Electronic Markets

, Volume 23, Issue 2, pp 105–114 | Cite as

Cloud computing in industrial SMEs: identification of the barriers to its adoption and effects of its application

  • Sara Trigueros-Preciado
  • Daniel Pérez-González
  • Pedro Solana-González
Special theme


Cloud computing is a new technological paradigm that may revolutionize how organizations use IT by facilitating delivery of all technology as a service. In the literature, the Cloud is treated mainly through a technological approach focused on the concept definition, service models, infrastructures for its development and security problems. However, there is an important lack of works which analyze this paradigm adoption in SMEs and its results, with a gap between the technological development and its adoption by organizations. This paper uses a qualitative technique methodology -group meetings with managers- and a quantitative one—survey- and identifies which factors act as barriers to Cloud adoption and which positive effects its application generates in 94 industrial SMEs. The conclusion is that the main barriers are of a cultural type and that the positive effects go well beyond reducing costs.


Cloud computing Industrial SMEs Barriers to adoption Effects 
JEL classification M15 L86 


  1. Ahmad, M. (2010). Security risks of cloud computing and its emergence as 5th utility service. Information Security and Assurance. Communications in Computer and Information Science, 76, 209–219.CrossRefGoogle Scholar
  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, al. (2009). Above the clouds: A Berkeley view of cloud computing. Retrieved 1 March, 2011, from
  3. Bayrak, E., Conley, J. P., & Wilkie, S. (2011). The economics of cloud computing, No 1118, Working Papers, Department of Economics, Vanderbilt University. Retrieved 1 March, 2012, from,
  4. Betcher, T.J. (2010). Cloud computing: Key IT-related risks and mitigation strategies for consideration by IT security practitioners. Retrieved 9 December, 2010, from
  5. Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A Study of Infrastructure as a Service (IaaS). International Journal of Engineering and Information Technology, 2(1), 60–63.Google Scholar
  6. Böhm, M., Leimeister, S., Riedl, C., & Krcmar, H. (2010). Cloud computing and computing evolution. Retrieved 9 December, 2010, from
  7. Brynjolfsson, E., & Hitt, L. M. (2003). Computing productivity: firm level evidence. The Review of Economics and Statistics, 85(4), 793–808.CrossRefGoogle Scholar
  8. Buyya, R., Yeo, C.S. & Venugopal, S. (2008). Market-oriented cloud computing: Vision, Hype, and Reality for delivering IT services as computing utility. 10th IEEE International Conference on High Performance Computing and Communications, Dalian. doi: 10.1109/HPCC.2008.172
  9. Cellary, W., & Strykowski, S. (2009). e-government based on cloud computing and service-oriented architecture, In (Eds), Proceedings of ACM International Conference Proceeding Series, Bogota, Colombia, ACM New York.Google Scholar
  10. Chen, Y., Paxson, V., & Katz, R.H. (2010) Whats new about cloud computing security?. Tech. report UCB/EECS-2010-5, EECS Dept., Univ. of California, Berkeley.Google Scholar
  11. Clemons, E., & Chen, Y. (2011). Making the decision to contract for cloud services: managing the risk of an extreme form of IT outsourcing, In Proceedings of 44th Hawaii International Conference on System Sciences, Kauai. doi: 10.1109/HICSS.2011.292
  12. Cloud Security Alliance. (2009). Security guidance for critical areas of focus in cloud computing. Retrieved 11 December, 2010, from
  13. Colomo-Palacios, R., García-Crespo, Á., Soto-Acosta, P., Ruano-Mayoral, M., & Jiménez-López, D. (2010). A case analysis of semantic technologies for R&D intermediation information management. International Journal of Information Management, 30(5), 465–469.CrossRefGoogle Scholar
  14. Das, R., Patnaik, S., & Misro, A.K. (2011). Adoption of cloud computing in e-Governance. Paper in CCSIT 2011, Part III, CCIS, 161–172, Springer: Berlin Heidelberg.Google Scholar
  15. Dewan, S., & Ren, F. (2011). Information technology and firm boundaries: impact on firm risk and return performance. Information Systems Research, 22(2), 369–388.CrossRefGoogle Scholar
  16. Dillon, T., Wu, C. & Chang, E. (2010). Cloud computing: Issues and challenges, In Proceedings of 24th International Conference on Information Networking and Applications Perth, IEEE, 27–33.Google Scholar
  17. Dumay, J. C. (2009). Intellectual capital measurement: a critical approach. Journal of Intellectual Capital, 10(2), 190–210.CrossRefGoogle Scholar
  18. ENISA. (2009). Cloud computing: benefits, risks and recommendations for information security. Retrieved 12 December, 2010, from
  19. Erdogmus, H. (2009). Cloud computing: does nirvana hide behind the nebula? IEEE Software, 26(2), 4–6. Retrieved 10 December, 2010 from Scholar
  20. Etro, F. (2009). The economic impact of cloud computing on business creation, employment and output in the E.U. Review of Business and Economics, 54(2), 179–208.Google Scholar
  21. Etro, F. (2010) The economic consequences of the diffusion of cloud computing, in Dutta, S., & Mia, I. (2010). The Global Information Technology Report 20092010 ICT for Sustainability. Londres, Foro Económico Mundial-INSEAD.Google Scholar
  22. European Commission. (2010) The future of cloud computing. Opportunities for European cloud computing beyond 2010. From
  23. Geelan, J. (2009). Twenty-one experts define cloud computing. Virtualization Journal. Retrieved 4 December, 2010, from
  24. Hubbard, D. W. (2010). How to measure anything: finding the value of intangibles in business. 2nd Edition. John Wiley & Sons.Google Scholar
  25. IDC. (2009). IDC’s new IT cloud services forecast: 2009–2013. Retrieved 5 May, 2011, from
  26. International Data Corporation, IDC ( 2008). IT cloud services forecast-2008–2012: A key driver for growth. Retrieved 4 December, 2010, from = 224.
  27. Kaufman, L. (2009). Data security in the world of cloud computing. Security & Privacy, 7(4), 61–64.CrossRefGoogle Scholar
  28. Kim, W. (2009). Cloud computing: Today and Tomorrow. Journal of Object Technology, 8(1), 65–72.CrossRefGoogle Scholar
  29. Lasica, J. (2009). Identity in the age of cloud computing: The next-generation Internet’s impact on business, governance and social interaction. Washington, D.C: Aspen Institute.Google Scholar
  30. Leavitt, N. (2009). Is cloud computing really ready for prime time? Computer, 42(1), 15–25.CrossRefGoogle Scholar
  31. Lee, J. J.-Y. (2008). Complementary effects of information technology investment on firm profitability: the functional forms of the complementarities. Information Systems Management, 25(4), 364–371.CrossRefGoogle Scholar
  32. Ma, S. (2012). A review on cloud computing development. Journal of Networks, 7(2), 305–310.CrossRefGoogle Scholar
  33. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing: the business perspective. Decision Support Systems, 51(1), 176–189.CrossRefGoogle Scholar
  34. Mell, P., Grance, T. (2011). The NIST definition of cloud computing. recommendations of the national institute of standards and technology. Special publication 800–145Google Scholar
  35. Melville, N., Kraemer, K., & Gurbaxani, V. (2004). Information technology and organizational performance: an integrative model of it business value. MIS Quarterly, 28(2), 283–322.Google Scholar
  36. OECD, (2009). The impact of the global crisis on SME and entrepreneurship financing and policy responses. Retrieved 9 December 2010, from:
  37. OECD (2010): Information technology outlook 2010 highlights. OECD publications. Retrieved 7 February, 2011, from:
  38. Powell, T. C., & Dent-Micallef, A. (1997). Information technology as competitive advantage: the role of human, business, and technology resources. Strategic Management Journal, 18(5), 375–405.CrossRefGoogle Scholar
  39. Ramayah, T., Lee, W. C., & Boey, C. I. (2011). Network collaboration and performance in the tourism sector. Service Business, 5(4), 411–428.CrossRefGoogle Scholar
  40. Rastogi, A. (2010). A model based approach to implement cloud computing in e-Governance. International Journal of Computer Applications, 9(7), 15–18.Google Scholar
  41. Rittinghouse, J., & Ransome, J. (2010). Cloud computing implementation, management and security. Boca Raton: Taylor and Francis.Google Scholar
  42. Russ, M., Jones, J. G., & Jones, J. K. (2008). Knowledge-based strategies and systems: A systematic review. In M. Lytras, M. Russ, R. Maier, & A. Naeve (Eds.), Knowledge management strategies: A handbook of applied technologies (pp. 1–62). doi: 10.4018/978-1-59904-603-7.
  43. Sher, P., & Lee, V. (2004). Information technology as a facilitator for enhancing dynamic capabilities through knowledge management. Information Management, 41(8), 933–945.CrossRefGoogle Scholar
  44. Soto-Acosta, P., Loukis, E., Colomo-Palacios, R., & Lytras, M. D. (2010). An empirical research of the effect of internet-based innovation on business value. African Journal of Business Management, 4(18), 4096–4105.Google Scholar
  45. Takabi, H., Joshi, J.B.D., & Ahn, G.J. (2010). Securecloud: Towards a comprehensive security framework for cloud computing environments. Proc. 1st IEEE Int Workshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010, 393–398.Google Scholar
  46. Tsaravas, C., & Themistocleous, M. (2011). Cloud computing and e-government: A literature review. European, Mediterranean & Middle Eastern Conference on Information Systems 2011,(EMCIS2011) May 30–31 2011, Athens.Google Scholar
  47. Vaquero, L., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009). A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55.CrossRefGoogle Scholar
  48. Velte, A., Velte, T., & Elsenpeter, R. (2010). Cloud computing a practical approach. McGraw-Hill.Google Scholar
  49. Youseff, L., Butrico, M., & Da Silva, D. (2008). Toward a unified ontology of cloud computing, In Proceedings of Grid Computing Environments Workshop, Austin. doi: 10.1109/GCE.2008.4738443
  50. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.CrossRefGoogle Scholar

Copyright information

© Institute of Information Management, University of St. Gallen 2013

Authors and Affiliations

  • Sara Trigueros-Preciado
    • 1
  • Daniel Pérez-González
    • 1
  • Pedro Solana-González
    • 1
  1. 1.Department of Business AdministrationUniversity of CantabriaSantanderSpain

Personalised recommendations