879
Views
27
CrossRef citations to date
0
Altmetric
Original Articles

Perceived potential for value creation from cloud computing: a study of the Australian regional government sector

, &
Pages 1157-1176 | Received 04 Sep 2016, Accepted 09 Jun 2018, Published online: 29 Jun 2018

References

  • AGIMO (Australian regional and municipal government Information Management Office). 2011. Cloud Computing Strategic Direction Paper: Opportunities and Applicability for Use by the Australian Government. Department of Finance and Deregulation, Canberra, ACT. Accessed August 22, 2013. http://agimo.gov.au/files/2012/04/final_cloud_computing_strategy_version_1.pdf.
  • Ahuja, S. P., and S. Mani. 2012. “Availability of Services in the Era of Cloud Computing.” Network and Communication Technologies 1 (1): 2–6.
  • Ajzen, I. 1985. “From Intentions to Action: A Theory of Planned Behaviour.” In Action Control: From Cognition to Behaviour, edited by J. Kuhl and J. Beckman, 11–39. New York: Springer-Verlag.
  • Ajzen, I. 1991. “The Theory of Planned Behaviour.” Organizational Behaviour and Human Decision Processes 50 (2): 179–211.
  • Ajzen, I. 2002. “Perceived Behavioural Control, Self-efficacy, Locus of Control, and the Theory of Planned Behavior.” Journal of Applied Social Psychology 32 (4): 665–683.
  • Alam, S. S. 2009. “Adoption of the Internet in Malaysian SMEs.” Journal of Small Business Enterprise Development 16: 240–255.
  • Ali, O., J. Soar, H. McClymont, J. Yong, and J. Biswas. 2015. “Anticipated Benefits of Cloud Computing Adoption in Australian Regional Municipal Government: An Exploratory Study.” Pacific Asia Conference on Information Systems (PACIS), 1–17.
  • Ali, O., J. Soar, and J. Yong. 2015. “An Investigation of the Main Factors to be Considered in Cloud Computing Adoption in Australian Regional Councils.” Journal of Contemporary Issues in Business and Government 21 (1): 72–93.
  • Ali, O., J. Soar, and J. Yong. 2016. “An Investigation of the Challenges and Issues Influencing the Adoption of Cloud Computing in Australian Regional Municipal Governments.” Journal of Information Security and Applications 27/28: 19–34.
  • Ali, O., J. Soar, J. Yong, and H. McClymont. 2015. “Level of Policy for Cloud Computing Adoption in Australian Regional Municipal Governments: An Exploratory Study.” The International Conference on Grid and Cloud Computing and Applications, Las Vegas, USA, 30–35.
  • Ali, O., J. Soar, J. Yong, H. McClymont, and D. Angus. 2015. “Collaborative Cloud Computing Adoption in Australian Regional Municipal Government: An Exploratory Study.” The 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 540–548.
  • Al-Ismaili, S., M. Li, Q. He, and J. Shen. 2016. “Cloud Computing Services Adoption in Australian SMEs: A Firm-Level Investigation.” Pacific Asia Conference on Information Systems (PACIS), pp. 1–11.
  • Al-Khouri, A. M. 2011. “PKI in Government Identity Management Systems.” International Journal of Network Security and its Applications 3 (3): 69–96.
  • Alshomrani, S., and S. Qamar. 2013. “Cloud-based e-Government: Benefits and Challenges.” International Journal of Multidisciplinary Sciences and Engineering 4 (6): 15–19.
  • Alvi, F. A., B. S. Choudary, N. Jeffery, and E. A. Pathan. 2011. Review on Cloud Computing Security Issues and Challenges. Department of Electronic Engineering, QUEST Nawabshah, Sindh, Pakistan.
  • Ashton, H., and D. Thorns. 2004. “Information and Communication Technologies (ICTs) to Make or Break a Community.” Future Times 4: 6–8.
  • Asthana, S. 2003. “Allocating Resources for Health and Social Care: The Significance of Reality.” Health and Social Care in the Community 11 (6): 486–493.
  • Avizienis, A., J. C. Laprie, B. Randell, and C. Landwehr. 2004. “Basic Concepts and Taxonomy of Dependable and Secure Computing.” IEEE Transactions on Dependable and Secure Computing 1 (1): 1–23.
  • Baker, J. 2011. “The Technology-Organization-Environment Framework.” In Information Systems Theory: Explaining and Predicting our Digital Society, edited by Y. Dwivedi, M. Wade, and S. Schneberger, 231–245. Springer.
  • Baxter, J., A. Hayes, and M. Gray. 2011. “Families in Regional, Rural and Remote Australia.” Australian Institute of Family Studies: 1–8.
  • Bhattacharya, K. 2011. “The Impact of Virtualization and Cloud Computing on IT Service Management.” Business Information System Engineering 3: 49–56.
  • Borgman, H. P., B. Bahli, H. Heier, and F. Schewski. 2013. “Cloud Rise: Exploring Cloud Computing Adoption and Governance with the TOE Framework.” The 46th Hawaii International Conference on System Sciences, 4425–4435.
  • Bradford, M., and J. Florin. 2003. “Examining the Role of Innovation Diffusion Factors on the Implementation Success of Enterprise Resource Planning Systems.” International Journal of Accounting Information Systems 4: 205–225.
  • Bradley, J. 1993. ““Methodological Issues and Practices in Qualitative Research.” The Library Quarterly 63 (4): 431–449.
  • Brohi, S. N., and M. A. Bamiah. 2011. “Challenges and Benefits for Adopting the Paradigm of Cloud Computing.” International Journal of Advanced Engineering, Science and Technology 2: 286–290.
  • Brynjolfsson, E., P. Hofmann, and J. Jordan. 2010. “Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model.” Communications of the ACM 53 (5): 32–34.
  • Buyya, R., C. S. Yeo, and S. Venugopala. 2008. “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities.” The 10th IEEE Conference on High-Performance Computing and Communications, 1–9.
  • Cameron, K. S., and R. E. Quinn. 2005. Diagnosing and Changing the Organizational Culture: Based on the Competing Values Framework. San Francisco: Josessy-Bass.
  • Cardoso, A., and P. Simões. 2012. “Cloud Computing: Concepts, Technologies and Challenges, Virtual and Networked Organizations, Emergent Technologies and Tools.” Computer and Information Science, Springer, Berlin 248: 127–136.
  • Carson, D., A. Gilmore, C. Perry, and K. Gronhaug. 2001. Qualitative Marketing Research. London: Sage Publications.
  • Catteddu, D., and G. Hogben. 2009. “Cloud Computing: Benefits, Risks and Recommendations for Information Security.” European Network and Information Security Agency 1–50.
  • Chesbrough, H., and J. Spohrer. 2006. “A Research Manifesto for Services Science.” Communications of the ACM 49 (7): 35–40.
  • Chong, A. Y., K. Ooi, B. Lin, and M. Raman. 2009. “Factors Affecting the Adoption Level of e-Commerce: An Empirical Study.” Journal of Computer Information Systems 50 (2): 13–22.
  • Choudrie, J., and Y. K. Dwivedi. 2005. “Investigating the Research Approaches for Examining Technology Adoption Issues.” Journal of Research Practice 1 (1): 1–8.
  • Claycomb, C., K. Lyer, and R. Germain. 2005. “Predicting the Level of B2B e-Commerce in Industrial Organizations.” Industrial Marking Management 34 (3): 221–234.
  • Cooper, R., and R. Zmud. 1990. “Information Technology Implementation Research: A Technological Diffusion Approach.” Management Science 36 (2): 123–139.
  • Cummings, S., and U. Daellenbach. 2009. “A Guide to the Future of Strategy? The History of Long-Range Planning.” Long Range Planning 42 (2): 234–263.
  • Damanpour, F. 1991. “Organizational Innovation: A Meta-Analysis of Effects of Determinants and Moderators.” The Academy of Management Journal 34 (3): 555–590.
  • Damanpour, F., and S. Gopalakrishnan. 1998. “Theories of Organizational Structure and Innovation Adoption: The Role of Environmental Change.” Journal of Engineering and Technology Management 15 (1): 1–24.
  • Das, R. M., S. Patnaik, and A. K. Misro. 2011. “Adoption of Cloud Computing in e-Government.” Advanced Computing Communications in Computer and Information Science 133: 161–172.
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–340.
  • Davis, F. D., P. B. Richard, and R. W. Paul. 1989. “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models.” Management Science 35 (8): 982–1003.
  • Delaney, K. J., and V. Vara. 2007. “Google Plans Services to Store Users’ Data.” Wall Street Journal. Accessed March 16, 2014. http://online.wsj.com/article/SB119612660573504716.html?mod=hps_us_whats_news.
  • Department on Innovation Industry Science and Research. 2011. Cloud Computing- Opportunities and Challenges. IT Industry Innovation Council, Australia, 1–31.
  • Duffany, J. L. 2012. “Cloud Computing Security and Privacy.” In Proceedings of the 10th Latin American and Caribbean Conference for Engineering and Technology, 1–9.
  • Eder, L., and M. Igbaria. 2001. “Determinants of Intranet Diffusion and Infusion.” Omega 29 (3): 233–242.
  • Espejo, R. 2000. “Giving Requisite Variety to Strategic and Implementation Processes: Theory and Practice.” JAIST Conference, Ishikawa, Japan.
  • Faust, D. 1982. “A Needed Component in the Prescription of Science: Empirical Knowledge of Human Cognitive Limitations.” Knowledge 3 (4): 555–570.
  • Feuerlicht, G. 2010. “Next Generation SOA: Can SOA Survive Cloud Computing.” The 6th Atlantic Web Intelligence Conference, Berlin/Heidelberg: Springer, 73–83.
  • Fichman, R. G. 2004. “Going Beyond the Dominant Paradigm for Information Technology Innovation Research: Emerging Concepts and Methods.” Journal of the Association for Information Systems 5 (8): 314–355.
  • Fishbein, M., and I. Ajzen. 1975. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading: MA: Addison-Wesley.
  • Garrison, G., S. Kim, and R. L. Wakefield. 2012. “Success Factors for Deploying Cloud Computing.” Communication ACM 55: 62–68.
  • Gaskell, G. 2000. “Individual and Group Interviewing.” In Qualitative Researching with Text, Image and Sound, edited by M. Bauer and G. Gaskell, 1–11. London: Sage.
  • Gharehchopogh, F. S., and S. Hashemi. 2012. “Security Challenges in Cloud Computing with More Emphasis on Trust and Privacy.” International Journal of Science and Technology Research 1 (6): 49–54.
  • Ghobakhloo, M., D. Arias-Aranda, and J. Benitez-Amado. 2011. “Adoption of e-Commerce Applications in SMEs.” Industrial Management and Data Systems 111: 1238–1269.
  • Gibbs, J., K. L. Kraemer, and J. Dedrick. 2003. “Environment and Policy Factors Shaping Global e-Commerce Diffusion: A Cross-Country Comparison.” The Information Society 19 (1): 5–18.
  • Glaser, B., and A. L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago, IL: Aldine.
  • Goel, S., M. Manuja, R. Dwivedi, and A. M. Sherry. 2012. “Challenges of Technology Infrastructure Availability in e-Government Program Implementations: A Cloud-Based Solution.” Journal of Computer Engineering 5 (2): 13–17.
  • Greenberg, A., J. Hamilton, D. Maltz, and P. Patel. 2009. “Cost of a Cloud: Research Problems in Data Center Networks.” ACM – SIGCOMM Computer Communication Review 39 (1): 68–73.
  • Hammond, A., and J. Paul. 2006. “A New Model for Rural Connectivity.” World Resources Institute, Development Thought Enterprise: 1–14.
  • Hands, D. W. 2009. “Economics, Psychology, and the History of Consumer Choice Theory.” Cambridge Journal of Economics, 1–21.
  • Hayes, B. 2008. “Cloud Computing.” Communication ACM 51: 9–11.
  • Hemant, P., N. P. Chawande, A. Sonule, and H. Wani. 2011. “Development of Servers in Cloud Computing to Solve Issues Related to Security and Backup.” In Proceedings of the IEEE International Conference on Cloud Computing and Intelligence Systems, 158–163.
  • Hempel, P. S., and Y. K. Kwong. 2001. “B2B e-Commerce in Emerging Economies: i-meta.com’s Non-Ferrous Metals Exchange in China.” Journal of Strategic Information Systems 10 (4): 335–355.
  • Hodges, C. 2011. “Cloud Computing Rains Cost Savings, Productivity Benefits: Manufacturers Are Migrating to the Cloud to Increase Cost Savings and Productivity.” Industry Week, Penton Media.
  • Hong, K. K., and Y. G. Kim. 2002. “The Critical Success Factors for ERP Implementation: An Organizational Fit Perspective.” Information Management 40: 25–40.
  • Hsieh, H. F., and S. E. Shannon. 2005. “Three Approaches to Qualitative Content Analyses.” Qualitative Health Research 15 (9): 1277–1288.
  • Iyer, B., and J. Henderson. 2010. “Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing.” MIS Quarterly Executive 9 (2): 117–131.
  • Jaeger, P. T., J. Lin, and J. M. Grimes. 2008. “Cloud Computing and Information Policy: Computing in a Policy Cloud.” Journal of Information Technology and Politics 5 (3): 269–283.
  • Jain, L., and S. Bhardwaj. 2010. “Enterprise Cloud Computing: Key Considerations for Adoption.” International Journal of Engineering and Information Technology 2 (2): 113–117.
  • Kautz, K., S. Madsen, and J. Norbjerg. 2007. “Persistent Problems and Practices in Information Systems Development.” Information Systems Journal 17 (3): 217–239.
  • Kirsch, L. J. 2004. “Deploying Common Systems Globally: The Dynamics of Control.” Information Systems Research 15 (4): 374–395.
  • Kuan, K. Y., and P. Y. K. Chau. 2001. “A Perception-Based Model for EDI Adoption in Small Businesses Using a Technology-Organization-Environment Framework.” Information and Management 38 (8): 507–521.
  • Lacity, M. C., S. Solomon, A. Yan, and L. P. Willcocks. 2011. “Business Process Outsourcing Studies: A Critical Review and Research Directions.” Journal of Information Technology 26 (4): 221–258.
  • Lee, L. S., and R. D. Mautz Jr. 2012. “Using Cloud Computing to Manage Costs.” Journal of Corporation Accounting and Finance 23: 11–15.
  • Lee, O. K., M. Wang, K. H. Lim, and Z. Peng. 2009. “Knowledge Management Systems Diffusion in Chinese Enterprises: A Multistage Approach Using the Technology-Organization-Environment Framework.” Journal of Global Information Management 17 (1): 70–84.
  • Leedy, P. D., and J. E. Ormrod. 2005. Practical Research: Planning and Design. Pearson Merrill Prentice Hall.
  • Li, Y. H. 2008. “An Empirical Investigation of the Determinants of e-Procurement Adoption in Chinese Manufacturing Enterprises.” The 15th International Conference on Management Science and Engineering (I & II), California, 32–37.
  • Lin, A., and N. C. Chen. 2012. “Cloud Computing as an Innovation: Perception, Attitude, and Adoption.” International Journal of Information Management 32: 533–540.
  • Lin, H. F., and S. M. Lin. 2008. “Determinants of e-Business Diffusion: A Test of the Technology Diffusion Perspective.” Tech-novation 28 (3): 135–145.
  • Lind, M., and R. Zmud. 1991. “The Influence of a Convergence in Understanding Between Technology Providers and Users of Information Technology Innovativeness.” Organization Science 2 (2): 195–217.
  • Lippert, S., and H. Forman. 2005. “Utilization of Information Technology: Examining Cognitive and Experiential Factors of Post-Adoption Behavior.” IEEE Transactions on Engineering Management 52 (3): 363–381.
  • Local Government Association Queensland. 2013. Digital Productivity Report. Local Government Association Queensland (LGAQ), 1–36.
  • Low, C., Y. Chen, and M. Wu. 2011. “Understanding the Determinants of Cloud Computing Adoption.” Industrial Management and Data Systems 111 (7): 1006–1023.
  • Lyytinen, K., and J. Damsgaard. 2011. “Inter-organizational Information Systems Adoption – A Configuration Analysis Approach.” European Journal of Information Systems 20: 496–509.
  • Ma, W. 2007. “Google’s G-Drives Raise Privacy Concerns.” Popular Mechanics. Accessed March 16, 2014. http://www.popularmechanics.com/technology/industry/4234444.html.
  • Magele, T. 2005. “E-security in South Africa.” White Paper. Accessed October 24, 2014. www.forgeahead.co.za/E-Security%20in%20South%20Africa%20-%20final.doc.
  • Marston, S., Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi. 2011. “Cloud Computing: The Business Perspective.” Decision Support Systems 51 (1): 176–189.
  • Martens, B., and F. Teuteberg. 2012. “Decision-Making in Cloud Computing Environments: a Cost and Risk-Based Approach.” Information Systems Frontiers 14 (4): 871–893.
  • Middleton, S., P. W. Liesch, and J. Steen. 2011. “Organizing Time: Internationalization Narratives of Executive Managers.” International Business Review 20 (2): 136–150.
  • Miles, M. B., and A. M. Huberman. 1984. Qualitative Data Analysis. Newbury Park, CA: Sage Publication.
  • Miles, M. B., A. M. Huberman, and J. Saldana. 2014. Qualitative Data Analysis. London: Sage Publication.
  • Mohammed, D. 2011. “Security in Cloud Computing: An Analysis of Key Drivers and Constraints.” Information Security Journal 20: 123.
  • Murugesan, S., G. Gangadharan, R. R. Harmon, and N. Godbole. 2013. “Fostering Green IT.” IT Professional 15: 16–18.
  • NIST (National Institute of Standards and Technology). 2009. Cloud Computing. Computer Security Resource Centre. Accessed October 27, 2013. http://csrc.nist.gov/groups/SNS/cloudcomputing/.
  • Nkhoma, M., and D. Dang. 2013. “Contributing Factors of Cloud Computing Adoption: A Technology-Organization-Environment Framework Approach.” International Journal of Information Systems and Engineering 1: 38–49.
  • Oliveira, T., and M. Martins. 2011. “Literature Review of Information Technology Adoption Models at the Firm Level.” The Electronic Journal of Information Systems Evaluation 14 (1): 110–121.
  • Owens, D. 2009. “Securing Elasticity in the Cloud.” Communications of the ACM 53 (6): 48–51.
  • Park, S. H., J. Eo, and J. J. Lee. 2012. “Assessing and Managing an Organization’s Green IT Maturity.” Management Information System Quarterly Executive 11: 127–140.
  • Patton, M. Q. 2002. Qualitative Research and Evaluation Methods. Thousand Oaks, CA: Sage Publications.
  • Pearson, S., and A. Benameur. 2010. “Privacy, Security and Trust Issues Arising from Cloud Computing.” In Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, IEEE Press, 693–702.
  • Rajkumar, B., B. James, and M. G. Andrzej. 2011. Cloud Computing: Principles and Paradigms. Hoboken, NJ: John Wiley and Sons.
  • Rao, H. S., and C. Perry. 2007. “Convergent Interviewing: A Starting Methodology for an Enterprise Research Program.” In Innovative Methodologies in Enterprise Research, edited by D. Hine and D. Carson, 86–100. Northampton, MA: Edward Elgar.
  • Rogers, E. M. 1995. Diffusion of Innovations. 4th ed. New York: Free Press.
  • Rogers, E. M. 2003. Diffusion of Innovations. 5th ed. New York: Free Press.
  • Ryan, M. D. 2011. “Cloud Computing Privacy Concerns on Our Doorstep.” Communication ACM 54: 36–38.
  • Ryan, W. M., and C. M. Loeffler. 2010. “Insights into Cloud Computing.” Intellectual Property and Technology Law Journal 22 (11): 1–8.
  • Saeed, I., G. Juell-Skielse, and E. Uppström. 2011. “Cloud Enterprise Resource Planning Adoption: Motives and Barriers.” International Conference on Research and Practical Issues of Enterprise Information Systems, 99–122.
  • Saini, S. L., D. K. Saini, J. H. Yousif, and S. V. Khandage. 2011. “Cloud Computing and Enterprise Resource Planning Systems.” The World Congress on Engineering (I), London, UK, 1–4.
  • Schilling, J. 2006. “On the Pragmatics of Qualitative Assessment: Designing the Process for Content Analysis.” European Journal of Psychological Assessment 22 (1): 28–37.
  • Scott, W. R. 2001. Institutions and Organizations. Sage Publications.
  • Scott, W. R., and S. Christensen. 1995. Institutional Construction of Organizations: International and Longitudinal Studies. Thousand Oaks, CA: Sage Publications.
  • Sharma, R., A. Sharma, and R. R. Singh. 2012. “E-government and Cloud Computing: Technology-Oriented Government Policies.” International Journal of Research in IT and Management 2 (2): 584–593.
  • Singh, A., B. Gedik, and L. Liu. 2006. “Agyaat: Mutual Anonymity Over Structured P2P Networks.” Internet Research 16 (2): 189–212.
  • Slappendel, C. 1996. “Perspectives on Innovation in Organizations.” Organization Studies 17 (1): 107–129.
  • Smith, A. E. 2007. Leximancer. 2.23rd ed. Brisbane: University of Queensland.
  • Smith, A. E., and M. S. Humphreys. 2006. “Evaluation of Unsupervised Semantic Mapping of Natural Language with Leximancer Concept Mapping.” Behaviour Research Methods 38 (2): 262–279.
  • Thiesse, F., T. Staake, P. Schmitt, and E. Fleisch. 2011. “The Rise of the Next-Generation Barcode: An International RFID Adoption Study.” Supply Chain Management: International Journal 16: 245–328.
  • Thong, J. 1999. “An Integrated Model of Information Systems Adoption in Small Businesses.” Journal of Management Information Systems 15 (4): 187–214.
  • Tornatzky, L., and M. Fleischer. 1990. The Process of Technology Innovation. Lexington, MA: Lexington Books.
  • Tripathi, A., and B. Parihar. 2011. “E-governance Challenges and Cloud Benefit.” VSRD International Journal of Computer Science and Information Technology 1 (1): 29–35.
  • Tsai, M. C., W. Lee, and H. C. Wu. 2010. “Determinants of RFID Adoption Intention: Evidence from Taiwanese Retail Chains.” Information Management 47: 255–261.
  • Tweneboah-Koduah, S. 2012. “Knowledge Management: Critical Factor for Successful Implementation of e-Government Applications.” In Proceedings of the 12th European Conference on E-Government, Spain, 713–721.
  • Tweneboah-Koduah, S., B. Endicott-Popovsky, and A. Tsetse. 2014. “Barriers to Government Cloud Adoption.” International Journal of Managing Information Technology 6 (3): 1–16.
  • Van De Ven, A. H., and E. M. Rogers. 1988. “Innovations and Organizations.” Communication Research 15 (5): 632–651.
  • Venkatesh, V., M. Morris, G. B. Davis, and F. D. Davis. 2003. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–478.
  • Venters, W., and E. A. Whitley. 2012. “A Critical Review of Cloud Computing: Researching Desires and Realities.” Journal of Information Technology 27: 179–197.
  • Venugopala, S., R. Buyyaa, C. S. Yeoa, J. Broberg, and I. Brandic. 2009. “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility.” Future Generation Computer Systems 25 (6): 599–616.
  • Voorsluys, W., J. Broberg, and R. Buyya. 2011. Cloud Computing Principles and Paradigm. Hoboken, NJ: John Wiley and Sons.
  • Wang, Y. M., Y. S. Wang, and Y. F. Yang. 2010. “Understanding the Determinants of RFID Adoption in the Manufacturing Industry.” Technological Forecasting and Social Change 77 (5): 803–815.
  • Weber, R. P. 1990. Basic Content Analysis. Newbury Park, CA: Sage Publications.
  • West, F. 2011. 10 Reasons Why Cloud Computing is the Wave of the Future for the Recruitment Sector. Accessed June 10, 2014. http://www.westtek.co.uk/Users/frmBlogDetail.aspx?id=2.
  • Wu, Y., C. G. Cegielski, B. T. Hazen, and D. J. Hall. 2013. “Cloud Computing in Support of Supply Chain Information System Infrastructure: Understanding When to Go to the Cloud.” Journal of Supply Chain Management 49: 25–41.
  • Yadav, N., and V. B. Singh. 2012. “E-governance: Past, Present and Future in India.” International Journal of Computer Applications 53 (7): 36–48.
  • Zaltman, G., R. Duncan, and J. Holbek. 1973. Innovations and Organizations. R. E. Krieger Publishing Company.
  • Zhang, Q., L. Cheng, and R. Boutaba. 2010. “Cloud Computing: State-of-the-Art and Research Challenges.” Journal of Internet Services and Applications 1 (1): 7–18.
  • Zhu, K., and K. L. Kraemer. 2005. “Post-adoption Variations in Usage and Value of e-Business by Organizations: Cross-Country Evidence from the Retail Industry.” Information Systems Research 16 (1): 61–84.
  • Zhu, K., K. Kraemer, and S. Xu. 2003. “Electronic Business Adoption by European Firms: A Cross-Country Assessment of the Facilitators and Inhibitors.” European Journal of Information Systems 12 (4): 251–268.
  • Zhu, K., K. L. Kraemer, and S. Xu. 2006. “Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on e-Business.” Management Science 52 (10): 1557–1576.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.