ABSTRACT
The Gulf Cooperation Council region, particularly the Kingdom of Saudi Arabia, is embracing 5G technology and its applications, such as cloud computing. Nevertheless, Small and Medium-sized Enterprises (SMEs) are held back due to the introduction of new technology, which leads to new business models and system dynamics that require a new set of tools (hard skills) and skills (soft skills) to quickly adopt new technologies. Using survey data from 122 respondents and structural equation modeling, the study finds the factors affecting the level of information sharing in organizations can act as a barrier to cloud computing adoption. The study's contribution is that it looks at the effect of information sharing from three intertwined socio-economic, technological, and behavioral perspectives. The results suggest that although technological aspects are important, socio-economical, and behavioral aspects are equally crucial for cloud computing adoption. The study concludes by highlighting the implications for SMEs adopting cloud computing and the need for future research to understand why 5G adoption might not realize its full potential in emerging markets.
- Ali E. Akgün, Halit Keskin, and John C. Byrne. 2010. Procedural justice climate in new product development teams: Antecedents and consequences. Journal of Product Innovation Management 27, 7 (2010), 1096–1111.Google ScholarCross Ref
- Abdulaziz Aljabre. 2012. Cloud computing for increased business value. International Journal of Business and social science 3, 1 (2012).Google Scholar
- Peter James Allen and Kellie Bennett. 2010. PASW statistics by SPSS: a practical guide: version 18.0. Cengage Learning, South Melbourne, Vic.Google Scholar
- Randy V. Bradley, Terry Anthony Byrd, Jeannie L. Pridmore, Evelyn Thrasher, Renee ME Pratt, and Victor WA Mbarika. 2012. An empirical examination of antecedents and consequences of IT governance in US hospitals. Journal of Information Technology 27, (2012), 156–177.Google Scholar
- Jason L. Brown, John H. Evans III, and Donald V. Moser. 2009. Agency theory and participative budgeting experiments. Journal of management accounting research 21, 1 (2009), 317–345.Google ScholarCross Ref
- Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly (2010), 523–548.Google ScholarDigital Library
- Victor Chang, Robert John Walters, and Gary Wills. 2013. The development that leads to the Cloud Computing Business Framework. International Journal of Information Management 33, 3 (2013), 524–538.Google ScholarCross Ref
- Vidyanand Choudhary and Joseph Vithayathil. 2013. The impact of cloud computing: Should the IT department be organized as a cost center or a profit center? Journal of Management Information Systems 30, 2 (2013), 67–100.Google ScholarCross Ref
- Yochi Cohen-Charash and Paul E. Spector. 2001. The role of justice in organizations: A meta-analysis. Organizational behavior and human decision processes 86, 2 (2001), 278–321.Google Scholar
- Jason A. Colquitt, Donald E. Conlon, Michael J. Wesson, Christopher OLH Porter, and K. Yee Ng. 2001. Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. Journal of applied psychology 86, 3 (2001), 425.Google ScholarCross Ref
- Jason A. Colquitt, Jerald Greenberg, and J. Greenberg. 2003. Organizational justice: A fair assessment of the state of the literature. Organizational behavior: The state of the science (2003), 159–200.Google Scholar
- Cybint. 2019. 10 Cybersecurity Trends To Watch Going Into 2020. Cybint. Retrieved July 10, 2023 from https://www.cybintsolutions.com/10-cybersecurity-trends-to-watch/Google Scholar
- Robert Folger and Jerald Greenberg. 1985. Procedural justice: An interpretive analysis of personnel systems. Research in personnel and human resources management 3, 1 (1985), 141–183.Google Scholar
- Joseph F. Hair, Joseph F. Hair, William C. Black, Barry J. Babin, and Rolph E. Anderson. 2013. Multivariate Data Analysis. Pearson Education Limited.Google Scholar
- Pi-Jung Hsieh. 2016. An empirical investigation of patients' acceptance and resistance toward the health cloud: The dual factor perspective. Computers in Human Behavior 63, (2016), 959–969.Google ScholarDigital Library
- Pei-Fang Hsu, Soumya Ray, and Yu-Yu Li-Hsieh. 2014. Examining cloud computing adoption intention, pricing mechanism, and deployment model. International Journal of Information Management 34, 4 (2014), 474–488.Google ScholarCross Ref
- Li‐tze Hu and Peter M. Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal 6, 1 (January 1999), 1–55. DOI:https://doi.org/10.1080/10705519909540118Google ScholarCross Ref
- W. Chan Kim and Renee A. Mauborgne. 1988. Becoming an effective global competitor. The Journal of Business Strategy 9, 1 (1988), 33.Google Scholar
- Julia Kirby and Thomas Stewart. 2007. The institutional yes: An interview with jeff bezos. Harvard Business Review 85, (October 2007), 75–82.Google Scholar
- Hennie A. Kruger and Wayne D. Kearney. 2006. A prototype for assessing information security awareness. Computers & security 25, 4 (2006), 289–296.Google Scholar
- Shirly Lee, Ivy Ong, HyoTaek Lim, and HoonJae Lee. 2010. Two factor authentication for cloud computing. Journal of information and communication convergence engineering 8, 4 (2010), 427–432.Google ScholarCross Ref
- Gerald S. Leventhal, K. J. Gergen, M. S. Greenberg, and R. H. Willis. 1980. Social exchange: Advances in theory and research. Social exchange: advances in theory and research (1980).Google Scholar
- Canchu Lin, Jenell L.S. Wittmer, and Xin (Robert) Luo. 2022. Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. Information & Management 59, 6 (September 2022), 103650. DOI:https://doi.org/10.1016/j.im.2022.103650Google ScholarDigital Library
- Mary Macharia. 2023. Cloud Computing Risk: A Decision-making Framework. Journal of Computer Information Systems 63, 2 (March 2023), 421–435. DOI:https://doi.org/10.1080/08874417.2022.2067793Google ScholarCross Ref
- Nace Magner, Robert B. Welker, and Terry L. Campbell. 1996. Testing a model of cognitive budgetary participation processes in a latent variable structural equations framework. Accounting and Business Research 27, 1 (1996), 41–50.Google ScholarCross Ref
- Robert J. Parker, James M. Kohlmeyer, Sakthi Mahenthirian, and Terry Sincich. 2014. Procedural Justice and Information Sharing During the Budgeting Process. In Advances in Management Accounting, Marc J. Epstein and John Y. Lee (eds.). Emerald Group Publishing Limited, 93–112. DOI:https://doi.org/10.1108/S1474-787120140000023003Google ScholarCross Ref
- Robert J. Parker and Larissa Kyj. 2006. Vertical information sharing in the budgeting process. Accounting, organizations and society 31, 1 (2006), 27–45.Google Scholar
- G. Premkumar and Margaret Roberts. 1999. Adoption of new information technologies in rural small businesses. Omega 27, 4 (1999), 467–484.Google ScholarCross Ref
- Steve Ranger. 2018. What is cloud computing? Everything you need to know about the cloud explained. ZDNet. Retrieved March 3, (2018), 2021.Google Scholar
- Rajiv Sabherwal and Yolande E. Chan. 2001. Alignment between business and IS strategies: A study of prospectors, analyzers, and defenders. Information systems research 12, 1 (2001), 11–33.Google Scholar
- Michael D. Shields and S. Mark Young. 1993. Antecedents and Consequences of Participative Budgeting: Evidence on the Effects of Asymmetrical Information. Journal of Management Accounting Research 5, (1993).Google Scholar
- Joseph Vithayathil. 2018. Will cloud computing make the I nformation T echnology (IT) d epartment obsolete? Information Systems Journal 28, 4 (2018), 634–649.Google ScholarCross Ref
- Hongjiang Xu and Sakthi Mahenthiran. 2021. Users' perception of cybersecurity, trust and cloud computing providers' performance. ICS 29, 5 (November 2021), 816–835. DOI:https://doi.org/10.1108/ICS-09-2020-0153Google ScholarCross Ref
- Boonghee Yoo, Naveen Donthu, and Tomasz Lenartowicz. 2011. Measuring Hofstede's Five Dimensions of Cultural Values at the Individual Level: Development and Validation of CVSCALE. (2011), 18.Google Scholar
- Philipp Zech. 2011. Risk-based security testing in cloud computing environments. In 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, IEEE, 411–414.Google ScholarDigital Library
- Qi Zhang, Lu Cheng, and Raouf Boutaba. 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications 1, (2010), 7–18.Google Scholar
Index Terms
- Factors Related to Information Sharing and Cloud Computing Adoption in SMEs: Evidence from Saudi Arabia
Recommendations
Cloud computing adoption decision modelling for SMEs: a conjoint analysis
Cloud computing is an emerging technology that promises competitive advantages, cost savings, enhanced business processes and services, and various other benefits to enterprises. Despite the rapid technological advancement, the adoption of cloud ...
Users' Acceptance of Cloud Computing in Saudi Arabia: An Extension of Technology Acceptance Model
Cloud computing has become a popular topic in the research community because of its ability to transform computer software, platforms, and infrastructure as a service. However, cloud computing literature currently lacks user studies despite the fact ...
Risk analysis in adoption of cloud computing in SMEs - a literature review
This paper presents a systematic literature review, to explore the current key issues related to cloud computing adoption in small medium enterprises SMEs. This is achieved by reviewing 55 articles published about cloud computing adoption in SMEs. Using ...
Comments