Abstract
This paper takes a scientometric research approach and undertakes a categorized literature analysis to provide a comprehensive and systemic overview of the current status of research on cloud services and their adoption by organizations. We review 52 journals and proceedings of the information systems field to identify and systematically categorize 36 articles on the topic. Our content-based analysis shows that the scarce theoretical and empirical work on organizational cloud service adoption has developed and explored factors that directly or indirectly drive organizations to adopt or inhibit them from adopting cloud services from different perspectives and dimensions. We classify these driving and inhibiting determinants based on the technology organization environment framework Tornatzky and Fleischer (The process of technological innovation. Lexington Books, Lexington, 1990) to provide a structured summary. Based on our analysis and recent cloud evolution in practice, we identify five new research areas, including theoretical and practical phenomena describing determinants and consequences of cloud service adoption in organizations: information technology (IT) related public threat appeals, trust in the technology versus trust in the vendor, bring your own cloud, transformation of organizational identity, and intelligent clusters of IT initiatives. For each phenomenon we provide relevant research questions, potential theoretical foundations, and methodologies to guide future research endeavors in this field.
Similar content being viewed by others
Notes
Complementary information is provided online at http://www.is-frankfurt.de/uploads/ocsa_shae.pdf.
References
Abimbola T, Vallaster C (2007) Brand, organisational identity and reputation in SMEs: an overview. Qual Mark Res Int J 10(4):341–348
Akter S, Ray P, D’Ambra J (2011) Viewing systems as services: the role of service quality. In: Proceedings of the 32nd international conference on information systems, Shanghai
Albert S, Whetten DA (1985) Organizational identity. In: Cummings LL, Staw BM (eds) Research in Organizational Behavior, vol 7. JAI Press, Greenwich, pp 263–295
Alvarez R (2008) Examining technology, structure and identity during an enterprise system implementation. Inf Syst J 18(2):203–224
Anderson CL, Agarwal R (2010) Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34(3):613–643
Anderson Ed, Lam L, Dharmasthira Y, Cournoyer S, Tornbohm C, Roster J, Granetto BF, Blackmore D, Eid T, Contu R, Liu VK, Biscotti F, Pang C, Sommer D, Singh TJ, Frank A, Swinehart HH, Dayley A, Petri G, Zhang J, Yeates M, Bell W, Toombs D, Brown RH, Correia JM, Wurster LF, Eschinger C, Sawai M, Nakao A (2013) Forecast: public cloud services, worldwide, 2011–2017, 1Q13 update. http://www.gartner.com/id=2391015. Accessed 31 May 2013
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58
Axelrod LJ, Newton JW (1991) Preventing nuclear war: beliefs and attitudes as predictors of disarmist and deterrentist behavior. J Appl Soc Psychol 21(1):29–40
Barrett M, Walsham G (1999) Electronic trading and work transformation in the London insurance market. Inf Syst Res 10(1):1–22
Barrett M, Sahay S, Walsham G (2001) Information technology and social transformation: GIS for forestry management in India. Inf Soc 17(1):5–20
Baun C, Kunze M, Nimis J, Tai S (2011) Cloud computing Web-basierte dynamische IT-services. Springer, Berlin
Benlian A (2009) A transaction cost theoretical analysis of software-as-a-service (SaaS)-based sourcing in SMBs and enterprises. In: Proceedings of the 17th european conference on information systems, Verona
Benlian A (2010) Which type of software model is first choice? An AHP-based comparison of traditional, open-source, and on-demand office suites on the fulfillment of evaluation criteria. In: Proceedings of the 18th European conference on information systems, Pretoria
Benlian A, Hess T (2009) Welche Treiber lassen SaaS auch in Grossunternehmen zum Erfolg werden? Eine empirische Analyse der SaaS-Adoption auf Basis der Transaktionskostentheorie. In: 9th international conference on Wirtschaftsinformatik, Wien
Benlian A, Hess T (2010) The risks of sourcing software as a service: an empirical analysis of adopters and non-adopters. In: Proceedings of the 18th European conference on information systems, Pretoria
Benlian A, Hess T (2011) Opportunities and risks of software-as-a-service: findings from a survey of IT executives. Decis Support Syst 52(1):232–246
Benlian A, Hess T, Buxmann P (2009) Drivers of SaaS-adoption: an empirical study of different application types. Bus Inf Syst Eng 1(5):357–369
Benlian A, Koufaris M, Hess T (2010) The role of SaaS service quality for continued SaaS use: empirical insights from SaaS using firms. In: Proceedings of the 31st international conference on information systems, St. Louis
Benlian A, Koufaris M, Hess T (2011) Service quality in software-as-a-service: developing the SaaS-Qual measure and examining its role in usage continuing. J Manag Inf Syst 28(3):85–126
Boggs R (2012) Worldwide small and medium-sized business 2012–2016 forecast: IT spending changes by size category and region for hardware, software, and services. IDC #233740. http://www.idc.com/getdoc.jsp?containerId=233740. Accessed 01 Oct 2013
Bose R, Luo X (2011) Integrative framework for assessing firms’ potential to undertake Green IT initiatives via virtualization: a theoretical perspective. J Strat Inf Syst 20(1):38–54
Brown AD (1997) Narcissism, identity, and legitimacy. Acad Manag Rev 22(3):643–686
Butler T (2011) Compliance with institutional imperatives on environmental sustainability: building theory on the role of Green IS. J Strat Inf Syst 20(1):6–26
Cachin C, Keidar I, Shraer A (2011) Fail-aware untrusted storage. Siam J Comput 40(2):493–533
Cearley D (2012) Gartner identifies the top 10 strategic technology trends for 2013. http://www.gartner.com/newsroom/id/2209615. Accessed 01 Oct 2013
Chau PYK, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1):1–24
Chui M, Manyika J, Bughin J, Brown B, Roberts R, Danielson J, Gupta S (2013) Ten IT-enabled business trends for the decade ahead updated research. McKinsey Global Institute. http://www.mckinsey.com/insights/high_tech_telecoms_internet/ten_it-enabled_business_trends_for_the_decade_ahead. Accessed 01 Oct 2013
Clemons EK, Chen Y (2011) Making the decision for cloud services: managing the risk of an extreme form of IT outsourcing. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii
Currie WL (2004) The organizing vision of application service provision: a process-oriented analysis. Inf Org 14(4):237–267
Currie WL, Parikh MA (2006) Value creation in web services: an integrative model. J Strat Inf Syst 15(2):153–174
DeLone WH, McLean ER (2003) The DeLone and McLean model of information system success: a ten-year update. J Manag Inf Syst 19(4):9–30
Dwivedi YK, Mustafee N (2010) It’s unwritten in the cloud: the technology enablers for realising the promise of cloud computing. J Enterp Inf Manag 23(6):673–679
Elsbach KD, Kramer RM (1996) Members’ responses to organizational identity threats: encountering and countering the business week rankings. Adm Sci Quart 41(3):442–476
Evans B (2012) The top 10 strategic CIO issues for 2013. http://www.forbes.com/sites/oracle/2012/09/28/the-top-10-strategic-cio-issues-for-2013/. Accessed 01 Oct 2013
Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J Appl Soc Psychol 30(2):407–429
Giddens A (1990) The consequences of modernity. Polity Press, Cambridge
Giddens A (1991) Modernity and self-identity: self and society in the late modern age. Polity Press, Cambridge
Gioia DA, Price KN, Hamilton AL, Thomas JB (2010) Forging an identity: an insider-outsider study of processes involved in the formation of organizational identity. Adm Sci Quart 55(1):1–46
Goles T, Chin WW (2005) Information systems outsourcing relationship factors: detailed conceptualization and initial evidence. ACM SIGMIS Database 36(4):47–67
Hay B, Nance K, Bishop M (2011) Storm clouds rising: security challenges for IaaS cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii
Hoberg P, Wollersheim J, Krcmar H (2012) The business perspective on cloud computing: a literature review of research on cloud computing. In: Proceedings of the 18th Americas conference on information systems, Seattle
Hofstede G (1980) Culture’s consequences: international differences in work-related values. Sage Publications, Beverly Hills
Iyer B, Henderson JC (2012) Business value from clouds: learning from users. MIS Q Exec 11(1):51–60
Janssen M, Joha A (2011) Challenges for adopting cloud-based software as a service (SaaS) in the public sector. In: Proceedings of the 19th European conference on information systems, Helsinki
Johnston AC, Warkentin M (2010) Fear appeals and information security behaviors: an empirical study. MIS Q 34(3):549–566
Jones MR, Karsten H (2008) Giddens’s structuration theory and information systems research. MIS Q 32(1):127–157
Kaisler S, Money WH, Cohen SJ (2012) A decision framework for cloud computing. In: Proceedings of the 45th Hawaii international conference on system sciences, Hawaii
Kauffman S (1993) The origins of order: self organization and selection in evolution. Oxford University Press, New York
Kim W, Jeong O, Kim C, So J (2011) The dark side of the Internet: attacks, costs and responses. Inf Syst 36(3):675–705
Koehler P, Anandasivam A, Dan MA, Weinhardt C (2010) Customer heterogeneity and tariff biases in cloud computing. In: Proceedings of the 31st international conference on information systems, St. Louis
Koslowski T, Strüker J (2011) ERP on demand platform complementary effects using the example of a sustainability benchmarking service. Bus Inf Syst Eng 3(6):359–367
Kroes L (2013) Statement by Vice President Neelie Kroes on the consequences of living in an age of total information. European Commission-MEMO/13/654 04/07/2013. http://europa.eu/rapid/press-release_MEMO-13-654_en.htm. Accessed 22 Sept 2013
Lamb R, Davidson E (2005) Information and communication technology challenges to scientific professional identity. Inf Soc 21(1):1–24
Lamberth S, Weisbecker A (2010) Wirtschaftlichkeitsbetrachtungen beim Einsatz von Cloud Computing. In: Pietsch W, Krams B (eds) Vom Projekt zum Produkt. Fachtagung des GI-Fachausschusses Management der Anwendungsentwicklung und -wartung im Fachbereich Wirtschaftsinformatik (WI-MAW), Aachen, 2010. Gesellschaft für Informatik, Bonn, pp 123–136
Lee J, Kim Y (1999) Effect of partnership quality on IS outsourcing success: conceptual framework and empirical validation. J Manag Inf Syst 15(4):29–61
Lee Y, Larsen KR (2009) Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software. Eur J Info Syst 18(2):177–187
Lee Y, Lee J, Lee Z (2006) Social influence on technology acceptance behavior: self-identity theory perspective. ACM SIGMIS Database 37(2–3):60–75
Leimeister S, Böhm M, Riedl C, Krcmar H (2010) The business perspective of cloud computing: actors, roles and value networks. In: Proceedings of the 18th European conference on information systems, Pretoria
Loch KD, Carr HH, Warkentin ME (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Q 16(2):173–186
Luoma E, Nyberg T (2011) Four scenarios for adoption of cloud computing in China. In: Proceedings of the 19th European conference on information systems, Helsinki
Markus ML, Robey D (1988) Information technology and organizational change: causal structure in theory and research. Manag Sci 34(5):583–598
Marston S, Li Z, Bandyopadhyay S, Ghalsasi A (2011a) Cloud computing: the business perspective. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii
Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011b) Cloud computing: the business perspective. Decis Support Syst 51(1):176–189
Martens B, Teuteberg F (2012) Decision-making in cloud computing environments: a cost and risk based approach. Inf Syst Front 14(4):871–893
Martens B, Poeppelbuss J, Teuteberg F (2011) Understanding the cloud computing ecosystem: results from a quantitative content analysis. In: 10th international conference on Wirtschaftsinformatik, Zurich
McDonald MP, Aron D (2013) Research presentation for ‘hunting and harvesting in a digital world: the 2013 CIO agenda’. http://www.gartner.com/id=2310018. Accessed 31 May 2013
McKnight DH, Chervany NL (2002) What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int J Electron Commer 6(2):35–59
McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new organizational relationships. Acad Manag Rev 23(3):473–490
McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Inf Syst Res 13(3):334–359
McLellan L (2012) By 2017 the CMO will spend more on IT than the CIO. Gartner Webinar Series. http://my.gartner.com/portal/server.pt?open=512&objID=202&mode=2&PageID=5553&resId=1871515. Accessed 02 Oct 2013
Mell P, Grance T (2011) The NIST definition of cloud computing Recommendations of the National Institute of Standards and Technology Special Publication 800-145. http://csrc.nist.gov/publications/PubsSPs.html#800-145. Accessed 22 Aug 2012
Milgrom P, Roberts J (1990) The economics of modern manufacturing: technology, strategy, and organization. Am Econ Rev 80(3):511–528
Milgrom P, Roberts J (1995) Complementarities and fit strategy, structure, and organizational change in manufacturing. J Acc Econ 19(2):179–208
Milne S, Sheeran P, Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. J Appl Soc Psychol 30(1):106–143
Mishra AN, Konana P, Barua A (2007) Antecedents and consequences of Internet use in procurement: an empirical investigation of U.S. manufacturing firms. Inf Syst Res 18(1):103–120
Mitchell RL (2013) IT’s new concern: the personal cloud. Computerworld. http://www.computerworld.com/s/article/9239348/IT_s_new_concern_The_personal_cloud?taxonomyId=220&pageNumber=1. Accessed 25 Sept 2013
Obermiller C (1995) The baby is sick/the baby is well: a test of environmental communication appeals. J Advert 24(2):55–70
Ozdemir Z, Barron J, Bandyopadhyay S (2011) An analysis of the adoption of digital health records under switching costs. Inf Syst Res 22(3):491–503
Pallud J, Elie-Dit-Cosaque C (2011) User responses to new system implementation: a bricolage perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai
Pavlou PA (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J Strat Inf Syst 11(3):215–243
Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commer 7(3):101–134
Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59
Porter M, Siggelkow N (2008) Contextuality within activity systems and sustainability of competitive advantage. Acad Manag Perspect 22(2):34–56
Ratnasingam P (2005) Trust in inter-organizational exchanges: a case study in business to business electronic commerce. Decis Support Syst 39(3):525–544
Ravasi D, Schultz M (2006) Responding to organizational identity threats: exploring the role of organizational culture. Acad Manag Rev 49(3):433–458
Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. J Psychol 91(1):93–114
Rogers RW (1983) Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social Psychophysiology. Guilford Press, New York, pp 153–176
Rogers EM (2003) Diffusion of Innovation, 5th edn. Free Press, New York
Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404
Russell S, Yoon V, Forgionne G (2010) Cloud-based decision support systems and availability context: the probability of successful decision outcomes. Inf Syst E Bus Manag 8(3):189–205
Sarkar PK, Young LW (2011) Sailing in the cloud: a case study of perceptions and changing roles in an Australian university. In: Proceedings of the 19th European conference on information systems, Helsinki
Sato (2012) An inside look at Google BigQuery. https://cloud.google.com/products/big-query. Accessed 01 Oct 2013
Saya S, Pee LG, Kankanhalli A (2010) The impact of institutional influences on perceived technological characteristics and real options in cloud computing adoption. In: Proceedings of the 31st international conference on information systems, St. Louis
Schmidt E (2006) Conversation with Eric Schmidt hosted by Danny Sullivan. In: Search Engine Strategies Conference. http://www.google.com/press/podium/ses2006.html. Accessed 18 Sep 2012
Schmitz K, Webb K, Teng J (2010) Exploring technology and task adaptation among individual users of mobile technology. In: Proceedings of the 31st international conference on information systems, St. Louis
Schrader U, Hennig-Thurau T (2009) VHB-JOURQUAL2: method, results, and implications of the German academic association for business research’s journal ranking. BuR-Bus Res 2(2):180–204
Scott SG, Lane VR (2000) A stakeholder approach to organizational identity. Acad Manag Rev 25(1):43–62
Stanton JM, Stam KR, Mastrangelo P, Jolton J (2005) Analysis of end user security behaviors. Comput Secur 24(2):124–133
Steinfield C, Markus ML, Wigand RT (2011a) Through a glass clearly: standards, architecture, and process transparency in global supply chains. J Manag Inf Syst 28(2):75–107
Steinfield CW, Markus ML, Wigand RT (2011b) Cooperative advantage and vertical information system standards: an automotive supply chain case study. In: Proceedings of the 44th Hawaii international conference on system sciences, Hawaii
Su N (2011) Emergence of cloud computing: an institutional innovation perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai
Susarla A, Barua A (2011) Contracting efficiency and new firm survival in markets enabled by information technology. Inf Syst Res 22(2):306–324
Tan YH, Thoen W (2001) Toward a generic model of trust for electronic commerce. Int J Eletron Commer 5(2):61–74
Tornatzky LG, Fleischer M (1990) The process of technological innovation. Lexington Books, Lexington
Vessey I, Ramesh V, Glass RL (2002) Research in information systems: an empirical study of diversity in the discipline and its journals. J Manag Inf Syst 19(2):129–174
Victor B, Cullen JB (1988) The organizational bases of ethical work climates. Adm Sci Q 33(1):101–125
Walther S, Plank A, Eymann T, Singh N, Phadke G (2012) Success factors and value propositions of software as a service providers: a literature review and classification. In: Proceedings of the 18th Americas conference on information systems, Seattle
Ward BT, Sipior JC (2010) The Internet jurisdiction risk of cloud computing. Inf Syst Manag 27(4):334–339
Webster J, Watson RT (2002) Analyzing the past to prepare for the future: writing a literature review. MIS Q Exec 26(2):xiii–xxiii
Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) Cloud computing: a classification, business models, and research directions. Bus Inf Syst Eng 1(5):391–399
Wieland S (2010) SOA in der Cloud. In: Fähnrich K, Franczyk B (eds) INFORMATIK 2010. Service Science: Neue Perspektiven für die Informatik. Band 2. Gesellschaft für Informatik, Bonn, pp 55–60
Wilde T, Hess T (2007) Forschungsmethoden der Wirtschaftsinformatik Eine empirische Untersuchung. Wirtschaftsinformatik 49(4):280–287
Willison R, Warkentin M (2013) Beyond deterrence: an expanded view of employee computer abuse. MIS Q 37(1):1–20
Winkler TJ, Goebel C, Benlian A, Bidault F, Günther O (2011) The impact of software as a service on IS authority: a contingency perspective. In: Proceedings of the 32nd international conference on information systems, Shanghai
Xin M, Levina N (2008) Software-as-a service model: elaborating client-side adoption factors. In: Proceedings of the 30th international conference on information systems, Paris
Yang H, Tate M (2012) A descriptive literature review and classification of cloud computing research. Commun Assoc Inf Syst 31(2):35–60
Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: Grid computing environments workshop, Austin
Zainuddin E, Gonzalez P (2011) Configurability, maturity, and value co-creation in SaaS: an exploratory case study. In: Proceedings of the 32nd international conference on information systems, Shanghai
Zhang P, Li NL (2005) The intellectual development of human-computer interaction research: a critical assessment of the MIS literature (1990–2002). J Assoc Inf Syst 6(11):227–292
Zhu K, Kraemer KL (2005) Post-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry. Inf Syst Res 16(1):61–84
Zhu K, Kraemer KL, Xu S, Dedrick J (2004) Information technology payoff in e-business environments: an international perspective on value creation of e-business in the financial services industry. J Manag Inf Syst 21(1):17–54
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Haag, S., Eckhardt, A. Organizational cloud service adoption: a scientometric and content-based literature analysis. J Bus Econ 84, 407–440 (2014). https://doi.org/10.1007/s11573-014-0716-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11573-014-0716-6