{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:19:11Z","timestamp":1775470751062,"version":"3.50.1"},"reference-count":43,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6,8]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>The purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several questions have been raised about the reliability of these promising but ambiguous offers, as the adoption of a cloud solution within an enterprise is generally accompanied by a change in the chief information officer (CIOs) role and loss of expertise.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>The research uses a mixed research methodology: a first step is based on a questionnaire survey to investigate the security aspects of open source and understand the role of CIOs in the migration process. The investigation involved nearly 800 companies operating in the cloud computing sector in 16 European countries between November 2015 and January 2016. Then, this paper completes the research with a qualitative study by examining the activity of two sample companies.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>Research confirms that open source cloud solutions offer a higher level of security than proprietary solutions. It is also noted that the role of CIOs is delegated to a third external actor: a transition CIO. Transition CIO is the guarantor of the strategic and security choices of small and medium enterprises.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Research limitations\/implications<\/jats:title>\n                  <jats:p>These findings have important implications and great value to managers and cloud computing providers, in terms of formulating better cloud computing solutions. This study can also assist in increasing their understanding of the new role of CIO in the migration process to cloud computing.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This study contributes to the body of research on cloud computing. It is first of its kind with its focus on open source alternatives. Another novelty of this research is that it suggests a new conception for the CIOs role in the migration to cloud computing. Finally, the findings of this study would serve as a European market study to different companies interested in cloud computing.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ics-01-2017-0001","type":"journal-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T10:43:50Z","timestamp":1590403430000},"page":"199-213","source":"Crossref","is-referenced-by-count":4,"title":["Cloud computing in SMEs: towards delegation of the CIO role"],"prefix":"10.1108","volume":"28","author":[{"given":"Wafa","family":"Bouaynaya","sequence":"first","affiliation":[{"name":"University of Picardy Graduate School of Management and CRIISEA Research Center, , Amiens,","place":["France"]}]}],"member":"140","published-online":{"date-parts":[[2020,5,28]]},"reference":[{"issue":"3","key":"2025081309503728500_ref001","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1108\/17410391311325225","article-title":"Cloud computing adoption by SMEs in the North East of England","volume":"26","author":"Alshamaila","year":"2013","journal-title":"Journal of Enterprise Information Management"},{"issue":"1","key":"2025081309503728500_ref002","first-page":"31","article-title":"Community relationship management and social media","volume":"18","author":"Ang","year":"2011","journal-title":"Journal of Database Marketing and Customer Strategy Management"},{"issue":"4","key":"2025081309503728500_ref003","doi-asserted-by":"crossref","first-page":"730","DOI":"10.3917\/sim.084.0007","article-title":"Une \u00e9tude des comportements li\u00e9s \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information en PME","volume":"13","author":"Barlette","year":"2008","journal-title":"Syst\u00e8mes D'information and Management"},{"key":"2025081309503728500_ref004","article-title":"La performance des op\u00e9rations d\u2019externalisation: une analyse empirique des d\u00e9terminants","volume-title":"13th International Conference of Strategic Management","author":"Barth\u00e9lemy","year":"2004"},{"issue":"4","key":"2025081309503728500_ref005","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1046\/j.1365-2575.2001.00111.x","article-title":"The power of gifts: organizing social relationships in open source communities","volume":"11","author":"Bergquist","year":"2001","journal-title":"Information Systems Journal"},{"key":"2025081309503728500_ref006","article-title":"Evolution et nouveau r\u00f4le des DSI? Le SI et ses utilisa-tueurs","volume-title":"Management \u00e0 l\u2019\u00e9preuve des Syst\u00e8mes d\u2019Information 19th AIM conference","author":"Bertin","year":"2014"},{"issue":"5","key":"2025081309503728500_ref007","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.59","article-title":"A spiral model of software development and enhancement","volume":"21","author":"Boehm","year":"1988","journal-title":"Computer"},{"key":"2025081309503728500_ref028a","first-page":"1","article-title":"Characterization of cloud computing reversibility as explored by the DELPHI method","author":"Bouaynaya","year":"2019","journal-title":"Information Systems Frontiers"},{"issue":"10","key":"2025081309503728500_ref028b","doi-asserted-by":"crossref","first-page":"3488","DOI":"10.3390\/s18103488","article-title":"Exploring risks transferred from cloud-based information systems: a quantitative and longitudinal model","volume":"18","author":"Bouaynaya","year":"2018","journal-title":"Sensors"},{"key":"2025081309503728500_ref008","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/EUROMICRO.2005.53","article-title":"Software security analysis-execution phase audit","volume-title":"31st EUROMICRO Conference on Software Engineering and Advanced Applications","author":"Carlsson","year":"2005"},{"issue":"6","key":"2025081309503728500_ref009","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.im.2009.05.005","article-title":"CIO roles and responsibilities: twenty-five years of evolution and change","volume":"46","author":"Chun","year":"2009","journal-title":"Information and Management"},{"issue":"3","key":"2025081309503728500_ref010","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3917\/docsi.503.0004","article-title":"Community manager: une l\u00e9gitimit\u00e9 m\u00e9tier","volume":"50","author":"Ertzscheid","year":"2013","journal-title":"Documentaliste-Sciences de L'information"},{"key":"2025081309503728500_ref011","doi-asserted-by":"crossref","first-page":"587","DOI":"10.2307\/25148740","article-title":"The transformation of open source software","volume":"1","author":"Fitzgerald","year":"2006","journal-title":"MIS Quarterly"},{"key":"2025081309503728500_ref029a","volume-title":"The Costs and Risks of Open Source","author":"Giera","year":"2004"},{"issue":"1","key":"2025081309503728500_ref012","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3917\/sim.111.0035","article-title":"La dynamique de transformation de la direction des syst\u00e8mes d\u2019information","volume":"16","author":"Guillemette","year":"2011","journal-title":"Syst\u00e8mes D\u2019information and Management"},{"issue":"4","key":"2025081309503728500_ref013","first-page":"157","article-title":"CIO and business executive leadership approaches to establishing company-wde information orientation","volume":"10","author":"Kettinger","year":"2011","journal-title":"MIS Quarterly Executive"},{"issue":"2","key":"2025081309503728500_ref014","first-page":"738","article-title":"Les business models des soci\u00e9t\u00e9s de services actives dans le secteur open source","volume":"14","author":"Lisein","year":"2009","journal-title":"Syst\u00e8mes D\u2019information and Management"},{"issue":"4","key":"2025081309503728500_ref015","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1057\/palgrave.ejis.3000373","article-title":"Open source movements as a model for organising","volume":"9","author":"Ljungberg","year":"2000","journal-title":"European Journal of Information Systems"},{"key":"2025081309503728500_ref016","first-page":"752","article-title":"Cloud computing interoperability: the state of play","volume-title":"Cloud Computing Technology and Science (CloudCom), IEEE Third International Conference on. IEEE","author":"Loutas","year":"2011"},{"issue":"7","key":"2025081309503728500_ref017","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1108\/02635571111161262","article-title":"Understanding the determinants of cloud computing adoption","volume":"111","author":"Low","year":"2011","journal-title":"Industrial Management and Data Systems"},{"issue":"4","key":"2025081309503728500_ref018","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/13645570210132848","article-title":"Developing quality standards for cross-national survey research: five approaches","volume":"6","author":"Lynn","year":"2003","journal-title":"International Journal of Social Research Methodology"},{"key":"2025081309503728500_ref035a","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-145","article-title":"The NIST definition of cloud computing","author":"Mell","year":"2011"},{"issue":"3","key":"2025081309503728500_ref019","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1046\/j.1365-2575.2003.00143.x","article-title":"The paucity of multimethod research: a review of the information systems literature","volume":"13","author":"Mingers","year":"2003","journal-title":"Information Systems Journal"},{"issue":"3","key":"2025081309503728500_ref020","doi-asserted-by":"crossref","first-page":"795","DOI":"10.25300\/MISQ\/2013\/37:3.3","article-title":"Introduction [special issue: critical realism in information systems research]","volume":"37","author":"Mingers","year":"2013","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025081309503728500_ref021","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","article-title":"Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors","volume":"51","author":"Oliveira","year":"2014","journal-title":"Information and Management"},{"issue":"4","key":"2025081309503728500_ref022","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TSE.2004.1274044","article-title":"An empirical study of open-source and closed-source software products","volume":"30","author":"Paulson","year":"2004","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"2025081309503728500_ref023","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1046\/j.1365-2575.2002.00118.x","article-title":"On the security of open source software","volume":"12","author":"Payne","year":"2002","journal-title":"Information Systems Journal"},{"issue":"4","key":"2025081309503728500_ref024","first-page":"31","article-title":"Clarifying the ambiguous role of the CIO","volume":"10","author":"Peppard","year":"2011","journal-title":"MIS Quarterly Executive"},{"key":"2025081309503728500_ref025","first-page":"62","article-title":"Portability and interoperability between clouds: challenges and case study","volume-title":"European Conference on a Service-Based Internet","author":"Petcu","year":"2011"},{"issue":"2","key":"2025081309503728500_ref026","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v3i2.578","article-title":"The cathedral and the bazaar","volume":"3","author":"Raymond","year":"1998","journal-title":"First Monday"},{"key":"2025081309503728500_ref027","article-title":"Decoding the \u201cFree\/open source (F\/OSS) software puzzle\u201d a survey of theoretical and empirical contributions","volume":"424","author":"Rossi","year":"2004","journal-title":"Quaderni"},{"key":"2025081309503728500_ref028c","article-title":"The evolving role of the CIO","author":"Ross","year":"1999","journal-title":"Center for Information Systems Research MIT"},{"issue":"12","key":"2025081309503728500_ref028","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/TSE.2017.2766070","article-title":"Entropy based software reliability analysis of multi-version open source software","volume":"44","author":"Singh","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2025081309503728500_ref029","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.entcs.2009.02.058","article-title":"Evaluating the quality of open source software","volume":"233","author":"Spinellis","year":"2009","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"2025081309503728500_ref030","article-title":"Copyleft: pragmatic idealism","volume-title":"Free Software Free Society: Selected Essays of Richard M. Stallman","author":"Stallman","year":"2010"},{"issue":"1","key":"2025081309503728500_ref031","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1046\/j.1365-2575.2002.00117.x","article-title":"Code quality analysis in open source software development","volume":"12","author":"Stamelos","year":"2002","journal-title":"Information Systems Journal"},{"issue":"2","key":"2025081309503728500_ref01a","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/09537325.2012.647644","article-title":"Organisational culture and cloud computing: coping with a disruptive innovation","volume":"24","author":"Sultan","year":"2012","journal-title":"Technology Analysis & Strategic Management"},{"issue":"3","key":"2025081309503728500_ref05a","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.jsis.2007.06.001","article-title":"The open source software phenomenon: characteristics that promote research","volume":"16","author":"Von Krogh","year":"2007","journal-title":"The Journal of Strategic Information Systems"},{"key":"2025081309503728500_ref032","doi-asserted-by":"crossref","first-page":"649","DOI":"10.2307\/41703471","article-title":"Carrots and rainbows: motivation and social practice in open source software development","volume":"1","author":"Von Krogh","year":"2012","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025081309503728500_ref033","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1108\/ICS-09-2015-0037","article-title":"Cloud computing assurance \u2013 a review of literature guidance","volume":"25","author":"Von Solms","year":"2017","journal-title":"Information and Computer Security"},{"issue":"3","key":"2025081309503728500_ref034","first-page":"15","article-title":"The chief information security officer: an analysis of the skills required for success","volume":"48","author":"Whitten","year":"2008","journal-title":"Journal of Computer Information Systems"},{"issue":"5","key":"2025081309503728500_ref035","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1108\/09685220810920530","article-title":"Evaluating the performance of open source software projects using data envelopment analysis","volume":"16","author":"Wray","year":"2008","journal-title":"Information Management and Computer Security"},{"key":"2025081309503728500_ref036","first-page":"1328","article-title":"Information security risk management framework for the cloud computing environments","volume-title":"Computer and Information Technology (CIT), IEEE 10th International Conference","author":"Zhang","year":"2010"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2017-0001\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/28\/2\/199\/10066840\/ics-01-2017-0001.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/28\/2\/199\/10066840\/ics-01-2017-0001.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T13:50:47Z","timestamp":1755093047000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/28\/2\/199\/1274392\/Cloud-computing-in-SMEs-towards-delegation-of-the"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,28]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6,8]]}},"URL":"https:\/\/doi.org\/10.1108\/ics-01-2017-0001","relation":{},"ISSN":["2056-4961","2056-497X"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-497X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,28]]}}}