Investigating Cloud Computing Adoption Reluctance Among Small Financial, Healthcare, and Leisure Industries in the United States
DOI:
https://doi.org/10.53555/nnbma.v2i1.114Keywords:
Cloud Computing, Security, Compliance, Service Level Agreement, Business Continuity, Contract lock-inAbstract
This study aims to explore the factors that hinder small organizations in the United States from adopting cloud computing. The study focused on extending the Technology Acceptance Model (TAM) to include the external variables that can have an impact on small organizations’ decisions when adopting the cloud technology. This study focused on small organizations from three service sectors, financial, health care and leisure. An Internet based survey was sent out to 131 participants who were conveniently sampled with an attempt to collect information about their concerns of the cloud technology. The findings indicate that small organizations are not adopting the cloud technology due to five main factors: security, compliance, service level agreement, business continuity and contract lock-in.
References
Abadi, D. (2009). Data Management in the Cloud: Limitations and Opportunities. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. Retrieved from: http://cs-www.cs.yale.edu/homes/dna/papers/abadi-Cloud-ieee09.pdf
Agarwal, R., and Prasad, J. (1999). "Are Individual Differences Germane to the Acceptance of New Information Technologies?". Decision Sciences (30:2), pp. 361-391
Ajakaiye, F., Eviwiekpaefe, A. (2013). The Trend and Challenges of Cloud Computing: A Literature Review. 10.18052. Retrieved from: http://www.scipress.com/ILSHS.16.13
Allen, B. M. (2012). A Factor Analysis of Noncompliance in the Payment Card Industry. (Doctoral dissertation, Walden University).
Arbuckle, J. A. (1995). Amos 16 Users Guide. Retrieved from: http://amosdevelopment.com
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM. 53(4), 50-58.
Burton-Jones, A., & Hubona, G. S. (2006). The Mediation of External Variables in the Technology Acceptance Model, Information & Management. 43 (6), 706-717.
Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on
(pp. 5-13). Ieee.
Chang, H. and Choi, E. (2011). “Challenges and Security in Cloud Computing”. Retrieved from: http://www.chinacloud.cn/upload/2011-11/11112001061070.pdf
Cloud Security Alliance (CSA). (2011). Defined Categories of Service. Retrieved from: https://cloudsecurityyalliance.org/wp-content/uploads/2011/09/SecaasV10.pdf
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-339.
Dekker, M., & Hogben, G. (2011). Survey and Analysis of Security Parameters in Cloud SLAs Across the European Public Sector. Online Abrufbar Unter: Retrieved from:
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Cloud-computing/survey-and analysisof-security-parameters-in-Cloud-slas-across-the-european-public-sector
European Network and Information Security Agency (ENISA). (2011). Survey and Analysis of Security Parameters in Cloud SLAs across the European Public Sector.
FaceTime. (2014). FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications. Retrieved from: http://docs.bankinfosecurity.com/files/whitepapers/pdf/370whitepaperFaceTimeFINRASocNet.pdf
Greiner, L., & Paul, L. G. (2007). SLA Definitions and Solutions. Retrieved from: http://www.cio.com/article/128900/SLADefinitionsandSolutions
Hofmann, P. and Woods, D. (2010). "Cloud Computing: The Limits of Public Clouds for Business Applications." IEEE Internet Computing, November/December 2010: 90-93. Retrieved from: http://cms.ieis.tue.nl/Beta/Files/WorkingPapers/wp_412.pdf
Jansen, W., & Grance, T. (2011). Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication, 800, 144.
Kim, H., Lim, H., Jeong, J., Jo, H., & Lee, J. (2009). Task-Aware Virtual Machine Scheduling for I/O Performance. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. (pp. 101-110). ACM.
King, W. R., & He, J. (2006). A Meta-Analysis of the Technology Acceptance Model. Information & Management, 43(6), 740-755. doi: 10.1016/j.im.2006.05.003
Kumekawa, J. (2005). Overview and Summary: HIPAA: How our Health Care World has Changed. OJIN: The Online Journal of Issues in Nursing, 10(2).
Lee, Younghwa; Kozar, Kenneth A.; and Larsen, Kai R.T. (2003) "The Technology Acceptance Model: Past, Present, and Future," Communications of the Association for Information Systems: Vol. 12, Article 50.
Leong, L., & MacDonald, N. (2011). Cloud IaaS: Security Considerations. Report No. G00210095.
Loeb & Loeb. (2013). Outsourcing the Law Alert. Retrieved from: http://www.loeb.com
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. "O'Reilly Media, Inc."
McFarland, D. J., & Hamilton, D. (2006). Adding Contextual Specificity to the Technology Acceptance Model. Computers in Human Behavior, 22(3), 427-447. doi: 10.1016/j.chb.2004.09.009
McGee, M. (2013). HIPAA Breaches in the Cloud. 2 Oregon Incidents Reveal Omnibus Fog. Retrieved from: http://www.healthcareinfosecurity.com/hipaa-breaches-in-Cloud-a-5959
Mills, E. (2009). Cloud Computing Security Forecast: Clear skies. CNET News.
Ommeren, V., E., & Van Den Berg, M. (2011). Seize the Cloud: A Manager's Guide to Success with Cloud Computing. IBM Press.
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the Security Risks Associated with Governmental Use of Cloud Computing. Government Information Quarterly, 27(3), 245-253.
PCI. (2010). Payment Card Industry (PCI) Data Security Standard. PCI DSS Requirements and Security Assessment Procedures, Version 2.0. s.l.
Pearson, S. (2012), Privacy, Security and Trust in Cloud Computing. Retrieved from: http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf
Softlayer. (2009). Service Level Agreement and Master Service Agreement. Retrieved from: http://www.softlayer.com/sla.html
Sultan, R. (2009). Cloud Computing to Education: A new dawn? International Journal of Information Management, 30(2), 109-116.
Taylor, C. W., & Hunsinger, D. S. (2011). A Study of Student Use of Cloud Computing Applications. Journal of Information Technology Management, 22(3), 36-50.
Thomson, L. Health Care Data Breaches and Information Security. Addressing Threats and Risks to Patient Data. Chapter 15. Retrieved From:
Ullah, S. and Xuefeng Z. (2013). Cloud Computing Research Challenges. IEEE 5th International Conference on Biomedical Engineering and Informatics, pp 1397-1401.
U.S. Department of Health & Human Services. (2003). Entities Covered by HIPAA Privacy Rule. Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa /understanding/training /coveredentities.pdf
Venkatesh, V., & Brown, S. (2001). A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges. MIS Quarterly, 25(1), 71-102.
Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS quarterly, 425-478.
Viega, J. (2009). Cloud Computing and the Common Man. Computer, 42(8), 106-108.
Wang, Y. S., & Shih, Y. W. (2009). Why do People Use Information Kiosks? A Validation of the Unified Theory of Acceptance and Use of Technology. Government Information Quarterly, 26(1), 158-165.
Windows Azure SLA. (2014). Retrieved from: http://www.microsoft.com/windowsazure/sla
Wixom, B. H., & Todd, P. A. (2005). A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research, 16(1), 85-102.
Yates, Gillett, Saleh, & Dines, (2008). “Is Cloud Computing Ready For The Enterprise?”
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notification email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by India Post and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publication uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.