Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model Authors Eko Agus Prasetio, School of Business and Management, Bandung Institute of Technology, eko.prasetio@sbm-itb.ac.id Wawan Dhewanto, School of Business and Management, Bandung Institute of Technology, eko.prasetio@sbm-itb.ac.id Abstract Cloud computing has been studied extensively in management of information system literature. However, the study of cloud computing from disruptive innovation perspective is limited. Therefore, this paper would like to address it by conceiving a research agenda for elaborating cloud computing as a disruptive information system and how firms accept this disruptive technology. This paper tries to combine the disruptive technology concept with technology acceptance model by looking at cloud computing as the focus of interest. Cloud computing is considered as one of the biggest IT transformational wave. Although there are a number of definitions of cloud computing, Truong (2010) defines cloud computing as a virtualized, self-maintained and managed platform that provides customers with a variety of scalable resources on demand. Cloud-delivered enterprise solutions that offer cheaper, simpler and often more broadly alternatives of enterprise computing might fit nicely into Christensen s framework for disruptive innovation. Some studies reported that some businesses are hesitant in adopting this new technology. Forrester Research (2009) reported that only 2% of small businesses (businesses with fewer than 100 employees) are using cloud computing. Every year over USD270 billion dollars are spent on enterprise software every year, but so far, only a fraction of those dollars is spent for cloud applications (Levie, 2011). Since the acceptance of cloud computing is still low, this paper would like to investigate it by utilizing the modified technology acceptance model 2 (TAM 2) adopted from previous researches (e.g., Opitz et al, 2012) and look at its variables, i.e. perceived usefulness and perceived ease of use. Some concerns make firms are still hesitant in adopting this relatively new technology, i.e. about the security, privacy and data integrity (Truong, 2010). Therefore, one other variable will be added to the modified TAM 2, i.e., perceived credibility. Key Words: Cloud computing, disruptive technology, technology acceptance model
Paper Introduction Cloud computing is considered as one of the biggest IT transformational wave. Although there are a number of definitions of cloud computing, Truong (2010) defines cloud computing as a virtualized, self-maintained and managed platform that provides customers with a variety of scalable resources on demand. Cloud-delivered enterprise solutions that offer cheaper, simpler and often more broadly alternatives of enterprise computing might fit nicely into Christensen s framework for disruptive innovation. Some studies reported that some businesses are hesitant in adopting this new technology. Forrester Research (2009) reported that only 2% of small businesses (businesses with fewer than 100 employees) are using cloud computing. Every year over USD270 billion dollars are spent on enterprise software, but so far, only a fraction of those dollars is spent for cloud applications (Levie, 2011). Objective Since the acceptance of cloud computing is still low, this paper would like to investigate it by utilizing the technology acceptance model and look at its variables, i.e. perceived usefulness and perceived ease of use. Some concerns make firms are still hesitant in adopting this relatively new technology, i.e. about the security, privacy and data integrity (Truong, 2010). Therefore, one other factor will be added to original TAM that is perceived credibility. Cloud computing in IT Cloud computing provides businesses with a fundamentally different model of operation in which the service providers are responsible for hard parts in using software: installation, upgrade, maintenance, backups and security (Truong, 2010). The architecture behind cloud computing is a massive network of interconnected servers, often with user-friendly interface, which allows user to select services (Bowers, 2011). Various type of cloud computing (Bowers, 2011 from SearchCloudComputing.com, InfoWorld Cloud Computing) is as follows: (1) Software-as-a-Service (SaaS): delivers a single application through a browser to thousands of customers using a multitenant architecture. (2) Infrastructure-as-a -Service (IaaS): an organization outsources the hardware used to support operations, including storage, hardware, servers, and networking components. (3) Platform-as-a-Service (PaaS): delivers development environments as a service. Customers build their own applications that run on the provider s infrastructure, which are then delivered to users via the Internet from the provider s servers. Cloud computing as disruptive technology Disruptive innovation theory was advanced by Christensen in his popular book The Innovator s Dilemma (1997). According to Christensen, disruptive technologies are technologies that provide different value from mainstream technologies and are initially inferior to mainstream technologies along the dimension of performance that are most important to mainstream customers. Christensen emphasized that disruptive innovation could be classified into low-end and newmarket disruptive innovation (Christensen and Raynor, 2003). Cloud-delivered enterprise solutions that offer cheaper, simpler and often more broadly alternatives of enterprise computing might fit nicely into Christensen s framework for disruptive innovation. Many cloud solutions today are disrupting the traditional IT solution provider by initially enter the good enough category. From there, the product roadmap became more elaborate and good
enough products becomes great, even better (Levie, 2011). It follows the low-end market disruption path. Levie (2011) further gave examples on some emerging companies that are operating in dimensions that were never easy or possible in a previous generation of software, offering new solutions that the incumbent can not attack, and therefore created new market disruption. Methodology in investigating the firm s acceptance of cloud computing The technology acceptance model (TAM) by Davis (1989) (see Figure 1) and its improved model of technology acceptance model 2 (TAM2) (see Figure 2) by Venkatesh and Davis (2000) is proven and widely used models in the area of information technology. Researchers applied TAM to analyze a user s behavior, particularly during the application of different types of information systems (Ramayah and Lo, 2007). Attitude towards Using Behavioral Figure 1. TAM Experience Voluntariness Subjective Norm Image Job Relevance Output Quality Result Demonstrability Figure 2. TAM 2 Opitz et.al (2012) conducted empirical research to investigate the technology acceptance of cloud computing in German IT department employing the TAM2. Their finding suggests that they need to rearrange the variables and propose a model shown in Figure 3.
Subjective Norm Image Job Relevance Output Quality Result Demonstrability Figure 3. Modified TAM 2 proposed by Opitz et.al. (2012) a model for cloud computing In Opitz research, the concern about the security and privacy has not been addressed. However, as pointed out by Truong (2010), there are concerns about security, privacy and data integrity for adopting cloud computing. Therefore, in this paper we would like to suggest one more variable for investigating technology acceptance of cloud computing, i.e. perceived credibility that includes security and privacy in assessing the user s plan to use cloud service in the future. This particular variable is adopted from online banking literatures, e.g. Amin, H. (2009). The conceptual model that we would like to suggest is presented in Figure 4. Conceptual Model and Hypotheses Since the model developed by Opitz et al. is a good and update model for describing technology acceptance of cloud computing we would like to adopt it. However, security, privacy and data integrity become concerns for users in adopting cloud computing. Therefore, we would like to include one more factor, i.e., perceived credibility. The model is figured below: Subjective Norm H1 Image H2 Job Relevance H3 H4 Output Quality H5 H6 Result Demonstrability H7 H9 H8 Credibility Figure 4. Proposed conceptual technology acceptance model of cloud computing The hypotheses which were adopted from TAM 2 and modified from the model developed from the research of Opitz et al. (2012): H1: Subjective norm will have a positive effect on Image H2: Image will have a positive effect on Output Quality
H3: Job Relevance will have a positive effect on Output Quality H4: Result Demonstrability will have a positive effect on Output Quality H5: Output Quality will have a positive effect on The perceived of usefulness (PU) to the user relates to extrinsic factors like efficiency and effectiveness (Ramayah and Lo, 2007). Cloud computing provide the users with scalability so that the companies can use as much resources as they needed on demand and the resources can be scaled up or down smoothly (Truong, 2010) as one of the benefit among others. This might influence the perceived of usefulness of cloud computing, therefore the following hypothesis is proposed: H6: usefulness will have a positive effect on TAM suggests that adaptation is influenced by ease of use given that the easier a system or technology is to use, the greater its utility. ease of use (PEU) is normally related to the intrinsic characteristics of IT (ease of use and ease of learning the technology). The usage of cloud computing does not require company to deal with installation, upgrade, maintenance, and staff training (Truong, 2010) that might influence the perceived ease of use. Therefore, the following hypothesis is proposed: H7: will have a positive effect on The importance of the third construct, i.e. perceived credibility security and privacy in assessing the user s plan to use cloud service in the future, is adapted from online banking literature. The importance of security and privacy to the acceptance of online banking has been noted in many banking studies (Pikkarainen et al., 2004). Since Truong (2010) posits that there are concerns about security, privacy and data integrity for adopting cloud computing, the same construct of perceived integrity will be deployed. The following hypothesis is proposed: H8: credibility will have a positive effect on H9: will have a positive effect on Limitation and Further Research This paper tried to propose a conceptual model for investigating the acceptance of cloud computing based on Technology Acceptance Model 2 and previous researches. Therefore, this conceptual model has to be followed by empirical research to test the model and get an insight of the significant factors in cloud acceptance. Authors plan to conduct the empirical research using this model. Considering that the previous researches focused only on the developed country setting, further research needs to be done in different setting, e.g. developing country. Furthermore, previous research did not take into account the credibility factor, therefore further research needs to include this factor.
Bibliography 1. Adams, D.A., Nelson, R.R., and Todd, P.A., (1992),, and Usage of Information Technology: A Replication MIS Quarterly, pp. 227-247 2. Amin, H., (2009), An Analysis of Online Banking Usage Intentions: An Extension of the Technology Acceptance Model, International Journal Business and Society Vol.10 No. 1, pp. 27-40 3. Bowers, L. (2011), Cloud Computing Efficiency Applied Clinical Trials, July 2011, pp. 45-51 4. Christensen. C.M. (1997) The Innovators Dilemma: When New Technologies Cause Great Firms to Fail Harvard Business School Press; Boston, MA. 5. Davis, F., (1989),,, and User Acceptance of Information Technology, MIS Quarterly, Vol. 13, pp. 983-1003 6. Forrester Research (2009) Is Cloud Computing Ready for the Enterprise? Forrester Research Report, May. URL: http://forrester.com 7. Golden, B., (2011) Cloud Computing: A Sustaining or Disruptive Innovation? URL:http://www.cio.com/article/677204/Cloud_Computing_A_Sustaining_or_Disruptive_Inn ovation_?page=2&taxonomyid=3112 8. Katzan, H., (2010) On the Privacy of Cloud Computing International Journal of Management & Information Systems Vol. 14 No. 2, pp. 1-12 9. Keagy, J., Sheehan, M., and Lancaster, P. (2008), Cloud Computing: Disruptive Innovation and Enabling Technology Presentation GoGrid/Serve Path, August 2008. 10. Levie, A., (2011) Is the Cloud the Ultimate Disruptive Innovation? URL: http://tech.fortune.cnn.com/2011/09/27/is-the-cloud-the-ultimate-disruptive-innovation/ 11. Opitz, N., Langkau T.F., Schmidt N.H., and Kolbe L.M., (2012) Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments, 45 th Hawaii International Conference on System Science Proceeding, pp. 1593-1601 12. Pemmaraju, K., (2010), The Cloud Disruptive Innovation: Managing the Business Transformation, URL: http://sandhill.com/article/the-cloud-disruptive-innovation-managingthe-business-transformation/ 13. Pikkarainen, T., Pikkarainen, K., Karjaluoto, H., and Pahnila, S., (2004), Consumer Acceptance of Online Banking: An Extension of Technology Acceptance Model, Internet Research 14, pp. 224-235 14. Rose, C., (2011) A Break in the Cloud? The Reality of Cloud Computing International Journal of Management & Information System Vo. 15 No. 4, pp. 59-63 15. Sultan, N. (2009) Cloud Computing for Education: A New Dawn International Journal of Information Management, in press 16. Truong, D., (2010) How Cloud Computing Enhances Competitive Advantage: A Research Model for Small Businesses The Business Review, Cambridge Vol. 15 No. 1; pp. 59-65. 17. Truong H. L., and Dustdar, S., (2010) Cloud Computing for Small Research Groups in Computational Science and Engineering: Current Status and Outlook, Computing, pp. 75-91 18. Venkatesh, V. and Davis, F.D., (1996) A Model of the Antecedents of Ease of Use: Development and Test, Decision Sciences, pp. 451-461 19. Ramayah, T., and Lo M., (2007) Impact of Shared Beliefs on and in the Implementation of an Enterprise Resource Planning System, Management Research News Vol.30 No.6, pp. 420 430 20. Venkatesh, V. and Davis, F.D. (2000) A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies, Management Science, pp. 186-204