Investigating Cloud Computing Adoption Reluctance Among Small Financial, Healthcare, and Leisure Industries in the United States

Authors

  • Ayman Talib Associate professor of MIS – Department of business and management DeVry University – Chicago USA
  • Jamal Shaban Verizon wireless Inc – Chicago USA

DOI:

https://doi.org/10.53555/nnbma.v2i1.114

Keywords:

Cloud Computing, Security, Compliance, Service Level Agreement, Business Continuity, Contract lock-in

Abstract

This study aims to explore the factors that hinder small organizations in the United States from adopting cloud computing. The study focused on extending the Technology Acceptance Model (TAM) to include the external variables that can have an impact on small organizations’ decisions when adopting the cloud technology. This study focused on small organizations from three service sectors, financial, health care and leisure. An Internet based survey was sent out to 131 participants who were conveniently sampled with an attempt to collect information about their concerns of the cloud technology. The findings indicate that small organizations are not adopting the cloud technology due to five main factors: security, compliance, service level agreement, business continuity and contract lock-in.

References

Abadi, D. (2009). Data Management in the Cloud: Limitations and Opportunities. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. Retrieved from: http://cs-www.cs.yale.edu/homes/dna/papers/abadi-Cloud-ieee09.pdf

Agarwal, R., and Prasad, J. (1999). "Are Individual Differences Germane to the Acceptance of New Information Technologies?". Decision Sciences (30:2), pp. 361-391

Ajakaiye, F., Eviwiekpaefe, A. (2013). The Trend and Challenges of Cloud Computing: A Literature Review. 10.18052. Retrieved from: http://www.scipress.com/ILSHS.16.13

Allen, B. M. (2012). A Factor Analysis of Noncompliance in the Payment Card Industry. (Doctoral dissertation, Walden University).

Arbuckle, J. A. (1995). Amos 16 Users Guide. Retrieved from: http://amosdevelopment.com

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM. 53(4), 50-58.

Burton-Jones, A., & Hubona, G. S. (2006). The Mediation of External Variables in the Technology Acceptance Model, Information & Management. 43 (6), 706-717.

Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on

(pp. 5-13). Ieee.

Chang, H. and Choi, E. (2011). “Challenges and Security in Cloud Computing”. Retrieved from: http://www.chinacloud.cn/upload/2011-11/11112001061070.pdf

Cloud Security Alliance (CSA). (2011). Defined Categories of Service. Retrieved from: https://cloudsecurityyalliance.org/wp-content/uploads/2011/09/SecaasV10.pdf

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-339.

Dekker, M., & Hogben, G. (2011). Survey and Analysis of Security Parameters in Cloud SLAs Across the European Public Sector. Online Abrufbar Unter: Retrieved from:

http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Cloud-computing/survey-and analysisof-security-parameters-in-Cloud-slas-across-the-european-public-sector

European Network and Information Security Agency (ENISA). (2011). Survey and Analysis of Security Parameters in Cloud SLAs across the European Public Sector.

FaceTime. (2014). FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications. Retrieved from: http://docs.bankinfosecurity.com/files/whitepapers/pdf/370whitepaperFaceTimeFINRASocNet.pdf

Greiner, L., & Paul, L. G. (2007). SLA Definitions and Solutions. Retrieved from: http://www.cio.com/article/128900/SLADefinitionsandSolutions

Hofmann, P. and Woods, D. (2010). "Cloud Computing: The Limits of Public Clouds for Business Applications." IEEE Internet Computing, November/December 2010: 90-93. Retrieved from: http://cms.ieis.tue.nl/Beta/Files/WorkingPapers/wp_412.pdf

Jansen, W., & Grance, T. (2011). Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication, 800, 144.

Kim, H., Lim, H., Jeong, J., Jo, H., & Lee, J. (2009). Task-Aware Virtual Machine Scheduling for I/O Performance. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. (pp. 101-110). ACM.

King, W. R., & He, J. (2006). A Meta-Analysis of the Technology Acceptance Model. Information & Management, 43(6), 740-755. doi: 10.1016/j.im.2006.05.003

Kumekawa, J. (2005). Overview and Summary: HIPAA: How our Health Care World has Changed. OJIN: The Online Journal of Issues in Nursing, 10(2).

Lee, Younghwa; Kozar, Kenneth A.; and Larsen, Kai R.T. (2003) "The Technology Acceptance Model: Past, Present, and Future," Communications of the Association for Information Systems: Vol. 12, Article 50.

Leong, L., & MacDonald, N. (2011). Cloud IaaS: Security Considerations. Report No. G00210095.

Loeb & Loeb. (2013). Outsourcing the Law Alert. Retrieved from: http://www.loeb.com

Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. "O'Reilly Media, Inc."

McFarland, D. J., & Hamilton, D. (2006). Adding Contextual Specificity to the Technology Acceptance Model. Computers in Human Behavior, 22(3), 427-447. doi: 10.1016/j.chb.2004.09.009

McGee, M. (2013). HIPAA Breaches in the Cloud. 2 Oregon Incidents Reveal Omnibus Fog. Retrieved from: http://www.healthcareinfosecurity.com/hipaa-breaches-in-Cloud-a-5959

Mills, E. (2009). Cloud Computing Security Forecast: Clear skies. CNET News.

Ommeren, V., E., & Van Den Berg, M. (2011). Seize the Cloud: A Manager's Guide to Success with Cloud Computing. IBM Press.

Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the Security Risks Associated with Governmental Use of Cloud Computing. Government Information Quarterly, 27(3), 245-253.

PCI. (2010). Payment Card Industry (PCI) Data Security Standard. PCI DSS Requirements and Security Assessment Procedures, Version 2.0. s.l.

Pearson, S. (2012), Privacy, Security and Trust in Cloud Computing. Retrieved from: http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf

Softlayer. (2009). Service Level Agreement and Master Service Agreement. Retrieved from: http://www.softlayer.com/sla.html

Sultan, R. (2009). Cloud Computing to Education: A new dawn? International Journal of Information Management, 30(2), 109-116.

Taylor, C. W., & Hunsinger, D. S. (2011). A Study of Student Use of Cloud Computing Applications. Journal of Information Technology Management, 22(3), 36-50.

Thomson, L. Health Care Data Breaches and Information Security. Addressing Threats and Risks to Patient Data. Chapter 15. Retrieved From:

http://www.americanbar.org/content/dam/aba/publications/books/healthcare_data_breaches.authcheckdam.pdf

Ullah, S. and Xuefeng Z. (2013). Cloud Computing Research Challenges. IEEE 5th International Conference on Biomedical Engineering and Informatics, pp 1397-1401.

U.S. Department of Health & Human Services. (2003). Entities Covered by HIPAA Privacy Rule. Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa /understanding/training /coveredentities.pdf

Venkatesh, V., & Brown, S. (2001). A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges. MIS Quarterly, 25(1), 71-102.

Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS quarterly, 425-478.

Viega, J. (2009). Cloud Computing and the Common Man. Computer, 42(8), 106-108.

Wang, Y. S., & Shih, Y. W. (2009). Why do People Use Information Kiosks? A Validation of the Unified Theory of Acceptance and Use of Technology. Government Information Quarterly, 26(1), 158-165.

Windows Azure SLA. (2014). Retrieved from: http://www.microsoft.com/windowsazure/sla

Wixom, B. H., & Todd, P. A. (2005). A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research, 16(1), 85-102.

Yates, Gillett, Saleh, & Dines, (2008). “Is Cloud Computing Ready For The Enterprise?”

Downloads

Published

31-01-2016

How to Cite

Talib, A., & Shaban, J. (2016). Investigating Cloud Computing Adoption Reluctance Among Small Financial, Healthcare, and Leisure Industries in the United States. Journal of Advance Research in Business, Management and Accounting (ISSN: 2456-3544), 2(1), 21-28. https://doi.org/10.53555/nnbma.v2i1.114

Similar Articles

71-80 of 106

You may also start an advanced similarity search for this article.