Skip to main content
Log in

Organizational cloud service adoption: a scientometric and content-based literature analysis

  • Original Paper
  • Published:
Journal of Business Economics Aims and scope Submit manuscript

Abstract

This paper takes a scientometric research approach and undertakes a categorized literature analysis to provide a comprehensive and systemic overview of the current status of research on cloud services and their adoption by organizations. We review 52 journals and proceedings of the information systems field to identify and systematically categorize 36 articles on the topic. Our content-based analysis shows that the scarce theoretical and empirical work on organizational cloud service adoption has developed and explored factors that directly or indirectly drive organizations to adopt or inhibit them from adopting cloud services from different perspectives and dimensions. We classify these driving and inhibiting determinants based on the technology organization environment framework Tornatzky and Fleischer (The process of technological innovation. Lexington Books, Lexington, 1990) to provide a structured summary. Based on our analysis and recent cloud evolution in practice, we identify five new research areas, including theoretical and practical phenomena describing determinants and consequences of cloud service adoption in organizations: information technology (IT) related public threat appeals, trust in the technology versus trust in the vendor, bring your own cloud, transformation of organizational identity, and intelligent clusters of IT initiatives. For each phenomenon we provide relevant research questions, potential theoretical foundations, and methodologies to guide future research endeavors in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Complementary information is provided online at http://www.is-frankfurt.de/uploads/ocsa_shae.pdf.

References

  • Abimbola T, Vallaster C (2007) Brand, organisational identity and reputation in SMEs: an overview. Qual Mark Res Int J 10(4):341–348

    Article  Google Scholar 

  • Akter S, Ray P, D’Ambra J (2011) Viewing systems as services: the role of service quality. In: Proceedings of the 32nd international conference on information systems, Shanghai

  • Albert S, Whetten DA (1985) Organizational identity. In: Cummings LL, Staw BM (eds) Research in Organizational Behavior, vol 7. JAI Press, Greenwich, pp 263–295

    Google Scholar 

  • Alvarez R (2008) Examining technology, structure and identity during an enterprise system implementation. Inf Syst J 18(2):203–224

    Article  Google Scholar 

  • Anderson CL, Agarwal R (2010) Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34(3):613–643

    Google Scholar 

  • Anderson Ed, Lam L, Dharmasthira Y, Cournoyer S, Tornbohm C, Roster J, Granetto BF, Blackmore D, Eid T, Contu R, Liu VK, Biscotti F, Pang C, Sommer D, Singh TJ, Frank A, Swinehart HH, Dayley A, Petri G, Zhang J, Yeates M, Bell W, Toombs D, Brown RH, Correia JM, Wurster LF, Eschinger C, Sawai M, Nakao A (2013) Forecast: public cloud services, worldwide, 2011–2017, 1Q13 update. http://www.gartner.com/id=2391015. Accessed 31 May 2013

  • Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  • Axelrod LJ, Newton JW (1991) Preventing nuclear war: beliefs and attitudes as predictors of disarmist and deterrentist behavior. J Appl Soc Psychol 21(1):29–40

    Article  Google Scholar 

  • Barrett M, Walsham G (1999) Electronic trading and work transformation in the London insurance market. Inf Syst Res 10(1):1–22

    Article  Google Scholar 

  • Barrett M, Sahay S, Walsham G (2001) Information technology and social transformation: GIS for forestry management in India. Inf Soc 17(1):5–20

    Article  Google Scholar 

  • Baun C, Kunze M, Nimis J, Tai S (2011) Cloud computing Web-basierte dynamische IT-services. Springer, Berlin

    Google Scholar 

  • Benlian A (2009) A transaction cost theoretical analysis of software-as-a-service (SaaS)-based sourcing in SMBs and enterprises. In: Proceedings of the 17th european conference on information systems, Verona

  • Benlian A (2010) Which type of software model is first choice? An AHP-based comparison of traditional, open-source, and on-demand office suites on the fulfillment of evaluation criteria. In: Proceedings of the 18th European conference on information systems, Pretoria

  • Benlian A, Hess T (2009) Welche Treiber lassen SaaS auch in Grossunternehmen zum Erfolg werden? Eine empirische Analyse der SaaS-Adoption auf Basis der Transaktionskostentheorie. In: 9th international conference on Wirtschaftsinformatik, Wien

  • Benlian A, Hess T (2010) The risks of sourcing software as a service: an empirical analysis of adopters and non-adopters. In: Proceedings of the 18th European conference on information systems, Pretoria

  • Benlian A, Hess T (2011) Opportunities and risks of software-as-a-service: findings from a survey of IT executives. Decis Support Syst 52(1):232–246

    Article  Google Scholar 

  • Benlian A, Hess T, Buxmann P (2009) Drivers of SaaS-adoption: an empirical study of different application types. Bus Inf Syst Eng 1(5):357–369

    Article  Google Scholar 

  • Benlian A, Koufaris M, Hess T (2010) The role of SaaS service quality for continued SaaS use: empirical insights from SaaS using firms. In: Proceedings of the 31st international conference on information systems, St. Louis

  • Benlian A, Koufaris M, Hess T (2011) Service quality in software-as-a-service: developing the SaaS-Qual measure and examining its role in usage continuing. J Manag Inf Syst 28(3):85–126

    Article  Google Scholar 

  • Boggs R (2012) Worldwide small and medium-sized business 2012–2016 forecast: IT spending changes by size category and region for hardware, software, and services. IDC #233740. http://www.idc.com/getdoc.jsp?containerId=233740. Accessed 01 Oct 2013

  • Bose R, Luo X (2011) Integrative framework for assessing firms’ potential to undertake Green IT initiatives via virtualization: a theoretical perspective. J Strat Inf Syst 20(1):38–54

    Article  Google Scholar 

  • Brown AD (1997) Narcissism, identity, and legitimacy. Acad Manag Rev 22(3):643–686

    Google Scholar 

  • Butler T (2011) Compliance with institutional imperatives on environmental sustainability: building theory on the role of Green IS. J Strat Inf Syst 20(1):6–26

    Article  Google Scholar 

  • Cachin C, Keidar I, Shraer A (2011) Fail-aware untrusted storage. Siam J Comput 40(2):493–533

    Article  Google Scholar 

  • Cearley D (2012) Gartner identifies the top 10 strategic technology trends for 2013. http://www.gartner.com/newsroom/id/2209615. Accessed 01 Oct 2013

  • Chau PYK, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1):1–24

    Article  Google Scholar 

  • Chui M, Manyika J, Bughin J, Brown B, Roberts R, Danielson J, Gupta S (2013) Ten IT-enabled business trends for the decade ahead updated research. McKinsey Global Institute. http://www.mckinsey.com/insights/high_tech_telecoms_internet/ten_it-enabled_business_trends_for_the_decade_ahead. Accessed 01 Oct 2013

  • Clemons EK, Chen Y (2011) Making the decision for cloud services: managing the risk of an extreme form of IT outsourcing. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii

  • Currie WL (2004) The organizing vision of application service provision: a process-oriented analysis. Inf Org 14(4):237–267

    Article  Google Scholar 

  • Currie WL, Parikh MA (2006) Value creation in web services: an integrative model. J Strat Inf Syst 15(2):153–174

    Article  Google Scholar 

  • DeLone WH, McLean ER (2003) The DeLone and McLean model of information system success: a ten-year update. J Manag Inf Syst 19(4):9–30

    Google Scholar 

  • Dwivedi YK, Mustafee N (2010) It’s unwritten in the cloud: the technology enablers for realising the promise of cloud computing. J Enterp Inf Manag 23(6):673–679

    Google Scholar 

  • Elsbach KD, Kramer RM (1996) Members’ responses to organizational identity threats: encountering and countering the business week rankings. Adm Sci Quart 41(3):442–476

    Article  Google Scholar 

  • Evans B (2012) The top 10 strategic CIO issues for 2013. http://www.forbes.com/sites/oracle/2012/09/28/the-top-10-strategic-cio-issues-for-2013/. Accessed 01 Oct 2013

  • Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J Appl Soc Psychol 30(2):407–429

    Article  Google Scholar 

  • Giddens A (1990) The consequences of modernity. Polity Press, Cambridge

    Google Scholar 

  • Giddens A (1991) Modernity and self-identity: self and society in the late modern age. Polity Press, Cambridge

    Google Scholar 

  • Gioia DA, Price KN, Hamilton AL, Thomas JB (2010) Forging an identity: an insider-outsider study of processes involved in the formation of organizational identity. Adm Sci Quart 55(1):1–46

    Article  Google Scholar 

  • Goles T, Chin WW (2005) Information systems outsourcing relationship factors: detailed conceptualization and initial evidence. ACM SIGMIS Database 36(4):47–67

    Article  Google Scholar 

  • Hay B, Nance K, Bishop M (2011) Storm clouds rising: security challenges for IaaS cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii

  • Hoberg P, Wollersheim J, Krcmar H (2012) The business perspective on cloud computing: a literature review of research on cloud computing. In: Proceedings of the 18th Americas conference on information systems, Seattle

  • Hofstede G (1980) Culture’s consequences: international differences in work-related values. Sage Publications, Beverly Hills

    Google Scholar 

  • Iyer B, Henderson JC (2012) Business value from clouds: learning from users. MIS Q Exec 11(1):51–60

    Google Scholar 

  • Janssen M, Joha A (2011) Challenges for adopting cloud-based software as a service (SaaS) in the public sector. In: Proceedings of the 19th European conference on information systems, Helsinki

  • Johnston AC, Warkentin M (2010) Fear appeals and information security behaviors: an empirical study. MIS Q 34(3):549–566

    Google Scholar 

  • Jones MR, Karsten H (2008) Giddens’s structuration theory and information systems research. MIS Q 32(1):127–157

    Google Scholar 

  • Kaisler S, Money WH, Cohen SJ (2012) A decision framework for cloud computing. In: Proceedings of the 45th Hawaii international conference on system sciences, Hawaii

  • Kauffman S (1993) The origins of order: self organization and selection in evolution. Oxford University Press, New York

    Google Scholar 

  • Kim W, Jeong O, Kim C, So J (2011) The dark side of the Internet: attacks, costs and responses. Inf Syst 36(3):675–705

    Article  Google Scholar 

  • Koehler P, Anandasivam A, Dan MA, Weinhardt C (2010) Customer heterogeneity and tariff biases in cloud computing. In: Proceedings of the 31st international conference on information systems, St. Louis

  • Koslowski T, Strüker J (2011) ERP on demand platform complementary effects using the example of a sustainability benchmarking service. Bus Inf Syst Eng 3(6):359–367

    Article  Google Scholar 

  • Kroes L (2013) Statement by Vice President Neelie Kroes on the consequences of living in an age of total information. European Commission-MEMO/13/654 04/07/2013. http://europa.eu/rapid/press-release_MEMO-13-654_en.htm. Accessed 22 Sept 2013

  • Lamb R, Davidson E (2005) Information and communication technology challenges to scientific professional identity. Inf Soc 21(1):1–24

    Article  Google Scholar 

  • Lamberth S, Weisbecker A (2010) Wirtschaftlichkeitsbetrachtungen beim Einsatz von Cloud Computing. In: Pietsch W, Krams B (eds) Vom Projekt zum Produkt. Fachtagung des GI-Fachausschusses Management der Anwendungsentwicklung und -wartung im Fachbereich Wirtschaftsinformatik (WI-MAW), Aachen, 2010. Gesellschaft für Informatik, Bonn, pp 123–136

  • Lee J, Kim Y (1999) Effect of partnership quality on IS outsourcing success: conceptual framework and empirical validation. J Manag Inf Syst 15(4):29–61

    Article  Google Scholar 

  • Lee Y, Larsen KR (2009) Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software. Eur J Info Syst 18(2):177–187

    Article  Google Scholar 

  • Lee Y, Lee J, Lee Z (2006) Social influence on technology acceptance behavior: self-identity theory perspective. ACM SIGMIS Database 37(2–3):60–75

    Article  Google Scholar 

  • Leimeister S, Böhm M, Riedl C, Krcmar H (2010) The business perspective of cloud computing: actors, roles and value networks. In: Proceedings of the 18th European conference on information systems, Pretoria

  • Loch KD, Carr HH, Warkentin ME (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Q 16(2):173–186

    Article  Google Scholar 

  • Luoma E, Nyberg T (2011) Four scenarios for adoption of cloud computing in China. In: Proceedings of the 19th European conference on information systems, Helsinki

  • Markus ML, Robey D (1988) Information technology and organizational change: causal structure in theory and research. Manag Sci 34(5):583–598

    Article  Google Scholar 

  • Marston S, Li Z, Bandyopadhyay S, Ghalsasi A (2011a) Cloud computing: the business perspective. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii

  • Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011b) Cloud computing: the business perspective. Decis Support Syst 51(1):176–189

    Article  Google Scholar 

  • Martens B, Teuteberg F (2012) Decision-making in cloud computing environments: a cost and risk based approach. Inf Syst Front 14(4):871–893

    Article  Google Scholar 

  • Martens B, Poeppelbuss J, Teuteberg F (2011) Understanding the cloud computing ecosystem: results from a quantitative content analysis. In: 10th international conference on Wirtschaftsinformatik, Zurich

  • McDonald MP, Aron D (2013) Research presentation for ‘hunting and harvesting in a digital world: the 2013 CIO agenda’. http://www.gartner.com/id=2310018. Accessed 31 May 2013

  • McKnight DH, Chervany NL (2002) What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int J Electron Commer 6(2):35–59

    Google Scholar 

  • McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new organizational relationships. Acad Manag Rev 23(3):473–490

    Google Scholar 

  • McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Inf Syst Res 13(3):334–359

    Article  Google Scholar 

  • McLellan L (2012) By 2017 the CMO will spend more on IT than the CIO. Gartner Webinar Series. http://my.gartner.com/portal/server.pt?open=512&objID=202&mode=2&PageID=5553&resId=1871515. Accessed 02 Oct 2013

  • Mell P, Grance T (2011) The NIST definition of cloud computing Recommendations of the National Institute of Standards and Technology Special Publication 800-145. http://csrc.nist.gov/publications/PubsSPs.html#800-145. Accessed 22 Aug 2012

  • Milgrom P, Roberts J (1990) The economics of modern manufacturing: technology, strategy, and organization. Am Econ Rev 80(3):511–528

    Google Scholar 

  • Milgrom P, Roberts J (1995) Complementarities and fit strategy, structure, and organizational change in manufacturing. J Acc Econ 19(2):179–208

    Article  Google Scholar 

  • Milne S, Sheeran P, Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. J Appl Soc Psychol 30(1):106–143

    Article  Google Scholar 

  • Mishra AN, Konana P, Barua A (2007) Antecedents and consequences of Internet use in procurement: an empirical investigation of U.S. manufacturing firms. Inf Syst Res 18(1):103–120

    Article  Google Scholar 

  • Mitchell RL (2013) IT’s new concern: the personal cloud. Computerworld. http://www.computerworld.com/s/article/9239348/IT_s_new_concern_The_personal_cloud?taxonomyId=220&pageNumber=1. Accessed 25 Sept 2013

  • Obermiller C (1995) The baby is sick/the baby is well: a test of environmental communication appeals. J Advert 24(2):55–70

    Article  Google Scholar 

  • Ozdemir Z, Barron J, Bandyopadhyay S (2011) An analysis of the adoption of digital health records under switching costs. Inf Syst Res 22(3):491–503

    Article  Google Scholar 

  • Pallud J, Elie-Dit-Cosaque C (2011) User responses to new system implementation: a bricolage perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai

  • Pavlou PA (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J Strat Inf Syst 11(3):215–243

    Article  Google Scholar 

  • Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commer 7(3):101–134

    Google Scholar 

  • Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59

    Article  Google Scholar 

  • Porter M, Siggelkow N (2008) Contextuality within activity systems and sustainability of competitive advantage. Acad Manag Perspect 22(2):34–56

    Article  Google Scholar 

  • Ratnasingam P (2005) Trust in inter-organizational exchanges: a case study in business to business electronic commerce. Decis Support Syst 39(3):525–544

    Article  Google Scholar 

  • Ravasi D, Schultz M (2006) Responding to organizational identity threats: exploring the role of organizational culture. Acad Manag Rev 49(3):433–458

    Article  Google Scholar 

  • Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. J Psychol 91(1):93–114

    Article  Google Scholar 

  • Rogers RW (1983) Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social Psychophysiology. Guilford Press, New York, pp 153–176

    Google Scholar 

  • Rogers EM (2003) Diffusion of Innovation, 5th edn. Free Press, New York

    Google Scholar 

  • Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404

    Article  Google Scholar 

  • Russell S, Yoon V, Forgionne G (2010) Cloud-based decision support systems and availability context: the probability of successful decision outcomes. Inf Syst E Bus Manag 8(3):189–205

    Article  Google Scholar 

  • Sarkar PK, Young LW (2011) Sailing in the cloud: a case study of perceptions and changing roles in an Australian university. In: Proceedings of the 19th European conference on information systems, Helsinki

  • Sato (2012) An inside look at Google BigQuery. https://cloud.google.com/products/big-query. Accessed 01 Oct 2013

  • Saya S, Pee LG, Kankanhalli A (2010) The impact of institutional influences on perceived technological characteristics and real options in cloud computing adoption. In: Proceedings of the 31st international conference on information systems, St. Louis

  • Schmidt E (2006) Conversation with Eric Schmidt hosted by Danny Sullivan. In: Search Engine Strategies Conference. http://www.google.com/press/podium/ses2006.html. Accessed 18 Sep 2012

  • Schmitz K, Webb K, Teng J (2010) Exploring technology and task adaptation among individual users of mobile technology. In: Proceedings of the 31st international conference on information systems, St. Louis

  • Schrader U, Hennig-Thurau T (2009) VHB-JOURQUAL2: method, results, and implications of the German academic association for business research’s journal ranking. BuR-Bus Res 2(2):180–204

    Google Scholar 

  • Scott SG, Lane VR (2000) A stakeholder approach to organizational identity. Acad Manag Rev 25(1):43–62

    Google Scholar 

  • Stanton JM, Stam KR, Mastrangelo P, Jolton J (2005) Analysis of end user security behaviors. Comput Secur 24(2):124–133

    Article  Google Scholar 

  • Steinfield C, Markus ML, Wigand RT (2011a) Through a glass clearly: standards, architecture, and process transparency in global supply chains. J Manag Inf Syst 28(2):75–107

    Article  Google Scholar 

  • Steinfield CW, Markus ML, Wigand RT (2011b) Cooperative advantage and vertical information system standards: an automotive supply chain case study. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii

  • Su N (2011) Emergence of cloud computing: an institutional innovation perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai

  • Susarla A, Barua A (2011) Contracting efficiency and new firm survival in markets enabled by information technology. Inf Syst Res 22(2):306–324

    Article  Google Scholar 

  • Tan YH, Thoen W (2001) Toward a generic model of trust for electronic commerce. Int J Eletron Commer 5(2):61–74

    Google Scholar 

  • Tornatzky LG, Fleischer M (1990) The process of technological innovation. Lexington Books, Lexington

    Google Scholar 

  • Vessey I, Ramesh V, Glass RL (2002) Research in information systems: an empirical study of diversity in the discipline and its journals. J Manag Inf Syst 19(2):129–174

    Google Scholar 

  • Victor B, Cullen JB (1988) The organizational bases of ethical work climates. Adm Sci Q 33(1):101–125

    Article  Google Scholar 

  • Walther S, Plank A, Eymann T, Singh N, Phadke G (2012) Success factors and value propositions of software as a service providers: a literature review and classification. In: Proceedings of the 18th Americas conference on information systems, Seattle

  • Ward BT, Sipior JC (2010) The Internet jurisdiction risk of cloud computing. Inf Syst Manag 27(4):334–339

    Article  Google Scholar 

  • Webster J, Watson RT (2002) Analyzing the past to prepare for the future: writing a literature review. MIS Q Exec 26(2):xiii–xxiii

    Google Scholar 

  • Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) Cloud computing: a classification, business models, and research directions. Bus Inf Syst Eng 1(5):391–399

    Article  Google Scholar 

  • Wieland S (2010) SOA in der Cloud. In: Fähnrich K, Franczyk B (eds) INFORMATIK 2010. Service Science: Neue Perspektiven für die Informatik. Band 2. Gesellschaft für Informatik, Bonn, pp 55–60

  • Wilde T, Hess T (2007) Forschungsmethoden der Wirtschaftsinformatik Eine empirische Untersuchung. Wirtschaftsinformatik 49(4):280–287

    Article  Google Scholar 

  • Willison R, Warkentin M (2013) Beyond deterrence: an expanded view of employee computer abuse. MIS Q 37(1):1–20

    Google Scholar 

  • Winkler TJ, Goebel C, Benlian A, Bidault F, Günther O (2011) The impact of software as a service on IS authority: a contingency perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai

  • Xin M, Levina N (2008) Software-as-a service model: elaborating client-side adoption factors. In: Proceedings of the 30th international conference on information systems, Paris

  • Yang H, Tate M (2012) A descriptive literature review and classification of cloud computing research. Commun Assoc Inf Syst 31(2):35–60

    Google Scholar 

  • Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: Grid computing environments workshop, Austin

  • Zainuddin E, Gonzalez P (2011) Configurability, maturity, and value co-creation in SaaS: an exploratory case study. In: Proceedings of the 32nd international conference on information systems, Shanghai

  • Zhang P, Li NL (2005) The intellectual development of human-computer interaction research: a critical assessment of the MIS literature (1990–2002). J Assoc Inf Syst 6(11):227–292

    Google Scholar 

  • Zhu K, Kraemer KL (2005) Post-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry. Inf Syst Res 16(1):61–84

    Article  Google Scholar 

  • Zhu K, Kraemer KL, Xu S, Dedrick J (2004) Information technology payoff in e-business environments: an international perspective on value creation of e-business in the financial services industry. J Manag Inf Syst 21(1):17–54

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steffi Haag.

Appendix

Appendix

See Tables 3 and 4.

Table 3 Classification scheme of data collection based on Vessey et al. (2002) and Wilde and Hess (2007)
Table 4 The 52 publications considered in the search process of our literature review

Rights and permissions

Reprints and permissions

About this article

Cite this article

Haag, S., Eckhardt, A. Organizational cloud service adoption: a scientometric and content-based literature analysis. J Bus Econ 84, 407–440 (2014). https://doi.org/10.1007/s11573-014-0716-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11573-014-0716-6

Keywords

JEL Classification

Navigation