Skip to main content

Iraqi’s Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1132))

Included in the following conference series:

Abstract

Guided by Technology Acceptance Model (TAM) and the lack of research on Open Source Cloud Computing (OSCC) in the Iraqi’s setting, the current endeavor posits and tests a model. The model encapsulates a number of perception-based, an attitudinal and intentional variable. Though, the aforementioned model is argued to correspond to a number of questions, which in turn, portray a gap in the literature. Particularly, the paper investigates the role of perception of the ease of use, usefulness and risk influences on attitude toward and the intention to adopt OSCC in the Iraqi’s settings. In addition, it conceptualized and tested the mediating role of user’s attitude. To that effect, a questionnaire was designed and deployed to examine the factors influencing intention to use the new technology of open source cloud computing. The obtained data were subjected to a number of statistical analyses. Particularly, the goodness of measure was assessed through conducting internal consistency test and factor analysis. The former test uncovered that the utilized constructs are reliable. The later analysis suggested the presence of only three variables. Moreover, the interrelationships between the resulted constructs of the framework were tested using multiple and heretical regression. Findings of these analyses suggest that consumers’ perception of OSCC has a weak effect on their intention to use it. Consumers’ attitudes were found to maintain more potent impact on their intention to utilize the new technology. Moreover, consumers’ attitude was unveiled to mediate the relationship between perception of OSCC and the intention to use OSCC. The study was concluded with a brief summary, its implications, and suggestion for future researcher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: challenges and opportunities. In: International Conference on High Performance Computing & Simulation, HPCS 2009, pp. 1–11. IEEE (2009)

    Google Scholar 

  2. Breivold, H.P., Crnkovic, I.: Cloud computing education strategies. In: 2014 IEEE 27th Conference, Software Engineering Education and Training (CSEE&T), pp. 29–38. IEEE (2014)

    Google Scholar 

  3. Ma’ruf, J.J., Mohamad, O., Ramayah, T.: Intention to purchase via the Internet: a comparison of two theoretical models. Asian Acad. Manag. J. 10, 79–95 (2005)

    Google Scholar 

  4. Wu, S.I.: The relationship between consumer characteristics and attitude toward online shopping. Market. Intell. Plan. 21(1), 37–44 (2003)

    Article  Google Scholar 

  5. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35(8), 982–1003 (1989)

    Article  Google Scholar 

  6. Shih, H.P.: An empirical study on predicting user acceptance of e-shopping on the Web. Inf. Manag. 41(3), 351–368 (2004)

    Article  Google Scholar 

  7. Luarn, P., Lin, H.H.: Toward an understanding of the behavioral intention to use mobile banking. Comput. Hum. Behav. 21(6), 873–891 (2005)

    Article  Google Scholar 

  8. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13, 319–340 (1989)

    Article  Google Scholar 

  9. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Quart. 27, 425–478 (2003)

    Article  Google Scholar 

  10. Zhang, N., Guo, X., Chen, G.: Extended information technology initial acceptance model and its empirical test. Syst. Eng. Theory Pract. 27(9), 123–130 (2007)

    Article  Google Scholar 

  11. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46(2), 186–204 (2000)

    Article  Google Scholar 

  12. Polančič, G., Heričko, M., Rozman, I.: An empirical examination of application frameworks success based on technology acceptance model. J. Syst. Softw. 83(4), 574–584 (2010)

    Article  Google Scholar 

  13. Teo, T.S.H., Liu, J.: Consumer trust in e-commerce in the United States, Singapore and China. Omega 35(1), 22–38 (2007)

    Article  Google Scholar 

  14. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, CLOUD 2009, pp. 109–116. IEEE (2009)

    Google Scholar 

  15. Tsai, C.L., Lin, U., Chang, A., Chen, C.J.: Information security issue of enterprises adopting the application of cloud computing. In: 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM), pp. 645–649. IEEE (2010)

    Google Scholar 

  16. Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing, NIST special publication 800-144. National Institute of Standards and Technology, Washington, DC (2011)

    Google Scholar 

  17. Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing, Technical report no. UCB/EECS-2009-28. University of California at Berkeley, Berkeley, CA (2009)

    Google Scholar 

  18. Britto, M.: An overview of Cloud computing in higher education. In: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, pp. 1062–1071. AACE (2011)

    Google Scholar 

  19. Pearson, S.: Taking account of privacy when designing cloud computing services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, CLOUD 2009, pp. 44–52. IEEE (2009)

    Google Scholar 

  20. Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted sata sharing over untrusted cloud storage providers. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 97–103. IEEE (2010)

    Google Scholar 

  21. Yang, J., Chen, Z.: Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–3. IEEE (2010)

    Google Scholar 

  22. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10. IEEE (2008)

    Google Scholar 

  23. Mukherjee, A., Nath, P.: A model of trust in online relationship banking. Int. J. Bank Market. 21(1), 5–15 (2003)

    Article  Google Scholar 

  24. Chiou, J.S.: The antecedents of consumers’ loyalty toward Internet service providers. Inf. Manag. 41(6), 685–695 (2004)

    Article  Google Scholar 

  25. Liu, R.: A restful architecture for service-oriented business process execution. In: 2008 IEEE International Conference on e-Business Engineering, pp. 197–204. IEEE (2008)

    Google Scholar 

  26. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  27. Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16(3), 297–334 (1951)

    Article  Google Scholar 

  28. Sekaran, U.: Research Methods for Business: A Skill Building Approach, 4th edn. Wiley, New York (2003)

    Google Scholar 

  29. Leech, N.L., Barrett, K.C., Morgan, G.A.: SPSS for Intermediate Statistics: Use and Interpretation. Lawrence Erlbaum Associates, Mahwah (2005)

    Google Scholar 

  30. Hair, J.F., Bush, R.P., Ortinau, D.J.: Marketing Research within a Changing Information Environment. McGraw-Hill/Irwin, New York (2006)

    Google Scholar 

  31. Hair, J., Anderson, R., Tatham, R., Black, W.: Multivariate Data Analysis, 6th edn. Prentice Hall, Upper Saddle River (2006)

    Google Scholar 

  32. Hair, J.F., Anderson, R.E., Tatham, R.L., Black, W.C.: Multivariate Data Analysis. Prentice Hall, Upper Saddle River (1998)

    Google Scholar 

  33. Sposito, A.V., Hand, M.L., Skarpness, B.: On the efficiency of using the sample kurtosis in selecting optimal lpestimators. Commun. Stat.-Simul. Comput. 12(3), 265–272 (1983)

    Article  Google Scholar 

  34. Baron, R.M., Kenny, D.A.: The moderator–mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. 51(6), 1173–1182 (1986). https://doi.org/10.1037/0022-3514.51.6.1173

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hala A. Albaroodi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Albaroodi, H.A., Abomaali, M., Manickam, S. (2020). Iraqi’s Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. https://doi.org/10.1007/978-981-15-2693-0_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2693-0_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2692-3

  • Online ISBN: 978-981-15-2693-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics