Iraqi’s Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study

  • Hala A. AlbaroodiEmail author
  • Mohammed Abomaali
  • Selvakumar Manickam
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1132)


Guided by Technology Acceptance Model (TAM) and the lack of research on Open Source Cloud Computing (OSCC) in the Iraqi’s setting, the current endeavor posits and tests a model. The model encapsulates a number of perception-based, an attitudinal and intentional variable. Though, the aforementioned model is argued to correspond to a number of questions, which in turn, portray a gap in the literature. Particularly, the paper investigates the role of perception of the ease of use, usefulness and risk influences on attitude toward and the intention to adopt OSCC in the Iraqi’s settings. In addition, it conceptualized and tested the mediating role of user’s attitude. To that effect, a questionnaire was designed and deployed to examine the factors influencing intention to use the new technology of open source cloud computing. The obtained data were subjected to a number of statistical analyses. Particularly, the goodness of measure was assessed through conducting internal consistency test and factor analysis. The former test uncovered that the utilized constructs are reliable. The later analysis suggested the presence of only three variables. Moreover, the interrelationships between the resulted constructs of the framework were tested using multiple and heretical regression. Findings of these analyses suggest that consumers’ perception of OSCC has a weak effect on their intention to use it. Consumers’ attitudes were found to maintain more potent impact on their intention to utilize the new technology. Moreover, consumers’ attitude was unveiled to mediate the relationship between perception of OSCC and the intention to use OSCC. The study was concluded with a brief summary, its implications, and suggestion for future researcher.


Open Source Cloud Computing (OSCC) Cronbach’s alpha Information communication technology (ICT) Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) 


  1. 1.
    Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: challenges and opportunities. In: International Conference on High Performance Computing & Simulation, HPCS 2009, pp. 1–11. IEEE (2009)Google Scholar
  2. 2.
    Breivold, H.P., Crnkovic, I.: Cloud computing education strategies. In: 2014 IEEE 27th Conference, Software Engineering Education and Training (CSEE&T), pp. 29–38. IEEE (2014)Google Scholar
  3. 3.
    Ma’ruf, J.J., Mohamad, O., Ramayah, T.: Intention to purchase via the Internet: a comparison of two theoretical models. Asian Acad. Manag. J. 10, 79–95 (2005)Google Scholar
  4. 4.
    Wu, S.I.: The relationship between consumer characteristics and attitude toward online shopping. Market. Intell. Plan. 21(1), 37–44 (2003)CrossRefGoogle Scholar
  5. 5.
    Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35(8), 982–1003 (1989)CrossRefGoogle Scholar
  6. 6.
    Shih, H.P.: An empirical study on predicting user acceptance of e-shopping on the Web. Inf. Manag. 41(3), 351–368 (2004)CrossRefGoogle Scholar
  7. 7.
    Luarn, P., Lin, H.H.: Toward an understanding of the behavioral intention to use mobile banking. Comput. Hum. Behav. 21(6), 873–891 (2005)CrossRefGoogle Scholar
  8. 8.
    Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13, 319–340 (1989)CrossRefGoogle Scholar
  9. 9.
    Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Quart. 27, 425–478 (2003)CrossRefGoogle Scholar
  10. 10.
    Zhang, N., Guo, X., Chen, G.: Extended information technology initial acceptance model and its empirical test. Syst. Eng. Theory Pract. 27(9), 123–130 (2007)CrossRefGoogle Scholar
  11. 11.
    Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46(2), 186–204 (2000)CrossRefGoogle Scholar
  12. 12.
    Polančič, G., Heričko, M., Rozman, I.: An empirical examination of application frameworks success based on technology acceptance model. J. Syst. Softw. 83(4), 574–584 (2010)CrossRefGoogle Scholar
  13. 13.
    Teo, T.S.H., Liu, J.: Consumer trust in e-commerce in the United States, Singapore and China. Omega 35(1), 22–38 (2007)CrossRefGoogle Scholar
  14. 14.
    Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, CLOUD 2009, pp. 109–116. IEEE (2009)Google Scholar
  15. 15.
    Tsai, C.L., Lin, U., Chang, A., Chen, C.J.: Information security issue of enterprises adopting the application of cloud computing. In: 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM), pp. 645–649. IEEE (2010)Google Scholar
  16. 16.
    Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing, NIST special publication 800-144. National Institute of Standards and Technology, Washington, DC (2011)Google Scholar
  17. 17.
    Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing, Technical report no. UCB/EECS-2009-28. University of California at Berkeley, Berkeley, CA (2009)Google Scholar
  18. 18.
    Britto, M.: An overview of Cloud computing in higher education. In: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, pp. 1062–1071. AACE (2011)Google Scholar
  19. 19.
    Pearson, S.: Taking account of privacy when designing cloud computing services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, CLOUD 2009, pp. 44–52. IEEE (2009)Google Scholar
  20. 20.
    Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted sata sharing over untrusted cloud storage providers. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 97–103. IEEE (2010)Google Scholar
  21. 21.
    Yang, J., Chen, Z.: Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–3. IEEE (2010)Google Scholar
  22. 22.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10. IEEE (2008)Google Scholar
  23. 23.
    Mukherjee, A., Nath, P.: A model of trust in online relationship banking. Int. J. Bank Market. 21(1), 5–15 (2003)CrossRefGoogle Scholar
  24. 24.
    Chiou, J.S.: The antecedents of consumers’ loyalty toward Internet service providers. Inf. Manag. 41(6), 685–695 (2004)CrossRefGoogle Scholar
  25. 25.
    Liu, R.: A restful architecture for service-oriented business process execution. In: 2008 IEEE International Conference on e-Business Engineering, pp. 197–204. IEEE (2008)Google Scholar
  26. 26.
    Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)CrossRefGoogle Scholar
  27. 27.
    Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16(3), 297–334 (1951)CrossRefGoogle Scholar
  28. 28.
    Sekaran, U.: Research Methods for Business: A Skill Building Approach, 4th edn. Wiley, New York (2003)Google Scholar
  29. 29.
    Leech, N.L., Barrett, K.C., Morgan, G.A.: SPSS for Intermediate Statistics: Use and Interpretation. Lawrence Erlbaum Associates, Mahwah (2005)Google Scholar
  30. 30.
    Hair, J.F., Bush, R.P., Ortinau, D.J.: Marketing Research within a Changing Information Environment. McGraw-Hill/Irwin, New York (2006)Google Scholar
  31. 31.
    Hair, J., Anderson, R., Tatham, R., Black, W.: Multivariate Data Analysis, 6th edn. Prentice Hall, Upper Saddle River (2006)Google Scholar
  32. 32.
    Hair, J.F., Anderson, R.E., Tatham, R.L., Black, W.C.: Multivariate Data Analysis. Prentice Hall, Upper Saddle River (1998)Google Scholar
  33. 33.
    Sposito, A.V., Hand, M.L., Skarpness, B.: On the efficiency of using the sample kurtosis in selecting optimal lpestimators. Commun. Stat.-Simul. Comput. 12(3), 265–272 (1983)CrossRefGoogle Scholar
  34. 34.
    Baron, R.M., Kenny, D.A.: The moderator–mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. 51(6), 1173–1182 (1986). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Hala A. Albaroodi
    • 1
    Email author
  • Mohammed Abomaali
    • 2
  • Selvakumar Manickam
    • 3
  1. 1.Gifted Education AuthorityMinistry of EducationBaghdadIraq
  2. 2.Department of Computer Technology EngineeringAlsafwa University CollegeKarbalaIraq
  3. 3.National Advanced IPv6 Centre (NAV6) Universiti Sains Malaysia, USMGelugorMalaysia

Personalised recommendations