1,462
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Producing competitive advantage from an infrastructure technology: The case of cloud computing

, , , & ORCID Icon

References

  • Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., … Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. doi:10.1145/1721654.1721672
  • Barney, J. B. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120. doi:10.1177/014920639101700108
  • Barrett, M. I. (1999). Challenges of Edi adoption for electronic trading in the London insurance market. European Journal of Information Systems, 8(1), 1–15. doi:10.1057/palgrave.ejis.3000313
  • Battleson, D. A., West, B. C., Kim, J., Ramesh, B., & Robinson, P. S. (2016). Achieving dynamic capabilities with cloud computing: An empirical investigation. European Journal of Information Systems, 25(3), 209–230. doi:10.1057/ejis.2015.12
  • Berman, S. J., Kesterson-Townes, L., Marshall, A., & Srivathsa, R. (2012). How cloud computing enables process and business model innovation. Strategy & Leadership, 40(4), 27–35. doi:10.1108/10878571211242920
  • Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems, 23(3), 357–372. doi:10.1057/ejis.2013.1
  • Birman, K., Chockler, G., & Renesse, R. (2009). Toward a cloud computing research agenda. ACM SIGACT News, 40(2), 68–80. doi:10.1145/1556154
  • Bose, R., & Luo, X. (2011). integrative framework for assessing firms’ potential to undertake green IT initiatives via virtualization – A theoretical perspective. The Journal of Strategic Information Systems, 20(1), 38–54. doi:10.1016/j.jsis.2011.01.003
  • Carcary, M., Doherty, E., Conway, G., & McLaughlin, S. (2014). Cloud computing adoption readiness and benefit realization in Irish SMEs—An exploratory study. Information Systems Management, 31(4), 313–327. doi:10.1080/10580530.2014.958028
  • Carr, N. G. (2003). IT doesn’t matter. Harvard Business Review, 81(5), 41–49.
  • Cooper, R. B., & Zund, R. W. (1990). Information technology implementation research: A technological diffusion approach. Management Science, 36(2), 123–139. doi:10.1287/mnsc.36.2.123.
  • Damsgaard, J., & Lyytinen, K. (1998). Governmental intervention in the diffusion of EDI: Goals and conflicts. In K. V. Anderson (Ed.), EDI and data networking in the public sector (pp. 13–42). Boston, MA: Springer. doi:10.1007/978-1-4615-5487-5
  • Davidson, E. (2002). Technology frames and framing: A socio-cognitive investigation of requirements determination. MIS Quarterly, 26(4), 329–358. doi:10.2307/4132312
  • Davidson, E. (2006). A technological frames perspective on information technology and organizational change. The Journal of Applied Behavioral Science, 42(1), 23–39. doi:10.1177/0021886305285126
  • DeLone, W. H., & McLean, E. R. (1992). Information systems success: the quest for the dependent variable. Information Systems Research, 3(1), 60–95. doi:10.1287/isre.3.1.60
  • Eisenhardt, K. M., & Martin, J. A. (2000). Dynamic capabilities: What are they? Strategic Management Journal, 21(10/11), 1105. doi:10.1002/1097-0266(200010/11)21:10/11<1105::AID-SMJ133>3.0.CO;2-E
  • Fan, Y.-W., Chen, C.-D., Wu, -C.-C., & Fang, Y.-H. (2015). The effect of status quo bias on cloud system adoption. Journal of Computer Information Systems, 55(3), 55–64. doi:10.1080/08874417.2015.11645772
  • Griffith, T. L., Sawyer, J. E., & Neale, M. A. (2003). Virtualness and knowledge in teams: Managing the love triangle of organizations, individuals, and information technology. MIS Quarterly, 27(2), 265–287. doi:10.2307/30036531
  • Grobauer, B. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2), 50–57. doi:10.1109/MSP.2010.115
  • Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Retrieved February 15, 2018, from https://www.gartner.com/doc/685308/assessing-security-risks-cloud-computing.
  • Henderson, J. C., & Venkatraman, N. (1999). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 38(2/3), 472–484. doi:10.1147/SJ.1999.5387096
  • Hirschheim, R., Welke, R., & Schwarz, A. (2010). Service-oriented architecture: Myths, realities, and the maturity model. MIS Quarterly Executive, 9(1), 37–48.
  • Iyer, B., & Henderson, J. C. (2010). Preparing for the future: Understanding the seven capabilities cloud computing. MIS Quarterly Executive, 9(2), 117–131.
  • Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security & Privacy Magazine, 7(4), 61–64. doi:10.1109/MSP.2009.87
  • Kautz, K., & Pries-Heje, J. (Eds.). (1996). Diffusion and adoption of information technology. London, UK: Chapman and Hall.
  • Kong, J. (2010). A practical approach to improve the data privacy of virtual machines. Paper presented at the 10th IEEE International Conference on Computer and Information Technology, Bradford, West Yorkshire, UK.
  • Kothari, P. (2011). Building trust in the cloud. SiliconIndia, June - 2011 issue.
  • Kranz, J. J., Hanelt, A., & Kolbe, L. M. (2016). Understanding the influence of absorptive capacity and ambidexterity on the process of business model change - the case of on-premise and cloud-computing software. Information Systems Journal, 26(5), 477–517. doi:10.1111/isj.v26.5
  • Lee, G. K., & Cole, R. E. (2003). From a firm-based to a community-based model of knowledge creation: The case of the Linux Kernel development. Organization Science, 14(6), 633–649. doi:10.1287/orsc.14.6.633.24866
  • Li, L., Zhang, W., & Mao, J.-Y. (2013). The business value of CRM technology: From the perspective of organizational ambidexterity. Paper presented at the AMCIS 2013, Chicago, IL, U.S.A.
  • Li, Q., Wang, C., Wu, J., Li, J., & Wang, Z.-Y. (2011). Towards the business–Information technology alignment in cloud computing environment: An approach based on collaboration points and agents. International Journal of Computer Integrated Manufacturing, 24(11), 1038–1057. doi:10.1080/0951192X.2011.592994
  • Lin, A., & Silva, L. (2005). The social and political construction of technological frames. European Journal of Information Systems, 14(1), 49–59. doi:10.1057/palgrave.ejis.3000521
  • Luftman, J., & Derksen, B. (2012). Key issues for IT executives 2012: Doing more with less. MIS Quarterly Executive, 11(4), 207–218.
  • Lyytinen, K., & Rose, G. M. (2003). The disruptive nature of information technology innovations: The case of internet computing in systems development organizations. MIS Quarterly, 27(4), 557–595. doi:10.2307/30036549
  • Malladi, S., & Krishnan, M. S. (2012). Cloud computing adoption and its implications for CIO strategic focus – An empirical analysis. Paper presented at the Thirty-third International Conference on Information Systems, Orlando.
  • Marston, S., Bandyopadhyay, S., Zhang, J., & Ghaisasi, A. (2011). Cloud computing - the business perspective. Decision Support Systems, 51(1), 176–189. doi:10.1016/j.dss.2010.12.006
  • McAfee, A. (2011). What every CEO needs to know about the cloud? Harvard Business Review, 89(11), 124–132.
  • McDermott, R. (1999). Why information technology inspired but cannot deliver knowledge management. California Management Review, 41(4), 103–117. doi:10.2307/41166012
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing Retrieved December 22, 2014, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
  • Merali, Y., Papadopoulos, T., & Nadkarni, T. (2012). Information systems strategy: Past, present, future? The Journal of Strategic Information Systems, 21(2), 125–153. doi:10.1016/j.jsis.2012.04.002
  • Mishra, A. N., & Agarwal, R. (2010). Technological frames, organizational capabilities, and IT use: An empirical investigation of electronic procurement. Information Systems Research, 21(2), 249–270. doi:10.1287/isre.1080.0220
  • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222. doi:10.1287/isre.2.3.192
  • Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497–510. doi:10.1016/j.im.2014.03.006
  • Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems, 12(2), 174–207. doi:10.1145/196734.196745
  • Pavlou, P., & Sawy, O. A. E. (2010). IT-enabled competitive advantage in turbulence through improvisational capabilities. Information Systems Research, 21(3), 443–471. doi:10.1287/isre.1100.0280
  • Pavlou, P. A., & Sawy, O. A. E. (2006). From IT leveraging competence to competitive advantage in turbulent environments: The case of new product development. Information Systems Research, 17(3), 198–227. doi:10.1287/isre.1060.0094
  • Porter, M. E., & Millar, V. E. (1985). How information gives you competitive advantage. Harvard Business Review, 63(4), 149–160.
  • Reich, B. H., & Benbasat, I. (1990). An empirical investigation of factors influencing the success of customer-oriented strategic systems. Information Systems Research, 1(3), 325–347. doi:10.1287/isre.1.3.325
  • RightScale. (2016). State of the Cloud Report 2016. Retrieved September 20, 2016, from http://www.rightscale.com/lp/2016-state-of-the-cloud-report?campaign=701700000015euW
  • Rogers, E. M. (2003). Diffusion of Innovations (5th ed.). New York, NY: Free Press.
  • Sahay, S., Palit, M., & Robey, D. (1994). A relativist approach to studying the social construction of information technology. European Journal of Information Systems, 3, 248–258. doi:10.1057/ejis.1994.30
  • Sambamurthy, S., Bharadwaj, B., & Grover, G. (2003). Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms. MIS Quarterly, 27(2), 237–263. doi:10.2307/30036530
  • Saya, S., Pee, L. G., & Kankanhalli, A. (2010). The impact of institutional influences on perceived technological characteristics and real options in cloud computing adoption. Paper presented at the ICIS 2010.
  • Spinola, M. (2009). An essential guide to possibilities and risks of cloud computing. Retrieved March 30, 2015, from http://www.mariaspinola.com/whitepapers/An_Essential_Guide_to_Possibilities_and_Risks_of_Cloud_Computing-A_Pragmatic_Effective_and_Hype_Free_Approach_For_Strategic_Enterprise_Decision_Making.pdf
  • Stanoevska-Slabeva, K., Wozniak, T., & Ristol, S. (Eds.). (2010). Grid and cloud computing: A business perspective on technology and applications. Heidelberg, Germany: Springer-Verlag.
  • Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176. doi:10.1287/isre.6.2.144
  • Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533. doi:10.1002/(ISSN)1097-0266
  • Tippins, M. J., & Sohi, R. S. (2003). IT competency and firm performance: Is organizational learning a missing link? Strategic Management Journal, 24(8), 745–761. doi:10.1002/(ISSN)1097-0266
  • Truong, D. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59–65.
  • Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. Paper presented at the Proceedings of the IEEE INFOCOM 2010, San Diego, CA.
  • Wang, C. L., & Ahmed, P. K. (2007). Dynamic capabilities: A review and research Agenda. The International Journal of Management Reviews, 9(1), 31–51. doi:10.1111/ijmr.2007.9.issue-1
  • Wang, W. Y. C., & Chuang, A. R. A. H.-M. (2011). Toward the trend of cloud computing. Journal of Electronic Commerce Research, 12(4), 238–242.
  • Warneke, D., & Kao, O. (2011). Exploiting dynamic resource allocation for efficient parallel data processing in the cloud. IEEE Transactions on Parallel and Distributed Systems, 22(6), 985–997. doi:10.1109/TPDS.2011.65
  • Watanabe, C., & Kondo, R. (2003). Institutional elasticity towards IT waves for Japan’s survival—The significant role of an IT testbed. Technovation, 23(4), 307–320. doi:10.1016/S0166-4972(01)00073-6
  • Weill, P., Subramani, M., & Broadbent, M. (2002). Building IT infrastructure for strategic agility. MIT Sloan Management Review, 44(1), 57–65.
  • Yang, H., & Tate, M. (2012). A descriptive literature review and classification of cloud computing research. Communications of the Association for Information Systems, 31(2), 35–60.
  • Yaokumah, W., & Amponsah, R. A. (2017). Examining the contributing factors for cloud computing adoption in a developing country. International Journal of Enterprise Information Systems, 13(1), 17–37. doi:10.4018/IJEIS
  • Zhang, W., & Xu, P. (2011). Do I have to learn something new? Mental models and the acceptance of replacement technologies. Behaviour & Information Technology, 30(2), 201–211. doi:10.1080/0144929X.2010.489665
  • Zhu, K., & Kraemer, K. L. (2005). Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry. Information Systems Research, 16(1), 61–84. doi:10.1287/isre.1050.0045
  • Zhu, K., Kraemer, K. L., & Xu, S. (2006). The process of innovation assimilation by firms in different countries: A technology diffusion perspective on E-business. Management Science, 52(10), 1557–1576. doi:10.1287/mnsc.1050.0487

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.