Article

Cloud Computing Adoption: Scale Development, Measurement and Validation

Authors:
  • IIM Mumbai(NITIE-National Institute of Industrial Engineering)
To read the full-text of this research, you can request a copy directly from the author.

Abstract

The purpose of this article is to develop a cloud computing adoption scale for Indian manufacturing, service, and process Industries. The scale development procedure has been followed from the previous studies and is refined further for clear understanding to adopt easily. In the first step, we have conducted a qualitative study for item selection. The second step includes pilot testing of 110 responses for measurement scale purification and finally, we are validating the scale with 660 sample respondents through convergent validity and discriminant validity. The initial result showed very poor threshold values for the items “Top management support” and “Marketplace establishment” which are having a strong literature support. This measurement scale will help managers to evaluate the level of cloud adoption to increase the business performance. The study is a first time attempt to develop a validated scale for cloud adoption that can be used in Indian Industries.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Cloud computing, disruptive innovation technology that extends existing IT capabilities and requirements [1,2], provides flexible and on-demand computing resources [3][4][5][6][7], which has gained substantial attention in both academia and industry [8][9][10][11][12]. Recently, cloud computing paradigm direction is toward mobile with advances of mobile network and mobile devices [1]. ...
... In the context of public sectors, in order to improve the efficiency of administration and the quality of public service [20,21], many governments all over the world have introduced MCC to deliver mobile government information services anywhere and anytime to citizens, businesses, governments, and employees [17,22]. In order to promote the adoption and diffusion of MCC in the government context, therefore, it is of great practical significance to explorer the determinants and mechanisms of mobile cloud computing-based government (m-Gov cloud) adoption [12]. ...
... Mobile Government Cloud. As NIST definition, cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [6,7,12,25]. As the definition of Shin and Huh [1], MCC is the technical and functional supporting about processing of mobile cloud services. ...
Article
Full-text available
Mobile cloud computing (MCC) has been widely used in every aspect of our society, bringing both advantages and challenges. However, the adoption of MCC technology is still at an early stage of implementation in the governments. To promote the adoption and diffusion of MCC in the government area, exploring the determinants and influence mechanisms of mobile cloud computing-based government (m-Gov cloud) adoption has become the focus in academic and industry. Based on the technology-organization-environment framework and trust theory at the organizational level, an integrated model including the determinants on the adoption of m-Gov cloud is proposed, and 93 survey samples from China are used to analyzed by partial least squares structural equation modeling (PLS-SEM). The results show that provider competence, organizational readiness, external pressure, and trust of m-Gov cloud have significant effects on m-Gov cloud adoption. Perceived benefit, perceived risk, and provider competence have significant effects on m-Gov cloud trust. The m-Gov cloud trust plays an indirect-only (full) mediation and a complementary (partial) mediation effect between perceived benefit, provider competence, and m-Gov cloud adoption, respectively, while perceived risk has no significant direct and indirect effect on m-Gov cloud adoption. The findings provide a new research perspective and practice insights to promote the implementation of solutions based on the idea of mobile cloud computing.
... However, due to the wide range of techniques and parameters involved, "cloud computing" systems are difficult to implement [54]. The common problems that users have must be explained to cloud computing specialists, so that they can be rapidly solved and users then feel more involved in the implementation [55,56]. This helps with communication between managers and employees when dealing with the different uses of the technology [53]. ...
... The dissemination of information is a critical process in organizations, both to make good decisions [52] and in the processes of technology adoption in companies [53,56]. Therefore, it must be shared conscientiously in order to be effective on team performance [57]. ...
Article
Full-text available
This paper aims to investigate the factors which promote the adoption of cloud-based technology. It strives for a better understanding of the impact of corporate governance on the adoption of this technology. This study concentrated on executives in companies where the use of cloud computing may give a competitive advantage. The main contribution of this work is to propose a model for the influence of corporate governance and other factors that determine the adoption of this technology. A questionnaire was prepared after taking into consideration the reviewed literature. The sample consisted of 164 technology companies from Southern Spain that already use the new economic models for digital solutions. The methodology used to analyze the structural model was the Structural Equation Model (SEM). The results of the survey showed the influence of Corporate Governance and the procedures and practices of the organization on the adoption of cloud computing and the associated business model. This study aims to point out the importance of corporate support and Knowledge Management for the correct and successful adoption of this technology and to show the effects on the new business model of billing for the use of available resources.
... CC has advantages of location independence, cost effectiveness, maintenance, and scalability which support the organization's approach in sustaining competitive advantages (Tariq et al., 2017;Priyadarshinee, 2018). However, there are some barriers that may hinder the adoption of CC services (e.g. ...
... The main aim of this study was to examine the main salient factors that may enable or hinder the adoption of cloud computing services in higher educational institutions in Oman. Similar to earlier studies (Tashkandi & Al-Jabri, 2015;Gutierrez et al., 2015;Loukis et al., 2017;2018), this study provided strong evidence that TOE is supported theoretically and empirically in understanding the adoption of cloud computing across cultures, exemplified here by Oman. Overall, the results illustrate that the vast majority of respondents provided positive responses to the factors being measured in the proposed theoretical framework. ...
Article
Full-text available
This article aims to examine the main factors that may hinder or facilitate the adoption of cloud computing (CC) services by higher educational institutions in developing countries, exemplified here by Oman. A conceptual model was developed through extending the technology-organization-environment (TOE) framework. Data was collected from 387 IT decision makers working in four higher educational institutions in Oman using a cross-sectional survey. Data was analysed using structural equation modelling based on AMOS 22.0. The results show that behavioural intention (BI) towards adopting CC services in higher educational institutions was influenced by top management support, relative advantage, attitudes towards change, technology readiness, complexity, government regulation, peer pressure, and data concerns in their order of influencing power. These all together accounted for 58.3% of the variance in BI. However, compatibility, vendor lock-in and external expertise did not have an influence on BI. This research provides original insight for cloud computing adoption within Oman from a managerial and IT professional perspectives. Specifically, this research would be helpful for government agencies, cloud computing providers and policy makers at higher educational institutions. It will also explain the relatively low penetration rate of cloud computing services at present, which will help in formulating strategies to encourage the adoption and acceptance of CC services by Omani higher educational institutions, where CC is still considered an innovation.
... In CC, the term "Cloud" refers to a carrier or service provider that delivers services through the Internet (Surbiryala & Rong, 2019). "Computing" refers to the processing, computations, calculations, and other resources a computer provides (Priyadarshinee, 2018). CC is a form of computing that relies on the Internet to provide on-demand access to shared resources such as servers, storage, and software applications (Surbiryala & Rong, 2019). ...
Article
Full-text available
The emergence and proliferation of cloud computing have caused a paradigm shift for organizations, moving them away from traditional servers towards data centers. Developed nations have extensively leveraged cloud computing to improve SMEs' operations, collaboration, and research, all while overcoming financial constraints. As such, the adoption of cloud-based services could prove to be highly significant for businesses of all sizes, including SMEs in developing countries. Despite the numerous benefits, SMEs in developing countries, particularly Pakistan, have hesitated to adopt cloud computing. In this study, a quantitative method will be employed, utilizing the Organizational Support Theory and the Technology-Organization-Environment theory, and moderator contribution variables relevant to the study, to investigate the factors influencing the intention to adopt a Cloud Computing Software-as-a-Service (CC-SaaS) model.
... Other research further argues (based on the finding that top management commitment and support influenced ease of use perceptions) that users attribute the availability of resources and support to top management commitment. In a way, top management commitment can therefore be viewed as a factor that helps users overcome obstacles which might arise during the implementation (Igbaria et al., 1997;Lewis et al., 2003;Priyadarshinee, 2018;Gupta et al., 2016). ...
Article
Full-text available
Within the technology acceptance literature, the issue of top management support and commitment has been studied extensively; however, the issue of leadership per se has not been addressed directly. A missing piece of the leadership puzzle as it relates to technology acceptance is an exploration of how top management support gets translated in the organizational hierarchy. This study introduces leader-member exchange (LMX) to better understand this missing piece. Specifically, this research explores the role direct supervisors play in the acceptance process by end users based on the moderated model of LMX and supervisor influence. The empirical test results in the field setting show that LMX is a significant moderator for most of the technology acceptance variables within organizations. The study explores the role of the quality of the relationship between supervisors and employees as end users. It also highlights the role of LMX and supervisor influence as a conduit for the acceptance process among end users in the organization.
... Government and business agency are the main source of big data where most of the data deals with personal information (Priyadarshinee, P. (2018)). In these applications, the user's privacy is commonly at danger when the data is stores centrally in cloud environment. ...
Chapter
Big data analytics is one of the key research areas ever since the advancement of internet technologies, social media, mobile networks, and internet of things (IoT). The volume of big data creates a major challenge to the data scientist while interpreting the information from raw data. The privacy of user data is an important issue faced by the users who utilize the computing resources from third party (i.e., cloud environment). This chapter proposed a data independent reusable projection (DIRP) technique for reducing the dimension of the original high dimensional data and also preserves the privacy of the data in analysis phase. The proposed method projects the high dimensional input data into the random low dimensional space. The data independent and distance preserving property helps the proposed method to reduce the computational complexity of the machine learning algorithm. The randomness of data masks the original input data which helps to solve the privacy issue during data analysis. The proposed algorithm has been tested with the MNIST hand written digit recognition dataset.
... In addition, completely positive and completely negative WOM reviews could be designed to elucidate Internet users' determination of eWOM intensity and directionality. Besides, related studies were employed survey method to retrieve purposeful and meaningful data for such topic discussions (Cyr and Bonanni 2005;Ulbrich et al. 2011;Gefen and Ridings 2005;Yates 2001;Nadiri and Gunay 2013;Ziebell et al. 2019;Priyadarshinee 2018). Therefore, the specified objective oriented survey was necessary for empirical study use, especially for human factors (Fabisiak 2018;Avdic 2018;Huang 2017). ...
Article
Full-text available
This study investigated the influence of the usefulness of E-word-of-mouth (eWOM) and Internet risk avoidance on consumers’ purchase intention. In particular, because consumers typically exhibit gender difference in their purchase intentions, this study adopted a quasi-experimental design and developed four situational questionnaires on gender difference. The objective of this study was to understand the influence of related factors on consumers’ hotel reservation intention. A total of 512 effective data were collected via online questionnaires. The results showed that eWOM and Internet risk avoidance were significantly and positively correlated with consumers’ purchase intention, and eWOM had higher predictive power than Internet risk avoidance did. The results reveal that both male and female respondents emphasized hotel facilities, and their purchase intention was positively influenced by related positive comments. However, female respondents paid more attention to hotel service quality than male respondents did.
... Government and business agency are the main source of big data where most of the data deals with personal information (Priyadarshinee, P. (2018)). In these applications, the user's privacy is commonly at danger when the data is stores centrally in cloud environment. ...
Chapter
Big data analytics is one of the key research areas ever since the advancement of internet technologies, social media, mobile networks, and internet of things (IoT). The volume of big data creates a major challenge to the data scientist while interpreting the information from raw data. The privacy of user data is an important issue faced by the users who utilize the computing resources from third party (i.e., cloud environment). This chapter proposed a data independent reusable projection (DIRP) technique for reducing the dimension of the original high dimensional data and also preserves the privacy of the data in analysis phase. The proposed method projects the high dimensional input data into the random low dimensional space. The data independent and distance preserving property helps the proposed method to reduce the computational complexity of the machine learning algorithm. The randomness of data masks the original input data which helps to solve the privacy issue during data analysis. The proposed algorithm has been tested with the MNIST hand written digit recognition dataset.
Article
Full-text available
Enterprises are adopting digital transformation with an exponential rate to drive growth through new business models and the use of digital technologies. Digital transformation is a business imperative rather than technology imperative. Hence, customer experience during and post-transformation is key to the success of the digital transformation. The present paper proposes an Integrated Predictive Experience Management Framework (IPEMF) for improving customer experience. IPEMF is- a structured and methodological business processes centric connected experience framework with the customer at the centre. The uniqueness of IPEMF is that it seamlessly integrates business processes, technology, organisation, and customer behaviour. It is agnostic of the business vertical or the geography. The framework puts forth an approach to predict the impact on customer experience proactively and provides a feedback loop to help continuously improve the experience. IPEMF helps enterprises build intuitive, trusted relationships and hyper-personalised customer experience through the customer journey.
Article
The internet of things (IoT) offers a range of benefits for its users, ranging from quicker and more precise perception of our ecosystem to more cost-effective monitoring of manufacturing applications, by taking internet access to the things. Due to the ubiquitous existence of the internet, there's been an increasing pace in the IoT. Such a growing pace has brought about the term of IoT ecosystem. This exponential growing IoT ecosystem will encounter several challenges in its path. Computing domains were used from very initial stage to assist the IoT ecosystem and mitigate those challenges. To understand the impact of computing domains in IoT ecosystem, this paper performs the elaborative study on cloud, fog, roof, and dew computing including their interaction, benefits, and limitations in IoT ecosystem. The brief comparative analysis on these four computing domains are then performed. The impact of internet and offline computing on these computing domains are then analyzed in depth. Finally, this paper presents the suggestions of potential appropriate computing domain strategies for IoT ecosystems.
Chapter
This article aims to examine the main factors that may hinder or facilitate the adoption of cloud computing (CC) services by higher educational institutions in developing countries, exemplified here by Oman. A conceptual model was developed through extending the technology-organization-environment (TOE) framework. Data was collected from 387 IT decision makers working in four higher educational institutions in Oman using a cross-sectional survey. Data was analysed using structural equation modelling based on AMOS 22.0. The results show that behavioural intention (BI) towards adopting CC services in higher educational institutions was influenced by top management support, relative advantage, attitudes towards change, technology readiness, complexity, government regulation, peer pressure, and data concerns in their order of influencing power. These all together accounted for 58.3% of the variance in BI. However, compatibility, vendor lock-in and external expertise did not have an influence on BI. This research provides original insight for cloud computing adoption within Oman from a managerial and IT professional perspectives. Specifically, this research would be helpful for government agencies, cloud computing providers and policy makers at higher educational institutions. It will also explain the relatively low penetration rate of cloud computing services at present, which will help in formulating strategies to encourage the adoption and acceptance of CC services by Omani higher educational institutions, where CC is still considered an innovation.
Article
The factors of Cloud computing (CC) adoption among small and medium enterprises (SMEs) have not been identified in the Jordanian context. Therefore, the aim of this study is to examine the factors influencing the adoption of CC in SMEs in Jordan. Through an extensive review of the literature, the research model was constructed based on the TOE framework. In order to validate the research model and test the proposed hypotheses, a quantitative research methodology followed in which a survey questionnaire was utilized to collect the data. Out of the 350 distributed questionnaires, 92 questionnaires were valid for the analysis. The PLS-SEM technique was used for the data analysis. The results approved the influence of six variables on the adoption of CC by manufacturing SMEs in Jordan, namely; compatibility, security, top management support, technological readiness, prior IT experience, and competitive pressure. Only the influence of the perceived benefits has not been supported. The study has theoretical implications and practical implications to SMEs in Jordan.
igi-global.com/article/corner-boundary-processor-allocation-for-3dmesh-connected-multicomputers/124839?camid=4v1a Implementation of User-End Broker Policy to Improve the Reliability of Cloud Services
  • Www
www.igi-global.com/article/corner-boundary-processor-allocation-for-3dmesh-connected-multicomputers/124839?camid=4v1a Implementation of User-End Broker Policy to Improve the Reliability of Cloud Services
  • Jitendra Singh
  • Vikas Kumar
Jitendra Singh and Vikas Kumar (2013). International Journal of Cloud Applications and Computing (pp. 13-27).
igi-global.com/article/simulation-study-derive-optimalcycle/55540?camid=4v1a Rough Set Based Ad Hoc Network: A Review
  • Www
www.igi-global.com/article/simulation-study-derive-optimalcycle/55540?camid=4v1a Rough Set Based Ad Hoc Network: A Review
  • Swati Chowdhuri
  • Payel Roy
  • Srijan Goswami
  • Ahmad Taher Azar
  • Nilanjan Dey
Swati Chowdhuri, Payel Roy, Srijan Goswami, Ahmad Taher Azar and Nilanjan Dey (2014). International Journal of Service Science, Management, Engineering, and Technology (pp. 66-76).
igi-global.com/article/rough-set-based-ad-hocnetwork/122561?camid=4v1a
  • Www
www.igi-global.com/article/rough-set-based-ad-hocnetwork/122561?camid=4v1a