{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:40:14Z","timestamp":1760985614571,"version":"3.41.2"},"reference-count":29,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T00:00:00Z","timestamp":1510531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,11,13]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of the cloud.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The paper uses an empirical approach by means of an exploratory survey, using descriptive statistics and <jats:italic>t<\/jats:italic>-tests to determine significant differences among various response groups.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The findings reveal that current and prospective cloud users feel that public cloud computing is less secure than on premise systems. These users feel that the public cloud may still be currently too immature for mission-critical system deployments; however, they do expect it to be more secure in the future as the service models become more mature and better technologies become available. None of the cloud adoption risk factors were universally considered to be showstoppers with respect to adoption.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The sample size is relatively small compared to the number of cloud participants. Additionally, respondents were concentrated in the high technology industries in Southern California.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The paper provides some valuable insight into cloud adoption and concludes that despite hyped security fears, the risks and threats of the cloud are well understood and that with proper planning and implementation, organizations can adopt cloud technologies with no additional risk.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-07-2016-0051","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T19:12:43Z","timestamp":1507057963000},"page":"634-659","source":"Crossref","is-referenced-by-count":16,"title":["To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions"],"prefix":"10.1108","volume":"25","author":[{"given":"Takahiko","family":"Kajiyama","sequence":"first","affiliation":[]},{"given":"Murray","family":"Jennex","sequence":"additional","affiliation":[]},{"given":"Theophilus","family":"Addo","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"11","key":"key2020120420541387600_ref001","doi-asserted-by":"crossref","first-page":"718","DOI":"10.7753\/IJCATR0311.1013","article-title":"Knowledge management in the cloud: benefits and risks","volume":"3","year":"2014","journal-title":"International Journal of Computer Applications Technology and Research"},{"first-page":"1","article-title":"Secure cloud computing: benefits, risks and controls","year":"2011","key":"key2020120420541387600_ref002"},{"key":"key2020120420541387600_ref003","unstructured":"CFO Research Services (2009), \u201cThe high cost of change for ERP: what does it cost to keep up to date?\u201d, available at: http:\/\/secure.cfo.com\/whitepapers\/index.cfm\/download\/13316055"},{"issue":"2","key":"key2020120420541387600_ref004","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: development of a measure and initial test","volume":"19","year":"1995","journal-title":"MIS Quarterly"},{"year":"2011","key":"key2020120420541387600_ref005","article-title":"A survey of risks, threats and vulnerabilities in cloud computing"},{"issue":"3","key":"key2020120420541387600_ref006","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","year":"1989","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120420541387600_ref007","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1287\/isre.3.1.60","article-title":"Information systems success: the quest for the dependent variable","volume":"3","year":"1992","journal-title":"Information Systems Research"},{"issue":"4","key":"key2020120420541387600_ref008","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","article-title":"The DeLone and McLean model of information systems success: a ten-year update","volume":"19","year":"2003","journal-title":"Journal of Management Information Systems"},{"volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","year":"1975","key":"key2020120420541387600_ref009"},{"issue":"1","key":"key2020120420541387600_ref010","article-title":"A quantitative analysis of current security concerns and solutions for cloud computing","volume":"1","year":"2012","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"issue":"2","key":"key2020120420541387600_ref011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijkm.2014040101","article-title":"Integrating KM and security: are we doing enough?","volume":"10","year":"2014","journal-title":"International Journal of Knowledge Management"},{"issue":"3","key":"key2020120420541387600_ref012","doi-asserted-by":"crossref","first-page":"51","DOI":"10.4018\/jkm.2006070104","article-title":"A model of knowledge management success","volume":"2","year":"2006","journal-title":"International Journal of Knowledge Management"},{"issue":"2","key":"key2020120420541387600_ref013","first-page":"783","article-title":"Harnessing the cloud: international law implications of cloud-computing","volume":"12","year":"2012","journal-title":"Chicago Journal of International Law"},{"key":"key2020120420541387600_ref014","unstructured":"National Institute of Standards and Technology (2011), \u201cGuidelines on security and privacy in public cloud computing (Publication No. 800-144)\u201d, available at: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-144\/SP800-144.pdf"},{"key":"key2020120420541387600_ref015","unstructured":"NTT Communications (2015), \u201cCloud reality check 2015: NTT Communications White Paper\u201d, available at: http:\/\/info.us.ntt.com\/rs\/320-KOG-016\/images\/WP-Cloud-Reality-Check.pdf?aliId=5609197 (accessed 28 December 2015)."},{"issue":"2","key":"key2020120420541387600_ref016","first-page":"141","article-title":"Cloud computing security issues","volume":"3","year":"2012","journal-title":"Journal of Defense Resources Management (JoDRM)"},{"issue":"4","key":"key2020120420541387600_ref017","doi-asserted-by":"crossref","first-page":"35","DOI":"10.4018\/IJKM.2015100103","article-title":"Ownership of collaborative works in the cloud","volume":"11","year":"2015","journal-title":"International Journal of Knowledge Management"},{"issue":"1","key":"key2020120420541387600_ref018","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2012.14","article-title":"Security challenges for the public cloud","volume":"16","year":"2012","journal-title":"IEEE Internet Computing"},{"year":"2013","key":"key2020120420541387600_ref019","article-title":"Cloud-computing in banking influential factors, benefits and risks from a decision maker\u2019s perspective"},{"year":"2014","key":"key2020120420541387600_ref020","article-title":"Identifying benefits and risks associated with utilizing cloud computing"},{"issue":"5","key":"key2020120420541387600_ref021","first-page":"247","article-title":"Cloud computing security issues and challenges","volume":"3","year":"2011","journal-title":"International Journal of Computer Networks"},{"key":"key2020120420541387600_ref022","unstructured":"Tsidulko, J. (2016), \u201cThe 10 biggest cloud outages of 2016 (so far)\u201d, CRN, available at: www.crn.com\/slide-shows\/cloud\/300081477\/the-10-biggest-cloud-outages-of-2016-so-far.htm (accessed 6 May 2017)."},{"key":"key2020120420541387600_ref023","article-title":"Benefits and risks of cloud computing","volume":"4","year":"2013","journal-title":"Journal of Technology Research"},{"key":"key2020120420541387600_ref024","unstructured":"US Government Accountability Office (2011a), \u201cSignificant challenges in safeguarding government and privately controlled systems from computer based attacks\u201d, available at: www.gao.gov\/assets\/110\/109004.pdf"},{"key":"key2020120420541387600_ref025","unstructured":"US Government Accountability Office (2011b), \u201cInformation security: additional guidance needed to address cloud computing concerns\u201d, available at: www.gao.gov\/assets\/590\/585638.pdf"},{"key":"key2020120420541387600_ref026","unstructured":"Bond, K. and Hellinger, D. (2011), \u201cOracle reports Q4 GAAP EPS up 34% to 62 cents; Q4 non-GAAP EPS up 25% to 75 cents: Q4 software new license sales up 19%, Q4 total revenue up 13%\u201d, available at: www.oracle.com\/us\/corporate\/investor-relations\/financials\/q4fy11-421266.pdf"},{"key":"key2020120420541387600_ref027","unstructured":"Brocade (2012), \u201cMainstreaming cloud computing\u201d, available at: http:\/\/fcw.com\/\u223c\/media\/GIG\/GIG%2520Custom\/2012%2520Custom%2520Reports\/Q1%2520PDFs\/ResearchReportCloud.ashx&ei=9M2CUPf7EIiA2wXDloHQBQ&usg=AFQjCNEtAuJqvDcrkBHZG2sI9z25Rzyk-Q"},{"key":"key2020120420541387600_ref028","unstructured":"Microsoft: Statistics and Facts (2012), available at: www.statista.com\/topics\/823\/microsoft\/ (accessed 15 December 2015)."},{"key":"key2020120420541387600_ref029","unstructured":"Zetter, K. (2009), \u201cFBI defends disruptive raid on Texas data centers\u201d, available at: www.wired.com\/threatlevel\/2009\/04\/data-centers-ra"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2016-0051\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2016-0051\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:01Z","timestamp":1753406581000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/5\/634-659\/189132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,13]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,11,13]]}},"alternative-id":["10.1108\/ICS-07-2016-0051"],"URL":"https:\/\/doi.org\/10.1108\/ics-07-2016-0051","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2017,11,13]]}}}