Determining factors for the adoption of cloud computing in developing countries

2016 ◽  
Vol 29 (4) ◽  
pp. 259-272 ◽  
Author(s):  
Mayank Yuvaraj

Purpose The paper aims to examine the constructs laid down by the information technology (IT) adoption theories to the cloud computing phenomena in conjunction with academic libraries of India to determine the factors responsible for the adoption of cloud computing. Design/methodology/approach Keeping the objectives into consideration, descriptive survey and constructive research method were used in the study. Library professionals engaged in the selected 28 central universities of India were chosen to participate in this study. To find the core drivers responsible for the adoption of cloud computing in academic libraries, constructs were taken from ten IT adoption theories. Findings The findings validate the fact that perceived ease of use, usefulness and ubiquitous availability of the enabling technology are strong drivers of the adoption of cloud computing technology in the libraries. Also, attitude is significantly correlated with the behavioral intention to adopt cloud computing services. High level of correlation was obtained between the cloud computing-perceived attributes and the librarian’s intention to use cloud computing technology. However, security risk is the biggest issue that has been affecting the behavioral intentions. Originality/value The study is a self-conscious attempt to fill the void and determine factors for the adoption of cloud computing in libraries. Further, it attempts to find out the preparedness of Indian academic libraries in adopting cloud computing.

2020 ◽  
pp. 097215092095717
Author(s):  
Esra Cengiz ◽  
Hülya Bakırtaş

The aim of this study is to investigate the factors affecting cloud computing technology application by using technology acceptance model 3 (TAM3). The conceptual model was empirically analysed. While the experience of employees has no moderating effect on the relationship between subjective norm and perceived usefulness, the effect of perceived ease of use on perceived usefulness is moderated by experience. In other words, the higher the experience, the higher the effect of perceived ease of use on perceived usefulness. In addition, perceived ease of use, in terms of the perceived enjoyment and playfulness variables, has a mediating effect. Perceived usefulness and perceived ease of use in cloud computing have positive effect on behavioral intention. Research on cloud computing and technology acceptance model has overlooked the mediating and moderating effect of variables in TAM3, on which very little work has been done.


2014 ◽  
Vol 32 (4) ◽  
pp. 645-666 ◽  
Author(s):  
Noa Aharony

Purpose – The purpose of this paper is to explore the extent to which the Technology Acceptance Model (TAM), and personal characteristics such as threat and challenge, self-efficacy and openness to experience, explain information professionals’ and educational technology experts’ perspectives about cloud computing. In addition, the study will investigate any differences between these two tech-savvy groups concerning cloud computing adoption. Design/methodology/approach – The research was conducted in Israel during the second semester of the 2013 academic year. Researchers used seven questionnaires to gather the data. Findings – The current study found that the behavioral intention to use cloud computing was impacted by perceived ease of use and personal innovativeness. Further, the study demonstrated that respondents’ intentions to use cloud computing are affected by personal characteristics such as threat and challenge, self-efficacy, and openness to experience. In addition, it seems that each group has a different perspective about technology. Originality/value – Findings reveal that newest technologies are not the main focus of information professionals. Therefore, if information organizations directors would like their employees to enhance their use of technological innovations, they should expose them to the latest technologies, emphasizing their usefulness, ease of use, and benefits.


Author(s):  
Ayatulloh Michael Musyaffi ◽  
Muna Arinal

Cloud computing technology can change the business structure, including accounting, through cloud computing. However, cloud accounting has problems, especially those related to data, which affect user acceptance of cloud accounting. Based on these problems, this research aims to test the acceptance of cloud accounting. The object of this research focuses on cloud accounting users to prospective accountants who are still at the undergraduate degree, with a total of 123 respondents. The questionnaire was distributed via google form and then analyzed using PLS using data processing through SmartPLS. The findings of this study indicate that perceived ease of use and security can influence the intention to using cloud accounting. Meanwhile, perceived usefulness not able to control the choice to use cloud accounting. This is because prospective accountants still consider cloud as a learning medium to not guarantee uncertainty in using cloud accounting.


2020 ◽  
Vol 53 (3-4) ◽  
pp. 191-201
Author(s):  
Dunja Dobrinić

The paper proposes a conceptual model of cloud computing acceptance. The model includes variables from TAM (Technology Acceptance Model), TOE (Technology-organization-environment) framework, and the security risk variable. This study aims to verify the suitability of the proposed model for measuring cloud computing acceptance by the auditors and auditors' assistants in the Republic of Croatia. For the purposes of the study, data were collected through a questionnaire. The sample included 111 certified auditors and 28 auditing assistants. The structural equation modeling (SEM) method was used to analyze the data collected and evaluate the proposed model. The results confirmed the impact of perceived usefulness and time and complexity on the intention to use. The influence of image, education, perceived ease of use and security risk on perceived usefulness was confirmed, while the effect of perceived ease of use on the intention to use did not prove significant. Constructs perceived usefulness, perceived ease of use, and time and complexity explain 31% of the variance in intention to use cloud computing. The paper outlines the limitations of the research as well as the scientific contribution.


2017 ◽  
Vol 15 (2) ◽  
pp. 73-94
Author(s):  
O T AROGUNDADE ◽  
A O ADEJIMI ◽  
A M MUSTAPHA ◽  
A M IKOTUN ◽  
A AKINWALE

Cloud computing is a viable alternative for meeting the technological needs of many  enterprises with the benefits of instantaneous computing resource fulfillment, technology expenditures at lower costs, common technology platforms that can facilitate standardization and decreased  need for internal technology support personnel. This paper examined the behavioral intention to adopt cloud computing services in large and small organization using an Enhanced Technology Acceptance Model (ETAM). The aim is to investigate the factors affecting cloud computing adoption in Nigeria. The model includes variables that other research has found related to adoption of new computing services and technologies. Regression Analysis was then deployed to test the research hypotheses. The result of regression analysis revealed that attitude and adopters ability to use cloud computing (self-efficacy) were better predictor of intention; perceived usefulness and perceived ease of use of cloud computing were better predictor of attitude; perceived ease of use and the relevant of cloud computing to adopters’ work (job relevance) were the predictor of perceived usefulness. 


2019 ◽  
Vol 29 (6) ◽  
pp. 1344-1369
Author(s):  
Nianxin Wang ◽  
Huigang Liang ◽  
Shilun Ge ◽  
Yajiong Xue ◽  
Jing Ma

Purpose The purpose of this paper is to understand what inhibit or facilitate cloud computing (CC) assimilation. Design/methodology/approach The authors investigate the effects of two enablers, top management support (TMS) and government support (GS), and two inhibitors, organization inertia (OI) and data security risk (DSR) on CC assimilation. The authors posit that enablers and inhibitors influence CC assimilation separately and interactively. The research model is empirically tested by using the field survey data from 376 Chinese firms. Findings Both TMS and GS positively and DSR negatively influence CC assimilation. OI negatively moderates the TMS–assimilation link, and DSR negatively moderates the GS–assimilation link. Research limitations/implications The results indicate that enablers and inhibitors influence CC assimilation in both separate and joint manners, suggesting that CC assimilation is a much more complex process and demands new knowledge to be learned. Practical implications For these firms with a high level of OI, only TMS is not enough, and top managers should find other effective way to successfully implement structural and behavioral change in the process of CC assimilation. For policy makers, they should actively play their supportive roles in CC assimilation. Originality/value A new framework is developed to identify key drivers of CC assimilation along two bipolar dimensions including enabling vs inhibiting and internal vs external.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Eugene Okyere-Kwakye ◽  
Khalil Md Nor

Purpose Electronic library (E-library) is a form of computer mediated system that uses electronic media, such as Web/internet devices and distributes resources to improve on the quality of teaching and learning. Students’ use of e-library for learning is essential and as such the government has invested hugely into its subscription for several university libraries in Ghana. However, most university students feel reluctant to use the e-library resources for their studies. The purpose of this paper is therefore to examine the factors that influence students’ intention to use e-library resources for their studies. Design/methodology/approach Questionnaire was used to collect data from 200 students from one Technical University in Ghana. Structural equation modeling (SmartPLS) was used to analyze the data. Findings The study found that accessibility, attitude, perceived ease of use, perceived usefulness and relevance to studies have positive significant effect on students’ attitude to use e-library. In addition, self-efficacy, subjective norm and attitude have positive significant influence on students’ intention to use e-library. Research limitations/implications Although the sample frame used for this study may be unique, but the total amount of data collected was limited to providing the general representative of the Ghanaian students in one particular university. Other researchers may consider collecting data from other universities to extend the sample frame for a larger sample size of students. Practical implications Academic administrators need to organize training and workshops on how to use the e-library portal for their search and other didactic assignments. Most importantly, students should be given IT or internet tutorials as foundation for the use of the e-library portal. Social implications Universities have to provide internet access such as hotspot and network routers at the labs, classrooms and other vantage points. It is believed that with these in place, adequate access to the internet would promote students’ engagement on the e-library facility. Originality/value The study examines the factors that influence students’ intention to use e-library resources for their studies in Ghana.


2017 ◽  
Vol 29 (7) ◽  
pp. 1892-1913 ◽  
Author(s):  
Arun Kumar Kaushik ◽  
Zillur Rahman

Purpose This paper aims to offer and examine a conceptual model of tourist innovativeness toward self-service technologies (SSTs) to confirm whether tourists prefer service delivery by SSTs over employees in an offline hospitality environment. Design/methodology/approach Tourists’ perceived usefulness (PU) of SSTs and need for interaction (NI) with service employees have been taken as crucial mediating variables to examine the effects of perceived ease of use and technology readiness index personality dimensions toward SST and employee-based service adoption. Findings Findings reveal that both “NI” and “PU” play significant roles in Technology Readiness and Acceptance Model (TRAM) when tourists select one of two service delivery options – SSTs and service employees. Research limitations/implications The foremost limitation of the study is its dependence on domestic tourist samples. However, such samples were chosen because tourists comprising these samples tend to use similar service delivery options more, in turn increasing their use of SSTs available in sample hotels. Practical implications The study gives a deeper understanding of TRAM with an extremely crucial mediating variable (NI) in an offline service context. It also provides useful insights to service providers and policy makers for developing new strategies and policies to enhance user experience. Social implications This study recommends the usage of numerous SSTs by tourists. Originality/value During extensive literature review carried out in this research, no study was found that proposed such an effective framework in an offline service context.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


Sign in / Sign up

Export Citation Format

Share Document