Skip to main content

Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector

  • Conference paper
  • First Online:
Digital Business Transformation

Abstract

In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two large companies in the financial sector. Our findings show that cloud adoption alters the locus and scope of IT governance which consequently compels organizations to rethink their control mechanisms to mitigate security risks. Our findings contribute to the literature on IT governance and IT outsourcing, and support IT executives and decision makers in mitigating the risks of cloud adoption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences (Ny), 305, 357–383. https://doi.org/10.1016/j.ins.2015.01.025.

    Article  Google Scholar 

  2. August, T., Niculescu, M. F., & Shin, H. (2014). Cloud implications on software network structure and security risks cloud implications on software network structure and security risks. Information Systems and Research, 25, 489–510. https://doi.org/10.1287/isre.2014.0527.

    Article  Google Scholar 

  3. Baset, S. A. (2012). Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review, 46, 57–66.

    Article  Google Scholar 

  4. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response. Information & Management, 51, 138–151. https://doi.org/10.1016/j.im.2013.11.004.

    Article  Google Scholar 

  5. Barney, J. B. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120.

    Article  Google Scholar 

  6. Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: Findings from a survey of IT executives. Decision Support Systems, 52, 232–246. https://doi.org/10.1016/j.dss.2011.07.007.

    Article  Google Scholar 

  7. Bowen, P. L., Cheung, M.-Y. D., & Rohde, F. H. (2007). Enhancing IT governance practices: A model and case study of an organization’s efforts. International Journal of Accounting Information Systems, 8, 191–221.

    Article  Google Scholar 

  8. Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33, 726–733. https://doi.org/10.1016/j.ijinfomgt.2013.05.004.

    Article  Google Scholar 

  9. David, A., Nguyen, Q., Johnson, V., Kappelman, L., Torres, R., Maurer, C. (2018). The 2017 SIM IT issues and trends study. MIS Q Executive 17. https://doi.org/10.1177/1066480713514945.

  10. Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: opportunities and challenges. Academy of Management Journal, 50, 25–32. https://doi.org/10.1002/job.

    Article  Google Scholar 

  11. European Network and Information Security Agency. (2009). Cloud Computing Security Risk Assessment. https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment.

  12. Flick, U., von Kardoff, E., & Steinke, I. (Eds.). (2004). A companion to qualitative research. Sage.

    Google Scholar 

  13. Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking qualitative rigor in inductive research: Notes on the Gioia methodology. Organizational Research Methods, 16, 15–31.

    Article  Google Scholar 

  14. Gonzalez, R., Gasco, J., & Llopis, J. (2006). Information systems outsourcing: A literature analysis. Information & Management, 43, 821–834.

    Article  Google Scholar 

  15. Gregory, R. W., Kaganer, E., Henfridsson, O., Ruch, T. J. (2018). IT consumerization and the transformation of it governance. MIS Quarterly 42, 1225–1253. https://doi.org/10.25300/MISQ/2018/13703.

  16. Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33, 861–874. https://doi.org/10.1016/j.ijinfomgt.2013.07.001.

    Article  Google Scholar 

  17. Hoberg, P., Wollersheim, J., Krcmar, H. (2012). The business perspective on cloud computing—a literature review of research on cloud computing. In: AMCIS 2012 Proceedings, Paper 5.

    Google Scholar 

  18. Jick, T. D. (1979). Mixing qualitative and quantitative methods: Triangulation in action. Administrative Science Quarterly, 24, 602–611.

    Article  Google Scholar 

  19. Kaspersky Lab. (2018). On the money: Growing IT security budgets to protect digital transformation initiatives.

    Google Scholar 

  20. Kern, T., Kreijger, J., & Willcocks, L. (2002). Exploring ASP as sourcing strategy: Theoretical perspectives, propositions for practice. Journal of Strategic Information Systems, 11, 153–177.

    Article  Google Scholar 

  21. Lacity, M. C., & Hirschheim, R. (1993). The information systems outsourcing bandwagon. Sloan Management Review, 35, 73.

    Google Scholar 

  22. Lacity, M. C., Willcocks, L. P., & Khan, S. (2011). Beyond transaction cost economics: Towards an endogenous theory of information technology outsourcing. Journal of Strategic Information Systems, 20, 139–157. https://doi.org/10.1016/j.jsis.2011.04.002.

    Article  Google Scholar 

  23. Lacity, M. C., Khan, S., Yan, A., & Willcocks, L. P. (2010). A review of the IT outsourcing empirical literature and future research directions. Journal of Information Technology, 25, 395–433. https://doi.org/10.1057/jit.2010.21.

    Article  Google Scholar 

  24. Lee, Y., & Cavusgil, S. T. (2006). Enhancing alliance performance: The effects of contractual-based versus relational-based governance. Journal of Business Research, 59, 896–905.

    Article  Google Scholar 

  25. Lin, A., & Chen, N.-C. (2012). Cloud computing as an innovation: Perception, attitude, and adoption. International Journal of Information Management, 32, 533–540. https://doi.org/10.1016/j.ijinfomgt.2012.04.001.

    Article  Google Scholar 

  26. Loske, A., Widjaja, T., Buxmann, P. (2013). Cloud computing providers’ unrealistic optimism regarding IT security risks: A threat to users? ICIS 1–20 (2013). https://doi.org/10.5121/ijnsa.2012.4206.

  27. Maher, N., Kavanagh, P., Glowatz, M. (2013). A vendor perspective on issues with security, governance and risk for Cloud Computing. In: 26th Bled eConference—eInnovations Challenges Impacts Individ. Organ. Soc. Proc. (pp. 103–114).

    Google Scholar 

  28. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision Support Systems, 51, 176–189. https://doi.org/10.1016/j.dss.2010.12.006.

    Article  Google Scholar 

  29. McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, 108, 57–68. https://doi.org/10.1016/j.dss.2018.02.007.

    Article  Google Scholar 

  30. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing—recommendations of the national institute of standards and technology. Gaithersburg: U.S. Department of Commerce.

    Google Scholar 

  31. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51, 497–510.

    Article  Google Scholar 

  32. Payton, S. (2010). Fluffy logic. Financial Management, 22–25 (14719185).

    Google Scholar 

  33. Peterson, R. R. (2004). Exploring IT governance in pharmaceutical and high-tech industries: Trends, challenges and directions.

    Google Scholar 

  34. Pfeffer, J., Salancik, G. R. (2003). The external control of organizations: A resource dependence perspective. Stanford University Press (2003).

    Google Scholar 

  35. Poppo, L., & Zenger, T. (2002). Do formal contracts and relational governance function as substitutes or complements? Strategic Management Journal, 23, 707–725.

    Article  Google Scholar 

  36. Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36, 618–625. https://doi.org/10.1016/j.ijinfomgt.2016.03.005.

    Article  Google Scholar 

  37. Ramireddy, S., Chakraborty, R., Raghu, T. S., Rao, H. R. (2010). Privacy and security practices in the arena of cloud computing—a research in progress. In: AMCIS, p. 574 (2010).

    Google Scholar 

  38. Rastogi, Gloria. (2015). Hendler: security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 129. https://doi.org/10.5325/jinfopoli.5.2015.0129.

    Article  Google Scholar 

  39. Schneider, S., Sunyaev, A.: Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology 31(1), 1–31. https://doi.org/10.1057/jit.2014.25.

  40. Schwarz, A., Jayatilaka, B., Hirschheim, R., & Goles, T. (2009). A conjoint approach to understanding IT application services outsourcing. Journal of the Association of the Information Systems, 10, 1.

    Article  Google Scholar 

  41. Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35, 1831–1838. https://doi.org/10.1016/j.jnca.2012.07.007.

    Article  Google Scholar 

  42. Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31, 272–278. https://doi.org/10.1016/j.ijinfomgt.2010.08.001.

    Article  Google Scholar 

  43. Tallon, P. P., Ramirez, R. V, Short, J. E., Tallon, P. P., Ramirez, R. V, Short, J. E. (2013). The Information artifact in IT Governance : Toward a Theory of Information governance the information artifact in IT governance : Toward a theory of information governance. Journal of Management Information System 30. https://doi.org/10.2753/MIS0742-1222300306.

  44. Tilson, D. (2010). Digital infrastructures : The missing IS research agenda. Information System Research, 748–759. https://doi.org/10.1287/isre.1100.0318.

  45. Tiwana, A., & Konsynski, B. (2010). Complementarities between organizational it architecture and governance structure. Information System Research, 21, 288–304. https://doi.org/10.1287/isre.

    Article  Google Scholar 

  46. Tiwana, A., Konsynski, B., & Venkatraman, N. (2013). Information technology and organizational governance: The IT governance cube. Journal of Management Information System, 30, 7–12.

    Article  Google Scholar 

  47. Vithayathil, J. (2017). Will cloud computing make the Information Technology (IT) department obsolete? Information System Journal. https://doi.org/10.1111/isj.12151.

    Article  Google Scholar 

  48. vom Brocke, J., Braccini, A. M., Sonnenberg, C., & Spagnoletti, P. (2014). Living IT infrastructures—an ontology-based approach to aligning IT infrastructure capacity and business needs. International Journal of Accounting Information Systems, 15, 246–274.

    Article  Google Scholar 

  49. Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., & Wang, Z. (2016). Cloud computing research in the IS discipline: A citation/co-citation analysis. Decision Support Systems, 86, 35–47. https://doi.org/10.1016/j.dss.2016.03.006.

    Article  Google Scholar 

  50. Weill, P., & Ross, J. W. (2004). IT governance. Boston: Harvard Business School Press.

    Google Scholar 

  51. Williamson, O. E. (1981). The modern corporation: Origins, evolution, attributes. Journal of Economic Literature, 19, 1537–1568.

    Google Scholar 

  52. Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press.

    Google Scholar 

  53. Wilkin, C. L., & Chenhall, R. H. (2010). A review of IT governance: A taxonomy to inform accounting information systems. Journal of Information System, 24, 107–146.

    Article  Google Scholar 

  54. Yin, R. K. (2013). Case study research: Design and methods. Sage publications.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niloofar Kazemargi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kazemargi, N., Spagnoletti, P. (2020). Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector. In: Agrifoglio, R., Lamboglia, R., Mancini, D., Ricciardi, F. (eds) Digital Business Transformation. Lecture Notes in Information Systems and Organisation, vol 38. Springer, Cham. https://doi.org/10.1007/978-3-030-47355-6_4

Download citation

Publish with us

Policies and ethics