Empirical Analysis for the Factors Affecting the Adoption of Cloud Computing Initiatives by Information Technology Executives

Mohammad AbdulQadir Obeidat, Tayfun Turgay


The tremendous explosion of technology acceptance theories has not spared the corpus of technology adoption literature from criticism that most of these models only evaluate the adoption of new technology from a single perspective. In an effort to attenuate this criticism, this breaks ranks with extant theories and proposes a unified model for evaluating technology adoption from multiple perspectives. The Technology Trade Theory (Triple-T) model which this study proposes integrates the Social Exchange Theory into the Technology Acceptance Model, and proposes that technology acceptance is a function of a deliberate process of weighing the advantages associated with that technology against its disadvantages. Adoption only happens when the advantages outweigh the disadvantages; otherwise, prospective adopters reject the technology. In this, the model recognizes a total of eight advantages and eight disadvantages associated with cloud computing, on the basis of which its claims are validated.

Data is collected by means of structured psychometric scales administered to a panel of medium and top level IT managers. Psychometric scales are also used to attach weights to each of the variables under study. The Pearson’s coefficient and paired tailed tests are used to analyze the nature, strength and significance of the findings. Findings validate the major claims of the study, on the basis of which research implications are extensively discussed.

Full Text:




Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly 16, pp. 227-247, http://portal.acm.org/citation.cfm?id=119641.119631

Ahronovitz M., Amrhein D., Anderson P., DeAndrade A., Armstrong J., Arasan B.E., Bartlett J., Bruklis R., Cameron K., Carlson M., Cohen R., Crawford T.M., Deolaliker V., Downing P., Easton A., & Flores R. (2010). Cloud computing use cases. White Paper.

Fishbein, M., & Ajzen, I. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.

Al-Qeisi, KI. (2009). Analyzing the use of UTAUT model in explaining an online behaviour: internet banking adoption. Brunel University.

Bagozzi, R. P., & Kimmel, S. K. (1995). A comparison of leading theories for the prediction of goal-directed behaviors. British Journal of Social Psychology, 34, pp.437-461.

Bagozzi, R.P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the association for information systems, 8(4), pp. 244-254.

Bandura, A. (1977). Social learning theory. Englewood Cliffs, NJ: Prentice-Hall.

Behrend, T.S., Wiebe, E.N., London, J.E., & Johnson, E.C. (2011). Cloud computing adoption and usage in community colleges. Behavior & Information Technology, 30 (2), pp. 231–240.

Brown, S., Massey, A., Montoya-Weiss, M., & Burkman, J. (2002). Do I really have to? User Acceptance of mandated technology. European journal of information systems, 11, pp. 283 – 295.

Burton- Jones, A., & Hubona, G. (2005). Individual differences and usage behavior: Revisiting a technology acceptance model assumption. ACM SIGMIS Database, 36(2), 58 – 77.

Buyya, R., Yeo, C. S., et al. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE Conference on High Performance Computing and Communications. IEEE.

Chuttur, M.Y. (2009). Overview of the technology acceptance model: Origins, developments and future directions. Sprouts: Working Papers on Information Systems, 9(37), pp.1-23.

Compeau, D., & Higgins, C. (1995). Application of social cognitive theory to training for computer skills. Information Systems Research, 6(2) 118 -143.

Cropanzano, R., & Mitchell, M.S. (2005). Social exchange theory: An interdisciplinary review. Journal of Management, 31; 874.

Davis, F.D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. MA: Sloan School of Management, Massachusetts Institute of Technology.

Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. (1992). User acceptance of computer technology: A comparison of two theoretical models. Management Science (35:8), 1989, pp. 982-1002.

Deci, E., and Ryan, R. (1985). Intrinsic motivation and self-determination in human behavior. New York: London: Plenum.

Gallivan, M.J., Spitler, V.K., and Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers' influence on IT usage in the workplace. Journal of Management Information Systems 22 (1), pp. 153-192.

Géczy, P., Izumi, N., & Hasida, K. (2011). Cloud services: Do risks outweigh benefits? 2011 2nd International Conference on Economics, Business and Management IPEDR, vol.22 (2011).

Grance, T. (2010). The NIST cloud definition framework. NIST.

Hale, J. L., Householder, B.J., & Greene, K.L. (2003). The theory of reasoned action. In J.P. Dillard & M. Pfau (Eds.), The persuasion handbook: Developments in theory and practice (pp. 259 - 286). Thousand Oaks, CA: Sage.

Huang, E., & Chuang, M.H. (2007). Extending the theory of planned behavior as a model to explain post-merger employee behavior of IS use. Computers in Human Behavior, 23 (2007), pp. 240–257.

Igbaria, M., Zinatelll, N., Cragg, P., and Cavaye, A. (1996). Personal computing acceptance factors in small firms: a structural equation model, MIS Quarterly (21:

Jackson, C.M., Chow, S., and Leitch, R.A. (1997). Toward an understanding of the behavioral intention to use an information system. Decision Sciences (28:2), pp. 357-389.

Jeffrey, K. & Neidecker-Lutz, B. (2009). The future of cloud computing: Opportunities for European cloud computing beyond 2010.

Jlelaty, M & Monzer, Y. (2012). Factors in cloud computing adoption. Lund University.

Karahanna, E., and Straub, D. W. (1999). The psychological origins of perceived usefulness and ease of use. Information and Management (35:4), pp. 237-250.

Lee, Y., Kozar, K.A., & Larsen, K.R.T. (2003). The technology acceptance model: Past, present and future. Communications of the AIS, 12(50), pp.752-780.

Legris, P., Ingham, J., and Collerette, P. (2003). “Why do people use information technology? A critical review of the technology acceptance model. Information & Management 40(3), 2003, pp. 191-204.

Low, C., Chen, Y., & Wu, M. (2011). “Understanding the determinants of cloud computing adoption.” Industrial Management & Data Systems, 111(7), pp.1006 – 1023.

Marston S., Li Z., Bandyopadhyay S., Juheng Z., & Ghalasi, A. (2011) Cloud computing: The business Perspective. Decision Support Systems, 51, 176–189.

Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research 2(3), pp. 173-191.

McKendrick, J. (2011). Cloud bursts onto the enterprise mainstream. Database Trends and Applications, December, pp. 2-5.

Mell, P. & Grance, T. (2009). The NIST definition of cloud computing version 15. National Institute of Standards and Technology.

Miller, M. (2008). Cloud computing: Web-based applications that change the way you work and collaborate. Queue Publishers.

Plummer, D. C., Smith, D. M., et al. (2009). Five refining attributes of public and private cloud.

Rogers, E.M. (1995). Diffusion of innovations, fourth Ed. New York: Free Press.

Shimba, F. (2010). Cloud computing: Strategies for cloud computing adoption. Dublin: Dublin Institute of Technology.

Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. Retrieved on 1/11.2012 from Http://arxiv.org/abs/1001.3259

Subramanian, G.H. (1994). A replication of perceived usefulness and perceived ease of use measurement. Decision Sciences (25: 5/6), 1994, pp. 863-874.

Szajna, B. (1996). Empirical evaluation of the revised technology acceptance model. Management Science, 42(1), pp. 85–92.

Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6, pp. 144–176.

Thibault, J. W., & Kelley, H. H. (1952). The social psychology of groups. New York: John Wiley & Sons.

Thompson, R. L., Higgins, C. A., Howell, J. M. (1991). “Personal computing: Toward a conceptual model of utilization,” MIS Quarterly 15 (1), pp. 124-143

Triandis, H. C. (1977). Interpersonal behavior. Monterey, CA: Brooke/Cole.

Vallerand, R.J. (2001). A hierarchical model of intrinsic and extrinsic motivation in sport and exercise. In: G. Roberts [Eds.], Advances in motivation in sport and exercise [www], IL, Champaign: Human Kinetics, pp. 263-319.

Venkatesh, V., & Davis, F.D. (1996). A model of the antecedents of perceived ease of use: development and test. Decision Sciences, 27 (3), pp.451-481.

Venkatesh, V. (1999). Creating favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly 23(2), pp. 239-260.

Venkatesh, V. and Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of the mood. Organizational Behavior and Human Decision Processes, Vol. 79 (1), pp. 1-28.

Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), pp. 186-204.

Venkatesh, V. and Speier, C., & Morris, M. (2002) User acceptance in individual decision making about technology: Toward an integrated model. Decision Science, 33 (2) 297-316.

Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27 (3), pp. 425-478.

Voona, S. & Venkantaratna, R. (2009). Cloud computing for banks. Infosys Technologies Ltd.

West, R., & Turner, L. H. (2000). Introducing communication theory: Analysis and application. Mountain View, CA: Mayfield.

DOI: https://doi.org/10.5296/jmr.v5i1.2764

Copyright (c)

Journal of Management Research ISSN 1941-899X

Email: jmr@macrothink.org

Copyright © Macrothink Institute


To make sure that you can receive messages from us, please add the 'macrothink.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.