Back
 CN  Vol.8 No.3 , August 2016
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
Abstract: Firms need cloud computing adoption for strategic and competitive goals, generating business value, and at last gaining competitive advantage. This study reviews the literature regarding cloud computing and IT governance, and presents a research model along with its hypotheses formulation to examine the factors impacting cloud computing perceived importance in several Arab firms, specifically Jordan, Saudi Arabia and United Arab Emirates by using the integration of Technology Acceptance Model (TAM) model and Technology-Organizational-Environmental (TOE) framework as adapted from [1]. 329 returned surveys from top, middle-level IT managers, and IT employees from the operational level of the studied firms were analyzed using the structural equation modeling technique. The study found relative advantage, compatibility, complexity, organizational readiness, top management commitment, and training and education as important variables for impacting cloud computing adoption using perceived ease of use and perceived usefulness as mediating variables. The model explained 61%, 63%, and 74% of cloud computing adoption for perceived usefulness, perceived ease of use and perceived importance respectively.
Cite this paper: Mas’adeh, R. (2016) Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level. Communications and Network, 8, 103-117. doi: 10.4236/cn.2016.83011.
References

[1]   Gangwar, H., Date, H. and Ramaswamy, R. (2015) Understanding Determinants of Cloud Computing Adoption Using an Integrated TAM-TOE Model. Journal of Enterprise Information Management, 28, 107-130.
http://dx.doi.org/10.1108/JEIM-08-2013-0065

[2]   Saravana, N., Rajya, G.V. and Balamurugan, B. (2015) Enhanced Attribute Based Encryption for Cloud Computing. Procedia Computer Science, 46, 689-696.
http://dx.doi.org/10.1016/j.procs.2015.02.127

[3]   Al-Saiyd, N. and Sail, N. (2013) Data Integrity in Cloud Computing Security. Journal of Theoretical and Applied Information Technology, 58, 570-581.

[4]   Lemoudden, M., Bouazza, N., Ouahidi, B. and Bourget, D. (2013) A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. Journal of Theoretical and Applied Information Technology, 54, 325-330.

[5]   Sari, R. and Kurniawan, Y. (2015) Cloud Computing Technology Infrastructure to Support the Knowledge Management Process (a Case Study Approach). Journal of Theoretical and Applied Information Technology, 73, 377-382.

[6]   Shahzad, F. (2014) State-of-the-Art Survey on Cloud Computing Security Challenges, Approaches and Solutions. Procedia Computer Science, 37, 357-362.
http://dx.doi.org/10.1016/j.procs.2014.08.053

[7]   Siani, P. (2011) Toward Accountability in the Cloud. IEEE Internet Computing, 15, 64-69.
http://dx.doi.org/10.1109/MIC.2011.98

[8]   Virgile, K. and Yu, H. (2015) Securing Cloud Emails Using Two Factor Authentication Based on Password/Apps in Cloud Computing. International Journal of Security and Its Applications, 9, 121-130.
http://dx.doi.org/10.14257/ijsia.2015.9.3.12

[9]   Altamony, H., Masa’deh, R., Alshurideh, M. and Obeidat, B. (2012) Information Systems for Competitive Advantage: Implementation of an Organisational Strategic Management Process. Proceedings of the 18th IBIMA Conference on Innovation and Sustainable Economic Competitive Advantage: From Regional Development to World Economic, Istanbul, 9-10 May 2012, 583-592.

[10]   Masádeh, R., Tarhini, A., Al-Dmour, R. and Obeidat, B. (2015) Strategic IT-Business Alignment a Managers’ Explorative and Exploitative Strategies. European Scientific Journal, 11, 437-457.

[11]   Beimborn, D., Schlosser, F. and Weitzel, T. (2009) Proposing a Theoretical Model for IT Governance and IT Business Alignment. Proceedings of the 42nd Hawaii International Conference on System Sciences, Washington DC, 1-11.

[12]   Van Grembergen, W., De Haes, S. and Guldentops, E. (2004) Structures, Processes and Relational Mechanisms for IT Governance. In: Van Grembergen, W., Ed., Strategies for Information Technology Governance, Idea Group Publishing, Belgium, 1-37.
http://dx.doi.org/10.4018/978-1-59140-140-7.ch001

[13]   Furuichi, T. and Yamada, K. (2014) Next Generation of Embedded System on Cloud Computing. Procedia Computer Science, 35, 1605-1614.
http://dx.doi.org/10.1016/j.procs.2014.08.244

[14]   Lombardi, F. and Dipietro, R. (2011) Secure Virtualization for Cloud Computing. Journal of Network and Computer Applications, 34, 1113-1122.
http://dx.doi.org/10.1016/j.jnca.2010.06.008

[15]   Marston, S., Li, Z., Bandyopadhyay, S., Juheng, Z. and Anand, G. (2011) Cloud Computing: The Business Perspective. Decision Support Systems, 51, 176-189.
http://dx.doi.org/10.1016/j.dss.2010.12.006

[16]   Olaru, M. (2014) Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technology, 12, 529-534.
http://dx.doi.org/10.1016/j.protcy.2013.12.525

[17]   Simamora, B. and Kom, J. (2015) Improving Services through Adoption of Cloud Computing at PT xyz in Indonesia. Journal of Theoretical and Applied Information Technology, 73, 395-404.

[18]   Sinjilawi, Y., AL-Nabhan, M. and Abu-Shanab, E. (2014) Addressing Security and Privacy Issues in Cloud Computing. Journal of Emerging Technologies in Web Intelligence, 6, 192-199.
http://dx.doi.org/10.4304/jetwi.6.2.192-199

[19]   Weinhardt, C., Anandasivam, W., Blau, B., Borissov, N., Meinl, T., Michalk, W. and StoBer, J. (2009) Cloud Computing—A Classification, Business Models, and Research Directions. Business & Information Systems Engineering, 5, 391-399.
http://dx.doi.org/10.1007/s12599-009-0071-2

[20]   Alijani, G., Fulk, H., Omar, A. and Tulsi, R. (2014) Cloud Computing Effects on Small Business. Entrepreneurial Executive, 19, 35-45.

[21]   Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems, 25, 599-616.
http://dx.doi.org/10.1016/j.future.2008.12.001

[22]   Erturk, E. and Maharjan, B. (2014) Developing Activities for Teaching Cloud Computing and Virtualization. Engineering, Technology & Applied Science Research, 4, 702-705.

[23]   Guo, C. and Zheng, X. (2015) The Research of Data Security Mechanism Based on Cloud Computing. International Journal of Security and Its Applications, 9, 363-370.
http://dx.doi.org/10.14257/ijsia.2015.9.3.28

[24]   Alshamaila, Y., Papagiannidis, S. and Li, F. (2013) Cloud Computing Adoption by SMEs in the North East of England: A Multi-Perspective Framework. Journal of Enterprise Information Management, 26, 250-275.
http://dx.doi.org/10.1108/17410391311325225

[25]   Feuerlicht, G., Burkon, L. and Sebesta, M. (2011) Cloud Computing Adoption: What Are the Issues? System Integration, 18, 187-192.

[26]   Lin, A. and Chen, N.C. (2012) Cloud Computing as an Innovation: Perception, Attitude, and Adoption. International Journal of Information Management, 32, 533-540.
http://dx.doi.org/10.1016/j.ijinfomgt.2012.04.001

[27]   Low, C., Chen, Y. and Wu, M. (2011) Understanding the Determinants of Cloud Computing Adoption. Industrial Management & Data Systems, 111, 1006-1023.
http://dx.doi.org/10.1108/02635571111161262

[28]   Hsiao, C. and Yang, C. (2011) The Intellectual Development of the Technology Acceptance Model: A Co-Citation Analysis. International Journal of Information Management, 31, 128-136.
http://dx.doi.org/10.1016/j.ijinfomgt.2010.07.003

[29]   Williams, G. and Miller, R. (2002) Change the Way You Persuade. Harvard Business Review, 80, 64-73.

[30]   Enns, H. and McDonagh, J. (2012) Irish CIOs’ Influence on Technology Innovation and IT-Business Alignment. Communications of the Association for Information Systems, 30, 1-10.

[31]   Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R. and Konwinski, A. (2010) A View of Cloud Computing. ACM Communications, 53, 50-58.
http://dx.doi.org/10.1145/1721654.1721672

[32]   Subashini, S. and Kavitha, V. (2011) A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34, 1-11.
http://dx.doi.org/10.1016/j.jnca.2010.07.006

[33]   Karajeh, H., Maqableh, M. and Masa’deh, R. (2014) Security of Cloud Computing Environment. Proceedings of the 23rd IBIMA Conference on Vision 2020: Sustainable Growth, Economic Development, and Global Competitiveness, Valencia, 13-14 May 2014, 2202-2215.

[34]   Joseph, A., Kathrine, J. and Vijayan, R. (2014) Cloud Security Mechanisms for Data Protection: A Survey. International Journal of Multimedia and Ubiquitous Engineering, 9, 81-90.
http://dx.doi.org/10.14257/ijmue.2014.9.9.09

[35]   Kim, S. and Lee, I. (2015) Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry, 7, 269-283.
http://dx.doi.org/10.3390/sym7010269

[36]   Sandholm, T. and Lee, D. (2014) Notes on Cloud Computing Principles. Journal of Cloud Computing: Advances, Systems and Applications, 3, 1-10.
http://dx.doi.org/10.1186/s13677-014-0021-5

[37]   Sehgal, N., Sohoni, S., Xiong, Y., Fritz, D., Mulia, W. and Acken, J. (2011) Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing. IETE Technical Review, 28, 279-291.
http://dx.doi.org/10.4103/0256-4602.83549

[38]   Varalakshmi, A., Haleema, P., Subalakshmi, R. and Iyengar, N. (2014) Quality Based Solution for Adaptable and Scalable Access Control in Cloud Computing. International Journal of Grid Distribution Computing, 7, 137-148.
http://dx.doi.org/10.14257/ijgdc.2014.7.6.11

[39]   Ibrahim, M. and Ameen, A. (2015) Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz university. International Journal of Advanced Networking and Applications, 6, 2359-2366.

[40]   Arango, I., Izquierdo, J., Campbell, E. and Pérez-García, R. (2014) Cloud-Based Decision Making in Water Distribution Systems. Procedia Engineering, 89, 488-494.
http://dx.doi.org/10.1016/j.proeng.2014.11.241

[41]   Caytiles, R. and Lee, S. (2012) Security Considerations for Public Mobile Cloud Computing. International Journal of Advanced Science and Technology, 44, 81-88.

[42]   Shahzad, A. and Hussain, M. (2013) Security Issues and Challenges of Mobile Cloud Computing. International Journal of Grid and Distributed Computing, 6, 37-50.
http://dx.doi.org/10.14257/ijgdc.2013.6.6.04

[43]   Terzis, V., Moridis, C. and Economides, A. (2013) Continuance Acceptance of Computer Based Assessment through the Integration of User’s Expectations and Perceptions. Computers & Education, 62, 50-61.
http://dx.doi.org/10.1016/j.compedu.2012.10.018

[44]   Sekaran, U. and Bougie, R. (2009) Research Methods for Business: A Skill-Building Approach. 5th Edition, John Wiley and Sons Inc., Hoboken.

[45]   Kline, R. (2005) Principles and Practice of Structural Equation Modeling. 2nd Edition, the Guilford Press, New York.

[46]   Kline, R. (2010) Principles and Practice of Structural Equation Modeling. 3rd Edition, the Guilford Press, New York.

[47]   Newkirk, H. and Lederer, A. (2006) The Effectiveness of Strategic Information Systems Planning under Environmental Uncertainty. Information & Management, 43, 481-501.
http://dx.doi.org/10.1016/j.im.2005.12.001

[48]   Hair, J., Black, W., Babin, B., Anderson, R. and Tatham, R. (2010) Multivariate Data Analysis. Pearson Prentice Hall, Pearson Education Inc., Upper Saddle River.

[49]   Arbuckle, J.L. (2009) Amos 18 User’s Guide. SPSS Incorporated, New York.

[50]   Chou, T., Chang, P., Cheng, Y. and Tasi, C. (2007) A Path Model Linking Organizational Knowledge Attributes, Information Processing Capabilities and Perceived Usability. Information & Management, 44, 408-417.
http://dx.doi.org/10.1016/j.im.2007.03.003

[51]   Byrne, B. (2001) Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming. Lawrence Erlbaum Associates, Mahwah.

[52]   Pallant, J. (2005) SPSS Survival Manual: A Step Guide to Data Analysis Using SPSS for Windows Version 12. Open University Press, Chicago.

[53]   Bagozzi, R. and Yi, Y. (1988) On the Evaluation of Structural Evaluation Models. Journal of the Academy of Marketing Science, 16, 74-94.
http://dx.doi.org/10.1007/BF02723327

[54]   Holmes-Smith, P. (2001) Introduction to Structural Equation Modelling Using LISREL. ACSPRI-Winter Training Program, Perth.

[55]   Creswell, J. (2009) Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 3rd Edition, Sage Publications, Thousand Oaks.

[56]   Blumberg, B., Cooper, D.R. and Schindler, P.S. (2005) Business Research Methods. McGraw-Hill, Maidenhead.

[57]   Gefen, D., Straub, D.W. and Boudreau, M.C. (2000) Structural Equation Modelling and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems, 4, 1-79.

[58]   Fronell, C. and Larcker, D. (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18, 39-50.
http://dx.doi.org/10.2307/3151312

[59]   Masa’deh, R. (2012) The Impact of Management Information Systems (MIS) on Quality Assurance (QA): A Case Study in Jordan. International Journal of Information, Business and Management, 4, 93-110.

[60]   Masa’deh, R. (2013) The Impact of Information Technology Infrastructure Flexibility on Firm Performance: An Empirical Study of Jordanian Public Shareholding Firms. Jordan Journal of Business Administration, 9, 204-224.

[61]   Masa’deh, R., Maqableh, M. and Karajeh, H. (2014) A Theoretical Perspective on the Relationship between Leadership Development, Knowledge Management Capability, and Firm Performance. Asian Social Science, 10, 128-137.

[62]   Almajali, D., Mansour, K., Masa’deh, R. and Maqableh, M. (2016) The Impact of Electronic Supply Chain Management Usage on Firm’s Performance. International Journal of Communications, Network and System Sciences, 9, 280-293.

 
 
Top