Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Drivers and barriers in the decision to adopt IaaS: a public sector case study

Published: 01 January 2016 Publication History

Abstract

Extant academic literature reveal the benefits of subscribing to cloud computing services but few of these address the use of cloud computing in the government sector. Moreover, within the literature, the subject of the decision making process in the migration to cloud computing by government agencies, does not seem to be investigated sufficiently. This paper, through a qualitative case study focusing on the decision to migrate to infrastructure as a service IaaS in a government organisation, reveals drivers and barriers that influence the decision to adopt cloud computing. The study shows that there are some common as well as some differing determinants to the decision to adopt cloud computing between a commercial organisation and a government organisation.

References

[1]
Adamchik, V.A. and Bedi, A.S. (2000) 'Wage differentials between the public and the private sectors: evidence from an economy in transition', Labour Economics, Vol. 7, No. 2, pp.203-224.
[2]
Alam, M. and Sethi, S. (2013) 'Security risks & migration strategy for cloud sourcing: a government perspective', International Journal of Engineering and Innovative Technology, Vol. 2, No. 7, pp.205-209.
[3]
Allen, B.A., Juillet, L., Paquet, G. and Roy, J. (2001) 'E-governance & government on-line in Canada: partnerships, people & prospects', Government Information Quarterly, Vol. 18, No. 2, pp.93-104.
[4]
Babu, L.D., Gunasekaran, A. and Krishna, P.V. (2014) 'A decision-based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management', International Journal of Business Information Systems, Vol. 16, No. 4, pp.409-430.
[5]
Boss, S.R., Kirsch, L.J., Angermeier, I., Shingler, R.A. and Boss, R.W. (2009) 'If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security', European Journal of Information Systems, Vol. 18, No. 2, pp.151-164.
[6]
Box, R.C. (1999) 'Running government like a business implications for public administration theory and practice', The American Review of Public Administration, Vol. 29, No. 1, pp.19-43.
[7]
Bozeman, B. and Bretschneider, S. (1986) 'Public management information systems: theory and prescription', Public Administration Review, Special issue, Vol. 46, pp.475-487.
[8]
Bradach, J.L. and Eccles, R.G. (1989) 'Price, authority, and trust: from ideal types to plural forms', Annual Review of Sociology, Vol. 15, No. 1, pp.97-118.
[9]
Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010) 'Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness', MIS Quarterly, Vol. 34, No. 3, pp.523-527.
[10]
Cellary, W. and Strykowski, S. (2009) 'E-government based on cloud computing and service-oriented architecture', Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, 2009, pp.5-10, ACM.
[11]
Chan, T.O. and Williamson, I.P. (1999) 'A model of the decision process for GIS adoption and diffusion in a government environment', URISA Journal, Vol. 11, No. 2, pp.7-16.
[12]
Cordella, A. and Iannacci, F. (2010) 'Information systems in the public sector: the e-government enactment framework', The Journal of Strategic Information Systems, Vol. 19, No. 1, pp.52-66.
[13]
Creeger, M. (2009) 'Cloud computing: an overview', ACM Queue, Vol. 7, No. 5, p.2.
[14]
Creswell, J.W. (2012) Qualitative Inquiry and Research Design: Choosing Among Five Approaches, Sage Publications, California, USA.
[15]
Dahbur, K., Mohammad, B. and Tarakji, A.B. (2011) 'A survey of risks, threats and vulnerabilities in cloud computing', Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, p.12, ACM.
[16]
Dobrev, S.D. and Gotsopoulos, A. (2010) 'Legitimacy vacuum, structural imprinting, and the first mover disadvantage', Academy of Management Journal, Vol. 53, No. 2, pp.1153-1174.
[17]
Etro, F. (2009) 'The economic impact of cloud computing on business creation, employment and output in Europe', Review of Business and Economics, Vol. 54, No. 2, pp.179-208.
[18]
Frant, H. (1996) 'High-powered and low-powered incentives in the public sector', Journal of Public Administration Research and Theory, Vol. 6, No. 3, pp.365-381.
[19]
Guest, G., Bunce, A. and Johnson, L. (2006) 'How many interviews are enough? An experiment with data saturation and variability', Field Methods, Vol. 18, No. 1, pp.59-82.
[20]
Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, B. (2010) 'Security issues for cloud computing', International Journal of Information Security and Privacy (IJISP), Vol. 4, No. 2, pp.36-48.
[21]
Herath, T. and Rao, H.R. (2009) 'Protection motivation and deterrence: a framework for security policy compliance in organisations', European Journal of Information Systems, Vol. 18, No. 2, pp.106-125.
[22]
Hsu, P-F., Ray, S. and Li-Hsieh, Y-Y. (2014) 'Examining cloud computing adoption intention, pricing mechanism, and deployment model', International Journal of Information Management, Vol. 34, No. 2, pp.474-488.
[23]
IMJ (2010) 'Federal govt. still wary of the cloud', Information Management Journal, Vol. 44, No. 2, p.15.
[24]
Kar, A.K. and Rakshit, A. (2014) 'Pricing of cloud IaaS based on feature prioritization - a value based approach', Recent Advances in Intelligent Informatics, Springer International Publishing, Switzerland.
[25]
Khajeh-Hosseini, A., Greenwood, D. and Sommerville, I. (2010) 'Cloud migration: a case study of migrating an enterprise it system to IaaS', 2010 IEEE, pp.450-457.
[26]
Khajeh-Hosseini, A., Greenwood, D., Smith, J.W. and Sommerville, I. (2012) 'The cloud adoption toolkit: supporting cloud adoption decisions in the enterprise', Software: Practice and Experience, Vol. 42, No. 4, pp.447-465.
[27]
KPMG (2012) Government Exploring the Cloud.
[28]
Kuan, K.K.Y. and Chau, P.Y.K. (2001) 'A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework', Information & Management, Vol. 38, No. 8, pp.507-521.
[29]
Kundra, V. (2010) State of Public Sector Cloud Computing, CIO Council, US Government, Washington, DC.
[30]
Lavigna, R.J. and Hays, S.W. (2004) 'Recruitment and selection of public workers: an international compendium of modern trends and practices', Public Personnel Management, Vol. 33, No. 3, pp.237-253.
[31]
Lian, J-W., Yen, D.C. and Wang, Y-T. (2014) 'An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital', International Journal of Information Management, Vol. 34, No. 1, pp.28-36.
[32]
Lin, A. and Chen, N-C. (2012) 'Cloud computing as an innovation: percepetion, attitude, and adoption', International Journal of Information Management, Vol. 2, No. 6, pp.533-540.
[33]
Lin, J-P., Wang, R-C. and Wang, T-C. (2013) 'Assessment criteria of IaaS in cloud computing', International Journal of Scientific Knowledge, Vol. 3, No. 1, pp.2305-1493.
[34]
Low, C., Chen, Y. and Wu, M. (2011) 'Understanding the determinants of cloud computing adoption', Industrial Management & Data Systems, Vol. 111, No. 7, pp.1006-1023.
[35]
Misra, S.C. and Mondal, A. (2011) 'Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment', Mathematical and Computer Modelling, Vol. 53, No. 3, pp.504-521.
[36]
Morse, J.M., Barrett, M., Mayan, M., Olson, K. and Spiers, J. (2002) 'Verification strategies for establishing reliability and validity in qualitative research', International Journal of Qualitative Methods, Vol. 1, No. 2, pp.1-19.
[37]
Mutavdzic, R. (2010) 'Cloud computing architectures for national, regional and local government', MIPRO, 2010 Proceedings of the 33rd International Convention, pp.1322-1327, IEEE.
[38]
NIST (2011) The NIST Definition of Cloud Computing, U.S.D.O.C., The National Institute of Standards and Technology (NIST), US Department of Commerce.
[39]
Nkhoma, M.Z., Dang, D.P.T. and De Souza-Daw, A. (2013) 'Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach', 2013 Reading: Academic Conferences International Limited, pp.180-188.
[40]
Oktay, K.Y., Gomathisankaran, M., Kantarcioglu, M., Mehrotra, S. and Singhal, A. (2014) Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. Secure Cloud Computing, Springer, New York.
[41]
Pearson, S. (2009) 'Taking account of privacy when designing cloud computing services', Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp.44-52, IEEE Computer Society.
[42]
Perry, C. and Jensen, O. (2001) 'Approaches to combining induction and deduction in one research study', Australian and New Zealand Marketing Academy Conference Massey University, Auckland, New Zealand.
[43]
Perry, J.L. and Wise, L.R. (1990) 'The motivational bases of public service', Public Administration Review, Vol. 50, No. 3, pp.367-373.
[44]
Petrescu, M. (2012) 'Cloud computing and business-to-business networks', International Journal of Business Information Systems, Vol. 10, No. 1, pp.93-108.
[45]
Pfitscher, R.J., Pillon, M.A. and Obelheiro, R.R. (2014) 'Customer-oriented diagnosis of memory provisioning for IaaS clouds', ACM SIGOPS Operating Systems Review, Vol. 48, No. 1, pp.2-10.
[46]
Ramgovind, S., Eloff, M.M. and Smith, E. (2010) 'The management of security in cloud computing', Information Security for South Africa (ISSA), pp.1-7, IEEE.
[47]
Rasheed, H. (2014) 'Data and infrastructure security auditing in cloud computing environments', International Journal of Information Management, Vol. 34, No. 3, pp.364-368.
[48]
Ratnam, K.A. and Dominic, P. (2014) 'The factors associating the adoption of cloud computing: an enhancement of the healthcare ecosystem in Malaysia', International Journal of Business Information Systems, Vol. 16, No. 4, pp.462-479.
[49]
Saba, F. and Shearer, R.L. (1994) 'Verifying key theoretical concepts in a dynamic model of distance education', American Journal of Distance Education, Vol. 8, No. 1, pp.36-59.
[50]
Sharma, R., Sharma, A. and Singh, R.R. (2012) 'E-governance and cloud computing: technology oriented government policies', International Journal of Research in IT and Management, Vol. 2, No. 2, pp.584-593.
[51]
Sultan, N. (2010) 'Cloud computing for education: a new dawn?', International Journal of Information Management, Vol. 30, No. 2, pp.109-116.
[52]
Thomas, D.R. (2006) 'A general inductive approach for analyzing qualitative evaluation data', American Journal of Evaluation, Vol. 27, No. 2, pp.237-246.
[53]
Toosi, A.N., Calheiros, R.N. and Buyya, R. (2014) 'Interconnected cloud computing environments: challenges, taxonomy, and survey', ACM Computing Surveys (CSUR), Vol. 47, No. 1, p.7.
[54]
Tornatzky, L.G. and Fleischer, M. (1990) The Processes of Technological Innovation, Lexington Books Lexington, MA.
[55]
Wang, W.Y.C., Rashid, A. and Chuang, H.M. (2011) 'Toward the trend of cloud computing', Journal of Electronic Commerce Research, Vol. 12, No. 4, pp.238-242.
[56]
Wyld, D.C. (2009) Moving to the Cloud: An Introduction to Cloud Computing in Government, IBM Center for the Business of Government.
[57]
Wyld, D.C. (2010) 'The cloudy future of government IT: cloud computing and the public sector around the world', International Journal of Web & Semantic Technology, Vol. 1, No. 1, pp.1-20.
[58]
Yin, R.K. (2014) Case Study Research: Design and Methods, Sage Publications, California, USA.

Cited By

View all
  • (2024)Information security and privacy challenges of cloud computing for government adoption: a systematic reviewInternational Journal of Information Security10.1007/s10207-023-00797-623:2(1459-1475)Online publication date: 1-Apr-2024

Index Terms

  1. Drivers and barriers in the decision to adopt IaaS: a public sector case study
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Business Information Systems
    International Journal of Business Information Systems  Volume 21, Issue 2
    January 2016
    131 pages
    ISSN:1746-0972
    EISSN:1746-0980
    Issue’s Table of Contents

    Publisher

    Inderscience Publishers

    Geneva 15, Switzerland

    Publication History

    Published: 01 January 2016

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 29 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Information security and privacy challenges of cloud computing for government adoption: a systematic reviewInternational Journal of Information Security10.1007/s10207-023-00797-623:2(1459-1475)Online publication date: 1-Apr-2024

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media