Abstract
Cloud computing already raises numerous security questions related to outsourced data confidentiality. Several companies are starting to require the reversibility of their cloud computing. They want to redirect their information systems to another provider or backsourcing their activities. Cloud computing reversibility is considered to be one of the first obstacles to service development; however, few researches have been conducted on this field. We propose characterizing the reversibility of cloud computing using a deductive approach. We suggest ten research hypotheses that identify the guarantees, objectives and process of reversibility. This research is based on a three-lap Delphi method, supported by 18 experts working on cloud computing projects. This article contributes to characterizing cloud computing reversibility and parametric theorization through a new coefficient of concordance proposal. This indicator helps to assess the experts’ agreement to or rejection of a hypothesis.
Similar content being viewed by others
References
Agarwal, A., & Agarwal, A. (2011). The security risks associated with cloud computing. International Journal of Computer Applications in Engineering Sciences, 1, 257–259.
Aydin, M. N., & Bakker, M. E. (2008). Analyzing IT maintenance outsourcing decision from a knowledge management perspective. Information Systems Frontiers, 10(3), 293–305.
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys (CSUR), 25(4), 375–414.
Battleson, D. A., West, B. C., Kim, J., Ramesh, B., & Robinson, P. S. (2016). Achieving dynamic capabilities with cloud computing: An empirical investigation. European Journal of Information Systems, 25(3), 209–230.
Benaroch, M., Dai, Q., & Kauffman, R. J. (2010). Should we go our own way? Backsourcing flexibility in IT services contracts. Journal of Management Information Systems, 26(4), 317–358.
Benaroch, M., Lichtenstein, Y., & Fink, L. (2016). Contract design choices and the balance of ex-ante and ex-post transaction costs in software development outsourcing. MIS Quarterly, 40(1), 57–82.
Bhattacharya, S., Gupta, A., & Hasija, S. (2018). Single-sourcing versus multisourcing: The roles of output verifiability on task modularity. MIS Quarterly, 42(4), 1171–1186.
Bouaynaya, W., Lyu, H., & Zhang, Z. (2018). Exploring risks transferred from cloud-based information systems: A quantitative and longitudinal model. Sensors, 18(10), 3488.
Burgelman, R. A. (1991) Intraorganizational Ecology of Strategy Making and Organizational Adaptation: Theory and Field Research. Organization Science 2 (3):239–262
Burgelman, R. A. (1996). A process model of strategic business exit: Implications for an evolutionary perspective on strategy. Strategic Management Journal, 17 (1), 193–214.
Buyya, R., Broberg, J., & Goscinski, A. M. (2010). Cloud computing: Principles and paradigms (Vol. 87). John Wiley & Sons.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.
Cetindamar, D., Pala, O. (2011). Chief technology officer roles and performance. Technology Analysis & Strategic Management, 23 (10), 1031–1046.
Chang, Y. B., & Gurbaxani, V. (2012). Information technology outsourcing, knowledge transfer, and firm productivity: An empirical analysis. MIS Quarterly, 36(4), 1043.
Chang, Y. B., Gurbaxani, V., & Ravindran, K. (2017). Information technology outsourcing: Asset transfer and the role of contract. MIS Quarterly, 41(3), 959–973.
Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management Science, 9(3), 458–467.
DeFond, M., & Zhang, J. (2014). A review of archival auditing research. Journal of Accounting and Economics, 58(2–3), 275–326.
Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. Information Systems Frontiers, 12(2), 185–205.
Goo, J., Kishore, R., Rao, H. R., & Nam, K. (2009). The role of service level agreements in relational management of information technology outsourcing: An empirical study. MIS Quarterly, 33, 119–145.
Grossman, S. J., & Hart, O. D. (1986). The costs and benefits of ownership: A theory of vertical and lateral integration. Journal of Political Economy, 94(4), 691–719.
Gurbaxani, V. (2007). Information systems outsourcing contracts: Theory and evidence. In Managing in the information economy (p. 83–115). Springer.
Hamilton, S., & Chervany, N. L. (1981). Evaluating information system effectiveness-part I: Comparing evaluation approaches. MIS Quarterly, 5, 55–69.
Huber, G. P. (1990). A theory of the effects of advanced information technologies on organizational design, intelligence, and decision making. Academy of Management Review, 15(1), 47–71.
Hung, P. C., Chiu, D. K., Fung, W. W., Cheung, W. K., Wong, R., Choi, S. P., et al. (2007). End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered web service integration approach. Information Systems Frontiers, 9(1), 85–101.
Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, 3(4), 305–360.
Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, 1–24.
Joskow, P. L. (1987). Contract duration and relationship-specific investments: Empirical evidence from coal markets. The American Economic Review, 168–185.
Kale, P., Singh, H., & Perlmutter, H. (2000). Learning and protection of proprietary assets in strategic alliances: Building relational capital. Strategic Management Journal, 21(3), 217–237.
Khansa, L., & Zobel, C. W. (2014). Assessing innovations in cloud security. Journal of Computer Information Systems, 54(3), 45–56.
Kern, T., & Willcocks, L. (2001). The relationship advantage: Information technologies, sourcing, and management. Oxford University Press on Demand.
Kim, S. L., Teo, T. S., Bhattacherjee, A., & Nam, K. (2017). IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea. Information Systems Frontiers, 19(3), 577–591.
Klein, B. (1996). Why hold-ups occur: The self-enforcing range of contractual relationships. Economic Inquiry, 34(3), 444–463.
Klein, B., Crawford, R. G., & Alchian, A. A. (1978). Vertical integration, appropriable rents, and the competitive contracting process. The Journal of Law and Economics, 21(2), 297–326.
Kotlarsky, J., & Bognar, L. (2012). Understanding the process of backsourcing: Two cases of process and product backsourcing in Europe. Journal of Information Technology Teaching Cases, 2(2), 79–86.
Linstone, H. A., & Turoff, M. (1975). The Delphi method: Techniques and applications. Advanced Book Program: Addison-Wesley Pub. Co..
Macaulay, S. (1963). Non-contractual relations in business: A preliminary study. American Sociological Review, 28, 55–67.
Martens, B., & Teuteberg, F. (2012). Decision-making in cloud computing environments: A cost and risk based approach. Information Systems Frontiers, 14(4), 871–893.
Mayer, K. J., & Argyres, N. S. (2004). Learning to contract: Evidence from the personal computer industry. Organization Science, 15(4), 394–410.
Mazhelis, O., & Tyrväinen, P. (2012). Economic aspects of hybrid cloud infrastructure: User organization perspective. Information Systems Frontiers, 14(4), 845–869.
Mueller, B., & Shepherd, D. (2012). Learning from failure : How entrepreneurial failure aids in the development of opportunity recognition expertise. Frontiers of Entrepreneurship Research, 32(6).
Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: An example, design considerations and applications. Information & Management, 42(1), 15–29.
Olaison, L., & Meier Sørensen, B. (2014). The abject of entrepreneurship: Failure, fiasco, fraud. International Journal of Entrepreneurial Behavior & Research, 20(2), 193–211.
Parker, D. B. (2012). Toward a new framework for information security? Computer Security Handbook, 3–1.
Quélin, B., & Duhamel, F. (2003). Bringing together strategic outsourcing and corporate strategy: Outsourcing motives and risks. European Management Journal, 21(5), 647–661.
Samonas, S., & Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security, 10(3).
Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. decision. Sciences, 28(3), 763–774.
Shivakumar, B. L., & Raju, T. (2010). Emerging role of cloud computing in redefining business operations. Global Management Review, 4(4).
Solli-Sæther, H., & Gottschalk, P. (2015). Stages-of-growth in outsourcing, offshoring and backsourcing: Back to the future? Journal of Computer Information Systems, 55(2), 88–94.
Susarla, A., Subramanyam, R., & Karhade, P. (2010). Contractual provisions to mitigate holdup: Evidence from information technology outsourcing. Information Systems Research, 21(1), 37–55.
Sussan, F., & Acs, Z. J. (2017). The digital entrepreneurial ecosystem. Small Business Economics, 49(1), 55–73. https://doi.org/10.1007/s11187-017-9867-5.
Swaminathan, J. M. (2001). Enabling customization using standardized operations. California Management Review, 43(3), 125–135.
Teneyuca, D. (2011). Internet cloud security: The illusion of inclusion. Information Security Technical Report, 16(3–4), 102–107.
Troger, P., Rajic, H., Haas, A., & Domagalski, P. (2007). Standardization of an API for distributed resource management systems. In Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid’07) (p. 619–626). IEEE.
Veltri, N. F., Saunders, C. S., & Kavan, C. B. (2008). Information systems backsourcing: Correcting problems and responding to opportunities. California Management Review, 51(1), 50–76.
von Bary, B., & Westner, M. (2018). Information systems backsourcing: A literature review. Journal of Information Technology Management, 29(1), 62–78.
Wallace, L., Lin, H., & Cefaratti, M. A. (2011). Information security and Sarbanes-Oxley compliance: An exploratory study. Journal of Information Systems, 25(1), 185–211.
Williamson, O. E. (1988). Technology and transaction cost economics: A reply. Journal of Economic Behavior & Organization, 10(3), 355–363.
Wüllenweber, K., Beimborn, D., Weitzel, T., & König, W. (2008). The impact of process standardization on business process outsourcing success. Information Systems Frontiers, 10(2), 211–224.
Yang, C., & Huang, J.-B. (2000). A decision model for IS outsourcing. International Journal of Information Management, 20(3), 225–239.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Bouaynaya, W. Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method. Inf Syst Front 22, 1505–1518 (2020). https://doi.org/10.1007/s10796-019-09947-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-019-09947-5