Skip to main content
Log in

Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Cloud computing already raises numerous security questions related to outsourced data confidentiality. Several companies are starting to require the reversibility of their cloud computing. They want to redirect their information systems to another provider or backsourcing their activities. Cloud computing reversibility is considered to be one of the first obstacles to service development; however, few researches have been conducted on this field. We propose characterizing the reversibility of cloud computing using a deductive approach. We suggest ten research hypotheses that identify the guarantees, objectives and process of reversibility. This research is based on a three-lap Delphi method, supported by 18 experts working on cloud computing projects. This article contributes to characterizing cloud computing reversibility and parametric theorization through a new coefficient of concordance proposal. This indicator helps to assess the experts’ agreement to or rejection of a hypothesis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Agarwal, A., & Agarwal, A. (2011). The security risks associated with cloud computing. International Journal of Computer Applications in Engineering Sciences, 1, 257–259.

    Google Scholar 

  • Aydin, M. N., & Bakker, M. E. (2008). Analyzing IT maintenance outsourcing decision from a knowledge management perspective. Information Systems Frontiers, 10(3), 293–305.

    Google Scholar 

  • Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys (CSUR), 25(4), 375–414.

    Google Scholar 

  • Battleson, D. A., West, B. C., Kim, J., Ramesh, B., & Robinson, P. S. (2016). Achieving dynamic capabilities with cloud computing: An empirical investigation. European Journal of Information Systems, 25(3), 209–230.

    Google Scholar 

  • Benaroch, M., Dai, Q., & Kauffman, R. J. (2010). Should we go our own way? Backsourcing flexibility in IT services contracts. Journal of Management Information Systems, 26(4), 317–358.

    Google Scholar 

  • Benaroch, M., Lichtenstein, Y., & Fink, L. (2016). Contract design choices and the balance of ex-ante and ex-post transaction costs in software development outsourcing. MIS Quarterly, 40(1), 57–82.

    Google Scholar 

  • Bhattacharya, S., Gupta, A., & Hasija, S. (2018). Single-sourcing versus multisourcing: The roles of output verifiability on task modularity. MIS Quarterly, 42(4), 1171–1186.

    Google Scholar 

  • Bouaynaya, W., Lyu, H., & Zhang, Z. (2018). Exploring risks transferred from cloud-based information systems: A quantitative and longitudinal model. Sensors, 18(10), 3488.

    Google Scholar 

  • Burgelman, R. A. (1991) Intraorganizational Ecology of Strategy Making and Organizational Adaptation: Theory and Field Research. Organization Science 2 (3):239–262

    Google Scholar 

  • Burgelman, R. A. (1996). A process model of strategic business exit: Implications for an evolutionary perspective on strategy. Strategic Management Journal, 17 (1), 193–214.

  • Buyya, R., Broberg, J., & Goscinski, A. M. (2010). Cloud computing: Principles and paradigms (Vol. 87). John Wiley & Sons.

  • Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.

    Google Scholar 

  • Cetindamar, D., Pala, O. (2011). Chief technology officer roles and performance. Technology Analysis & Strategic Management, 23 (10), 1031–1046.

  • Chang, Y. B., & Gurbaxani, V. (2012). Information technology outsourcing, knowledge transfer, and firm productivity: An empirical analysis. MIS Quarterly, 36(4), 1043.

    Google Scholar 

  • Chang, Y. B., Gurbaxani, V., & Ravindran, K. (2017). Information technology outsourcing: Asset transfer and the role of contract. MIS Quarterly, 41(3), 959–973.

    Google Scholar 

  • Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management Science, 9(3), 458–467.

    Google Scholar 

  • DeFond, M., & Zhang, J. (2014). A review of archival auditing research. Journal of Accounting and Economics, 58(2–3), 275–326.

    Google Scholar 

  • Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. Information Systems Frontiers, 12(2), 185–205.

    Google Scholar 

  • Goo, J., Kishore, R., Rao, H. R., & Nam, K. (2009). The role of service level agreements in relational management of information technology outsourcing: An empirical study. MIS Quarterly, 33, 119–145.

    Google Scholar 

  • Grossman, S. J., & Hart, O. D. (1986). The costs and benefits of ownership: A theory of vertical and lateral integration. Journal of Political Economy, 94(4), 691–719.

    Google Scholar 

  • Gurbaxani, V. (2007). Information systems outsourcing contracts: Theory and evidence. In Managing in the information economy (p. 83–115). Springer.

  • Hamilton, S., & Chervany, N. L. (1981). Evaluating information system effectiveness-part I: Comparing evaluation approaches. MIS Quarterly, 5, 55–69.

    Google Scholar 

  • Huber, G. P. (1990). A theory of the effects of advanced information technologies on organizational design, intelligence, and decision making. Academy of Management Review, 15(1), 47–71.

    Google Scholar 

  • Hung, P. C., Chiu, D. K., Fung, W. W., Cheung, W. K., Wong, R., Choi, S. P., et al. (2007). End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered web service integration approach. Information Systems Frontiers, 9(1), 85–101.

    Google Scholar 

  • Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, 3(4), 305–360.

    Google Scholar 

  • Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, 1–24.

  • Joskow, P. L. (1987). Contract duration and relationship-specific investments: Empirical evidence from coal markets. The American Economic Review, 168–185.

  • Kale, P., Singh, H., & Perlmutter, H. (2000). Learning and protection of proprietary assets in strategic alliances: Building relational capital. Strategic Management Journal, 21(3), 217–237.

    Google Scholar 

  • Khansa, L., & Zobel, C. W. (2014). Assessing innovations in cloud security. Journal of Computer Information Systems, 54(3), 45–56.

    Google Scholar 

  • Kern, T., & Willcocks, L. (2001). The relationship advantage: Information technologies, sourcing, and management. Oxford University Press on Demand.

  • Kim, S. L., Teo, T. S., Bhattacherjee, A., & Nam, K. (2017). IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea. Information Systems Frontiers, 19(3), 577–591.

    Google Scholar 

  • Klein, B. (1996). Why hold-ups occur: The self-enforcing range of contractual relationships. Economic Inquiry, 34(3), 444–463.

    Google Scholar 

  • Klein, B., Crawford, R. G., & Alchian, A. A. (1978). Vertical integration, appropriable rents, and the competitive contracting process. The Journal of Law and Economics, 21(2), 297–326.

    Google Scholar 

  • Kotlarsky, J., & Bognar, L. (2012). Understanding the process of backsourcing: Two cases of process and product backsourcing in Europe. Journal of Information Technology Teaching Cases, 2(2), 79–86.

    Google Scholar 

  • Linstone, H. A., & Turoff, M. (1975). The Delphi method: Techniques and applications. Advanced Book Program: Addison-Wesley Pub. Co..

    Google Scholar 

  • Macaulay, S. (1963). Non-contractual relations in business: A preliminary study. American Sociological Review, 28, 55–67.

    Google Scholar 

  • Martens, B., & Teuteberg, F. (2012). Decision-making in cloud computing environments: A cost and risk based approach. Information Systems Frontiers, 14(4), 871–893.

    Google Scholar 

  • Mayer, K. J., & Argyres, N. S. (2004). Learning to contract: Evidence from the personal computer industry. Organization Science, 15(4), 394–410.

    Google Scholar 

  • Mazhelis, O., & Tyrväinen, P. (2012). Economic aspects of hybrid cloud infrastructure: User organization perspective. Information Systems Frontiers, 14(4), 845–869.

    Google Scholar 

  • Mueller, B., & Shepherd, D. (2012). Learning from failure : How entrepreneurial failure aids in the development of opportunity recognition expertise. Frontiers of Entrepreneurship Research, 32(6).

  • Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: An example, design considerations and applications. Information & Management, 42(1), 15–29.

    Google Scholar 

  • Olaison, L., & Meier Sørensen, B. (2014). The abject of entrepreneurship: Failure, fiasco, fraud. International Journal of Entrepreneurial Behavior & Research, 20(2), 193–211.

    Google Scholar 

  • Parker, D. B. (2012). Toward a new framework for information security? Computer Security Handbook, 3–1.

  • Quélin, B., & Duhamel, F. (2003). Bringing together strategic outsourcing and corporate strategy: Outsourcing motives and risks. European Management Journal, 21(5), 647–661.

    Google Scholar 

  • Samonas, S., & Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security, 10(3).

  • Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. decision. Sciences, 28(3), 763–774.

    Google Scholar 

  • Shivakumar, B. L., & Raju, T. (2010). Emerging role of cloud computing in redefining business operations. Global Management Review, 4(4).

  • Solli-Sæther, H., & Gottschalk, P. (2015). Stages-of-growth in outsourcing, offshoring and backsourcing: Back to the future? Journal of Computer Information Systems, 55(2), 88–94.

    Google Scholar 

  • Susarla, A., Subramanyam, R., & Karhade, P. (2010). Contractual provisions to mitigate holdup: Evidence from information technology outsourcing. Information Systems Research, 21(1), 37–55.

    Google Scholar 

  • Sussan, F., & Acs, Z. J. (2017). The digital entrepreneurial ecosystem. Small Business Economics, 49(1), 55–73. https://doi.org/10.1007/s11187-017-9867-5.

    Article  Google Scholar 

  • Swaminathan, J. M. (2001). Enabling customization using standardized operations. California Management Review, 43(3), 125–135.

    Google Scholar 

  • Teneyuca, D. (2011). Internet cloud security: The illusion of inclusion. Information Security Technical Report, 16(3–4), 102–107.

    Google Scholar 

  • Troger, P., Rajic, H., Haas, A., & Domagalski, P. (2007). Standardization of an API for distributed resource management systems. In Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid’07) (p. 619–626). IEEE.

  • Veltri, N. F., Saunders, C. S., & Kavan, C. B. (2008). Information systems backsourcing: Correcting problems and responding to opportunities. California Management Review, 51(1), 50–76.

    Google Scholar 

  • von Bary, B., & Westner, M. (2018). Information systems backsourcing: A literature review. Journal of Information Technology Management, 29(1), 62–78.

    Google Scholar 

  • Wallace, L., Lin, H., & Cefaratti, M. A. (2011). Information security and Sarbanes-Oxley compliance: An exploratory study. Journal of Information Systems, 25(1), 185–211.

    Google Scholar 

  • Williamson, O. E. (1988). Technology and transaction cost economics: A reply. Journal of Economic Behavior & Organization, 10(3), 355–363.

    Google Scholar 

  • Wüllenweber, K., Beimborn, D., Weitzel, T., & König, W. (2008). The impact of process standardization on business process outsourcing success. Information Systems Frontiers, 10(2), 211–224.

    Google Scholar 

  • Yang, C., & Huang, J.-B. (2000). A decision model for IS outsourcing. International Journal of Information Management, 20(3), 225–239.

    Google Scholar 

  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wafa Bouaynaya.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Table 3 Result of first round
Table 4 Result of second round
Table 5 Result of third round

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bouaynaya, W. Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method. Inf Syst Front 22, 1505–1518 (2020). https://doi.org/10.1007/s10796-019-09947-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-019-09947-5

Keywords

Navigation