increases to the commercial construction industry; building information modeling (BIM), and integrated project delivery (IPD) are such technologies. The literature is overwhelmingly positive with respect to the potential of BIM and/or IPD, in addition to Partnering – a less formal predecessor to IPD. This conceptual study is a critical review of the technologies, which identifies key benefits/deficiencies within the literature, synthesizes the information with comparative analysis, and conceptualizes a new framework for understanding the technologies and their interactions – the BIM/IPD Integration Model. A preliminary methodological concept for resolution of the problems uncovered is also put forth. Conclusions indicate that further study is needed to better understand the relationship between BIM and/or IPD adoption and project performance measures (e.g., cost, profit, ROI, schedule, safety, relationships, etc.) utilizing rigorous quantitative methods applied to actual project data.
Article
Full-text available
Knowledge is originated from the intelligence of individuals and is visible in the tasks, systems, procedures, norm and customs and is really difficult to imitate. Knowledge economy has changed the theme of innovation management. Knowledge sharing not only reduces the cost of the production or service, but also contributes to the success of the organization because knowledge sharing helps in avoiding the mistakes and develops the ability to innovate.There exist a gap in the studies that address the knowledge sharing practices. Knowledge sharing has been found to become a beneficial for different organizations especially for the development of solutions through innovations. This study has, therefore, been conducted to find out the factors that influence academic staff's knowledge sharing intentions which develop the university's capabilities towards innovation. In order to check the factors that determine the behaviour of knowledge sharing among the academic staff, different theoretical models have been discussed that explain the individual's behaviour. On the basis of literature, 'trust' from social capital theory along with subjective norms and attitude from theory of reasoned action were used as factors influencing the knowledge sharingintentions.The data was collected by using a semi structured questionnaire. The model used for evaluation was structural equation model (SEM) and data has been analysed by using LISREL 8.70 software. The results obtained from the analysis of the data confirmed that the intensity of knowledge sharing behaviours has a positive influence on the innovative capabilities of the university.
Article
For the last 25 years, organizations have invested heavily in information technology to support their work processes. In today's organizations, intra-and interorganizational work systems are increasingly IT-enabled. Available evidence, however, suggests the functional potential of these installed IT applications is underutilized. Most IT users apply a narrow band of features, operate at low levels of feature use, and rarely initiate extensions of the available features. We argue that organizations need aggressive tactics to encourage users to expand their use of installed IT-enabled work systems. This article strives to accomplish three primary research-objectives. First, we offer a comprehensive research model aimed both at coalescing existing research on Post-adoptive IT use behaviors and at directing future research on those factors that influence users to (continuously) exploit and extend the functionality built into IT applications. Second, in developing this comprehensive research model, we provide a window (for researchers across a variety of scientific disciplines interested in technology management) into the rich body of research regarding IT adoption use, and diffusion. Finally, we discuss implications and recommend guidelines for research and practice.