{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T07:31:05Z","timestamp":1771054265124,"version":"3.50.1"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T00:00:00Z","timestamp":1646006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T00:00:00Z","timestamp":1646006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing (CC) has many benefits, so its use has spread rapidly, particularly in the business sector. An important consideration in the acceptance of CC is whether the CC system is dependable, and it can differ among industry and service type. However, little research has considered the effect of<jats:italic>dependability<\/jats:italic>(composed of<jats:italic>availability<\/jats:italic>,<jats:italic>reliability<\/jats:italic>,<jats:italic>security<\/jats:italic>,<jats:italic>maintainability<\/jats:italic>) on CC acceptance. Especially, group comparisons between high IT-intensive (Hi-ITi) and low IT-intensive (Lo-ITi) industries have not been reported, nor have comparisons between software-as-a-service (SaaS) and platform-as-a-service (PaaS)\/infrastructure-as-a-service (IaaS). This study aims to explore how the<jats:italic>dependability<\/jats:italic>of CC affects users\u2019 intent to accept it, with focus on how this intent is affected by intensity of IT use (by industry) and by the type of CC service used. To validate the proposed model, this study applied structural equation modeling and conducted multi-group analysis. A total of 230 business managers in South Korea represent the sample for our study. For the full dataset<jats:italic>,<\/jats:italic>the three<jats:italic>dependability<\/jats:italic>attributes (<jats:italic>availability<\/jats:italic>,<jats:italic>reliability<\/jats:italic>,<jats:italic>security<\/jats:italic>) do not affect the usefulness of CC, but do affect the ease of use of CC. The usefulness of CC is a determinant for positive intention to accept CC, whereas the ease of use of CC is not.<jats:italic>Maintainability<\/jats:italic>is the strongest determinant of CC adoption for the full dataset, and for all individual groups, except those that use SaaS. For Hi-ITi and Lo-ITi industries, results show that managers show no differences in their perceptions of the effect of<jats:italic>dependability<\/jats:italic>attributes (<jats:italic>availability<\/jats:italic>,<jats:italic>reliability<\/jats:italic>,<jats:italic>security<\/jats:italic>) on the usefulness and the ease of CC. The absence of such a difference in managers\u2019 perception also applies to the relationship between two core variables of TAM (i.e.,<jats:italic>perceived usefulness<\/jats:italic>,<jats:italic>perceived ease of use<\/jats:italic>) and behavioral intention to accept CC. For SaaS and PaaS\/IaaS, managers have different perceptions of<jats:italic>security<\/jats:italic>on the usefulness of CC, and the effect of the usefulness of CC on the intention to accept CC. The findings can provide academic researchers and industry practitioners with a differentiated and in-depth perspective on the understanding and the spread of CC.<\/jats:p>","DOI":"10.1007\/s11227-022-04346-1","type":"journal-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T14:03:51Z","timestamp":1646057031000},"page":"12159-12201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["The influence of dependability in cloud computing adoption"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3076-7371","authenticated-orcid":false,"given":"Chi-hoon","family":"Song","sequence":"first","affiliation":[]},{"given":"Young-woo","family":"Sohn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"4346_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b11667","volume-title":"Fundamentals of dependable computing for software engineers","author":"J Knight","year":"2012","unstructured":"Knight J (2012) Fundamentals of dependable computing for software engineers. Chapman & Hall\/CRC Press, Boca Raton"},{"key":"4346_CR2","volume-title":"Design and analysis of fault tolerant digital systems","author":"BW Johnson","year":"1989","unstructured":"Johnson BW (1989) Design and analysis of fault tolerant digital systems. Addison-Wesley Publishing Company Inc, Boston"},{"issue":"1","key":"4346_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11\u201333. https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4346_CR4","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.indmarman.2008.01.002","volume":"38","author":"JY Lai","year":"2009","unstructured":"Lai JY, Yang CC (2009) Effects of employees\u2019 perceived dependability on success of enterprise applications in e- business. Ind Mark Manage 38:263\u2013274. https:\/\/doi.org\/10.1016\/j.indmarman.2008.01.002","journal-title":"Ind Mark Manage"},{"key":"4346_CR5","unstructured":"Mc Geough B, Donnellan B (2013) Factors that affect the adoption of cloud computing for an enterprise: a case study of cloud adoption within intel corporation. In: Proceedings of the 21st European Conference on Information Systems, 2013, pp 1\u201312. ECIS. http:\/\/aisel.aisnet.org\/ecis2013_cr\/37"},{"key":"4346_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techsoc.2021.101583","volume":"65","author":"JK Adjei","year":"2021","unstructured":"Adjei JK, Adams S, Mamattah L (2021) Cloud computing adoption in Ghana; accounting for institutional factors. Technol Soc 65:1\u20139. https:\/\/doi.org\/10.1016\/j.techsoc.2021.101583","journal-title":"Technol Soc"},{"key":"4346_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10108-w","author":"O Ali","year":"2021","unstructured":"Ali O, Shrestha A, Ghasemaghaei M, Beydoun G (2021) Assessment of complexity in cloud computing adoption: a case study of local governments in Australia. Inf Syst Front. https:\/\/doi.org\/10.1007\/s10796-021-10108-w","journal-title":"Inf Syst Front"},{"key":"4346_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.acalib.2020.102255","volume":"46","author":"A Tella","year":"2020","unstructured":"Tella A, Ukwoma SC, Kayode AI (2020) A two models modification for determining cloud computing adoption for web-based services in academic libraries in Nigeria. J Acad Librariansh 46:1\u201315. https:\/\/doi.org\/10.1016\/j.acalib.2020.102255","journal-title":"J Acad Librariansh"},{"key":"4346_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.acalib.2021.102395","volume":"47","author":"P Jahangiri","year":"2021","unstructured":"Jahangiri P, Saberi MK, Vakilimofrad H (2021) Development and psychometric evaluation of the cloud computing acceptance questionnaire for academic libraries. J Acad Librariansh 47:1\u201311. https:\/\/doi.org\/10.1016\/j.acalib.2021.102395","journal-title":"J Acad Librariansh"},{"key":"4346_CR10","doi-asserted-by":"crossref","unstructured":"Hogan M, Liu F, Sokol A, Tong J (2011) NIST cloud computing standards roadmap. National Institute of Standards and Technology. https:\/\/www.nist.gov\/system\/files\/documents\/itl\/cloud\/NIST_SP-500-291_Jul5A.pdf. Accessed 5 June 2021","DOI":"10.6028\/NIST.SP.500-291v1"},{"issue":"4","key":"4346_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358. https:\/\/doi.org\/10.1145\/1721654.1721672","journal-title":"Commun ACM"},{"key":"4346_CR12","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/ICCASM.2010.5620636","volume":"7","author":"L Tian","year":"2010","unstructured":"Tian L, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. Int Conf Comput Appl Syst Model 7:567\u2013572. https:\/\/doi.org\/10.1109\/ICCASM.2010.5620636","journal-title":"Int Conf Comput Appl Syst Model"},{"issue":"3","key":"4346_CR13","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/17517575.2017.1355484","volume":"12","author":"S Tomas","year":"2018","unstructured":"Tomas S, Thomas M, Oliveira T (2018) Evaluating the impact of virtualization characteristics on SaaS adoption. Enterp Inf Syst 12(3):259\u2013278. https:\/\/doi.org\/10.1080\/17517575.2017.1355484","journal-title":"Enterp Inf Syst"},{"key":"4346_CR14","doi-asserted-by":"publisher","unstructured":"Pan Y, Hu N (2014) Research on dependability of cloud computing systems. In: International Conference on Reliability, Maintainability and Safety, 2014, pp 435\u2013439. IEEE. https:\/\/doi.org\/10.1109\/ICRMS.2014.7107234","DOI":"10.1109\/ICRMS.2014.7107234"},{"key":"4346_CR15","unstructured":"Shahzad A, Litchfield A (2015) Virtualization technology: cross-VM cache side channel attacks make it vulnerable. In: Proceedings of Australasian Conference on Information Systems, 2015, pp 1\u201314. ACIS. https:\/\/aisel.aisnet.org\/acis2015\/120"},{"key":"4346_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.procs.2017.11.016","volume":"121","author":"TJ Branco","year":"2017","unstructured":"Branco TJ, S\u00e1-Soares F, Riverob AL (2017) Key issues for the successful adoption of cloud computing. Proc Comput Sci 121:115\u2013122. https:\/\/doi.org\/10.1016\/j.procs.2017.11.016","journal-title":"Proc Comput Sci"},{"key":"4346_CR17","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TSC.2017.2735778","volume":"10","author":"S Russo","year":"2017","unstructured":"Russo S, Vieira M (2017) Security and dependability of cloud systems and services. IEEE Trans Serv Comput 10:673\u2013674. https:\/\/doi.org\/10.1109\/TSC.2017.2735778","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"4346_CR18","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478. https:\/\/doi.org\/10.2307\/30036540","journal-title":"MIS Q"},{"issue":"3","key":"4346_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33552\/GJES.2019.01.000511","volume":"1","author":"H Taherdoost","year":"2019","unstructured":"Taherdoost H (2019) Importance of technology acceptance assessment for successful implementation and development of new technologies. Glob J Eng Sci 1(3):1\u20134. https:\/\/doi.org\/10.33552\/GJES.2019.01.000511","journal-title":"Glob J Eng Sci"},{"issue":"3","key":"4346_CR20","first-page":"124","volume":"26","author":"S Tripathi","year":"2017","unstructured":"Tripathi S (2017) Understanding the determinants affecting the continuance intention to use cloud computing. J Int Technol Inf Manage 26(3):124\u2013152","journal-title":"J Int Technol Inf Manage"},{"issue":"2","key":"4346_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCBPL.2017040101","volume":"7","author":"AM Momani","year":"2017","unstructured":"Momani AM, Jamous MM, Hilles SMS (2017) Technology acceptance theories: review and classification. Int J Cyber Behav, Psychol Learn 7(2):1\u201314. https:\/\/doi.org\/10.4018\/IJCBPL.2017040101","journal-title":"Int J Cyber Behav, Psychol Learn"},{"issue":"16","key":"4346_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3991\/ijet.v15i16.14811","volume":"15","author":"N Matar","year":"2020","unstructured":"Matar N, AlMalahmeh T, Al-Adaileh M, Al Jaghoub S (2020) Factors affecting behavioral intentions towards cloud computing in the workplace. Int J Emer Technol Learn 15(16):31\u201348","journal-title":"Int J Emer Technol Learn"},{"issue":"3","key":"4346_CR23","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1108\/IMR-04-2014-0148","volume":"33","author":"NF Richter","year":"2016","unstructured":"Richter NF, Sinkovics RR, Ringle CM, Schl\u00e4gel C (2016) A critical look at the use of SEM in international business research. Int Mark Rev 33(3):376\u2013404. https:\/\/doi.org\/10.1108\/IMR-04-2014-0148","journal-title":"Int Mark Rev"},{"issue":"1","key":"4346_CR24","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","volume":"31","author":"J Risher","year":"2019","unstructured":"Risher J, Ringle CM, Sarstedt M (2019) When to use and how to report the results of PLS-SEM. Eur Bus Rev 31(1):2\u201324. https:\/\/doi.org\/10.1108\/EBR-11-2018-0203","journal-title":"Eur Bus Rev"},{"issue":"1","key":"4346_CR25","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1108\/JEIM-08-2013-0065","volume":"28","author":"H Gangwar","year":"2015","unstructured":"Gangwar H, Date H, Ramaswamy R (2015) Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. J Enterp Inf Manag 28(1):107\u2013130. https:\/\/doi.org\/10.1108\/JEIM-08-2013-0065","journal-title":"J Enterp Inf Manag"},{"key":"4346_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/2536040","volume":"1","author":"PR Palos-Sanchez","year":"2017","unstructured":"Palos-Sanchez PR, Arenas-Marquez FJ, Aguayo-Camacho M (2017) Cloud computing (SaaS) adoption as a strategic technology: results of an empirical study. Mob Inf Syst 1:1\u201320. https:\/\/doi.org\/10.1155\/2017\/2536040","journal-title":"Mob Inf Syst"},{"issue":"4","key":"4346_CR27","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1177\/0972150916645692","volume":"17","author":"H Gangwar","year":"2016","unstructured":"Gangwar H, Date H (2016) Critical factors of cloud computing adoption in organizations: an empirical study. Glob Bus Rev 17(4):886\u2013904. https:\/\/doi.org\/10.1177\/0972150916645692","journal-title":"Glob Bus Rev"},{"issue":"3","key":"4346_CR28","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340. https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Q"},{"issue":"3","key":"4346_CR29","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1111\/j.1540-5915.1996.tb00860.x","volume":"27","author":"V Venkatesh","year":"1996","unstructured":"Venkatesh V, Davis FD (1996) A model of the antecedents of perceived ease of use: development and test. Decis Sci 27(3):451\u2013481. https:\/\/doi.org\/10.1111\/j.1540-5915.1996.tb00860.x","journal-title":"Decis Sci"},{"key":"4346_CR30","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler J, Ringle CM, Sarstedt M (2015) A new criterion for assessing discriminant validity in variance-based structural equation modeling. J Acad Mark Sci 43:115\u2013135. https:\/\/doi.org\/10.1007\/s11747-014-0403-8","journal-title":"J Acad Mark Sci"},{"key":"4346_CR31","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1007\/s10796-017-9739-1","volume":"20","author":"HM Sabi","year":"2017","unstructured":"Sabi HM, Uzoka FME, Langmia K, Njeh FN, Tsuma CK (2017) A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa. Inf Syst Front 20:1381\u20131404. https:\/\/doi.org\/10.1007\/s10796-017-9739-1","journal-title":"Inf Syst Front"},{"key":"4346_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2019.02.009","volume":"49","author":"T Oliveira","year":"2019","unstructured":"Oliveira T, Martins R, Sarker S, Thomas M, Popovic\u02c7 A (2019) Understanding SaaS adoption: the moderating impact of the environment context. Int J Inf Manage 49:1\u201312. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.02.009","journal-title":"Int J Inf Manage"},{"issue":"4","key":"4346_CR33","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1504\/IJBIS.2016.080215","volume":"23","author":"IM Al-Jabri","year":"2016","unstructured":"Al-Jabri IM, Alabdulhadi MH (2016) Factors affecting cloud computing adoption: perspectives of IT professionals. Int J Bus Inf Syst 23(4):389\u2013405. https:\/\/doi.org\/10.1504\/IJBIS.2016.080215","journal-title":"Int J Bus Inf Syst"},{"issue":"1","key":"4346_CR34","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.im.2017.03.008","volume":"55","author":"PJ Hsieh","year":"2018","unstructured":"Hsieh PJ, Lin WS (2018) Explaining resistance to system usage in the PharmaCloud: a view of the dual-factor model. Inf Manage 55(1):51\u201363. https:\/\/doi.org\/10.1016\/j.im.2017.03.008","journal-title":"Inf Manage"},{"issue":"4","key":"4346_CR35","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TSC.2011.30","volume":"5","author":"C Li","year":"2012","unstructured":"Li C, Raghunathan A, Jha NK (2012) A trusted virtual machine in an untrusted management environment. IEEE Trans Serv Comput 5(4):472\u2013483. https:\/\/doi.org\/10.1109\/TSC.2011.30","journal-title":"IEEE Trans Serv Comput"},{"issue":"5","key":"4346_CR36","first-page":"24","volume":"6","author":"LY Chen","year":"2017","unstructured":"Chen LY (2017) Perceived risk and trust in the adoption of cloud computing services and their effects on organizational performance. Int J Adv Stud Comput Sci Eng 6(5):24\u201331","journal-title":"Int J Adv Stud Comput Sci Eng"},{"key":"4346_CR37","unstructured":"Wang G, Chen S, Liu J (2015) An environment-aware anomaly detection framework of cloud platform for improving its dependability. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2015, pp 431\u2013437. WorldComp"},{"key":"4346_CR38","doi-asserted-by":"publisher","DOI":"10.1177\/0972150920957173","author":"E Cengiz","year":"2020","unstructured":"Cengiz E, Bak\u0131rta H (2020) Technology acceptance model 3 in understanding employee\u2019s cloud computing technology. Glob Bus Rev. https:\/\/doi.org\/10.1177\/0972150920957173","journal-title":"Glob Bus Rev"},{"key":"4346_CR39","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.chb.2012.07.032","volume":"29","author":"SC Park","year":"2013","unstructured":"Park SC, Ryoo SY (2013) An empirical investigation of end-users\u2019 switching toward cloud computing: a two factor theory perspective. Comput Hum Behav 29:160\u2013170. https:\/\/doi.org\/10.1016\/j.chb.2012.07.032","journal-title":"Comput Hum Behav"},{"key":"4346_CR40","doi-asserted-by":"publisher","DOI":"10.5772\/10381","volume-title":"Dependability of E-information sources","author":"J Capek","year":"2010","unstructured":"Capek J (2010) Dependability of E-information sources. IntechOpen, London"},{"key":"4346_CR41","unstructured":"Chavez F (2015) Cloud-based soft real-time systems for monitoring and controlling distributed industrial operations: a feasibility study. Dissertation, Colorado Technical University"},{"key":"4346_CR42","doi-asserted-by":"publisher","unstructured":"Guan Q, Chiu CC, Fu S (2012) CDA: a cloud dependability analysis framework for characterizing system dependability in cloud computing infrastructures. In: Proceedings of 18th Pacific Rim International Symposium on Dependable Computing, 2012, pp 11\u201320. IEEE. https:\/\/doi.org\/10.1109\/PRDC.2012.10","DOI":"10.1109\/PRDC.2012.10"},{"issue":"2","key":"4346_CR43","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1108\/09685229510088575","volume":"3","author":"KJ Fitzgerald","year":"1995","unstructured":"Fitzgerald KJ (1995) Information security baselines. Inf Manag Comput Secur 3(2):8\u201312. https:\/\/doi.org\/10.1108\/09685229510088575","journal-title":"Inf Manag Comput Secur"},{"key":"4346_CR44","doi-asserted-by":"crossref","unstructured":"Littlewood B, Strigini L (2000) Software reliability and dependability: a Roadmap. In: Proceedings of the Conference on the Future of Software Engineering, 2000, pp 177\u2013188. ACM","DOI":"10.1145\/336512.336551"},{"key":"4346_CR45","doi-asserted-by":"crossref","unstructured":"Khan MA, Kerkhoff HG (2013) Monitoring operating temperature and supply voltage in achieving high system dependability. In: Proceedings of 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, pp 108\u2013112. IEEE","DOI":"10.1109\/DTIS.2013.6527788"},{"key":"4346_CR46","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1016\/j.jss.2009.02.029","volume":"82","author":"JY Lai","year":"2009","unstructured":"Lai JY, Chen WH (2009) Measuring e-business dependability: the employee perspective. J Syst Softw 82:1046\u20131055. https:\/\/doi.org\/10.1016\/j.jss.2009.02.029","journal-title":"J Syst Softw"},{"issue":"3","key":"4346_CR47","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10796-013-9450-9","volume":"17","author":"V Cho","year":"2015","unstructured":"Cho V, Chan A (2015) An integrative framework of comparing SaaS adoption for core and non-core business operations: an empirical study on Hong Kong industries. Inf Syst Front 17(3):629\u2013644. https:\/\/doi.org\/10.1007\/s10796-013-9450-9","journal-title":"Inf Syst Front"},{"issue":"3","key":"4346_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.17705\/1pais.11303","volume":"11","author":"S Tripathi","year":"2019","unstructured":"Tripathi S (2019) Determinants of cloud computing adoption: a comparative study. Pac Asia J Assoc Inf Syst 11(3):28\u201354. https:\/\/doi.org\/10.17705\/1pais.11303","journal-title":"Pac Asia J Assoc Inf Syst"},{"issue":"3","key":"4346_CR49","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1108\/JEIM-02-2014-0017","volume":"28","author":"F Safari","year":"2015","unstructured":"Safari F, Safari N, Hasanzadeh A (2015) The adoption of software-as-a-service (SaaS): ranking the determinant. J Enterp Inf Manag 28(3):400\u2013422. https:\/\/doi.org\/10.1108\/JEIM-02-2014-0017","journal-title":"J Enterp Inf Manag"},{"key":"4346_CR50","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s40747-016-0021-9","volume":"2","author":"F Alharbi","year":"2016","unstructured":"Alharbi F, Atkins A, Stanier C (2016) Understanding the determinants of cloud computing adoption in Saudi healthcare organizations. Complex Intell Syst 2:155\u2013171. https:\/\/doi.org\/10.1007\/s40747-016-0021-9","journal-title":"Complex Intell Syst"},{"key":"4346_CR51","doi-asserted-by":"publisher","unstructured":"Adiyasa H, Hidayanto AN, Pinem AA, Solikin NES, Putri PBM (2018) Exploring the factors for cloud computing adoption in Indonesia. In: Proceedings of International Conference on Computing, Engineering, and Design, 2018, pp 137\u2013142. IEEE. https:\/\/doi.org\/10.1109\/ICCED.2018.00035","DOI":"10.1109\/ICCED.2018.00035"},{"key":"4346_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techsoc.2019.101225","volume":"60","author":"A Khayer","year":"2019","unstructured":"Khayer A, Talukder MS, Bao Y, Hossain MN (2019) Cloud computing adoption and its impact on SMEs\u2019 performance for cloud supported operations: a dual-stage analytical approach. Technol Soc 60:1\u201336. https:\/\/doi.org\/10.1016\/j.techsoc.2019.101225","journal-title":"Technol Soc"},{"issue":"2","key":"4346_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/ITP-03-2019-0119","volume":"34","author":"O Ali","year":"2020","unstructured":"Ali O, Shrestha A, Osmanaj V, Muhammed S (2020) Cloud computing technology adoption: an evaluation of key factors in local governments. Inf Technol People 34(2):1\u201338. https:\/\/doi.org\/10.1108\/ITP-03-2019-0119","journal-title":"Inf Technol People"},{"key":"4346_CR54","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s12564-019-09611-2","volume":"21","author":"F Shahzad","year":"2020","unstructured":"Shahzad F, Xiu G, Khan I, Shahbaz M, Riaz MU, Abbas A (2020) The moderating role of intrinsic motivation in cloud computing adoption in online education in a developing country: a structural equation model. Asia Pac Educ Rev 21:121\u2013141. https:\/\/doi.org\/10.1007\/s12564-019-09611-2","journal-title":"Asia Pac Educ Rev"},{"key":"4346_CR55","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s10796-019-09912-2","volume":"22","author":"R El-Haddadeh","year":"2020","unstructured":"El-Haddadeh R (2020) Digital innovation dynamics influence on organizational adoption: the case of cloud computing services. Inf Syst Front 22:985\u2013999. https:\/\/doi.org\/10.1007\/s10796-019-09912-2","journal-title":"Inf Syst Front"},{"issue":"3","key":"4346_CR56","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.32604\/cmc.2021.014099","volume":"66","author":"AK Bhardwaj","year":"2021","unstructured":"Bhardwaj AK, Garg L, Garg A, Gajpal Y (2021) E-learning during COVID-19 outbreak: cloud computing adoption in Indian public universities. Comput, Mater Continua 66(3):2471\u20132492. https:\/\/doi.org\/10.32604\/cmc.2021.014099","journal-title":"Comput, Mater Continua"},{"key":"4346_CR57","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.chb.2016.03.073","volume":"62","author":"SK Sharma","year":"2016","unstructured":"Sharma SK, Al-Badi AH, Govindaluri SM, Al-Kharusi MH (2016) Predicting motivators of cloud computing adoption: a developing country perspective. Comput Hum Behav 62:61\u201369. https:\/\/doi.org\/10.1016\/j.chb.2016.03.073","journal-title":"Comput Hum Behav"},{"issue":"25","key":"4346_CR58","doi-asserted-by":"publisher","first-page":"114","DOI":"10.19101\/IJACR.2016.626019","volume":"6","author":"MB Alotaibi","year":"2016","unstructured":"Alotaibi MB (2016) Antecedents of software-as-a-service (SaaS) adoption: a structural equation model. Int J Adv Comput Res 6(25):114\u2013129. https:\/\/doi.org\/10.19101\/IJACR.2016.626019","journal-title":"Int J Adv Comput Res"},{"key":"4346_CR59","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s12243-016-0553-4","volume":"72","author":"R Amin","year":"2017","unstructured":"Amin R, Inayat I, Shahzad B, Saleem K, Aijun L (2017) An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective. Ann Telecommun 72:253\u2013264. https:\/\/doi.org\/10.1007\/s12243-016-0553-4","journal-title":"Ann Telecommun"},{"issue":"1","key":"4346_CR60","doi-asserted-by":"publisher","first-page":"134","DOI":"10.33736\/ijbs.3231.2020","volume":"21","author":"H Sallehudin","year":"2020","unstructured":"Sallehudin H, Aman AHM, Razak RC, Ismail M, Bakar NAA, Fadzil AFM, Baker R (2020) Performance and key factors of cloud computing implementation in the public sector. Int J Bus Soc 21(1):134\u2013152. https:\/\/doi.org\/10.33736\/ijbs.3231.2020","journal-title":"Int J Bus Soc"},{"key":"4346_CR61","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10639-019-09932-0","volume":"25","author":"Z Asadi","year":"2020","unstructured":"Asadi Z, Abdekhoda M, Nadrian H (2020) Cloud computing services adoption among higher education faculties: development of a standardized questionnaire. Educ Inf Technol 25:175\u2013191. https:\/\/doi.org\/10.1007\/s10639-019-09932-0","journal-title":"Educ Inf Technol"},{"key":"4346_CR62","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2021.1915477","author":"M Fretschner","year":"2021","unstructured":"Fretschner M, Clauss T, Hagenau T, L\u00fcthje C (2021) CEOs\u2019 search for alignment: the impact of strategic orien- tations on an extended adoption of software as-a-service in SME. Technol Anal Strateg Manage. https:\/\/doi.org\/10.1080\/09537325.2021.1915477","journal-title":"Technol Anal Strateg Manage"},{"issue":"7","key":"4346_CR63","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1108\/02635571111161262","volume":"111","author":"C Low","year":"2011","unstructured":"Low C, Chen Y, Wu M (2011) Understanding the determinants of cloud computing adoption. Ind Manag Data Syst 111(7):1006\u20131023. https:\/\/doi.org\/10.1108\/02635571111161262","journal-title":"Ind Manag Data Syst"},{"issue":"6","key":"4346_CR64","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2012.04.001","volume":"32","author":"PF Hsu","year":"2012","unstructured":"Hsu PF, Ray S, Li-Hsieh YY (2012) Cloud computing as an innovation: perception, attitude, and adoption. Int J Inf Manage 32(6):533\u2013540. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2012.04.001","journal-title":"Int J Inf Manage"},{"issue":"4","key":"4346_CR65","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/j.ijinfomgt.2014.04.006","volume":"34","author":"PF Hsu","year":"2014","unstructured":"Hsu PF, Ray S, Li-Hsieh YY (2014) Examining cloud computing adoption intention, pricing mechanism, and deployment model. Int J Inf Manage 34(4):474\u2013488. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.04.006","journal-title":"Int J Inf Manage"},{"issue":"11","key":"4346_CR66","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.3844\/jcssp.2014.2315.2329","volume":"10","author":"MB Alotaibi","year":"2014","unstructured":"Alotaibi MB (2014) Exploring users\u2019 attitudes and intentions toward the adoption of cloud computing in Saudi Arabia: an empirical investigation. J Comput Sci 10(11):2315\u20132329. https:\/\/doi.org\/10.3844\/jcssp.2014.2315.2329","journal-title":"J Comput Sci"},{"issue":"1","key":"4346_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/palgrave.jit.2000056","volume":"21","author":"A Jeyaraj","year":"2006","unstructured":"Jeyaraj A, Rottman JW, Lacity MC (2006) A review of the predictors, linkages, and biases in IT innovation adoption research. J Inf Technol 21(1):1\u201323. https:\/\/doi.org\/10.1057\/palgrave.jit.2000056","journal-title":"J Inf Technol"},{"issue":"1","key":"4346_CR68","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10257-012-0212-x","volume":"12","author":"E MacLennan","year":"2014","unstructured":"MacLennan E, Van Belle JP (2014) Factors affecting the organizational adoption of service-oriented architecture (SOA). IseB 12(1):71\u2013100. https:\/\/doi.org\/10.1007\/s10257-012-0212-x","journal-title":"IseB"},{"issue":"1","key":"4346_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10919390802198907","volume":"19","author":"HS Rhee","year":"2009","unstructured":"Rhee HS, Riggins FJ, Kim C (2009) The impact of product type and perceived characteristics of the web on multifaceted online shopping behavior. J Organ Comput Electron Commer 19(1):1\u201329. https:\/\/doi.org\/10.1080\/10919390802198907","journal-title":"J Organ Comput Electron Commer"},{"issue":"2","key":"4346_CR70","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1057\/ejis.2009.11","volume":"18","author":"Y Lee","year":"2009","unstructured":"Lee Y, Larsen KR, Han HJ (2009) Threat or coping appraisal: determinants of SMB executives\u2019 decision to adopt anti-malware software. Eur J Inf Syst 18(2):177\u2013187. https:\/\/doi.org\/10.1057\/ejis.2009.11","journal-title":"Eur J Inf Syst"},{"issue":"5","key":"4346_CR71","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.im.2017.10.001","volume":"55","author":"HC Chae","year":"2018","unstructured":"Chae HC, Koh CE, Park KO (2018) Information technology capability and firm performance: role of industry. Inf Manage 55(5):525\u2013546. https:\/\/doi.org\/10.1016\/j.im.2017.10.001","journal-title":"Inf Manage"},{"issue":"8","key":"4346_CR72","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1080\/02642060903437576","volume":"31","author":"S Dimitriadis","year":"2011","unstructured":"Dimitriadis S, Kyrezis N (2011) The effect of trust, channel technology, and transaction type on the adoption of self- service bank channels. Serv Ind J 31(8):1293\u20131310. https:\/\/doi.org\/10.1080\/02642060903437576","journal-title":"Serv Ind J"},{"issue":"11","key":"4346_CR73","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.1016\/j.jbusres.2011.06.025","volume":"64","author":"H Choi","year":"2011","unstructured":"Choi H, Kim Y, Kim J (2011) Driving factors of post adoption behavior in mobile data services. J Bus Res 64(11):1212\u20131217. https:\/\/doi.org\/10.1016\/j.jbusres.2011.06.025","journal-title":"J Bus Res"},{"key":"4346_CR74","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.chb.2015.12.067","volume":"58","author":"I Arpaci","year":"2016","unstructured":"Arpaci I (2016) Understanding and predicting students\u2019 intention to use mobile cloud storage services. Comput Hum Behav 58:150\u2013157. https:\/\/doi.org\/10.1016\/j.chb.2015.12.067","journal-title":"Comput Hum Behav"},{"issue":"4","key":"4346_CR75","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1016\/j.chb.2013.01.037","volume":"29","author":"S Sintonen","year":"2013","unstructured":"Sintonen S, Immonen M (2013) Telecare services for aging people: assessment of critical factors influencing the adoption intention. Comput Hum Behav 29(4):1307\u20131317. https:\/\/doi.org\/10.1016\/j.chb.2013.01.037","journal-title":"Comput Hum Behav"},{"issue":"5","key":"4346_CR76","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","volume":"33","author":"P Gupta","year":"2013","unstructured":"Gupta P, Seetharaman A, Raj JR (2013) The usage and adoption of cloud computing by small and medium businesses. Int J Inf Manage 33(5):861\u2013874. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.07.001","journal-title":"Int J Inf Manage"},{"issue":"2","key":"4346_CR77","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1080\/0144929X.2010.489118","volume":"30","author":"TS Behrend","year":"2011","unstructured":"Behrend TS, Wiebe EN, London JE, Johnson EC (2011) Cloud computing adoption and usage in community colleges. Behav Inf Technol 30(2):231\u2013240. https:\/\/doi.org\/10.1080\/0144929X.2010.489118","journal-title":"Behav Inf Technol"},{"issue":"5","key":"4346_CR78","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1080\/02642060902719958","volume":"29","author":"SY Yousafzai","year":"2009","unstructured":"Yousafzai SY, Foxall G, Pallister J (2009) Multi-dimensional role of trust in Internet banking adoption. Serv Ind J 29(5):591\u2013605. https:\/\/doi.org\/10.1080\/02642060902719958","journal-title":"Serv Ind J"},{"key":"4346_CR79","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.dss.2014.12.005","volume":"70","author":"S Goode","year":"2015","unstructured":"Goode S, Lin C, Tsai JC, Jiang JJ (2015) Rethinking the role of security in client satisfaction with Software-as-a- Service (SaaS) providers. Decis Support Syst 70:73\u201385. https:\/\/doi.org\/10.1016\/j.dss.2014.12.005","journal-title":"Decis Support Syst"},{"key":"4346_CR80","doi-asserted-by":"publisher","unstructured":"Shaw N (2015) The mediating role of perceived security: an empirical study of mobile wallet adoption in USA. In: Proceedings of International Conference on HCI in Business, 2015, vol. 9191, pp 358\u2013369. Springer. https:\/\/doi.org\/10.1007\/978-3-319-20895-4_33","DOI":"10.1007\/978-3-319-20895-4_33"},{"issue":"1","key":"4346_CR81","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.hitech.2015.04.005","volume":"26","author":"V Dutot","year":"2015","unstructured":"Dutot V (2015) Factors influencing near field communication (NFC) adoption: an extended TAM approach. J High Technol Manage Res 26(1):45\u201357. https:\/\/doi.org\/10.1016\/j.hitech.2015.04.005","journal-title":"J High Technol Manage Res"},{"issue":"3","key":"4346_CR82","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.ijinfomgt.2013.01.006","volume":"33","author":"SG Lee","year":"2013","unstructured":"Lee SG, Chae SH, Cho KM (2013) Drivers and inhibitors of SaaS adoption in Korea. Int J Inf Manage 33(3):429\u2013440. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.01.006","journal-title":"Int J Inf Manage"},{"key":"4346_CR83","unstructured":"Demirhan D, Jaco V, Raghunatha S (2002) Strategic IT investments: impact of switching cost and declining technology cost. In: Proceedings of 23th International Conference on Information Systems, 2002, pp 469\u2013480. AIS Electronic Library"},{"key":"4346_CR84","doi-asserted-by":"crossref","unstructured":"Lim J, Richardson VJ, Roberts TL (2004) Information technology investment and firm performance: a meta-analysis. In: Proceedings of 37th Annual Hawaii International Conference on System Sciences, 2004, pp 1\u201310. IEEE","DOI":"10.1109\/HICSS.2004.1265512"},{"issue":"3","key":"4346_CR85","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.ijinfomgt.2009.09.007","volume":"30","author":"Y Zhu","year":"2010","unstructured":"Zhu Y, Li Y, Wang W, Chen J (2010) What leads to post-implementation success of ERP? An empirical study of the Chinese retail industry. Int J Inf Manage 30(3):265\u2013276. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2009.09.007","journal-title":"Int J Inf Manage"},{"key":"4346_CR86","unstructured":"UN (2018) UN E-Government Survey. https:\/\/www.un.org\/development\/desa\/publications\/2018-un-e-government-survey.html. Accessed 10 June 2021"},{"key":"4346_CR87","unstructured":"Lee JD, Kim W, Kim TY (2003) The role of IT, R&D in industrial productivity growth: evidence from Korea. In: Proceedings of Evaluation of Government Funded R&D Activities Conference, 2003, pp 1\u201317. ZEW"},{"issue":"3","key":"4346_CR88","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1108\/IMR-09-2014-0304","volume":"33","author":"J Henseler","year":"2016","unstructured":"Henseler J, Ringle CM, Sarstedt M (2016) Testing measurement invariance of composites using partial least square. Int Mark Rev 33(3):405\u2013431. https:\/\/doi.org\/10.1108\/IMR-09-2014-0304","journal-title":"Int Mark Rev"},{"issue":"1","key":"4346_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2007.03.005","volume":"45","author":"I Im","year":"2008","unstructured":"Im I, Kim Y, Han HJ (2008) The effects of perceived risk and technology type on users\u2019 acceptance of technologies. Inf Manage 45(1):1\u20139. https:\/\/doi.org\/10.1016\/j.im.2007.03.005","journal-title":"Inf Manage"},{"key":"4346_CR90","doi-asserted-by":"publisher","unstructured":"Sun P, Wang X (2012) Application of ant colony optimization in preventive software maintenance policy. In: Proceedings of International Conference on Information Science and Technology, 2012, pp 141\u2013144. IEEE. https:\/\/doi.org\/10.1109\/ICIST.2012.6221624","DOI":"10.1109\/ICIST.2012.6221624"},{"key":"4346_CR91","unstructured":"Statista (2019) South Korea: internet penetration 2000\u20132018. URL https:\/\/www.statista.com\/statistics\/255859\/internet-penetration-in-south-korea\/. Accessed 10 June 2021"},{"key":"4346_CR92","unstructured":"Statista (2020) Internet usage in South Korea. URL https:\/\/www.statista.com\/topics\/2230\/internet-usage-in-south-korea\/. Accessed 10 June 2021"},{"issue":"2","key":"4346_CR93","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/17517575.2012.690453","volume":"8","author":"AP Ciganek","year":"2014","unstructured":"Ciganek AP, Haseman WD, Ramamurthy K (2014) Time to decision: the drivers of innovation adoption decisions. Enterp Inf Syst 8(2):279\u2013308. https:\/\/doi.org\/10.1080\/17517575.2012.690453","journal-title":"Enterp Inf Syst"},{"issue":"2","key":"4346_CR94","first-page":"335","volume":"5","author":"G Oskarsso","year":"2009","unstructured":"Oskarsso G (2009) Information technology capabilities and their impact on the transfer of external information. Rev Polit Adm 5(2):335\u2013361","journal-title":"Rev Polit Adm"},{"issue":"1","key":"4346_CR95","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/25148829","volume":"32","author":"Y Xue","year":"2008","unstructured":"Xue Y, Liang H, Boulton WR (2008) Information technology governance in information technology investment decision processes: the impact of investment characteristics, external environment, and internal context. MIS Q 32(1):67\u201396. https:\/\/doi.org\/10.2307\/25148829","journal-title":"MIS Q"},{"key":"4346_CR96","doi-asserted-by":"publisher","unstructured":"Al-Dwairi RM, Al-Tweit N, Zyout K (2018) Factors influencing cloud-computing adoption in small and medium E-commerce enterprises in Jordan. In: Proceedings of International Conference on Internet and e-Business, 2018, pp 73\u201378. ACM. https:\/\/doi.org\/10.1145\/3230348.3230370","DOI":"10.1145\/3230348.3230370"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04346-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04346-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04346-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T13:13:31Z","timestamp":1726751611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04346-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,28]]},"references-count":96,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4346"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04346-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,28]]},"assertion":[{"value":"30 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}