Determining factors influencing cloud services adoption in India
Abstract
This study identifies the factors influencing cloud services adoption in India using Unified Theory of Acceptance and Use of Technology (UTAUT) model. Role of perceived risk as a moderator in adoption of cloud services, too, has been examined along with other moderators such as gender, age, experience and voluntariness of use as stated in UTAUT model. Following a descriptive research design, a survey was conducted and a structured questionnaire was administered randomly to a sample of 379 respondents in Dehradun region. Most of the relationships confirmed to UTAUT model. Performance expectancy and effort expectancy emerged as the two most significant factors influencing cloud services adoption. Perceived risk, too, played a significant moderating role in adoption of cloud services. Cloud based services are relatively new to consumers in India. The benefits of these cloud technology can only be reaped fully if more and more customers adopt it. Also, various types of risks, such as financial loss, data loss, privacy etc., are associated with using cloud services. Therefore, this study may have immediate implications for cloud service providers.
References
Ajzen, I., & Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ.
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50 (2), 179-211.
Alharbi, S.T. (2014). Trust and Acceptance of Cloud Computing: A Revised UTAUT Model. 2014 International Conference on Computational Science and Computational Intelligence, 2, 131-134.
Bagozzi, R.P. (2007). The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift. Journal of the Association for Information Systems, 8(4), 244-254.
Bauer, R. A. (1960). Consumer behavior as risk taking. In R. S. Hancock (Ed.), Dynamic marketing for a changing world. Chicago: American Marketing Association, 389-398.
Bettman, J.R. (1973). Perceived Risk and Its Components: A Model and Empirical Test. Journal of Marketing Research, 10(2), 184-190.
Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving - Results from an empirical study. The Journal of High Technology Management Research, 25(2), 172-187.
Cao, Y., Bi, X., & Wang, L. (2013). A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. 2013 International Conference on Information Science and Cloud Computing Companion, 287-293.
Chang, S. S., Lou, S. J., Cheng, S. R., & Lin, C., L. (2015). Exploration of usage behavioral model construction for university library electronic resources. The Electronic Library, 33(2), 292-307.
Chonka, A., Xiang, Y., Zhou, W,. & Bonti, A. (2011). Cloud security defense to protect cloud computing against HTTP-DOS and XML-DOS attacks. Journal of Network and Computer Applications, 34(4), 1097-1107.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982-1003.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.
Dowling, G.R., & Staelin, R. (1994). A Model of Perceived Risk and Intended Risk-Handling Activity. Journal of Consumer Research, 21(1), 119-134.
Engel, J., Blackwell, R., & Miniard, P. (1986). Consumer Behavior, CBS College Publishing, New York.
Festinger, L. (1957). A Theory of Cognitive Dissonance. Stanford University Press, Stanford CA.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.
Germunden, H. G. (1985).Perceived Risk and Information Search: A systematic Meta-Analysis of Empirical Evidence. International Journal of Research in Marketing. 2, 79-100.
Gray, A. (2013). Conflict of laws and the cloud. Computer Law and Security Review, 29(1), 58-65.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management. 33(5), 861-874.
Hair, J.F., Jr., Anderson, R.E., Tatham, R. L., & Black, W. C. (2010). Multivariate Data Analysis. 7th Edition. Englewood Cliffs, NJ: Prentice-Hall International.
Karakas, F., & Manisaligil, A. (2012). Reorienting self-directed learning for the creative digital era. European Journal of Training and Development. 36(7), 712-731.
Lian, J.W. (2015). Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management, 35(1), 98-109.
Marchewka, J.T., Liu, C., & Kostiwa, K. (2007). An application of the UTAUT model for understanding student perceptions using course management software. Communications of the IIMA, 7(2), 93.
Marston, S., Li, Z., Bandyopadhyay, S., Chang, J., & Ghalsasi, A. (2011). Cloud computing – the business perspective. Decision Support Systems, 51(1), 176-189.
Min, Q., Ji, S., & Qu, G. (2008). Mobile commerce user acceptance study in China: a revised UTAUT model. Tsinghua Science & Technology, 13(3), 257-264.
Nunnally, J.C. (1978). Psychometric Theory-Vol 2, McGraw-Hill, New York, NY.
Langkau, T. F., Opitz, N., Schmidt, N. H., & Kolbe, L. M. (2012). Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments. 45th Hawaii International Conference on System Sciences(HICSS), Maui, Hawaii USA, 1593-1602.
Park, E., & Kim, K.J. (2014). An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Information Management, 34(1), 28-36.
Park, S.C., & Ryoo, S.Y. (2013). An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1), 160-170.
Rogers, E.M. (1995). Diffusion of Innovations, The Free Press, New York, NY.
San-Martín, H., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33(1), 341-350.
Shin, D.H. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30(2), 194-203.
Stein, S., Ware, J., Laboy, J., & Schaffer, H.E. (2013). Improving K-12 pedagogy via a cloud designed for education. International Journal of Information Management, 33(1), 235-241.
Stieninger, M., & Nedbal, D. (2014). Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors. 2014 47th Hawaii International Conference on System Sciences. Waikoloa, HI, USA USA, 3307-3316.
Taylor, C.W., & Hunsinger, D.S. (2011). A study of student use of cloud computing applications. Journal of Information Technology Management. 22(3), 36-50.
Taylor, S., & Todd, P. (1995). Assessing IT Usage: The Role of Prior Experience. MIS Quarterly, 19(4), 561.
Taylor, J.W. (1974). The Role of Risk in Consumer Behavior. Journal of Marketing, 38(2), 54-60.
Udo, G., Bagchi, K., & Maity, M. (2016). Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture. Journal of Business Ethics, 135(3), 517-541.
Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478.
Vouk, M.A. (2008). Cloud computing-issues, research and implementations. Journal of Computing and Information Technology. 16(4), 235-246.
Wu, P. F. (2009). Opening the black boxes of TAM : Towards a Mixed methods approach. International Conference on Information Systems. Paper 101. http:// aisle.aisnet.org/icis2009/101
Wu, W.W. (2011). Mining significant factors affecting the adoption of SaaS using the rough set approach. Journal of Systems and Software, 84(3), 435-441.
Zaltman, G. & Wallendorf, M. (1983). Consumer Behavior, Wiley, New York.
The Author wishes to submit the Work to SJM for publication. To enable SJM to publish the Work and to give effect to the parties’ intention set forth herein, they have agreed to cede the first right to publication and republication in the SJM Journal.
Cession
The Author hereby cedes to SJM, who accepts the cession, to the copyright in and to the paper.
The purpose of the cession is to enable SJM to publish the Work, as first publisher world-wide, and for republication in the SJM Journal, and to grant the right to others to publish the Work world-wide, for so long as such copyright subsists;
SJM shall be entitled to edit the work before publication, as it deems fit, subject to the Authors approval
The Author warrants to SJM that:
- the Author is the owner of the copyright in the Work, whether as author or as reassigned from the Author’s employee and that the Author is entitled to cede the copyright to SJM;
- the paper (or any of its part) is not submitted or accepted for publication in any other Journal;
- the Work is an original work created by the Author;
- the Author has not transferred, ceded, or assigned the copyright, or any part thereof, to any third party; or granted any third party a licence or other right to the copyright, which may affect or detract from the rights granted to SJM in terms of this agreement.
The Author hereby indemnifies the SJM as a body and its individual members, to the fullest extent permitted in law, against all or any claims which may arise consequent to the warranties set forth.
No monetary consideration shall be payable by SJM to the Author for the cession, but SJM shall clearly identify the Author as having produced the Work and ensure that due recognition is given to the Author in any publication of the Work.
Should SJM, in its sole discretion, elect not to publish the Work within 1 year after the date of this agreement, the cession shall lapse and be of no further effect. In such event the copyright shall revert to the Author and SJM shall not publish the Work, or any part thereof, without the Author’s prior written consent.