Traditional ways of managing information technology (IT) service providers are no longer applicable as companies use more and more services provisioned in the cloud. Therefore, organizations are looking for new ways to manage their relationship with cloud providers. The shift from IT-as-a-product to IT-as-a-service puts clients in a continued dependency on cloud service providers (CSPs), making provider management a critical factor for companies’ success. In this paper, we (1) identify cloud-specific challenges in managing CSPs, (2) develop a corresponding process framework for CSP management, and (3) discuss and extend this framework. Our final cloud management framework comprises ten processes for effective CSP management based on a literature study and twelve expert interviews. Furthermore, we unpack three major contingency factors, i.e., client–provider ratio, specificity, and service delivery model, which influence the reasonability and configuration of the cloud management processes. Drawing on two specific cases from our interview study, we explicate the contingency factors’ influence. Thus, our paper contributes to cloud sourcing research by deepening the understanding of client–provider relationships and by introducing a viable CSP management instrument contingent on three salient factors of cloud service provisioning.
According to Balaji and Brown (2005), provider management in information technology (IT) outsourcing projects comprises the client’s activities to plan, control, coordinate, and maintain provider relationships. In information systems (IS) research, the management of IT outsourcing relationships is considered to be an essential factor that can make or break the outsourcing project (Lacity and Willcocks 2003; Ruzzier et al. 2008; Urbach and Würz 2012). However, provider management is always challenged by new management approaches such as agile project management (Wiedemann and Wiesche 2018) or new technological concepts. One of these seminal technological concepts is cloud computing. Over the past decades, cloud computing has emerged and it continues to change the fundamental characteristics of IT service provisioning (Buyya et al. 2009; Xiao and Hedman 2019; Keller et al. 2019). Cloud computing is a form of IT provisioning with which pooled IT resources are offered to clients, the users of cloud services, in a flexible and scalable manner without requiring a long-term capital commitment or IT-specific expertise (Armbrust et al. 2010; Marston et al. 2011; Mell and Grance 2011). Due to these characteristics, cloud services can both reduce IT costs as well as open up new business opportunities (Marston et al. 2011; Etro 2009). IT managers have quickly recognized the opportunities at hand, and thus, cloud computing adoption increased (Xiao and Hedman 2019; Fahmideh et al. 2018).
Following the broadly accepted definition of the National Institute of Standards and Technology, cloud computing consists of three different service models (Software as a Service—SaaS, Platform as a Service—PaaS, and Infrastructure as a Service—IaaS) and four deployment models (private, community, public, and hybrid) (Mell and Grance 2011). However, the general understanding of cloud services with the aforementioned characteristics mostly focuses on public cloud services for all three service models. In such scenarios, provider management becomes especially relevant owing to the external hosting of infrastructure and systems by the cloud service provider (CSP) (Mell and Grance 2011). Thus, public cloud services may require configuration and a suitable integration in organizations’ IT landscape. In the following, we refer to public cloud services unless otherwise stated.
The transition from traditional IT outsourcing to the cloud sourcing era has radically changed client–provider relationships (Willcocks et al. 2012; Huntgeburth 2015). The associated shift from IT-as-a-product to IT-as-a-service places enterprise cloud clients in a constant dependency on the availability and the security mechanisms of the CSP (Keller and König 2014). Clients hand over confidential data as well as the control over critical IT infrastructure and applications to the Internet (Chaput and Ringwood 2010; Ali et al. 2015; Huntgeburth 2015), and the abstraction provided by cloud computing leads to a perceived lack of transparency (Venters and Whitley 2012) and a loss of control (Jansen 2011; Jansen and Grance 2011). Furthermore, enterprise cloud clients must rethink the role of the internal IT department (Malladi and Krishnan 2012; Willcocks et al. 2012; Prasad et al. 2014) as well as the characteristics of the outsourcing relationship that defines how clients and cloud providers interact in the era of cloud sourcing (Hon et al. 2012; Schlagwein and Thorogood 2014). In standardized public cloud scenarios, cloud computing’s pay-as-you-go model and its scalability are convenient for clients and promise substantial cost savings as well as the transfer of responsibilities to the provider. Cloud services allow organizations to access high-end IT services without requiring high initial investment (Marston et al. 2011) and to “respond quickly to changing capacity requirements” (Repschlaeger et al. 2012, p. 6). More specialized services (Hoefer and Karagiannis 2010) in the context of SaaS lead to fine-grained providers for specialized solutions (Wang et al. 2014). However, an unmanaged relationship likely leads to a dependency on the CSP, which can have several downsides, e.g., vendor lock-in (cf. Opara-Martins et al. 2014). Furthermore, without appropriate provider management, the lack of transparency in cloud offerings may increase and, thus, reinforce risks in client–provider relationships (Keller and König 2014; Keller 2019). Consequently, the importance of managing business relationships with CSPs has increased to become a critical success factor for clients.
Although some approaches for specific aspects of cloud provider management already exist (Armbrust et al. 2010; Marston et al. 2011; Subashini and Kavitha 2011; Garrison et al. 2012; Vithayathil 2018), research still lacks a holistic framework that addresses all phases from the pre-contract to the post-contract stage. Furthermore, existing approaches do not consider the specific realities of the client–provider relationship in practice. To address the current issues and to add to the scientific discourse on managing relationships between providers and clients, we seek to answer the following research question:
What are the relevant processes to manage cloud computing providers and what contingencies influence the client–provider relationship?
To answer this research question, we reviewed the literature on existing challenges in the client–provider relationship and existing approaches to cloud provider management. Furthermore, we enriched the literature review with insights from interviews with domain experts. We synthesized our findings in a process framework for managing cloud computing providers. In this context, we exclude preceding strategic questions during the outsourcing process (e.g., decisions on make-or-buy), but focus on the business relationship and all client–provider interactions instead. Since provider management depends on companies’ realities, we identified contingency factors during the research process that impact the proposed management processes. Our cloud management framework aims at researchers and practitioners who seek to better understand client–provider interactions in cloud computing from a client perspective.
The remainder of this paper is structured as follows: In Sect. 2, we describe the theoretical background of client–provider relationships in cloud computing before we illustrate our research approach in Sect. 3. Subsequently, we introduce the ten processes of our cloud management framework in Sect. 4. In Sect. 5, we elucidate the three contingency factors and illustrate potential adjustments for the ten cloud management processes. Finally, in Sect. 6, we discuss, conclude, and reflect upon our findings.
2 Theoretical background on client–provider relationships
Managers may either concentrate on core competencies or strategic outsourcing as two basic principles to “leverage their companies’ skills and resources well beyond levels available with other strategies” (Quinn and Hilmer 1994, p. 43). In this paper, we focus on outsourcing, which has, for instance, a long tradition in supply chain networks, where companies utilize their business network to seek competitive advantage (Hallikas et al. 2002).
Similarly, IT outsourcing is a well-established and well-described phenomenon (cf. the survey and analysis of Dibbern et al. 2004). Early publications already dealt with the make-or-buy decision (Buchowicz 1991) or the phenomenon itself (Gupta and Gupta 1992; Lacity and Hirschheim 1995; Willcocks and Kern 1998). Thus, the literature has frequently addressed the question if companies should or should not outsource hardware, software, or both (Lee et al. 2003). However, research has often debated on IT outsourcing’s effectiveness, since companies face a trade-off between flexibility needs and control needs (Quinn and Hilmer 1994). Furthermore, the emergence of application service providers catalyzes this trade-off (Dibbern et al. 2004).
A critical influencing factor in balancing those needs is the client–provider relationship. From a client perspective, the search process for the right partner initiates this relationship (Wadhwa and Ravindran 2007). Having found the right provider, the literature identified the steering of IT service providers as a crucial success factor in IT outsourcing (Urbach and Würz 2012). Prior research has already carved out relevant process steps of steering processes: after the initial contract negotiation and the subsequent service transition, steering also consists of the cultivation of the client–provider relationship, the improvement of the underlying service, and usually ends with the termination of the IT outsourcing contract (cf. Barthelemy 2001; Urbach and Würz 2012). In contrast to this rather organizational perspective, service lifecycle management provides a more technical perspective on the client–provider relationship in IT outsourcing (Fischbach et al. 2013). While most of the literature on relationship management takes on a provider perspective (cf. Kamprath and Röglinger 2010; Lambert 2009), relationship management issues from a client perspective are also manifold. Research streams in supply chain management, for instance, go way beyond the mere steering of a provider, but rather deal with the integration of production chains to co-create value (cf. Galvagno and Dalli 2014; Lambert and Schwieterman 2012).
In contrast to these research domains, cloud computing’s non-storable services (Keller 2016), its pay-as-you-go model, and its scalability induce more standardized products (Armbrust et al. 2010). Thus, cloud computing changes IT departments’ interaction with their providers in comparison to traditional IT products (Willcocks et al. 2012; Huntgeburth 2015). The transformation to cloud computing fosters multi-sourcing strategies as well as the consumption of distinct, specialized services (Keller 2019). Consequently, the complex interaction between multiple cloud services may lead to a perceived lack of transparency (Venters and Whitley 2012) and loss of control (Jansen 2011). While companies can store products in warehouses and traditional software permanently runs after its installation, clients that consume cloud services are in a constant dependency on the availability and security mechanisms of their CSP (Keller and König 2014).
Coping with cloud computing’s specifics for client–provider relationships, governance frameworks in academic literature seek to provide new standards. Most frameworks focus on assessing and handling existing risks associated with cloud computing usage, and address common data security and trust issues (Ahmad and Janczewski 2011; Ko et al. 2011; Alruwaili and Gulliver 2014; Martens and Teuteberg 2011; Zhang et al. 2010). Other studies refer to performance monitoring (Alhamad et al. 2010; Jeon et al. 2014) or the management of cloud computing in application scenarios (Huang et al. 2010). Furthermore, Loebbecke et al. (2012) provide a guided approach to identifying cloud-ready IT services.
However, despite the abundant literature on cloud governance, only a few papers focus on the client–provider relationship from acquisition to its termination. Xiao and Hedman (2019), for instance, describe the client–provider relationship from a provider perspective. They illustrate how a provider changed its business model and therewith its internal processes and mindset to provide SaaS. Furthermore, they illustrate how the provider must integrate its clients in the change process. Grati et al. (2015) consider the lifecycle of a service from a technical perspective and provide a meta-model for provider management entities that contain service-level agreements (SLAs), billing, and monitoring.
Other authors focus on the client perspective. Joha and Janssen (2012), for instance, identify required IT governance capabilities to adopt cloud computing in public sector organizations. They identify capabilities in the areas of business, technical, supply, and governance and guide practitioners on how to overcome existing challenges. Digging deeper into the promises of cloud computing, Winkler et al. (2014) analyze the so-called mantras of cloud services (i.e., financial benefits, technological implications, and organizational implications) and describe the trade-off for cloud clients. From an in-depth analysis of a single case, they derive nine lessons learned to achieve cloud payoffs. They recommend multi-sourcing strategies as well as the involvement of internal IT staff. They also advocate an in-depth analysis of providers as well as contract negotiation. Regarding the functional requirements, they suggest partnering with the provider as well as extending the SaaS customization options using PaaS offerings. Finally, they emphasize the need for compliance with existing regulations. Focusing on the suggested multi-sourcing strategies, Schlagwein and Thorogood (2014) describe how to integrate several cloud providers to dynamically switch between their offerings. They identify the necessity of enforcing technical standards across providers and of being an early-adopter of industry standards as well as flexible contracts. Furthermore, they argue for retaining internal capabilities to “become a competent IT broker able to integrate external and internal IT resources and to design state-of-the-art overall IT solutions” (Schlagwein et al. 2014, p. 210). Finally, Schneider and Sunyaev (2015) focus on how to engage service providers in cloud sourcing relationships from the client perspective. Therefore, they build a cloud service life cycle framework in which they describe the relevant phases of cloud service provisioning as well as the points of interaction between clients and providers: requirements determination, acquisition, integration, contract fulfillment, development, and termination. However, similar to Xiao and Hedman (2019), Schneider and Sunyaev (2015) mostly describe their insights from a provider perspective. Aside from those research papers, practitioner guides such as COBIT 5 or ITIL 3 offer managerial recommendations (Information Technology Service Forum 2012; COBIT 2014), but are mostly neither theoretically nor empirically grounded (Urbach and Würz 2012).
3 Research method
Our research process consisted of two major components. First, we conducted a literature review to identify and synthesize the relevant work on client–provider relationships in cloud computing. Based on the findings from the literature, we drafted an initial cloud management framework. Second, we conducted semi-structured interviews with sixteen experts in the field to validate the initial framework. Iteratively enhancing the framework, the interviewees’ feedback helped us to extend, substantiate, and corroborate our findings. In the following, we provide further details on the two components of our research process.
3.1 Literature review
For our literature review, we followed the guidelines of Vom Brocke et al. (2015) and Webster and Watson (2002). As Vom Brocke et al. (2015) suggest, our research question guided the research process in an iterative, yet systematic manner. In a preliminary literature search, we gained an overview of existing literature to structure the subsequent steps. While our preliminary search focused on identifying holistic models for the client–provider relationship, our structured literature search specifically sought to gain a comprehensive overview of the existing literature.
We collected literature from six major scientific databases (ACM Digital Library, AIS electronic library, EBSCOhost Business Source Premier, IEEE Xplore, ProQuest, ScienceDirect) to allow for broad coverage of research domains (Vom Brocke et al. 2015). Drawing on the insights from our preliminary literature search, we defined ten search strings that concatenate cloud computing with different perspectives (client, provider, management, and sourcing) and our focus on client–provider interaction or the client–provider relationship (see Table 1).
Applying the search strings with no other restrictions resulted in 1804 search results. After removing duplicates across search strings and databases, we began to verify the remaining 1165 search results. Next, we excluded false-positives (e.g., table of contents and front covers) and screened the publications’ titles according to predefined inclusion and exclusion criteria that we had discussed among the authors. For instance, we excluded publications from other domains with no immediate focus on the cloud computing concept (e.g., biology) or publications that clearly focused on non-management aspects (e.g., technical papers). After this step, 225 potentially relevant search results remained. Finally, we checked the publications’ abstracts and—where the abstract did not provide a clear indication—their full texts to derive our final literature sample of 37 publications (see Appendix 1). Thereby, we again applied our inclusion and exclusion criteria in accordance with our research question. Following Webster and Watson (2002), we synthesized the findings from the literature review in a concept matrix (see Appendix 1).
The findings from our literature review corroborated our research question and the underlying motivation. The majority of the publications adopted a provider focus and addressed selected topics such as SLA design, pricing strategies, or trust and security issues. In contrast, barely, any papers provided a comprehensive view of the cloud management lifecycle or prescriptive insights on managing the client–provider relationship. Thus, while the structured literature review helped us to compile an initial collection of cloud management processes (see Appendix 2), we saw the need to engage in our own data collection to gain in-depth insights from interviews. Yet, we iteratively revisited our literature review results throughout the subsequent data collection to consider extant work and to update the concept matrix. Furthermore, we performed a backward and forward search (Vom Brocke et al. 2015) to back the findings from our interview study with literature.
3.2 Interview study
To further explore the relationship between providers and clients on top of our literature review, we opted for a qualitative-empirical research method to validate our preliminary results and to gain a deeper understanding of the management processes (Bettis et al. 2015; Goldkuhl 2012). Based on interviewees’ opinions, we iteratively incorporated corroborating and constructive feedback into our preliminary framework. While we used the initial framework derived from the literature in the first interview, we revised the cloud management framework after each interview round. This enabled us to incorporate new insights quickly and gain feedback on the changes in subsequent interviews. Since the number of suggestions for improvement decreased significantly throughout the interviews and no or only minor suggestions for improvement resulted from the last interviews, we can assume saturation.
Besides further insights and validation of the cloud management framework itself, the interviews also revealed indications for contingencies related to the management processes. During data analysis, we compared the interview findings across the different cases and identified relevant contingency factors that influence the processes’ reasonability and configuration in our cloud management framework. Thus, we specifically sought to unravel those contingencies in later interviews as an emerging theme in our research process. In joint discussions in the research team and by revisiting earlier interviews as well as the literature, we conceptualized the contingency factors and their potential implications for our cloud management framework. While the contingencies were brought up during the frameworks’ validation and, thus, require further substantiation, we see them as a valuable contribution to better understand the different manifestations of our management processes in practice.
In line with the guidelines of Myers and Newman (2007) and Schultze and Avital (2011), we conducted 12 semi-structured interviews with 16 experts from the area of cloud sourcing to gain comprehensive practitioner insights. To increase the validity of our results, we sought to validate the framework from different angles. We considered both interviewees from the client’s point of view and the CSP perspective and cloud management consultants. All interviewees were well experienced within the fields of IT service provisioning and cloud projects for at least 2 and up to 25 years. The interviews were audio-recorded and then transcribed for further analysis and reference. The interviews lasted between 45 min and 2 h. We conducted three interviews as a group interview of at least two employees from the same organization, i.e., Interviewees [Va–c], Interviewees [VIIIa–b], and Interviewees [Xa–b]. Table 2 depicts an overview and the order of data collection, as well as additional information on the interviewed experts.
For data analysis, we used qualitative content analysis techniques (Mayring 2014) and analyzed our data in MAXQDA. Thereby, the first two authors systematically analyzed the interview transcription word-by-word using a categorical coding scheme which we initially developed based on the theory available (Mayring 2014). Thus, our scheme comprised the initial processes in our framework as the main categories. During data analysis, we extended our theoretically derived coding scheme whenever new topics emerged from our data. Here, we also started to identify our contingency factors. Thus, we created new codes and allocated them to a suitable category. All authors thoroughly reviewed our codes and categories in the middle and at the end of data analysis to summarize codes and create sub-categories where the coding scheme was too generic. Thereby, we ensured the clarity and precision of our coding scheme.
4 Developing a cloud management framework
In this section, we illustrate our cloud management framework. For reasons of simplification, the following subsections and Fig. 1 present the final cloud management process framework, which is guided by the literature and our interview findings (see Appendix 2 for the initial cloud management framework). The final framework comprises ten processes to manage CSPs from the client perspective.
In the following subsections, we describe each of the ten cloud management processes in detail and provide insights from the empirical validation. To increase the intelligibility and the applicability of the framework, we used the established approach in IS research of arranging processes in a life cycle view which provides a chronological sequence of the management processes (Heckman 1999; Schneider and Sunyaev 2014). Thereby, we divided the life cycle into three phases: (1) pre-contract, (2) contract, and (3) post-contract (Chou and Chou 2009).
We distinguish eight primary and two secondary cloud management processes. The primary processes comprise distinct management areas during the cloud service provisioning. Thus, the primary processes describe either clients’ direct interactions with the CSP or the activities to prepare, monitor, and steer CSP’s actions. In contrast, secondary processes are support processes in terms of relational and risk management aspects that clients must consider in every primary process. Furthermore, they are not time-limited but require continuous governance. In this context, the life cycle approach structures our results for better comprehensibility and increases the feasibility of the framework. The interview findings show that our interviewees positively acknowledge the life cycle arrangement (e.g., “I think it's perfect to build the whole thing based on the life cycle, which makes the model very clear. […] The structure of the life cycle increases the comprehensibility enormously”, Interviewee [IIa]; “This is what a regular SaaS life cycle look like”, Interviewee [Xa]).
4.1 Service and provider selection
Clients should first conduct internal requirements engineering activities (Zardari and Bahsoon 2011; Mouratidis et al. 2013), resulting, among others, in the decision on which services should be selected for cloud sourcing. Loebbecke et al. (2012) identify that service selection goes hand in hand with provider selection. Clients must “identify IT services that are likely cloud-ready ahead of vendor sales pitches” (Loebbecke et al. 2012, p. 20), and involve various internal and external stakeholders such as management, employees, technology, and service providers. Clients evaluate offerings and select the CSP that best satisfies their requirements based on their specific characteristics. The provider selection itself might result in one CSP or a shortlist of suitable CSPs with whom the client will engage in negotiations. CSP selection is a crucial cloud provider management process to increase trust and, therefore, highly influences the success of the subsequent client–provider relationship (Liu et al. 2016; Lacity and Reynolds 2014). In this process, the development and application of the appropriate evaluation criteria are essential (Zardari and Bahsoon 2011; Low and Chen 2012; Repschlaeger et al. 2012). This process is also highlighted in the interviews. Interviewee [Xa] states that the “…first thing is the solution that you want and then you check which provider can bring that solution.” Initially, this process only comprised provider selection, but based on the interviewees’ comments (e.g., [Xa]), we relabeled it to service and provider selection. This expresses the necessity to find a suitable match of service and provider characteristics for the client’s needs. Furthermore, client companies need to ensure that CSPs also meet industry-specific regulatory requirements. “Contracts in the financial industry are always part of provider selection. […] For example, the contract determines which rights you need to do an audit. This clause is one of the main factors for the selection of a provider [in the financial industry]”, Interviewee [IX].
4.2 Contract negotiation
The sourcing decision to use cloud services strongly influences the contractual foundation of the sourcing contract as well as its processes (Gold 2015; Gilbert 2010; Trappler 2010). Here, commodity CSPs challenge the traditional way of lengthy contract negotiations by offering non-negotiable and standardized contracts that might not reflect all client requirements (Hon et al. 2012; Pearson and Benameur 2010). However, Winkler et al. (2014), as well as Schlagwein et al. (2014), describe that large organizations also have room for negotiations. Furthermore, cloud contracts should define liabilities and penalties in the case of service outages and contract termination (Hon et al. 2012; Calloway 2012). Our interview findings also emphasize such issues. For example, Interviewee [VI] highlights industry-specific compliance aspects that need to be addressed in the contract negotiation. Especially, topics like “Where is data stored; do I have access to my data; do I also have physical access; do I have the possibility to interfere with my provider; or if my provider has a subcontractor, can I also interfere with them, if something does not work, am I still able to act? […] There need to be contractual regulations, so-called ‘instructions’, with which I have the right to take actions against my provider”, Interviewee [VI]. Moreover, Interviewees [Vb] and [Xa] emphasize the importance of being clear right from the contract negotiations what will happen with the transferred data and how the data are accessible after termination.
4.3 Contract management
The fast deployment and the pay-as-you-go model of cloud service provisioning shift the cost structure into operating expenditure instead of capital expenditure at the beginning of IT outsourcing projects (Weinhardt et al. 2009; Buyya et al. 2009). In comparison to traditional IT management, organizations can perform financial performance management in a much finer granularity that allows the breakdown of resource usage and costs to an individual use or a cloud application level (Bond 2015). Furthermore, organizations must monitor compliance and data security due to the transfer of data and control to the CSP (Kerr and Teng 2012; Kaufman 2009; Wang et al. 2010). In case of unforeseen issues (e.g., regulatory changes and unexpectedly high demand), companies need to renegotiate the existing contract and potentially adapt it. The interview findings show that compliance aspects are decisive for practitioners (Interviewees [VI], [IX], and [Xa]). Therefore, the contract management also needs a constant evaluation of changes in compliance and renegotiation if required.
4.4 Service transformation
The transformation from internal IT to cloud services is critical, since the fit of cloud services to the client’s IT architecture and business processes is not guaranteed (Goyal 2010; Govindarajan and Lakshmanan 2010; Bannerman 2010). Thus, service transformation requires careful preparation with a focus on the adaptation of internal service provisioning, management processes, and data consistency. On-premise deployment approaches are usually not appropriate for cloud services and thus make cloud-specific deployment techniques necessary, especially concerning the automated and rapid provisioning of services (Bond 2015; Li et al. 2012). Moreover, clients often use various cloud services from different sources—even within one business process—which increase the complexity for process owners and end-users (Demchenko et al. 2013; Bond 2015; Böhm et al. 2011). This leads to a demand for transparent multi-cloud provider management to prevent inefficiencies and security risks (Paraiso et al. 2012; Böhm et al. 2011; Schlagwein et al. 2014), as well as platforms which enable the aggregation and resource allocation across all cloud services within the organization (Tordsson et al. 2012; Nair et al. 2010). Service transformation includes the management of multiple CSPs, the transformation to automated service provisioning, as well as customization of outsourced services. Thus, service transformation must feature three capabilities: (1) service aggregation must enable the provision of data across multiple CSPs; (2) service arbitrage consists of all activities involved in choosing the best CSP under contract for each workload; and (3) intermediation involves the distribution and control of service, data consistency, and workloads across multiple CSPs (Bond 2015; Nair et al. 2010; Kandpal 2013). Interviewee [IIa] highlights the importance of data consistency not only in the service transformation itself but also in the preparation before the actual transformation starts. Furthermore, Interviewee [IIa] also sees consistent user interfaces as a challenge that must be addressed in the service transformation. “In the area of service transition, a lot of consulting effort is necessary, which does not work with every CSP. However, many large system integrators such as SAP, IBM, etc. close this gap”, Interviewee [IV].
4.5 Organizational transformation
In cloud sourcing, technological complexity can be hidden from the client through abstraction, which makes the management of IT infrastructure and applications less relevant to the internal IT department (Gong et al. 2010). Traditional centralized procedures in which IT, finance, and functional departments are engaged in the procurement process hinder the flexibility of cloud sourcing (Bond 2015; Jede and Teuteberg 2015). Thus, IT departments require an organizational transformation in terms of restructuring organizational roles and the redefinition of the corresponding internally required capabilities (Garrison et al. 2012; Zhang et al. 2010). For example, a major focus to increase cloud adoption is aligning business requirements and IT provisioning through the cloud (Joha and Janssen 2012; Prasad et al. 2014). Like service transformation, clients must carefully plan their activities to avoid organizational issues. A critical challenge for organizational transformation is getting all relevant stakeholders on board and acquiring the right set of in-house IT capabilities to exploit the value of cloud services, e.g., through application integration skills (Lacity and Reynolds 2014). As the demand for cloud services often originates in non-IT departments, close collaboration is required. Cloud services’ easy accessibility can lead to shadow IT, the unregulated and uncontrolled use of client-external cloud resources (Silic and Back 2014). Aside from data security and compliance risks, shadow IT can also lead to overall architecture inefficiencies and high costs (Silic and Back 2014). “Choosing a cloud service provider means changing the internal processes on the client side. Ideally, the business functions do not realize the change, but sometimes they do, so that the business function also needs a certain transition. And of course, there are also organizational changes in the IT organization. In extreme cases, cloud sourcing can mean that some employees are no longer needed”, Interviewee [IV]. Therefore, Interviewee [IV] proposes conducting change management.
4.6 Demand management
Since clients can easily access cloud services via web interfaces, a coordinated management approach that manages the internal demand is necessary (Bond 2015). Demand management deals with the service ordering process and is necessary for the management of both commodity and specialized services. For micro-transactions and the ordering of individual services, the ordering should be automated, and manual processes should be reduced (Bond 2015). However, order management must also guarantee that service ordering stays within the internal and regulatory policies. Thus, appropriate order management requires flexible authorization concepts that guarantee both flexibility and controllability, e.g., pre-approval for ordering and funding pools (Mell and Grance 2011). In addition to managed ordering, IT departments should govern the automated scaling of cloud resources, because unexpectedly high variable costs might arise (Vaquero et al. 2011). To cover these issues and in contrast to our initial literature-based conceptualization of the cloud management framework, Interviewee [I] recommends “my professional experience clearly shows that demand management […] start very far ahead, right from the start of contract”, Interviewee [I]. Furthermore, Interviewee [VIIIa] approaches their initial demands based on a blueprint approach to best know their needs. Thus, client companies should know their demands upfront to better estimate their costs.
4.7 Performance management
As technical and economical provider performance in IT outsourcing projects is fundamental (McFarlan and Nolan 1995; Kern and Willcocks 2000), the development of a structured approach, including client-specific key performance indicators as well as SLAs, to link business impacts to cloud utilization in the context of benefits management is imperative. Furthermore, companies must monitor their confidential data (Kerschbaum 2011; Grati et al. 2015). Performance management needs to collect, transfer, and analyze data from CSPs, without impairing the ongoing service operation. Thereby, it copes with dynamic changes of monitored entities and facilitates monitoring throughout the upsizing or downsizing of cloud resources (Aceto et al. 2013; Bond 2015). Clients must take a holistic view of services, especially in the case of multi-sourcing (Schlagwein et al. 2014). Furthermore, companies can evaluate what utilization benefits are achieved through cloud sourcing (Greenwell et al. 2014; Aljabre 2012). Based on our interviews, we identify that performance management is crucial but also demanding. Performance management should not only comprise SLA monitoring: “In performance management, it is important not only to conduct SLA monitoring and measurement, but to conduct it end-to-end, which is an extremely challenging task. If you have connected or interrelated services, how do you measure what comes out at the end? This end-to-end measurement is extremely difficult to implement in practice”, Interviewee [IIa]. Moreover, Interviewee [IV] highlights that performance management is important, but even more important for client companies is the question of what will happen if an SLA is violated and how they can readjust the service. Therefore, these issues need to be addressed in the contract negotiation, which is why we follow the suggestion of Interviewee [III] and Interviewee [IV] and designed an overlap of the performance management process with the contract negotiation process in our cloud management framework.
4.8 Termination management
Termination management copes with the deletion and the retransfer of data assets back to in-house systems or to another CSP. Thereby, the client requires the support of the original CSP. It is mandatory to clarify already in the contract phase how long client data will be stored for the transfer, what assistance will be given during the transfer, emerging costs, and when the information will be deleted in the contract management process (Expert Group 2014). The lack of contractually agreed data handling arrangements can either lead to loss of data when the CSP deletes all client data immediately after the contract suspension, or to compliance risks when client data are stored too long (Expert Group 2014; Hon et al. 2012). To avoid problems with the interoperability and transfer of data and applications (i.e., lock-in), clients need to ensure that the CSP supports interoperable standards (API, programming language, and runtime applications) (Opara-Martins et al. 2016). Furthermore, CSPs might also terminate a business contract, e.g., due to a shutdown of a certain service or if a client violates contractual terms. Thus, the client should develop business continuity plans. Also, the interview findings show that aspects of contract termination must be negotiated and “be confirmed in the contract, otherwise you will wake up badly at the end of the contract”, Interviewee [III]. Consequently, “it would be charming if a small part of termination management has an overlap with contract management because it is very important to define in the contract how terms of transition and/or exit look like”, Interviewee [III]. From a provider perspective, “we always make sure that when a client leaves that they go in good faith and in good will from both sides in terms like we host their assets, we always give them back, we always make sure that the client gets a hard drive or server back with all the data they once gave us”, Interviewee [Xa].
4.9 Relationship management
To guarantee a healthy client–provider relationship within the service provisioning, trust in the CSP's intentions and capabilities is a top priority for most companies (Garrison et al. 2012). The challenges of trust in cloud service provisioning do not entirely stem from the technology itself, but also the lack of transparency, control over data assets, and unclear security assurances (Huntgeburth 2015; Khan and Malluhi 2010; Habib et al. 2011). Thus, clients appreciate it if a CSP gives extensive information on products and security measures (Huntgeburth 2015; Khan and Malluhi 2010). Independent third-party certifications also certify the CSP’s capabilities to act as a quality verification as illustrated by Accorsi et al. (2011). Moreover, the client should establish routines to exchange performance and security monitoring resulting in service improvement purposes (Schlagwein and Thorogood 2014). Lacity and Reynolds (2014) also describe that a major challenge of cloud consumption is to keep the provider’s attention once the contract is running. Therefore, they suggest building social capital with cloud providers outside the formal cloud service relationship (Lacity and Reynolds 2014). We also find evidence in our interviews for relationship management. The intensity of the relationship management differs from nearly no contact (low-touch) to interaction in the spirit of a partnership (high-touch) (Interviewee [IX]). For high-touch relationships, relationship management is divided up between different teams of the CSP. For instance, in the pre-contract phase, the relationship management is part of the sales team, whereas “as soon as the contract is signed, every contract is handed over to the customer success team and the onboarding department. […] Relationship is definitely important, but the content is different [between the phases]”, Interviewee [Xa]. However, relationship and cooperation can also be difficult in rather low-touch relationships. “The support itself is largely outsourced to India and is divided into different support levels. We experienced that on the first and second level support the support quality was partly very low. But if the problem was not solved and you were routed to the support in the USA, then it worked well. But the issue of support from a major CSP is a difficult one”, Interviewee [IX]. As Interviewee [VIIIa] puts it, “If I need my credit card in the ordering process, then this is an indication that I will have little interactions with the provider”.
4.10 Risk management and legal regulations
To deal with cloud-specific risks, dedicated risk management is of fundamental importance (Fan et al. 2012; Tanimoto et al. 2011). The most prominent risks include data privacy, data security, compliance, and the availability of services that are often related to one another (Srinivasan et al. 2012). Also, some circumstances can reinforce risks (Keller and König 2014). Clients need a careful assessment of risks related to cloud sourcing, and need to develop risk management mechanisms and require appropriate business continuity plans for the impact of any predictable (and unpredictable) interruption event like a protocol of actions (Ristov et al. 2011). Applicable from traditional risk management, clients must identify threats throughout the cloud sourcing relationship as well as structure all risk-related matters in a way that decision-makers understand which risks exist and what factors can influence those risks. As cloud computing develops towards complex network structures, similar to supply chain networks, it is particularly important to analyze the impending network structure (Keller and König 2014). In doing so, organizations must accept that cloud computing has its own idiosyncratic risks that may not be solved through traditional risk management methods and thus requires new approaches (Paquette et al. 2010; Ramgovind et al. 2010). Hence, Zhang et al. (2010) analyze the applicability of a risk management framework for cloud computing. In accordance with the literature, the interview findings also show that data-related problems are the major issue among all challenges (Interviewees [IIa], [III]). “This is the most relevant and the greatest challenge. The transparency and security of having the data secure with the CSP and being able to retrieve it at any time. The most important challenge is not technology, but non-technical factors and IT security”, Interviewee [III]. Additional risks can also emerge from cloud provider networks. For instance, “If the underlying infrastructure CSP is not available, then the CSPs which run their cloud services on this infrastructure CSP also fail”, Interviewee [I].
5 Preliminary contingency factors for the cloud management framework
Our conceptual framework, despite being well-received by our interviewees, is contingent on salient factors of the client–provider relationship. While this theoretical lens has been adopted to discuss the locus of decision rights for SaaS cloud services (Winkler et al. 2011), to the best of our knowledge, research lacks a thorough understanding of cloud-specific management processes and their underlying contingencies.
Contingencies are moderating variables or influences that have a bearing on other variables (Glaser 1992; Sambamurthy and Zmud 1999). A better fit among contingency factors and their consideration in management choices might improve organizational performance (Weill and Olson 1989). Therefore, we decided to describe those insights in a preliminary contingency model that influences and moderates the cloud management framework. Sambamurthy and Zmud (1999) distinguish three types of contingencies according to the contingency factors’ influence on the outcome. With reinforcing contingencies, all contingency factors induce the same outcome. Likewise, dominating contingencies create one result, but the result follows one primary contingency factor. In contrast, conflicting contingencies do not allow a predominant result to be derived, because the different contingency factors demand contrasting management choices.
During data analysis, we compared the interview findings across the different cases and identified three contingency factors that influence the processes’ reasonability and configuration in our cloud management framework. Thus, our ten cloud management processes describe general fields of action for organizations to successfully use cloud services. Specifically, the management actions are contingent on client–provider ratio, specificity, and service delivery models. In the following, we elucidate these three contingency factors and potential adjustments of the cloud management processes as adequate responses to the contingency factors. Thereby, we explicate our preliminary findings regarding contingencies with two exhibits that emerged during data analysis.
5.1 Client–provider ratio, specificity, and service delivery models
The first contingency factor, client–provider ratio, describes the client characteristics compared to CSP characteristics. Building on our analysis, this ratio comprises aspects like client size and prospective cloud service user base, client knowledge and experience, client cloud ecosystem, provider size, and provider focus on client needs (Schneider and Sunyaev 2014; Benlian 2009; Vithayathil 2018; Lacity et al. 2017). Thus, while size is the decisive factor in the client–provider ratio, we dive deeper into the relevant aspects mentioned by our interviewees.
Regarding client size, our interviewees especially noted differences in negotiation position and cloud management professionality. The interviewees associated larger organizations with more negotiation power and higher cloud management professionality compared to smaller client organizations. “We could not discuss classic topics such as contract negotiation with Microsoft, as we are too small for this. For example, we could not deviate from the process at all.”, Interviewee [VIIb]. In addition, case IX illustrates that not only client size influences the client–provider relationship, but also the prospective user base of the cloud service. While case IX is a rather small fintech (< 40 employees), providing cloud services to this fintech is also a door opener to cooperate with the bank behind it (< 750 employees, < 50 bn € balance sheet total). Larger clients are more likely to feature knowledge and experience for cloud services which constitutes a prerequisite to face the provider at eye level and to use cloud services to their full potential. “The basic prerequisite is the understanding and knowledge of limitations within cloud solutions”, Interviewee [IX]. However, client size is also linked to the clients’ cloud ecosystem, which comprises interdependencies across multiple cloud services in a multi-sourcing environment, as well as interfaces to internal IT infrastructure (Schlagwein et al. 2014; Winkler et al. 2014). Consequently, companies must decide whether to adapt their infrastructure and processes, ensure integration, or build workarounds. “Often, some other company builds the middleware even though of course that is a hurdle itself. Someone needs to build the middleware where different APIs must talk to each other […] So that is something that is often taking a whole lot of time to research if this actually works”, Interviewee [Xa].
In terms of provider size, larger CSPs have a reputation for delivering better service quality compared to smaller cloud providers, but at the same time, they are less flexible. “You always have the trade-off between ‘I will take something big with high quality and little flexibility and room for negotiation’ or ‘I will take something smaller with less know-how, but a more personal relationship with more interaction and flexibility’”, Interviewee [VIIb]. Finally, our interviews indicate that the provider's focus on client needs differs in terms of the nature of cooperation and level of interaction between the client and the cloud provider. While cloud services are usually self-explaining and easy to use, clients often require assistance to integrate services into their existing ecosystem and to facilitate the interplay with other cloud services. “In the service transition, a lot of consulting effort is necessary, which does not work with every CSP”, Interviewee [IV]. Thus, the client’s effort and success in overcoming such obstacles depends on the provider’s focus on client needs. “You can buy a license and get started. But it is very unlikely that this will fit your needs. All services must be configured”, Interviewee [VIIb].
The second contingency factor, specificity, represents the continuum between specialized cloud services and commodity cloud services. While specialized services address particular requirements of certain industries or application scenarios (Keller 2019), commodity services are universally usable in various application scenarios (Schneider and Sunyaev 2014). Thus, clients must carefully evaluate which kind of service fits their needs best and adapt the cloud management processes accordingly. Although specialized services may better meet clients’ requirements, they also require increased interaction in the client–provider relationship. “In theory, if you have a tool like Office 365, you just download it, pay for it, and then you are good to go. So not every SaaS company needs to do it like us, but some SaaS software like [ours] also requires a little bit more human touch. Our tool would not be as successful as it is right now without approaching client success how we are”, Interviewee [Xa]. Moreover, the contract negotiation stage and the associated interaction differ significantly between commodity and specialized cloud services. For standardized commodity cloud services, CSPs offer little to no room for negotiation. In contrast, specialized cloud services often concern the client’s core business or core processes and, therefore, require more negotiation and client–provider interaction. “If I require a credit card for provisioning, I won’t have much interaction with the provider”, Interviewee [VIIIa]. Furthermore, service specificity also affects termination management. When using a specialized service, the client needs to keep control of the stored sensitive data and define appropriate termination management measures from the beginning of the contract to avoid losing important data. Case X provides interesting insights into the attempt to standardize termination management even for specialized cloud services and to ensure a consistent and standardized approach. “So we always make sure that when a client leaves that this goes in good faith and in a good will from both sides in terms like we host their assets, we always give them back, we always make sure that the client gets a hard drive or server back with all the data they once gave us”, Interviewee [Xa].
The third contingency factor, service delivery model, depicts the differences between IaaS, PaaS, and SaaS cloud service provisioning (Mell and Grance 2011). The three abstracted service layers are umbrella terms that comprise various technological aspects and typically reflect the different levels of abstraction of the offered functionality and the provider’s service model (Sunyaev 2020). Regarding the management of the three service delivery models, SaaS has the highest complexity and IaaS has the lowest complexity (Iqbal et al. 2016), as our interviewees also acknowledge. “So, I think especially for SaaS, the topic becomes more complex generally speaking, but there you still have to shed light on all points and discuss them with the clients”, Interviewee [Vb]. At the same time, the clients’ responsibility decreases from IaaS to SaaS. “IaaS, I would translate it this way, we don't have to worry about the hardware, but we can virtualize as much as we want. That means we buy the environment, so the virtualization machine, the servers, the storages, the databases or whatever, someone runs it for us, but what we put on it we have to manage and operate ourselves”, Interviewee [IX]. Although our interviewees attributed SaaS with the highest complexity in steering the CSP, SaaS’ technical complexity is rather low compared to IaaS or PaaS. “With SaaS, I just want the program to work and the usage to be smooth. With IaaS and PaaS, I have very different aspects such as I need more memory, I need more capacity, I need this or that feature, how fast or slow the processor is at the moment, or is there a specific bug that can blow everything up? Depending on the kind of ‘as-a-Service’ there are complex monitoring requirements. I think that the intensity [between the service delivery models] differs”, Interviewee [VIIb].
5.2 Contingency factors’ potential implications for the cloud management framework
During data analysis of our expert interviews, we observed that the identified preliminary contingency factors have different implications for the presented cloud management framework (see Fig. 1) and the contingent characteristics may alter the cloud management processes. In this section, we draw on two contrasting cases from our interviews to illustrate potential adjustments required to ensure the process effectiveness of our cloud management framework, i.e., case VII and case X. While the two cases consider all three contingency factors, they focus on selected manifestations of the contingency factors. On one hand, case VII is a small research institute using standardized PaaS cloud services from large CSPs with little experience in CSP management. On the other hand, case X is a small CSP offering a very specialized cloud service to larger clients. By juxtaposing case VII and case X, we contribute to a better understanding of how companies may adapt the cloud management processes according to their specifics. Table 3 summarizes the contrasting case characteristics.
Naturally, the two contrasting case examples do not cover all potential combinations across the three contingency factors. Yet, by their fundamental differences, the two cases shed light on the tendencies for necessary adaptations that result from the contingency factors. Based on a synthesis of all our interviews, Table 4 summarizes the contingencies’ potential implications for the cloud management process for the two exemplary cases. We see this as a promising starting point for research to explore the contingency factors and their implications in more detail as well as for practice to use it as a preliminary guideline to find appropriate adjustments for the specific contingency factor manifestations in companies.
The two distinct cases illustrate the potential adaptations to the management processes to account for the contingency factors. As an emerging theme during interview analysis, the contingency factors and their implications require further substantiation. Still, these preliminary insights provided us with a better understanding of the complex reality of the client–provider relationship. As illustrated in Sect. 2, researchers and practitioners often discuss cloud services as highly standardized commodities such as storage or computing power (Buyya et al. 2009; Dhar 2012; Maurer et al. 2012). However, with the increasing adoption of cloud services, we observe a diversification of cloud offerings. An increasing number of specialized cloud services target particular business user groups and business needs (Hoefer and Karagiannis 2010).
Likewise, our two exemplary cases fundamentally differ in their general nature. On the one hand, case VII is less complex regarding the client’s requirements and can follow clear CSP prescriptions and procedures for service implementation and use. On the other hand, clients in case X benefit from closer and needs-oriented interactions with the CSP which allows for client-specific adaptations of the cloud service in the broader sense (e.g., through additional services during service and organizational transformation). Owing to the lower level of CSP interaction, we conclude that case VII requires more client responsibility to achieve a successful cloud service. Hence, case VII is an example of the overall cloud computing paradigm, combining cloud computing’s infrastructural characteristics (e.g., scalability and resource pooling) and business characteristics (e.g., on-demand self-service) (Mell and Grance 2011) with a standardized and low-touch CSP interaction. In contrast, case X comprises primarily cloud computing’s infrastructural characteristics, while client and CSP forge the business characteristics through a high-touch CSP interaction. Therefore, organizations must carefully assess their desired cloud service, consider the three contingency factors, their implications, and the client–provider relationship to adapt the cloud management processes accordingly.
6 Conclusion and discussion
In our research paper, we contribute to cloud governance, specifically to the context of CSP management. Here, we provide a framework that illustrates ten processes on the client side that cope with CSP management. Furthermore, the paper elucidates preliminary contingencies that describe the reality of client–provider interactions in the cloud service provisioning. The framework and the contingencies originate from an extensive literature review corroborated with insights from 12 interviews with 16 industry experts. Thereby, our paper provides a starting point for organizations to successfully manage CSPs.
6.1 Theoretical contribution
Our research contributes to the general discussion on cloud computing governance and cloud provider management. The study’s findings reveal that today, besides commodity cloud services, also highly specified, complex cloud services exist. Therefore, we provide a structured framework on how companies can manage their cloud providers and interactions with them. We propose ten management processes covering the entire cloud sourcing lifecycle, which deepen the understanding of cloud sourcing relationships and their successful management. Also, other sourcing and B2B relationships may involve comparable characteristics (e.g., pay-per-use, scalability, non-storability). Here, our presented cloud management framework and the comprised processes may provide important insights for comparable disciplines and can serve as a valuable starting point.
Besides the framework, we provide two additional theoretical contributions: first, we focused on clients in the business-to-business context. The existing literature predominantly considers the provider perspective (cf. Xiao and Hedman 2019), concentrates on specific service models (cf. Winkler et al. 2014), or focuses on single case observations (cf. Schlagwein et al. 2014). We analyzed existing literature and added insights from multiple cases, thus, creating a comprehensive basis for future theory building of the client–provider relationship for cloud services. Second, we unravel the complex reality of client–provider relationships through three contingency factors that we synthesized from our data. We explicate their potential implications for our ten management processes by juxtaposing two distinctive cases. Our results indicate that, in cloud computing environments, client–provider relationships are neither fish nor fowl and require in-depth case-specific research. Thereby, we provide insights into the dimensions that span in this context and extend previous, often one-dimensional or procedural literature.
6.2 Practical implications
From a practical point of view, the results of our work are especially important for companies planning to capitalize on cloud technology while still being rather inexperienced in cloud management. In particular, the CSP management framework, as well as the identified contingency factors, will help IT managers to access and use cloud technologies more successfully. Furthermore, we support potential clients with managerial implications on how to manage CSPs and offer initial insights into how clients need to adapt their cloud management processes based on the two very different client-CSP characteristics provided.
Also, from the perspective of a CSP, our framework helps to identify crucial points for cloud providers within the service delivery process. Based on our identified management processes within the CSP management framework, clients and their CSPs can solve potential problems before they occur. Hence, the quality of the service delivery process may increase, and client satisfaction may rise.
6.3 Limitations and future research
Our research is subject to limitations that foster future research. First, our qualitative-empirical research approach cannot claim for generalizability. However, the interviews allowed us to explore the complexity of the client–provider relationship and delineate three preliminary contingency factors. Second, the contingency factors only emerged during data analysis and we could not confront our interviewees with our conceptualization of the contingency factors. Thus, future work may further elaborate on the contingency factors to validate our findings and foster the understanding of their influence on the cloud management processes. Third, we did not consider potential interdependencies between the contingency factors. Judging by the different implications in our two distinct cases, we expect conflicting interdependencies among the contingency factors. Moreover, we also assume that there are interdependencies between the cloud management processes. Therefore, additional research on these interdependencies would be fruitful to better guide decisions on the cloud management processes. Fourth, the topic of cloud provider management is a dynamic field. New technologies and paradigms are emerging, whereby cloud services also change. A longitudinal approach would be helpful to take these dynamics into account and observe the entire cloud service lifecycle. Besides, the interview partners also pointed out that cloud services will often accompany an entire cloud ecosystem and multi-sourcing (Goldberg and Satzger 2016). Our research contribution focused on the relationship with a single CSP. Thus, the investigation of the entire cloud ecosystem seems to be a fruitful topic for future research. Fifth, our paper focused on the development of the cloud management framework, building on an extensive literature study and 12 expert interviews. The demonstration and evaluation (Hevner et al. 2004) of the final cloud management framework goes beyond the scope of this paper. Hence, future research could provide explicit guidance for its implementation and observe its implications in practice. Developing a maturity model depicting actionable measures for different degrees of CSP management professionalism in each management process could be a sensible next step in this direction. Despite its limitations, we believe that our research is a step towards unraveling client–provider relationships, which is useful for practitioners and researchers alike.
Accorsi, R., L. Lowis, and Y. Sato. 2011. Automated certification for compliant cloud-based business processes. Business and Information Systems Engineering 3 (3): 145–154. https://doi.org/10.1007/s12599-011-0155-7.
Aceto, G., A. Botta, W. Donato, and A. Pescapè. 2013. Cloud monitoring: A survey. Computer Networks 57 (9): 2093–2115. https://doi.org/10.1016/j.comnet.2013.04.001.
Ahmad, R., and L. Janczewski. 2011. Governance life cycle framework for managing security in public cloud: From user perspective. In 2011 IEEE 4th International Conference on Cloud Computing, 372–379.
Alhamad, M., T. Dillon, and E. Chang. 2010. Conceptual SLA framework for cloud computing. In 4th IEEE International Conference on Digital Ecosystems and Technologies, 606–610.
Ali, M., S.U. Khan, and A.V. Vasilakos. 2015. Security in cloud computing: Opportunities and challenges. Information Sciences 305: 357–383. https://doi.org/10.1016/j.ins.2015.01.025.
Aljabre, A. 2012. Cloud computing for increased business value. International Journal of Business and Social Science 3 (1): 234–239.
Alruwaili, F.F., and T.A. Gulliver. 2014. Safeguarding the cloud: An effective risk management framework for cloud computing services. International Journal of Computer Communications and Networks 4 (3): 6–16.
Anithakumari, S, and K. Chandrasekaran. 2015. Monitoring and management of service level agreements in cloud computing. In 2015 International Conference on Cloud and Autonomic Computing, 204–207.
Arias-Cabarcos, P., F. Almenárez, D. Díaz-Sánchez, and A. Marín. 2018. FRiCS: A framework for risk-driven cloud selection. In Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 18–26.
Armbrust, M., I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin. 2010. A view of cloud computing. Communications of the ACM 53 (4): 50–58. https://doi.org/10.1145/1721654.1721672.
Balaji, S., and S.A. Brown. 2005. Strategic is sourcing and dynamic capabilities: Bridging the gap. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 1–8.
Bannerman, P.L. 2010. Cloud computing adoption risks: State of play. In Asia Pacific Software Engineering Conference (APSEC 2010) Cloud Workshop, 1–7.
Barthelemy, J. 2001. The hidden costs of IT outsourcing: Lessons from 50 IT-outsourcing efforts show that unforeseen costs can undercut anticipated benefits. understanding the issues can lead to better outsourcing decisions. MIT Sloan Management Review 42 (3): 60–69.
Benlian, A. 2009. A transaction cost theoretical analysis of softwareas-a-service (SAAS)-based sourcing in SMBs and enterprises. In Proceedings of the European Conference on Information Systems, 25–36.
Bettis, R.A., A. Gambardella, C. Helfat, and W. Mitchell. 2015. Qualitative empirical research in strategic management. Strategic Management Journal 36 (5): 637–639. https://doi.org/10.1002/smj.2317.
Böhm, M., S. Leimeister, C. Riedl, and H. Krcmar. 2011. Cloud computing outsourcing 2.0 cloud computing—Outsourcing 2.0 or a new business model for IT provisioning? In Application management: Challenges—service creation—strategies, ed. M. Böhm, S. Leimeister, C. Riedl, and H. Krcmar, 33–53. Wiesbaden: Gabler Verlag.
Bond, J. 2015. The enterprise cloud. Sebastopol: O’Reilly Media.
Branco, T., and H. Santos. 2016. What is missing for trust in the cloud computing? In Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, 27–28.
Breiter, G., and M. Behrendt. 2009. Life cycle and characteristics of services in the world of cloud computing. IBM Journal of Research and Development 53 (4): 31–38. https://doi.org/10.1147/JRD.2009.5429057.
Brumec, S., and N. Vrček. 2013. Cost effectiveness of commercial computing clouds. Information Systems 38 (4): 495–508. https://doi.org/10.1016/j.is.2012.11.002.
Buchowicz, B.S. 1991. A process model of make-vs.-buy decision-making. The case of manufacturing software. IEEE Transactions on Engineering Management 38 (1): 24–32. https://doi.org/10.1109/17.65757.
Buyya, R., C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25 (6): 599–616. https://doi.org/10.1016/j.future.2008.12.001.
Califf, C.B., S. Sarker, S. Sarker, and M. Skilton. 2016. The role and value of a cloud service partner. MIS Quarterly Executive 15 (3): 231–242.
Calloway, T.J. 2012. Cloud computing, clickwrap agreements, and limitation on liability clauses: A perfect storm? Duke Law and Technology Review 11 (1): 163–174.
Chaput, S.R., and K. Ringwood. 2010. Cloud compliance: A framework for using cloud computing in a regulated world. In Cloud computing—Principles, systems and applications, ed. Nick Antonopoulos and Lee Gillam, 241–255. London: Springer-Verlag London.
Chen, Y., B. Khoussainov, and X. Ye. 2013. A game theoretic approach to service discovery and selection. In 2013 IEEE International Conference on Systems, Man, and Cybernetics, 4072–4079.
Chou, D.C. 2015. Cloud computing: A value creation model. Computer Standards and Interfaces 38: 72–77. https://doi.org/10.1016/j.csi.2014.10.001.
Chou, D.C., and A.Y. Chou. 2009. Information Systems Outsourcing Life Cycle and Risks Analysis. Computer Standards & Interfaces 31 (5): 1036–1043.
Cleary, S., and C. McLarney. 2019. Organizational benefits of an effective vendor management strategy. IUP Journal of Supply Chain Management 16 (4): 50–67.
COBIT. 2014. Vendor management using COBIT 5. Rolling Meadows: ISACA.
Cohen, M.A. 2012. Product performance based business models: A service based perspective. In 2012 45th Hawaii International Conference on System Sciences, 4814–4819.
Demchenko, Y., M.X. Makkes, R. Strijkers, C. Ngo, and C.D. Laat. 2013. Intercloud architecture framework for heterogeneous multi-provider cloud based infrastructure services provisioning. International Journal of Next-Generation Computing 4 (2): 109–127.
Dhar, S. 2012. From outsourcing to cloud computing: evolution of IT services. Management Research Review 35 (8): 664–675. https://doi.org/10.1108/01409171211247677.
Dibbern, J., T. Goles, R. Hirschheim, and B. Jayatilaka. 2004. Information systems outsourcing. ACM SIGMIS Database 35 (4): 6–102. https://doi.org/10.1145/1035233.1035236.
Dowell, S., A. Barreto, J.B. Michael, and M. Shing. 2011. Cloud to cloud interoperability. In 2011 6th International Conference on System of Systems Engineering, 258–263.
Etro, F. 2009. The economic impact of cloud computing on business creation, employment and output in Europe: An application of the endogenous market structures approach to a GPT innovation. Review of Business and Economics Literature 54 (2): 179–208.
Expert Group. 2014. Switching—Transfer and deletion of data after the end of the relationship, ed. Expert Group. In Meeting of the Commission Expert Group on Cloud Computing Contracts, 1–4.
Fahmideh, M., F. Daneshgar, F. Rabhi, and G. Beydoun. 2018. A generic cloud migration process model. European Journal of Information Systems 35 (6): 1–23. https://doi.org/10.1080/0960085X.2018.1524417.
Fan, C.K., C.M.F. Chiang, and T.L. Kao. 2012. Risk management strategies for the use of cloud computing. International Journal of Computer Network and Information Security 4 (12): 50–58. https://doi.org/10.5815/ijcnis.2012.12.05.
Fischbach, M., T. Puschmann, and R. Alt. 2013. Service-lifecycle-management. Wirtschaftsinformatik 55 (1): 51–55. https://doi.org/10.1007/s11576-012-0343-1.
Galvagno, M., and D. Dalli. 2014. Theory of value co-creation: a systematic literature review. Managing Service Quality An International Journal 24 (6): 643–683. https://doi.org/10.1108/MSQ-09-2013-0187.
Garrison, G., S. Kim, and R.L. Wakefield. 2012. Success factors for deploying cloud computing. Communications of the ACM 55 (9): 62–68. https://doi.org/10.1145/2330667.2330685.
Gilbert, F. 2010. Cloud service contracts may be fluffy: Selected legal issues to consider before taking off. Journal of Internet Law 14 (4): 17–30.
Glaser, B.G. 1992. Basics of grounded theory analysis: Emergence vs forcing, 2nd ed. Mill Valley, Calif.: Sociology Press.
Gold, S. 2015. Key considerations in incentivizing performance in cloud and outsourcing contracts. The Licensing Journal 35 (8): 4–6.
Goldberg, M., and G. Satzger. 2016. Towards multi-sourcing maturity: A service integration capability model. In Thirty-Seventh International Conference on Information Systems (ICIS 2016), 2016.
Goldkuhl, G. 2012. Pragmatism vs interpretivism in qualitative information systems research. European Journal of Information Systems 21 (2): 135–146. https://doi.org/10.1057/ejis.2011.54.
Gong, C., J. Liu, Q. Zhang, H. Chen, and Z. Gong. 2010. The characteristics of cloud computing. In 2010 International Conference on Parallel Processing Workshops, 275–279.
Govindarajan, A., and Lakshmanan. 2010. Overview of cloud standards. In Cloud computing: Principles, systems and applications, ed. Nick Antonopoulos and Lee Gillam, 77–89. London: Springer.
Goyal, P. 2010. Enterprise usability of cloud computing environments: Issues and challenges. In 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 54–59.
Grati, R, K. Boukadi, and H. Ben-Abdallah. 2015. SaaS cloud provider management framework. In Proceedings of the 12th International Joint Conference on e-Business and Telecommunications (ICETE), 221–228.
Greenwell, R., X. Liu, and K. Chalmers. 2014. Benefits management of cloud computing investments. International Journal of Advanced Computer Science and Applications 5 (7): 1–9. https://doi.org/10.14569/IJACSA.2014.050701.
Gupta, U.G., and A. Gupta. 1992. Outsourcing is the function. Information Systems Management 9 (3): 44–47. https://doi.org/10.1080/10580539208906881.
Habib, S.M., S. Ries, and M. Muhlhauser. 2011. Towards a trust management system for cloud computing. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 933–939.
Hallikas, J., V.-M. Virolainen, and M. Tuominen. 2002. Understanding risk and uncertainty in supplier networks—A transaction cost approach. International Journal of Production Research 40 (15): 3519–3531. https://doi.org/10.1080/00207540210146512.
Heckman, R. 1999. Organizing and managing supplier relationships in information technology procurement. International Journal of Information Management 19 (2): 141–155. https://doi.org/10.1016/S0268-4012(99)00005-5.
Hevner, A.R., S.T. March, and J. Park. 2004. Design science in information systems research. MIS Quarterly 28 (1): 75–105.
Hoefer, C.N., and G. Karagiannis. 2010. Taxonomy of cloud computing services. In 2010 IEEE Globecom Workshops, 1345–1350.
Hon, W.K., C. Millard, and I. Walden. 2012. Negotiating cloud contracts: Looking at clouds from both sides now. Stanford Technology Law Review 16 (1): 79–129.
Huang, D., X. Zhang, M. Kang, and J. Luo. 2010. MobiCloud: Building secure cloud framework for mobile computing and communication. In 2010 Fifth International Symposium on Service Oriented System Engineering (SOSE), 27–34.
Huntgeburth, J. 2015. Developing and evaluating a cloud service relationship theory. Heidelberg: Springer.
Hussain, W., F.K. Hussain, O.K. Hussain, E. Damiani, and E. Chang. 2017. Formulating and managing viable SLAs in cloud computing from a small to medium service provider’s viewpoint: A state-of-the-art review. Information Systems 71: 240–259. https://doi.org/10.1016/j.is.2017.08.007.
Information Technology Service Forum. 2012. ITIL foundation, 3rd ed. Belfast: Handbook.
Iqbal, S., M.L.M. Kiah, N.B. Anuar, B. Daghighi, A.W.A. Wahab, and S. Khan. 2016. Service delivery models of cloud computing: Security issues and open challenges. Security and Communication Networks 9 (17): 4726–4750. https://doi.org/10.1002/sec.1585.
Jansen, W. 2011. Cloud hooks: Security and privacy issues in cloud computing. In 44th Hawaii International Conference on System Sciences (HICSS 2011), 1–10.
Jansen, W., and T. Grance. 2011. Guidelines on security and privacy in public cloud computing. Gaithersburg: National Institute of Standards and Technology.
Jede, A., and F. Teuteberg. 2015. Managing the cloud procurement process—Findings from a case study. International Journal of Computer, Electrical, Automation, Control and Information Engineering 9 (2): 378–388.
Jeon, H.G., Y.G. Min, and K.K. Seo. 2014. A framework of performance measurement of cloud service infrastructure system for service delivery. Advanced Science and Technology Letters 46: 142–145. https://doi.org/10.14257/astl.2014.46.32.
Joha, A., and M. Janssen. 2012. Transformation to cloud services sourcing: Required IT governance capabilities. ICST Transactions on e-Business 12 (7–9): 1–12.
Kamprath, N., and M. Röglinger. 2010. Operational and work systems-related success factors for customer relationship management in "Product Sales" and "Solution Sales"—a descriptive case study. In Proceedings of the European Conference on Information Systems, 1–17.
Kandpal, D. 2013. Role of service brokers in cloud computing. In Cloud computing: Methods and practical approaches, ed. Zaigham Mahmood, 87–105. New York: Springer.
Kaufman, L.M. 2009. Data security in the world of cloud computing. IEEE Security and Privacy Magazine 7 (4): 61–64. https://doi.org/10.1109/MSP.2009.87.
Keller, R. 2016. Analyse von Risikomanagementstrategien in Cloudnetzwerken—Was tun bei verknüpften, voneinander abhängigen cloud services? HMD Praxis der Wirtschaftsinformatik 53 (5): 674–687. https://doi.org/10.1365/s40702-016-0252-7.
Keller, R. 2019. Cloud networks as platform-based ecosystems: Detecting management implications for actors in cloud networks. Bayreuth: University of Bayreuth.
Keller, R., and C. König. 2014. A Reference model to support risk identification in cloud networks. In Proceedings for the Thirty-Fifth International Conference on Information Systems, 1–19.
Keller, R., L. Häfner, T. Sachs, and G. Fridgen. 2019. Scheduling flexible demand in cloud computing spot markets. Business and Information Systems Engineering 26 (4): 477. https://doi.org/10.1007/s12599-019-00592-5.
Kern, T., and L. Willcocks. 2000. Exploring information technology outsourcing relationships: Theory and practice. The Journal of Strategic Information Systems 9 (4): 321–350. https://doi.org/10.1016/S0963-8687(00)00048-2.
Kerr, J., and K. Teng. 2012. Cloud computing: Legal and privacy issues. Journal of Legal Issues and Cases in Business 1: 1–11.
Kerschbaum, F. 2011. Secure and sustainable benchmarking in clouds. Business and Information Systems Engineering 3 (3): 135–143. https://doi.org/10.1007/s12599-011-0153-9.
Khan, K.M., and Q. Malluhi. 2010. Establishing trust in cloud computing. IT Professional 12 (5): 20–27. https://doi.org/10.1109/MITP.2010.128.
Kirkham, T., D. Armstrong, K. Djemame, M. Corrales, M. Kiran, I. Nwankwo, M. Jiang, and N. Forgó. 2016. Assuring data privacy in cloud transformations. In 2016 IEEE Trustcom/BigDataSE/ISPA, 1063–1069.
Ko, R.K.L., P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B.S. Lee. 2011. TrustCloud: A framework for accountability and trust in cloud computing. In 2011 IEEE World Congress on Services, 584–588.
Kyriazis, D. 2012. Modeling the interactions between cloud service providers. In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 609–6013.
Lacity, M., and R. Hirschheim. 1995. Information systems outsourcing: Myths, metaphors and realities, vol. 1. Chichester: Wiley.
Lacity, M., and P. Reynolds. 2014. Cloud services practices for small and medium-sized enterprises. MIS Quarterly Executive 13 (1): 31–44.
Lacity, M., and L. Willcocks. 2003. IT sourcing reflections. Wirtschaftsinformatik 45 (2): 115–125. https://doi.org/10.1007/BF03250888.
Lacity, M., S.A. Khan, and A. Yan. 2017. Review of the empirical business services sourcing literature: An update and future directions. In Outsourcing and offshoring business services, ed. Leslie P. Willcocks, Mary C. Lacity, and Chris Sauer, 499–651. Cham: Springer International Publishing.
Lambert, D.M. 2009. Customer relationship management as a business process. Journal of Business and Industrial Marketing 25 (1): 4–17. https://doi.org/10.1108/08858621011009119.
Lambert, D.M., and M.A. Schwieterman. 2012. Supplier relationship management as a macro business process. Supply Chain Management: An International Journal 17 (3): 337–352. https://doi.org/10.1108/13598541211227153.
Lee, J.-N., M.Q. Huynh, R.C.-W. Kwok, and S.-M. Pi. 2003. IT outsourcing evolution—Past, present, and future. Communications of the ACM 46 (5): 84–89. https://doi.org/10.1145/769800.769807.
Li, W., P. Svard, J. Tordsson, and E. Elmroth. 2012. A general approach to service deployment in cloud environments. In 2012 International Conference on Cloud and Green Computing, 17–24.
Lin, J., M.R. Lee, T. Chang, and S. Yang. 2014. A cloud deployment approach for consumer support systems. In 2014 18th Pacific Asia Conference on Information Systems (PACIS), 1–12.
Liu, S., F.T.S. Chan, and W. Ran. 2016. Decision making for the selection of cloud vendor: An improved approach under group decision-making with integrated weights and objective/subjective attributes. Expert Systems with Applications 55: 37–47. https://doi.org/10.1016/j.eswa.2016.01.059.
Loebbecke, C., B. Thomas, and T. Ullrich. 2012. Assessing cloud readiness at continental AG. MIS Quarterly Executive 11 (1): 11–23.
Longo, A., M.A. Bochicchio, and B. Livieri. 2013. Does service composition suffice to define business contracts for IT services in networked organizations. In Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 195–202. Association for Computing Machinery. New York, NY, USA.
Loukis, E., and N. Kyriakou. 2018. Contractual and relational governance, ICT skills and organization adaptations, and cloud computing benefits. In 2018 51st Hawaii International Conference on System Sciences (HICSS).
Low, C., and Y. Chen. 2012. Criteria for the evaluation of a cloud-based hospital information system outsourcing provider. Journal of Medical Systems 36 (6): 3543–3553. https://doi.org/10.1007/s10916-012-9829-z.
Maarouf, A., A. Marzouk, and A. Haqiq. 2015. Practical modeling of the SLA life cycle in cloud computing. In 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), 52–58.
Macias, M., and J. Guitart. 2012. Client classification policies for SLA enforcement in shared cloud datacenters. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012), 156–163.
Mahamadu, A., L. Mahdjoubi, and C. Booth. 2013. Challenges to BIM-cloud integration: Implication of security issues on secure collaboration. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 209–214.
Malladi, S. and M.S. Krishnan. 2012. Cloud computing adoption and its implications for CIO strategic focus—An empirical analysis. In Proceedings of Thirty-Third International Conference on Information Systems, 1–19.
Marston, S., Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi. 2011. Cloud computing—The Business perspective. Decision Support Systems 51 (1): 176–189. https://doi.org/10.1016/j.dss.2010.12.006.
Martens, B., and F. Teuteberg. 2011. Towards a reference model for risk and compliance management of IT services in a cloud computing environment. In Application management: challenges—service creation—strategies, ed. M. Böhm, S. Leimeister, C. Riedl, and H. Krcmar, 137–159. Wiesbaden: Gabler Verlag.
Maurer, M., V.C. Emeakaroha, I. Brandic, and J. Altmann. 2012. Cost-benefit analysis of an SLA mapping approach for defining standardized cloud computing goods. Future Generation Computer Systems 28 (1): 39–47. https://doi.org/10.1016/j.future.2011.05.023.
Mayring, P. 2014. Qualitative content analysis: Theoretical foundation, basic procedures and software solution. Klagenfurt: Social Science Open Access Repository.
McFarlan, F.W., and R.L. Nolan. 1995. How to manage an IT outsourcing alliance. Sloan Management Review 36 (2): 9–23.
Mell, P., and T. Grance. 2011. NIST definition of cloud computing. Communications of the ACM, 53 (6), 50.
Mouratidis, H., S. Islam, C. Kalloniatis, and S. Gritzalis. 2013. A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86 (9): 2276–2293. https://doi.org/10.1016/j.jss.2013.03.011.
Myers, M.D., and M. Newman. 2007. The qualitative interview in IS research: Examining the craft. Information and Organization 17 (1): 2–26. https://doi.org/10.1016/j.infoandorg.2006.11.001.
Nair, S.K., S. Porwal, T. Dimitrakos, A.J. Ferrer, J. Tordsson, T. Sharif, C. Sheridan, M. Rajarajan, and A.U. Khan. 2010. Towards secure cloud bursting, brokerage and aggregation. In 2010 IEEE 8th European Conference on Web Services, 189–196.
Odun-Ayo, I., O. Ajayi, and N. Omoregbe. 2017. Cloud service level agreements—Issues and development. In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), 1–6.
Oliveira, A.C., P. Dora, M. Spohn, and K. Oliveira. 2015. From the dark net to the cloudy data—Cloud network governance guidelines. In 2015 34th International Conference of the Chilean Computer Science Society (SCCC), 1–8.
Opara-Martins, J., R. Sahandi, and F. Tian. 2014. Critical review of vendor lock-in and its impact on adoption of cloud computing. In 2014 International Conference on Information Society, 92–97.
Opara-Martins, J., R. Sahandi, and F. Tian. 2016. Critical analysis of vendor lock-in and its impact on cloud computing migration: A business perspective. Journal of Cloud Computing 5 (1): 493. https://doi.org/10.1186/s13677-016-0054-z.
Paquette, S., P.T. Jaeger, and S.C. Wilson. 2010. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27 (3): 245–253. https://doi.org/10.1016/j.giq.2010.01.002.
Paraiso, F., N. Haderer, P. Merle, R. Rouvoy, and L. Seinturier. 2012. A federated multi-cloud PaaS infrastructure. In 2012 IEEE 5th International Conference on Cloud Computing, 392–399.
Pearson, S., and A. Benameur. 2010. Privacy, security and trust issues arising from cloud computing. In 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science. Proceedings of the 2nd International Conference on Cloud Computing Technology and Science, 693–702.
Prasad, A., P. Green, and J. Heales. 2014. On governance structures for the cloud computing services and assessing their effectiveness. International Journal of Accounting Information Systems 15 (4): 335–356. https://doi.org/10.1016/j.accinf.2014.05.005.
Quinn, J.B., and F.G. Hilmer. 1994. Strategic outsourcing. Sloan Management Review 35 (4): 43–55.
Ramgovind, S., M.M. Eloff, and E. Smith. 2010. The management of security in cloud computing. In Proceedings to the 2010 Information Security for South Africa, 1–7.
Raza, M.R. and A. Varol. 2020. QoS parameters for viable SLA in cloud. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1–5.
Rehman, Z., O.K. Hussain, E. Chang, and T. Dillon. 2015. Decision-making framework for user-based inter-cloud service migration. Electronic Commerce Research and Applications 14 (6): 523–531. https://doi.org/10.1016/j.elerap.2015.08.002.
Repschlaeger, J., R. Zarnekow, S. Wind, and K. Turowski. 2012. Cloud requirements framework: Requirements and evaluation criteria to adopt cloud solutions. In Proceedings of the Twentieth European Conference on Information Systems, 1–13.
Ristov, S., M. Gushev, M. Kostoska, and K. Kiroski. 2011. Business continuity challenges in cloud computing. In ICT Innovations 2011, Web Proceedings.
Ruan, A., M. Wei, A. Martin, D. Blundell, and D. Wallom. 2016. Breaking down the monarchy: Achieving trustworthy and open cloud ecosystem governance with separation-of-powers. In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 505–512.
Ruzzier, J., A.S. Sohal, P. Katna, and S. Zyngier. 2008. Success and failure in IT outsourcing by government agencies: Two Australian case studies. International Journal of Business Information Systems 3 (2): 107–119. https://doi.org/10.1504/IJBIS.2008.016581.
Sagar, M., S. Bora, A. Gangwal, P. Gupta, A. Kumar, and A. Agarwal. 2013. Factors affecting customer loyalty in cloud computing: A customer defection-centric view to develop a void-in-customer loyalty amplification model. Global Journal of Flexible Systems Management 14 (3): 143–156. https://doi.org/10.1007/s40171-013-0035-8.
Sambamurthy, V., and R.W. Zmud. 1999. Arrangements for information technology governance: A theory of multiple contingencies. MIS Quarterly 23 (2): 261. https://doi.org/10.2307/249754.
Sarkar, S., R. Ganesan, M. Srivastava, and S. Dharmasankar. 2012. Cloud based next generation service and key challenges. In 2012 Third International Conference on Services in Emerging Markets, 20–29.
Schlagwein, D., and A. Thorogood. 2014. Married for life? A cloud computing client–provider relationship continuance model. In Proceedings of the Twenty-Second European Conference on Information Systems, 2014.
Schlagwein, D., A. Thorogood, and L. Willcocks. 2014. How commonwealth bank of Australia gained benefits using a standards-based multi-provider cloud model. MIS Quarterly Executive 13 (4): 209–222.
Schneider, S., and A. Sunyaev. 2014. Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology 31 (1): 1–31. https://doi.org/10.1057/jit.2014.25.
Schneider, S., and A. Sunyaev. 2015. CloudLive: A life cycle framework for cloud services. Electronic Markets 25 (4): 299–311. https://doi.org/10.1007/s12525-015-0205-y.
Schultze, U., and M. Avital. 2011. Designing interviews to generate rich data for information systems research. Information and Organization 21 (1): 1–16. https://doi.org/10.1016/j.infoandorg.2010.11.001.
Silic, M., and A. Back. 2014. Shadow IT—A view from behind the curtain. Computers and Security 45: 274–283. https://doi.org/10.1016/j.cose.2014.06.007.
Simmonds, D., R. Webb Collins, and D. Berndt. 2010. Coordinating the relationship between it services providers and clients: The case of cloud computing. Sprouts Working Papers on Information Systems.
Son, S., H.-H. Choi, B.T. Oh, S.W. Kim, and B.S. Kim. 2017. Cloud SLA relationships in multi-cloud environment: Models and practices. In Proceedings of the 8th International Conference on Computer Modeling and Simulation, 1–6.
Srinivasan, M.K., K. Sarukesi, P. Rodrigues, M.S. Manoj, and P. Revathy. 2012. State-of-the-art cloud computing security taxonomies. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 470–476.
Subashini, S., and V. Kavitha. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34 (1): 1–11. https://doi.org/10.1016/j.jnca.2010.07.006.
Le S., J. Singh, and O.K. Hussain. 2012. Service level agreement (SLA) assurance for cloud services: A survey from a transactional risk perspective. In Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia, 263–266.
Sunyaev, A. 2020. Cloud computing. In Internet computing, ed. Ali Sunyaev, 195–236. Cham: Springer International Publishing.
Tanimoto, S., M. Hiramoto, M. Iwashita, H. Sato, and A. Kanai. 2011. Risk management on the security problem in cloud computing. In 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, 147–152.
Thalmann, S., D. Bachlechner, L. Demetz, and R. Maier. 2012. Challenges in cross-organizational security management. In 2012 45th Hawaii International Conference on System Sciences (HICSS), 5480–5489.
Tordsson, J., R.S. Montero, R. Moreno-Vozmediano, and I.M. Llorente. 2012. Cloud brokering mechanisms for optimized placement of virtual machines across multiple providers. Future Generation Computer Systems 28 (2): 358–367. https://doi.org/10.1016/j.future.2011.07.003.
Trappler, T. 2010. If it's in the cloud, get it on paper: Cloud computing contract issues. Educause Quarterly 33(2).
Urbach, N., and T. Würz. 2012. How to steer the IT outsourcing provider—Development and validation of a reference framework of IT outsourcing steering processes. Business and Information Systems Engineering 4 (5): 247–259.
Vaquero, L.M., L. Rodero-Merino, and R. Buyya. 2011. Dynamically scaling applications in the cloud. SIGCOMM Computer Communication Review 41 (1): 45–52. https://doi.org/10.1145/1925861.1925869.
Venters, W., and E.A. Whitley. 2012. A critical review of cloud computing: Researching desires and realities. Journal of Information Technology 27 (3): 179–197. https://doi.org/10.1057/jit.2012.17.
Vithayathil, J. 2018. Will cloud computing make the Information Technology (IT) department obsolete? Information Systems Journal 28 (4): 634–649. https://doi.org/10.1111/isj.12151.
Vom Brocke, J., A. Simons, K. Reimer, B. Niehaves, R. Plattfaut, and A. Cleven. 2015. Standing on the Shoulders of Giants: Challenges and Recommendations of Literature Search in Information Systems Research. Communications of the Association for Information Systems 37 (1): 205–224. https://doi.org/10.17705/1CAIS.03709.
Wadhwa, V., and A.R. Ravindran. 2007. Vendor selection in outsourcing. Computers and Operations Research 34 (12): 3725–3737. https://doi.org/10.1016/j.cor.2006.01.009.
Wamuyu, P. 2017. Use of cloud computing services in micro and small enterprises: A fit perspective. International Journal of Information Systems and Project 5 (2): 59–81.
Wang, C., Q. Wang, K. Ren, and W. Lou. 2010. Privacy-preserving public auditing for data storage security in cloud computing. In IEEE Conference on Computer Communications, 1–9.
Wang, S., Z. Liu, Q. Sun, H. Zou, and F. Yang. 2014. Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing. Journal of Intelligent Manufacturing 25 (2): 283–291. https://doi.org/10.1007/s10845-012-0661-6.
Webster, J., and R.T. Watson. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly 26 (2): 13–23.
Weill, P., and M.H. Olson. 1989. An assessment of the contingency theory of management information systems. Journal of Management Information Systems 6 (1): 59–86. https://doi.org/10.1080/07421222.1989.11517849.
Weinhardt, C., A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk, and J. Stößer. 2009. Cloud computing—A classification, business models, and research directions. Business and Information Systems Engineering 1 (5): 391–399. https://doi.org/10.1007/s12599-009-0071-2.
Wiedemann, A., and M. Wiesche. 2018. Are you ready for devops? Required skill set for DevOps teams. In Proceedings of the Twenty-Sixth European Conference on Information Systems., 1–16.
Willcocks, L.P., and T. Kern. 1998. IT outsourcing as strategic partnering: The case of the UK Inland Revenue. European Journal of Information Systems 7 (1): 29–45. https://doi.org/10.1057/palgrave.ejis.3000284.
Willcocks, L.P., W. Venters, and E. Whitley. 2012. Cloud sourcing: Implications for managing the IT function. In 6th Global Sourcing Workshop 2012, eds. J. Kotlarsky, I. Oshri, and L.P. Willcocks, 142–163.
Winkler, T.J., C. Goebel, A. Benlian, F. Bidault, and O. Guenther. 2011. The impact of software as a service on IS Authority—A contingency perspective. In Proceedings of the Thirty-Second International Conference on Information Systems, 1–17.
Winkler, T.J., A. Benlian, M. Piper, and H. Hirsch. 2014. Bayer healthcare delivers a dose of reality for cloud payoff mantras in multinationals. MIS Quarterly Executive 13 (4): 193–208.
Xiao, X., and J. Hedman. 2019. How a software vendor weathered the Stormy journey to the cloud. MIS Quarterly Executive 18 (1): 37–50.
Zappatore, M., A. Longo, and M. A. Bochicchio. 2015. SLA composition in service networks: A tool for representing relationships between SLAs and contracts. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1219–1224.
Zardari, S. and R. Bahsoon. 2011. Cloud adoption: A goal-oriented requirements engineering approach. In Proceedings of the 2nd International Workshop on Software Engineering for Cloud Computing, 29–35.
Zhang, X., N. Wuwong, H. Li, and X. Zhang. 2010. Information security risk management framework for the cloud computing environments. In 2010 IEEE 10th International Conference on Computer and Information Technology, 1328–1334.
Zhong, F., and M.D. Myers. 2016. Client–vendor relationships in cloud computing: Lessons from IT outsourcing. In 2016 20th Pacific Asia Conference on Information Systems (PACIS), 1–12.
This research was (in part) carried out in the context of the Project Group Business and Information Systems Engineering of the Fraunhofer Institute for Applied Information Technology FIT.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix 1: Literature review concept matrix
Appendix 2: Initial cloud management framework
About this article
Cite this article
Oesterle, S., Jöhnk, J., Keller, R. et al. A contingency lens on cloud provider management processes. Bus Res 13, 1451–1489 (2020). https://doi.org/10.1007/s40685-020-00128-8