Determining factors influencing cloud services adoption in India

  • Garima Rastogi DIT University
  • Hemraj Verma DIT University
  • Rama Sushil DIT University


This study identifies the factors influencing cloud services adoption in India using Unified Theory of Acceptance and Use of Technology (UTAUT) model. Role of perceived risk as a moderator in adoption of cloud services, too, has been examined along with other moderators such as gender, age, experience and voluntariness of use as stated in UTAUT model. Following a descriptive research design, a survey was conducted and a structured questionnaire was administered randomly to a sample of 379 respondents in Dehradun region. Most of the relationships confirmed to UTAUT model. Performance expectancy and effort expectancy emerged as the two most significant factors influencing cloud services adoption. Perceived risk, too, played a significant moderating role in adoption of cloud services. Cloud based services are relatively new to consumers in India. The benefits of these cloud technology can only be reaped fully if more and more customers adopt it. Also, various types of risks, such as financial loss, data loss, privacy etc., are associated with using cloud services. Therefore, this study may have immediate implications for cloud service providers.

Author Biography

Garima Rastogi, DIT University
Research Scholar, Computer Science and Engineering Department


Ajzen, I., & Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ.

Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50 (2), 179-211.

Alharbi, S.T. (2014). Trust and Acceptance of Cloud Computing: A Revised UTAUT Model. 2014 International Conference on Computational Science and Computational Intelligence, 2, 131-134.

Bagozzi, R.P. (2007). The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift. Journal of the Association for Information Systems, 8(4), 244-254.

Bauer, R. A. (1960). Consumer behavior as risk taking. In R. S. Hancock (Ed.), Dynamic marketing for a changing world. Chicago: American Marketing Association, 389-398.

Bettman, J.R. (1973). Perceived Risk and Its Components: A Model and Empirical Test. Journal of Marketing Research, 10(2), 184-190.

Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving - Results from an empirical study. The Journal of High Technology Management Research, 25(2), 172-187.

Cao, Y., Bi, X., & Wang, L. (2013). A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. 2013 International Conference on Information Science and Cloud Computing Companion, 287-293.

Chang, S. S., Lou, S. J., Cheng, S. R., & Lin, C., L. (2015). Exploration of usage behavioral model construction for university library electronic resources. The Electronic Library, 33(2), 292-307.

Chonka, A., Xiang, Y., Zhou, W,. & Bonti, A. (2011). Cloud security defense to protect cloud computing against HTTP-DOS and XML-DOS attacks. Journal of Network and Computer Applications, 34(4), 1097-1107.

Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982-1003.

Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.

Dowling, G.R., & Staelin, R. (1994). A Model of Perceived Risk and Intended Risk-Handling Activity. Journal of Consumer Research, 21(1), 119-134.

Engel, J., Blackwell, R., & Miniard, P. (1986). Consumer Behavior, CBS College Publishing, New York.

Festinger, L. (1957). A Theory of Cognitive Dissonance. Stanford University Press, Stanford CA.

Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.

Germunden, H. G. (1985).Perceived Risk and Information Search: A systematic Meta-Analysis of Empirical Evidence. International Journal of Research in Marketing. 2, 79-100.

Gray, A. (2013). Conflict of laws and the cloud. Computer Law and Security Review, 29(1), 58-65.

Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management. 33(5), 861-874.

Hair, J.F., Jr., Anderson, R.E., Tatham, R. L., & Black, W. C. (2010). Multivariate Data Analysis. 7th Edition. Englewood Cliffs, NJ: Prentice-Hall International.

Karakas, F., & Manisaligil, A. (2012). Reorienting self-directed learning for the creative digital era. European Journal of Training and Development. 36(7), 712-731.

Lian, J.W. (2015). Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management, 35(1), 98-109.

Marchewka, J.T., Liu, C., & Kostiwa, K. (2007). An application of the UTAUT model for understanding student perceptions using course management software. Communications of the IIMA, 7(2), 93.

Marston, S., Li, Z., Bandyopadhyay, S., Chang, J., & Ghalsasi, A. (2011). Cloud computing – the business perspective. Decision Support Systems, 51(1), 176-189.

Min, Q., Ji, S., & Qu, G. (2008). Mobile commerce user acceptance study in China: a revised UTAUT model. Tsinghua Science & Technology, 13(3), 257-264.

Nunnally, J.C. (1978). Psychometric Theory-Vol 2, McGraw-Hill, New York, NY.

Langkau, T. F., Opitz, N., Schmidt, N. H., & Kolbe, L. M. (2012). Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments. 45th Hawaii International Conference on System Sciences(HICSS), Maui, Hawaii USA, 1593-1602.

Park, E., & Kim, K.J. (2014). An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Information Management, 34(1), 28-36.

Park, S.C., & Ryoo, S.Y. (2013). An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1), 160-170.

Rogers, E.M. (1995). Diffusion of Innovations, The Free Press, New York, NY.

San-Martín, H., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33(1), 341-350.

Shin, D.H. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30(2), 194-203.

Stein, S., Ware, J., Laboy, J., & Schaffer, H.E. (2013). Improving K-12 pedagogy via a cloud designed for education. International Journal of Information Management, 33(1), 235-241.

Stieninger, M., & Nedbal, D. (2014). Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors. 2014 47th Hawaii International Conference on System Sciences. Waikoloa, HI, USA USA, 3307-3316.

Taylor, C.W., & Hunsinger, D.S. (2011). A study of student use of cloud computing applications. Journal of Information Technology Management. 22(3), 36-50.

Taylor, S., & Todd, P. (1995). Assessing IT Usage: The Role of Prior Experience. MIS Quarterly, 19(4), 561.

Taylor, J.W. (1974). The Role of Risk in Consumer Behavior. Journal of Marketing, 38(2), 54-60.

Udo, G., Bagchi, K., & Maity, M. (2016). Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture. Journal of Business Ethics, 135(3), 517-541.

Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478.

Vouk, M.A. (2008). Cloud computing-issues, research and implementations. Journal of Computing and Information Technology. 16(4), 235-246.

Wu, P. F. (2009). Opening the black boxes of TAM : Towards a Mixed methods approach. International Conference on Information Systems. Paper 101. http://

Wu, W.W. (2011). Mining significant factors affecting the adoption of SaaS using the rough set approach. Journal of Systems and Software, 84(3), 435-441.

Zaltman, G. & Wallendorf, M. (1983). Consumer Behavior, Wiley, New York.

Original Scientific Paper