1,224
Views
19
CrossRef citations to date
0
Altmetric
Articles

Adoption Intention of Cloud Computing at the Firm Level

References

  • Brender N, Markov I. Risk perception and risk management in cloud computing: results from a case study of Swiss companies. In J Inf Manage. 2013;33(5):726–733.
  • Mezgár I, Rauschecker U. The challenge of networked enterprises for cloud computing interoperability. Comput Ind. 2014;64(4):657–674.
  • Dutta A, Peng GCA, Choudhary A. Risks in enterprise cloud computing: the perspective of IT experts. J Comput Inf Syst. 2013;53(4):39–48.
  • Wu WW. Developing an explorative model for SaaS adoption. Expert Syst Appl. 2011;38(12):15057–15064.
  • IDC. IDC predictions 2015 . 2014[cited Dec 2016]. Available from http://www.idc.com/research/Predictions15/index.jsp;jsessionid=9EBBBB7264EC4559FD8358B7D871949A
  • Hsu KL. Three trends that are changing the firms: mobile, social, and cloud. 2012 [ cited Dec 2016]. Available from http://www.bnext.com.tw/article/view/cid/0/id/21851
  • Navimipour NJ, Navin AH, Rahmani AM, Hosseinzadeh M. Behavioral modeling and automated verification of a Cloud–based framework to share the knowledge and skills of human resources. Comput Ind. 2015;68:65–77.
  • Wu GY. Cloud opportunities. 2011 [cited Dec 2016]. Available from http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?cnlid=13&cat=1&id=0000264776_CUN6U5CK8YCB9F5J95TI3&cat1=25&cat2=10
  • Lin YZ. Manage risks, utilize cloud computing digital rights management to multimedia. Digit. Rights Manage Multimed. 2010;16(4):138–149.
  • Button K. Considering the cloud CFO. 2015 [citedDec 2016]. Available from http://ww2.cfo.com/the–cloud/2015/02/considering–cloud/
  • Kauffman RJ, Mohtadi, H. Proprietary and open systems adoption in e–procurement: a risk–augmented transaction cost perspective. J Manage Inf Syst. 2004;21(1):137–166
  • Ojala A. Business models and opportunity creation: how IT entrepreneurs create and develop business models under uncertainty. Inf Syst J. 2016; 26(5):451–476.
  • Simons L. The strategy of control. CA Mag. 1992;125:4–51.
  • Solaymani S, Sohaili K, Yazdinejad E. Adoption and use of e–commerce in SMEs. Electron Commerce Res Appl. 2012;12(3):249–263.
  • Aqlan F. A software application for rapid risk assessment in integrated supply chains. Expert Syst Appl. 2016;43(1):109–116.
  • Carlo JL, Gaskin J, Lyytinen K, Rose GM. Early vs. late adoption of radical information technology innovations across software development organizations: an extension of the disruptive information technology innovation model. Inf Syst J. 2014;24(6):537–569.
  • Caron F, Vanthienen J, Baesens B. A comprehensive investigation of the applicability of process mining techniques for enterprise risk management. Comput Ind. 2013;64(4):464–475.
  • Liu S, Zhang J, Keil M, Chen T. Comparing senior executive and project manager perceptions of IT project risk: a Chinese Delphi study. Inf Syst J. 2010;13(3):275–297.
  • Mamoghli S, Goepp V, Botta-Genoulaz V. An operational “Risk Factor Driven” approach for the mitigation and monitoring of the “Misalignment Risk” in Enterprise Resource Planning projects. Comput Ind. 2015;70:1–12.
  • Kshetri N. Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun Policy. 2013;37(4):372–386.
  • Barki H, Rivard S, Talbot J. Toward an assessment of software development risk. J Manage Inf Syst. 1993;10(2):203–225.
  • Wallace L, Keil M, Rai A. Understanding software project risk: a cluster analysis. Inf Manage. 2004;42(1): 15–125.
  • Chang CY. 1/5 European firms adopt cloud computing. 2014 [cited Dec 2016]. Available form http://www.cna.com.twnews/ait/201412090427–1.aspx
  • Information Systems Audit and Control Association. 2012 ISACA IT Risk/Reward Barometer survey report. 2012 [cited Dec 2016]. Available from http://www.isaca.org/Pages/2012–Risk–Reward–Barometer.aspx
  • Institute for Information Industry. Enterprises’ demand for cloud computing services. 2011 [citedDec 2016]. Available from http://www.find.org.tw/find/home.aspx?page=many&id=299
  • Nonaka I, Takeuchi H. The Knowledge–creating company: how Japanese companies’ creating the dynamics of innovation. New York: Oxford University Press; 1995.
  • Davenport TH, Prusak L. Working knowledge: how organizations manage what they know. Boston: Harvard Business School Press; 1998.
  • Hsu MS, Chang CM. Examining interpersonal trust as a facilitator and uncertainty as an inhibitor of intra–organisational knowledge sharing. Inf Syst J. 2014;24(2):119–142.
  • Dimitrios P, Patrick C. Exploring geographic variation in corporate broadband adoption; evidence from Irish small– and medium–sized enterprises (SMEs). Telecommun Policy. 2010;34(3):144–161.
  • Khalil Moghaddam B, Khatoon–Abadi A. Factors affecting ICT adoption among rural users: a case study of ICT Center in Iran. Telecommun Policy. 2013;37(11):1083–1094.
  • Yang HD, Moon YJ, Rowley C. Social influence on knowledge worker’s adoption of innovative information technology. J Comput Inf Syst. 2009;50(1):25–36.
  • Lee MC. Predicting and explaining the adoption of online trading: an empirical study in Taiwan. Decis Support Syst. 2009;47(2):133–142.
  • Gao X, Gerst M, Sun R. Understanding MNEs׳ decline in the adoption of locally developed technology standard in China: a positioning and cognitive perspective. Telecommun Policy. 2014;38(10):878–889.
  • Roselius T. Consumer rankings of risk reduction methods. J Marketing. 1971;35(1):56–61.
  • Khajavi SH, Partanen J, Holmström J, Tuomi, J. Risk reduction in new product launch: a hybrid approach combining direct digital and tool-based manufacturing. Comput Ind. 2015;74:29–42.
  • Heiser J, Nicolett M. Assessing the security risks of cloud comput–ing. 2008 [citedDec2016]. Available from http://cloud.ctrls.in/files/assessing–the–security–risks.pdf
  • Nikou S, Mezei J. Evaluation of mobile services and substantial adoption factors with Analytic Hierarchy Process (AHP). Telecommun Policy. 2013;37(10):915–929.
  • Rogers EM. Diffusion of innovations. New York: Free Press; 1995
  • Griffin D, Jones T. Cloud security. 2010 [cited Dec 2016]. Available from https://technet.microsoft.com/en–us/magazine/gg296364.aspx
  • Herath T, Chen R, Wang J, Banjara K, Wilbur J, Rao HR. Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf syst J. 2014;24(1):61–84.
  • Lee MTF, Lin JTM. CIO’s risk control decision–making for business information security. Inf Manage Res. 2002;4(2):1–42.
  • Babcock C. 9 worst cloud security threats. 2014 [cited Dec 2016]. Available from http://www.informationweek.com/cloud/infrastructure–as–a–service/9–worst–cloud–security–threats/d/d–id/1114085
  • Khansa L, Zobel CW. Assessing innovations in cloud security. J Comput Inf Syst. 2014;54(3):45–56.
  • Krutz RL, Vines RD. Cloud security: a comprehensive guide to secure cloud computing. Indianapolis (IN): Wiley Publishing; 2010.
  • Lee YC, Chu PY, Tseng HL. Exploring the relationships between information technology adoption and business process reengineering. J Manage Organiz. 2009;15(2):170–185.
  • Lee YC, Chu PY, Tseng HL. Corporate performance of ICT–enabled business process re–engineering. Ind Manage Data Syst. 2011;111(5):735–754.
  • Dryden P. ERP failures exact high price. Comput World. 1998;32:16–17.
  • Gallagher S. Beat the systems management odds. Infor Week. 1998;675:61–76.
  • Kang S, Park JH, Yang, HD. ERP alignment for positive business performance: evidence from Korea’s ERP market. J Comput Infor Syst. 2008;48(4):25–38.
  • Pan M.J, Jang WY. Determinants of the adoption of enterprise resource planning within the technology–organization–environment framework: Taiwan’s communications industry. J Comput Infor Syst. 2008;48(3):94–102.
  • Samantra C, Datta S, Mahapatra SS. Risk assessment in IT outsourcing using fuzzy decision–making approach: an Indian perspective. Expert Syst Appl. 2014;41(15):4010–4022.
  • Willcocks L, Feeny D. IT outsourcing and core IS capabilities: challenges and lessons at Dupont. Infor Syst Manage. 2006;23(1):49–56.
  • Liu H.W. Finance risk management – Theory, application and development. Taipei (ROC): Best Wise; 2004.
  • Dutta A, Peng GCA, Choudhary A. Risks in enterprise cloud computing: the perspective of IT experts. J Comput Infor Syst. 2013;53(4):39–48.
  • Sheth JN. Psychology of innovation resistance: the less developed concept in diffusion research. Res Marketing. 1981;4:273–282.
  • Fan YW, Chen CD, Wu CC, Fang YH. The effect of status Quo bias on cloud system adoption. J Comput Infor Syst. 2015;55(3):55–64.
  • Das TK, Teng BS. Between trust and control: developing confidence in partner cooperation in alliances. Acad Manage Rev. 1998;23(3):491–511.
  • Premkumar G, Ramamurthy K. The role of interorganizational and organizational factors on the decision mode for adoption of interorganizational systems. Decis sci. 1995;26(3):303–336.
  • Delerue H. Relational risk perception and alliance management in French biotechnology SMEs. Eur Bus Rev. 2005;17(6):532–546.
  • Elmuti D, Kathawala Y. An overview of strategic alliances. Manage Decis. 2001;39:205–237.
  • Terjesen S, Patel, PC. In search of process innovations: the role of search depth: search breadth, and the industry environment. J Manage. 2015. doi: 0149206315575710.
  • Madhavaram, S., and Hunt, S. D. The service-dominant logic and a hierarchy of operant resources. Journal of the Academy of Marketing Science, 2008; 36: 67–82.
  • Bigliardi B, Dormio AI, Galati F. The adoption of open innovation within the telecommunication industry. Eur J Innovation Manag. 2012;15:27–54.
  • China Credit Information Services. Top 5000 firms in Taiwan. Taiwan: China Credit Information Services; 2014.
  • Steenkamp JBEM, Baumgartner H. Assessing measurement invariance in cross–national consumer research. J Consum Res. 1998;25:78–107.
  • Fornell C, Larcker DF. Evaluating structural equation models with unobservable variables and measurement error. J Marketing Res. 1981;18(1):39–50.
  • Koumoutsos G, Thramboulidis K. A knowledge-based framework for complex, proactive and service-oriented e-negotiation systems. Electron Commerce Res. 2009;9(4):317–349.
  • Cheng TC, Lam YC, Yeung CL. Adoption of internet banking: an empirical study in Hong Kong. Decis Support Syst. 2006;42(3):1558–1572.
  • Qu WG, Pinsonneault A, Oh W. Influence of industry characteristics on information technology outsourcing. J Manage Infor Syst. 2011;27(4):99–128.
  • Premkumar G. An empirical study of IS planning characteristics among industries. Omega Int J Manage Sci. 1992;20(6):611–629.
  • Shin I. Adoption of enterprise application software and firm performance. Small Bus Econ. 2006;26:241–256.
  • Manuj I, Mentzer, JT. Global supply chain risk management strategies. Int J Physical Distrib Logist Manage. 2008;38(3):192–223.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.