skip to main content
10.1145/3625156.3625158acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicissConference Proceedingsconference-collections
research-article

Factors Related to Information Sharing and Cloud Computing Adoption in SMEs: Evidence from Saudi Arabia

Published:21 November 2023Publication History

ABSTRACT

The Gulf Cooperation Council region, particularly the Kingdom of Saudi Arabia, is embracing 5G technology and its applications, such as cloud computing. Nevertheless, Small and Medium-sized Enterprises (SMEs) are held back due to the introduction of new technology, which leads to new business models and system dynamics that require a new set of tools (hard skills) and skills (soft skills) to quickly adopt new technologies. Using survey data from 122 respondents and structural equation modeling, the study finds the factors affecting the level of information sharing in organizations can act as a barrier to cloud computing adoption. The study's contribution is that it looks at the effect of information sharing from three intertwined socio-economic, technological, and behavioral perspectives. The results suggest that although technological aspects are important, socio-economical, and behavioral aspects are equally crucial for cloud computing adoption. The study concludes by highlighting the implications for SMEs adopting cloud computing and the need for future research to understand why 5G adoption might not realize its full potential in emerging markets.

References

  1. Ali E. Akgün, Halit Keskin, and John C. Byrne. 2010. Procedural justice climate in new product development teams: Antecedents and consequences. Journal of Product Innovation Management 27, 7 (2010), 1096–1111.Google ScholarGoogle ScholarCross RefCross Ref
  2. Abdulaziz Aljabre. 2012. Cloud computing for increased business value. International Journal of Business and social science 3, 1 (2012).Google ScholarGoogle Scholar
  3. Peter James Allen and Kellie Bennett. 2010. PASW statistics by SPSS: a practical guide: version 18.0. Cengage Learning, South Melbourne, Vic.Google ScholarGoogle Scholar
  4. Randy V. Bradley, Terry Anthony Byrd, Jeannie L. Pridmore, Evelyn Thrasher, Renee ME Pratt, and Victor WA Mbarika. 2012. An empirical examination of antecedents and consequences of IT governance in US hospitals. Journal of Information Technology 27, (2012), 156–177.Google ScholarGoogle Scholar
  5. Jason L. Brown, John H. Evans III, and Donald V. Moser. 2009. Agency theory and participative budgeting experiments. Journal of management accounting research 21, 1 (2009), 317–345.Google ScholarGoogle ScholarCross RefCross Ref
  6. Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly (2010), 523–548.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Victor Chang, Robert John Walters, and Gary Wills. 2013. The development that leads to the Cloud Computing Business Framework. International Journal of Information Management 33, 3 (2013), 524–538.Google ScholarGoogle ScholarCross RefCross Ref
  8. Vidyanand Choudhary and Joseph Vithayathil. 2013. The impact of cloud computing: Should the IT department be organized as a cost center or a profit center? Journal of Management Information Systems 30, 2 (2013), 67–100.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yochi Cohen-Charash and Paul E. Spector. 2001. The role of justice in organizations: A meta-analysis. Organizational behavior and human decision processes 86, 2 (2001), 278–321.Google ScholarGoogle Scholar
  10. Jason A. Colquitt, Donald E. Conlon, Michael J. Wesson, Christopher OLH Porter, and K. Yee Ng. 2001. Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. Journal of applied psychology 86, 3 (2001), 425.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jason A. Colquitt, Jerald Greenberg, and J. Greenberg. 2003. Organizational justice: A fair assessment of the state of the literature. Organizational behavior: The state of the science (2003), 159–200.Google ScholarGoogle Scholar
  12. Cybint. 2019. 10 Cybersecurity Trends To Watch Going Into 2020. Cybint. Retrieved July 10, 2023 from https://www.cybintsolutions.com/10-cybersecurity-trends-to-watch/Google ScholarGoogle Scholar
  13. Robert Folger and Jerald Greenberg. 1985. Procedural justice: An interpretive analysis of personnel systems. Research in personnel and human resources management 3, 1 (1985), 141–183.Google ScholarGoogle Scholar
  14. Joseph F. Hair, Joseph F. Hair, William C. Black, Barry J. Babin, and Rolph E. Anderson. 2013. Multivariate Data Analysis. Pearson Education Limited.Google ScholarGoogle Scholar
  15. Pi-Jung Hsieh. 2016. An empirical investigation of patients' acceptance and resistance toward the health cloud: The dual factor perspective. Computers in Human Behavior 63, (2016), 959–969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Pei-Fang Hsu, Soumya Ray, and Yu-Yu Li-Hsieh. 2014. Examining cloud computing adoption intention, pricing mechanism, and deployment model. International Journal of Information Management 34, 4 (2014), 474–488.Google ScholarGoogle ScholarCross RefCross Ref
  17. Li‐tze Hu and Peter M. Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal 6, 1 (January 1999), 1–55. DOI:https://doi.org/10.1080/10705519909540118Google ScholarGoogle ScholarCross RefCross Ref
  18. W. Chan Kim and Renee A. Mauborgne. 1988. Becoming an effective global competitor. The Journal of Business Strategy 9, 1 (1988), 33.Google ScholarGoogle Scholar
  19. Julia Kirby and Thomas Stewart. 2007. The institutional yes: An interview with jeff bezos. Harvard Business Review 85, (October 2007), 75–82.Google ScholarGoogle Scholar
  20. Hennie A. Kruger and Wayne D. Kearney. 2006. A prototype for assessing information security awareness. Computers & security 25, 4 (2006), 289–296.Google ScholarGoogle Scholar
  21. Shirly Lee, Ivy Ong, HyoTaek Lim, and HoonJae Lee. 2010. Two factor authentication for cloud computing. Journal of information and communication convergence engineering 8, 4 (2010), 427–432.Google ScholarGoogle ScholarCross RefCross Ref
  22. Gerald S. Leventhal, K. J. Gergen, M. S. Greenberg, and R. H. Willis. 1980. Social exchange: Advances in theory and research. Social exchange: advances in theory and research (1980).Google ScholarGoogle Scholar
  23. Canchu Lin, Jenell L.S. Wittmer, and Xin (Robert) Luo. 2022. Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. Information & Management 59, 6 (September 2022), 103650. DOI:https://doi.org/10.1016/j.im.2022.103650Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mary Macharia. 2023. Cloud Computing Risk: A Decision-making Framework. Journal of Computer Information Systems 63, 2 (March 2023), 421–435. DOI:https://doi.org/10.1080/08874417.2022.2067793Google ScholarGoogle ScholarCross RefCross Ref
  25. Nace Magner, Robert B. Welker, and Terry L. Campbell. 1996. Testing a model of cognitive budgetary participation processes in a latent variable structural equations framework. Accounting and Business Research 27, 1 (1996), 41–50.Google ScholarGoogle ScholarCross RefCross Ref
  26. Robert J. Parker, James M. Kohlmeyer, Sakthi Mahenthirian, and Terry Sincich. 2014. Procedural Justice and Information Sharing During the Budgeting Process. In Advances in Management Accounting, Marc J. Epstein and John Y. Lee (eds.). Emerald Group Publishing Limited, 93–112. DOI:https://doi.org/10.1108/S1474-787120140000023003Google ScholarGoogle ScholarCross RefCross Ref
  27. Robert J. Parker and Larissa Kyj. 2006. Vertical information sharing in the budgeting process. Accounting, organizations and society 31, 1 (2006), 27–45.Google ScholarGoogle Scholar
  28. G. Premkumar and Margaret Roberts. 1999. Adoption of new information technologies in rural small businesses. Omega 27, 4 (1999), 467–484.Google ScholarGoogle ScholarCross RefCross Ref
  29. Steve Ranger. 2018. What is cloud computing? Everything you need to know about the cloud explained. ZDNet. Retrieved March 3, (2018), 2021.Google ScholarGoogle Scholar
  30. Rajiv Sabherwal and Yolande E. Chan. 2001. Alignment between business and IS strategies: A study of prospectors, analyzers, and defenders. Information systems research 12, 1 (2001), 11–33.Google ScholarGoogle Scholar
  31. Michael D. Shields and S. Mark Young. 1993. Antecedents and Consequences of Participative Budgeting: Evidence on the Effects of Asymmetrical Information. Journal of Management Accounting Research 5, (1993).Google ScholarGoogle Scholar
  32. Joseph Vithayathil. 2018. Will cloud computing make the I nformation T echnology (IT) d epartment obsolete? Information Systems Journal 28, 4 (2018), 634–649.Google ScholarGoogle ScholarCross RefCross Ref
  33. Hongjiang Xu and Sakthi Mahenthiran. 2021. Users' perception of cybersecurity, trust and cloud computing providers' performance. ICS 29, 5 (November 2021), 816–835. DOI:https://doi.org/10.1108/ICS-09-2020-0153Google ScholarGoogle ScholarCross RefCross Ref
  34. Boonghee Yoo, Naveen Donthu, and Tomasz Lenartowicz. 2011. Measuring Hofstede's Five Dimensions of Cultural Values at the Individual Level: Development and Validation of CVSCALE. (2011), 18.Google ScholarGoogle Scholar
  35. Philipp Zech. 2011. Risk-based security testing in cloud computing environments. In 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, IEEE, 411–414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Qi Zhang, Lu Cheng, and Raouf Boutaba. 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications 1, (2010), 7–18.Google ScholarGoogle Scholar

Index Terms

  1. Factors Related to Information Sharing and Cloud Computing Adoption in SMEs: Evidence from Saudi Arabia

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICISS '23: Proceedings of the 2023 6th International Conference on Information Science and Systems
      August 2023
      301 pages
      ISBN:9798400708206
      DOI:10.1145/3625156

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 November 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format