34,718 research outputs found
What role does corporate governance play in the intention to use cloud computing technology?
This paper aims to investigate the factors which promote the adoption of cloud-based technology. It strives for a better understanding of the impact of corporate governance on the adoption of this technology. This study concentrated on executives in companies where the use of cloud computing may give a competitive advantage. The main contribution of this work is to propose a model for the influence of corporate governance and other factors that determine the adoption of this technology. A questionnaire was prepared after taking into consideration the reviewed literature. The sample consisted of 164 technology companies from Southern Spain that already use the new economic models for digital solutions. The methodology used to analyze the structural model was the Structural Equation Model (SEM). The results of the survey showed the influence of Corporate Governance and the procedures and practices of the organization on the adoption of cloud computing and the associated business model. This study aims to point out the importance of corporate support and Knowledge Management for the correct and successful adoption of this technology and to show the effects on the new business model of billing for the use of available resources. View Full-Tex
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security
assurance are currently two major challenges of Cloud-based systems. GDPR compliance implies both privacy and security
mechanisms definition, enforcement and control, including evidence collection. This paper presents a novel DevOps
framework aimed at supporting Cloud consumers in designing, deploying and operating (multi)Cloud systems that include
the necessary privacy and security controls for ensuring transparency to end-users, third parties in service provision (if any)
and law enforcement authorities. The framework relies on the risk-driven specification at design time of privacy and security
level objectives in the system Service Level Agreement (SLA) and in their continuous monitoring and enforcement at runtime.The research leading to these results has received
funding from the European Union’s Horizon 2020 research
and innovation programme under grant agreement No 644429
and No 780351, MUSA project and ENACT project,
respectively. We would also like to acknowledge all the
members of the MUSA Consortium and ENACT Consortium
for their valuable help
Why Do People Adopt, or Reject, Smartphone Password Managers?
People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers
Cloud computing in government organizations: towards a new comprehensive model
Cloud computing is a new information technology paradigm, one which has been adopted in many different sectors. Many developing countries are working on improving e-government to provide services to their citizens that are integrated and effective. Therefore, the Saudi government has made improving e-government a high priority. The aim of this study is to explore significant factors affecting the adoption of cloud computing in e-government services in Saudi Arabia as a case study. After identifying these factors, we propose a new comprehensive model for the Adoption of Cloud Computing in Saudi G-GOVernment (ACCE-GOV) that has been adopted from the Technology Organisation Environment (TOE) framework and the Diffusion of Innovations (DOI) theory. This research model examines factors of technological context (compatibility, complexity, service quality, security, and relative advantages), organisational context (top management support, organisation size, and technology readiness), environmental context (regulations and competitive pressures), and social context (awareness, trust, and attitude) in regard to the adoption of cloud computing. Ultimately, this study enhances the decision-making of the Saudi government through understanding and highlighting the most important factors that influence the adoption of cloud computing in an e-government context. This is a position paper, reporting on the work in progress. The findings of this study will be useful for the researchers who considers suitability of different methodological approaches for cloud computing adoption and evaluation
ERP implementation methodologies and frameworks: a literature review
Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
Cloud Computing in SMEs: A Qualitative Approach to Identify and Evaluate Influential Factors
In the age of ubiquitous digitalization, there are opportunities to relocate miscellaneous activities to the cloud, e.g. data storage, computing operations or even entire services. This has a massive impact on nearly all branches of industries as well as for private individuals. However, the reasons for adoption or rejection of these technologies are still underrepresented in academic literature. During the study at hand, qualitative expert interviews are designed and conducted to elicit reasons for the adoption of cloud services in German small and medium-sized enterprises (SME). The study presents a list of explored influencing factors, ranked in order to their relevance. In addition to the ones abstracted from the literature, the study identifies five more factors with an influence on the adoption of cloud services in the investigated area. The result of the evaluation is that the security and handling of data have the highest significance for German SMEs. Thus, trust, privacy and security are the most relevant influencing factors
Recommended from our members
Exploring Factors Influencing Adoption of Blockchain in Accounting Applications using Technology–Organization–Environment Framework
Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable for trust. Triangulation of methods and data sources used in this study contributed to the depth of research and understanding. A comprehensive literature review was first conducted. Its results were further enhanced using the encoding methodology, based on which influencing factors were identified and a model for adoption was developed. A qualitative exploratory study was undertaken next on twelve organizations at the cusp of adoption for accounting applications. Eight significant factors influencing the adoption thus identified are: relative advantage, uncertainty, top management support, technology readiness, industry, regulatory environment, competitive pressure and trust. The study contributes to revealing the relevance of blockchain to accounting while highlighting potential disruptions to enable better evaluation of the technology for adoption. The results may have limited generalizability, which may be overcome through a quantitative study in the future
IT service management: towards a contingency theory of performance measurement
Information Technology Service Management (ITSM) focuses on IT service creation, design, delivery and maintenance. Measurement is one of the basic underlying elements of service science and this paper contributes to service science by focussing on the selection of performance metrics for ITSM. Contingency theory is used to provide a theoretical foundation for the study. Content analysis of interviews of ITSM managers at six organisations revealed that selection of metrics is influenced by a discrete set of factors. Three categories of factors were identified: external environment, parent organisationand IS organisation. For individual cases, selection of metrics was contingent on factors such as organisation culture, management philosophy and perspectives, legislation, industry sector, and customers, although a common set of four factors influenced selection of metrics across all organisations. A strong link was identified between the use of a corporate performance framework and clearly articulated ITSM metrics
- …