{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:44:05Z","timestamp":1773974645039,"version":"3.50.1"},"reference-count":77,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7,11]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to explore the factors that drive the adoption of cloud-based services and further understand the impact of this adoption on the organizational flexibility. This study presents information technology executive\u2019s perspective and discovers new constructs of organizational flexibility that can be achieved due to the adoption of cloud-based services, which is the main contribution of this paper. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This study uses in-depth interview approach. Total 21 Indian cases were studied by interacting with respondents having similar profiles (i.e. CIOs, CTOs, technology heads, and systems managers). Based on the literature review a semi-structured questionnaire was prepared and administered through in-depth interviews. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Analysis of data reveals that cloud-based services provide relative advantage in terms of scalability, accessibility, and on-demand deployment of services within no time. Easy to use interface, experience, and expertise of the cloud service provider as well as support from top management plays important role in the cloud adoption decision. Further the study also identifies that no matter which model of cloud-based services (software-as-a-service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS)) is used; cloud-based services\u2019 adoption impacts organizational flexibility, which can be divided into four categories, namely, economic flexibility, process flexibility, performance flexibility, and market flexibility. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 This is an exploratory study conducted through in-depth interviews hence the results can further be verified through a quantitative research. The study does not explore negative factors that may discourage adoption of cloud-based services. Though two factors vendor lock-in and security emerged as a concern very prominently in the in-depth interviews but this issue can further be explored in detail. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study bridge the gap in the research by identifying the factors that drive the adoption of cloud-based services in different forms (SaaS, PaaS, and IaaS) as well exploring the impact of cloud adoption on the organizational flexibility in case of Indian organizations.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/jeim-04-2015-0028","type":"journal-article","created":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T08:29:07Z","timestamp":1466756947000},"page":"566-588","source":"Crossref","is-referenced-by-count":49,"title":["Understanding the impact of cloud-based services adoption on organizational flexibility"],"prefix":"10.1108","volume":"29","author":[{"given":"Prerna","family":"Lal","sequence":"first","affiliation":[]},{"given":"Sangeeta Shah","family":"Bharadwaj","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121423191422500_b2","doi-asserted-by":"crossref","unstructured":"Avram, M.G.\n                (2014), \u201cAdvantages and challenges of adopting cloud computing from an enterprise perspective\u201d, \n                  Procedia Technology\n               , Vol. 12, pp. 529-534.","DOI":"10.1016\/j.protcy.2013.12.525"},{"key":"key2020121423191422500_b3","unstructured":"AWS\n                (2010), \u201cSoftware-as-a-service (SaaS) on AWS: business and architecture overview\u201d, September, available at: https:\/\/d36cz9buwru1tt.cloudfront.net\/SaaS_whitepaper.pdf (accessed October 3, 2015)."},{"key":"key2020121423191422500_b4","doi-asserted-by":"crossref","unstructured":"Benlian, A.\n                and \n                  Hess, T.\n                (2011), \u201cOpportunities and risks of software-as-a-service: findings from a survey of IT executives\u201d, \n                  Decision Support Systems\n               , Vol. 52 No. 1, pp. 232-246.","DOI":"10.1016\/j.dss.2011.07.007"},{"key":"key2020121423191422500_b5","unstructured":"Biocic, B.\n               , \n                  Tomic, D.\n                and \n                  Ogrizovic, D.\n                (2011), \u201cEconomics of the cloud computing\u201d, Proceedings of the 34th International Convention MIPRO, 2011, pp. 1438-1442."},{"key":"key2020121423191422500_b6","unstructured":"Brodkin, J.\n                (2008), \u201cGartner: seven cloud-computing security risks\u201d, available at: www.idi.ntnu.no\/emner\/tdt60\/papers\/Cloud_Computing_Security_Risk.pdf (accessed September 29, 2015)."},{"key":"key2020121423191422500_b7","unstructured":"Bryman, A.\n                (2008), \n                  Social Research Methods\n               , 3rd ed., Oxford University Press, Oxford."},{"key":"key2020121423191422500_b8","doi-asserted-by":"crossref","unstructured":"Bunduchi, R.\n               , \n                  Weisshaar, C.\n                and \n                  Smart, A.U.\n                (2011), \u201cMapping the benefits and costs associated with process innovation: the case of RFID adoption\u201d, \n                  Technovation\n               , Vol. 31 No. 9, pp. 505-521.","DOI":"10.1016\/j.technovation.2011.04.001"},{"key":"key2020121423191422500_b9","doi-asserted-by":"crossref","unstructured":"Calvo, R.\n               , \n                  Domingo, R.\n                and \n                  Sebasti\u00e1n, M.A.\n                (2008), \u201cOperational flexibility quantification in a make-to-order assembly system\u201d, \n                  International Journal of Flexible Manufacturing Systems\n               , Vol. 19 No. 3, pp. 247-263.","DOI":"10.1007\/s10696-008-9037-9"},{"key":"key2020121423191422500_b10","doi-asserted-by":"crossref","unstructured":"Chaisiri, S.\n               , \n                  Lee, B.S.\n                and \n                  Niyato, D.\n                (2012), \u201cOptimization of resource provisioning cost in cloud computing\u201d, \n                  IEEE Transactions on Services Computing\n               , Vol. 5 No. 2, pp. 164-177.","DOI":"10.1109\/TSC.2011.7"},{"key":"key2020121423191422500_b11","doi-asserted-by":"crossref","unstructured":"Chou, M.C.\n               , \n                  Teo, C.P.\n                and \n                  Zheng, H.\n                (2008), \u201cProcess flexibility: design, evaluation, and applications\u201d, \n                  Flexible Services and Manufacturing Journal\n               , Vol. 20 Nos 1-2, pp. 59-94.","DOI":"10.1007\/s10696-008-9053-9"},{"key":"key2020121423191422500_b12","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n                (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, \n                  MIS Quarterly\n               , Vol. 13 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2020121423191422500_b1","doi-asserted-by":"crossref","unstructured":"De Assun\u00e7\u00e3o, M.D.\n                and \n                  Costanzo, A.\n                (2009), \u201cEvaluating the cost-benefit of using cloud computing to extend the capacity of clusters\u201d, \n                  Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing HPDC 09\n               , Vol. 256 No. 3, pp. 141-150.","DOI":"10.1145\/1551609.1551635"},{"key":"key2020121423191422500_b13","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M.\n                and \n                  Martin, J.A.\n                (2000), \u201cDynamic capabilities: what are they?\u201d, \n                  Strategic Management Journal\n               , Vol. 21 Nos 10-11, pp. 1105-1121.","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1105::AID-SMJ133>3.0.CO;2-E"},{"key":"key2020121423191422500_b14","doi-asserted-by":"crossref","unstructured":"Featherman, M.S.\n               , \n                  Miyazaki, A.D.\n                and \n                  Sprott, D.E.\n                (2010), \u201cReducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility\u201d, \n                  Journal of Services Marketing\n               , Vol. 24 No. 3, pp. 219-229.","DOI":"10.1108\/08876041011040622"},{"key":"key2020121423191422500_b15","doi-asserted-by":"crossref","unstructured":"Feuerlicht, G.\n                (2010), \u201cNext generation SOA: can SOA survive cloud computing?\u201d, \n                  Advances in Intelligent Web Mastering-2\n               , Springer, Berlin Heidelberg, pp. 19-29.","DOI":"10.1007\/978-3-642-10687-3_2"},{"key":"key2020121423191422500_b16","doi-asserted-by":"crossref","unstructured":"Fink, L.\n                and \n                  Neumann, S.\n                (2009), \u201cExploring the perceived business value of the flexibility enabled by information technology infrastructure\u201d, \n                  Information and Management\n               , Vol. 46 No. 2, pp. 90-99.","DOI":"10.1016\/j.im.2008.11.007"},{"key":"key2020121423191422500_b17","doi-asserted-by":"crossref","unstructured":"Fisch, J.H.\n                and \n                  Zschoche, M.\n                (2012), \u201cThe role of operational flexibility in the expansion of international production networks\u201d, \n                  Strategic Management Journal\n               , Vol. 33 No. 13, pp. 1540-1556.","DOI":"10.1002\/smj.1999"},{"key":"key2020121423191422500_b18","doi-asserted-by":"crossref","unstructured":"Fredericks, E.\n                (2005), \u201cInfusing flexibility into business-to-business firms: a contingency theory and resource-based view perspective and practical implications\u201d, \n                  Industrial Marketing Management\n               , Vol. 34 No. 6, pp. 555-565.","DOI":"10.1016\/j.indmarman.2004.09.022"},{"key":"key2020121423191422500_b19","doi-asserted-by":"crossref","unstructured":"Gagnon, Y.C.\n                and \n                  Toulouse, J.M.\n                (1996), \u201cThe behavior of business managers when adopting new technologies\u201d, \n                  Technological Forecasting and Social Change\n               , Vol. 52 No. 1, pp. 59-74.","DOI":"10.1016\/0040-1625(95)00271-5"},{"key":"key2020121423191422500_b20","doi-asserted-by":"crossref","unstructured":"Graves, S.C.\n                and \n                  Tomlin, B.T.\n                (2003), \u201cProcess flexibility in supply chains\u201d, \n                  Management Science\n               , Vol. 49 No. 7, pp. 907-919.","DOI":"10.1287\/mnsc.49.7.907.16381"},{"key":"key2020121423191422500_b21","doi-asserted-by":"crossref","unstructured":"Gupta, P.\n               , \n                  Seetharaman, A.\n                and \n                  Raj, J.R.\n                (2013), \u201cThe usage and adoption of cloud computing by small and medium businesses\u201d, \n                  International Journal of Information Management\n               , Vol. 33 No. 5, pp. 861-874.","DOI":"10.1016\/j.ijinfomgt.2013.07.001"},{"key":"key2020121423191422500_b22","doi-asserted-by":"crossref","unstructured":"Hong, W.\n                and \n                  Zhu, K.\n                (2006), \u201cMigrating to internet-based e-commerce: factors affecting e-commerce adoption and migration at the firm level\u201d, \n                  Information & Management\n               , Vol. 43 No. 2, pp. 204-221.","DOI":"10.1016\/j.im.2005.06.003"},{"key":"key2020121423191422500_b23","unstructured":"IBM\n                (2011), \u201cCreating new business value through smarter technology services\u201d, available at: www.inteligencija.com\/index.php\/en\/component\/phocadownload\/category\/12-ibm-cognos?download=71:ibm-cognos-brochure (accessed October 1, 2015)."},{"key":"key2020121423191422500_b24","unstructured":"IDC\n                (2014), \u201cIDC predicts the 3rd platform will bring innovation, growth, and disruption across all industries in 2015\u201d, December 2, available at: www.idc.com\/getdoc.jsp?containerId=prUS25285614 (accessed September 5, 2015)."},{"key":"key2020121423191422500_b25","doi-asserted-by":"crossref","unstructured":"Javalgi, R.G.\n               , \n                  Whipple, T.W.\n               , \n                  Ghosh, A.K.\n                and \n                  Young, R.B.\n                (2005), \u201cMarket orientation, strategic flexibility, and performance: implications for services providers\u201d, \n                  Journal of Services Marketing\n               , Vol. 19 No. 4, pp. 212-221.","DOI":"10.1108\/08876040510605244"},{"key":"key2020121423191422500_b26","doi-asserted-by":"crossref","unstructured":"Jensen, M.\n               , \n                  Schwenk, J.\n               , \n                  Gruschka, N.\n                and \n                  Iacono, L. Lo.\n                (2009), \u201cOn technical security issues in cloud computing\u201d, CLOUD 2009 \u2013 2009 IEEE International Conference on Cloud Computing, pp. 109-116.","DOI":"10.1109\/CLOUD.2009.60"},{"key":"key2020121423191422500_b27","doi-asserted-by":"crossref","unstructured":"Johansson, B.\n                and \n                  Ruivo, P.\n                (2013), \u201cExploring factors for adopting ERP as SaaS\u201d, \n                  Procedia Technology\n               , Vol. 9, pp. 94-99.","DOI":"10.1016\/j.protcy.2013.12.010"},{"key":"key2020121423191422500_b28","doi-asserted-by":"crossref","unstructured":"Jules, G.\n               , \n                  Saadat, M.\n               , \n                  Tan, M.C.L.\n                and \n                  Owliya, M.\n                (2011), \u201cHolonic-based flexible allocation of workforce in labourintensive manufacturing shop floors\u201d, Conference Proceedings \u2013 IEEE International Conference on Systems, Man and Cybernetics, pp. 434-439.","DOI":"10.1109\/ICSMC.2011.6083704"},{"key":"key2020121423191422500_b29","doi-asserted-by":"crossref","unstructured":"Kaufman, L.M.\n                (2009), \u201cData security in the world of cloud computing\u201d, \n                  IEEE Security and Privacy\n               , Vol. 7 No. 4, pp. 61-64.","DOI":"10.1109\/MSP.2009.87"},{"key":"key2020121423191422500_b30","doi-asserted-by":"crossref","unstructured":"Kondo, D.\n               , \n                  Javadi, B.\n               , \n                  Malecot, P.\n               , \n                  Cappello, F.\n                and \n                  Anderson, D.P.\n                (2009), \u201cCost-benefit analysis of cloud computing versus desktop grids\u201d, IEEE International Symposium on Parallel \n\t\t\t\t\t&\n\t\t\t\t Distributed Processing, pp. 1-12.","DOI":"10.1109\/IPDPS.2009.5160911"},{"key":"key2020121423191422500_b31","unstructured":"KPMG\n                (2014), \u201cKey findings from the cloud survey report\u201d, available at: www.kpmg.com\/us\/en\/topics\/pages\/cloud-takes-shape.aspx (accessed August 3, 2015)."},{"key":"key2020121423191422500_b32","doi-asserted-by":"crossref","unstructured":"Lee, S.-G.\n               , \n                  Chae, S.H.\n                and \n                  Cho, K.M.\n                (2013), \u201cDrivers and inhibitors of SaaS adoption in Korea\u201d, \n                  International Journal of Information Management\n               , Vol. 33 No. 3, pp. 429-440.","DOI":"10.1016\/j.ijinfomgt.2013.01.006"},{"key":"key2020121423191422500_b33","doi-asserted-by":"crossref","unstructured":"Levy, M.\n                and \n                  Powell, P.\n                (1998), \u201cSME flexibility and the role of information systems\u201d, \n                  Small Business Economics\n               , Vol. 11 No. 2, pp. 183-196.","DOI":"10.1023\/A:1007912714741"},{"key":"key2020121423191422500_b34","doi-asserted-by":"crossref","unstructured":"Li, X.\n               , \n                  Li, Y.\n               , \n                  Liu, T.\n               , \n                  Qiu, J.\n                and \n                  Wang, F.\n                (2009), \u201cThe method and tool of cost analysis for cloud computing\u201d, IEEE International Conference on Cloud Computing, pp. 93-100.","DOI":"10.1109\/CLOUD.2009.84"},{"key":"key2020121423191422500_b35","doi-asserted-by":"crossref","unstructured":"Lim, B.T.H.\n               , \n                  Ling, F.Y.Y.\n               , \n                  Ibbs, C.W.\n               , \n                  Raphael, B.\n                and \n                  Ofori, G.\n                (2011), \u201cEmpirical analysis of the determinants of organizational flexibility in the construction business\u201d, \n                  Journal of Construction Engineering and Management\n               , Vol. 137 No. 3, pp. 225-237.","DOI":"10.1061\/(ASCE)CO.1943-7862.0000272"},{"key":"key2020121423191422500_b36","unstructured":"Loeffler, B.\n                (2011), \u201cCloud computing: what is infrastructure as a service\u201d, October, available at: http:\/\/technet.microsoft.com\/en-us\/magazine\/hh509051.aspx (accessed September 12, 2015)."},{"key":"key2020121423191422500_b37","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Nicol\u00e1s, C.\n               , \n                  Molina-Castillo, F.J.\n                and \n                  Bouwman, H.\n                (2008), \u201cAn assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models\u201d, \n                  Information and Management\n               , Vol. 45 No. 6, pp. 359-364.","DOI":"10.1016\/j.im.2008.05.001"},{"key":"key2020121423191422500_b38","doi-asserted-by":"crossref","unstructured":"Low, C.\n               , \n                  Chen, Y.\n                and \n                  Wu, M.\n                (2011), \u201cUnderstanding the determinants of cloud computing adoption\u201d, \n                  Industrial Management & Data Systems\n               , Vol. 111 No. 7, pp. 1006-1023.","DOI":"10.1108\/02635571111161262"},{"key":"key2020121423191422500_b39","doi-asserted-by":"crossref","unstructured":"Lucas, H.C.\n                and \n                  Olson, M.\n                (1994), \u201cThe impact of information technology on organizational flexibility\u201d, \n                  Journal of Organizational Computing\n               , Vol. 4 No. 2, pp. 155-176.","DOI":"10.1080\/10919399409540221"},{"key":"key2020121423191422500_b42","unstructured":"McCracken, G.\n                (1988), \n                  Qualitative Research Methods Series: The Long Interview\n               , Sage Publications, Newbury."},{"key":"key2020121423191422500_b43","unstructured":"McFarlan, F.W.\n                (1984), \u201cInformation technology changes the way you compete\u201d, \n                  Harvard Business Review\n               , Vol. 62 No. 3, pp. 98-103."},{"key":"key2020121423191422500_b44","unstructured":"McKeen, J.D.\n                and \n                  Smith, H.A.\n                (1996), \n                  Management Challenges in IS: Successful Strategies and Appropriate Action\n               , John Wiley and Sons Ltd, Chichester."},{"key":"key2020121423191422500_b45","unstructured":"McKendrick, J.\n                (2011), \u201cCloud computing\u2019s vendor lock-in problem: why the industry is taking a step backward\u201d, available at: www.forbes.com\/sites\/joemckendrick\/2011\/11\/20\/cloud-computings-vendor-lock-in-problem-why-the-industry-is-taking-a-step-backwards\/ (accessed September 18, 2015)."},{"key":"key2020121423191422500_b40","doi-asserted-by":"crossref","unstructured":"Marston, S.\n               , \n                  Li, Z.\n               , \n                  Bandyopadhyay, S.\n                and \n                  Ghalsasi, A.\n                (2011), \u201cCloud computing \u2013 the business perspective\u201d, 44th Hawaii International Conference on System Sciences, IEEE, pp. 1-11.","DOI":"10.1109\/HICSS.2011.102"},{"key":"key2020121423191422500_b41","doi-asserted-by":"crossref","unstructured":"Matz-Costa, C.\n                and \n                  Pitt-Catsouphes, M.\n                (2009), \u201cWorkplace flexibility as an organizational response to the aging of the workforce: a comparison of nonprofit and for-profit organizations\u201d, \n                  Journal of Social Service Research\n               , Vol. 36 No. 1, pp. 68-80.","DOI":"10.1080\/01488370903333645"},{"key":"key2020121423191422500_b46","unstructured":"Mell, P.\n                and \n                  Grance, T.\n                (2011), \u201cThe NIST definition of cloud computing recommendations of the national institute of standards and technology\u201d, available at: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf (accessed October 18, 2015)."},{"key":"key2020121423191422500_b47","doi-asserted-by":"crossref","unstructured":"Misra, S.C.\n                and \n                  Mondal, A.\n                (2011), \u201cIdentification of a company\u2019s suitability for the adoption of cloud computing and modelling its corresponding return on investment\u201d, \n                  Mathematical and Computer Modelling\n               , Vol. 53 Nos 3-4, pp. 504-521.","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"key2020121423191422500_b48","doi-asserted-by":"crossref","unstructured":"Nadkarni, S.\n                and \n                  Herrmann, P.\n                (2010), \u201cCEO personality, strategic flexibility, and firm performance: the case of the Indian business process outsourcing industry\u201d, \n                  Academy of Management Journal\n               , Vol. 53 No. 5, pp. 1050-1073.","DOI":"10.5465\/amj.2010.54533196"},{"key":"key2020121423191422500_b50","unstructured":"NASSCOM\n                (2014a), \u201cDeconstructing the \u2018cloud\u2019: the new growth frontier for Indian IT-BPO sector\u201d, available at: www.nasscom.in\/download\/summary_file\/fid\/76232 (accessed October 10, 2015)."},{"key":"key2020121423191422500_b51","unstructured":"NASSCOM\n                (2014b), \u201cIndia \u2013 the fastest growing and 3rd largest start-up ecosystem globally: NASSCOM startup report 2014\u201d, available at: www.nasscom.in\/india-fastest-growing-and-3rd-largest-startup-ecosystem-globally-nasscom-startup-report-2014 (accessed October 11, 2015)."},{"key":"key2020121423191422500_b49","unstructured":"NASSCOM and Deloitte\n                (2012), \u201cDeconstructing the \u2018cloud\u2019: the new growth frontier for Indian IT-BPO sector\u201d, NASSCOM, available at: www.nasscom.in\/deconstructing-%E2%80%9Ccloud%E2%80%9D-new-growth-frontier-indian-itbpo-sector (accessed October 18, 2015)."},{"key":"key2020121423191422500_b52","doi-asserted-by":"crossref","unstructured":"Newell, S.J.\n                and \n                  Goldsmith, R.E.\n                (2001), \u201cThe development of a scale to measure perceived corporate credibility\u201d, \n                  Journal of Business Research\n               , Vol. 52 No. 3, pp. 235-247.","DOI":"10.1016\/S0148-2963(99)00104-6"},{"key":"key2020121423191422500_b53","unstructured":"Northbridge\n                (2014), \u201cIndustry\u2019s largest cloud computing survey reveals 5x adoption of SaaS\u201d, June 19, available at: www.northbridge.com\/industry-largest-cloud-computing-survey-reveals-5x-adoption-saas (accessed October 2, 2015)."},{"key":"key2020121423191422500_b54","doi-asserted-by":"crossref","unstructured":"Oliveira, T.\n               , \n                  Thomas, M.\n                and \n                  Espadanal, M.\n                (2014), \u201cAssessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors\u201d, \n                  Information & Management\n               , Vol. 51 No. 5, pp. 497-510.","DOI":"10.1016\/j.im.2014.03.006"},{"key":"key2020121423191422500_b55","doi-asserted-by":"crossref","unstructured":"Ozer, M.\n                (2002), \u201cThe role of flexibility in online business\u201d, \n                  Business Horizons\n               , Vol. 45 No. 1, pp. 61-69.","DOI":"10.1016\/S0007-6813(02)80011-8"},{"key":"key2020121423191422500_b56","unstructured":"Palanisamy, R.\n                and \n                  Sushil\n                (2003), \u201cMeasurement and enablement of information systems for organizational flexibility: an empirical study\u201d, \n                  Journal of Services Research\n               , Vol. 3 No. 2, pp. 82-103."},{"key":"key2020121423191422500_b57","doi-asserted-by":"crossref","unstructured":"Patel, P.C.\n               , \n                  Terjesen, S.\n                and \n                  Li, D.\n                (2012), \u201cEnhancing effects of manufacturing flexibility through operational absorptive capacity and operational ambidexterity\u201d, \n                  Journal of Operations Management\n               , Vol. 30 No. 3, pp. 201-220.","DOI":"10.1016\/j.jom.2011.10.004"},{"key":"key2020121423191422500_b58","doi-asserted-by":"crossref","unstructured":"Phillips, P.A.\n                and \n                  Wright, C.\n                (2009), \u201cE-business\u2019s impact on organizational flexibility\u201d, \n                  Journal of Business Research\n               , Vol. 62 No. 11, pp. 1071-1080.","DOI":"10.1016\/j.jbusres.2008.09.014"},{"key":"key2020121423191422500_b59","unstructured":"PRNewswire\n                (2014), \u201cIaaS market: 42.9% CAGR for infrastructure as a service industry forecast to 2019 in a new global research report\u201d, December 3, available at: www.prnewswire.com\/news-releases\/iaas-market-429-cagr-for-infrastructure-as-a-service-industry-forecast-to-2019-in-a-new-global-research-report-284583391.html (accessed September 18, 2015)."},{"key":"key2020121423191422500_b60","unstructured":"Rogers, E.M.\n                (2003), \n                  Diffusion of Innovations\n               , 5th ed., Free Press, New York, NY."},{"key":"key2020121423191422500_b61","unstructured":"Shaikh, F.B.F.\n                and \n                  Haider, S.\n                (2011), \u201cSecurity threats in cloud computing\u201d, International Conference for Internet Technology and Secured Transactions, pp. 214-219."},{"key":"key2020121423191422500_b62","doi-asserted-by":"crossref","unstructured":"Shawish, A.\n                and \n                  Salama, M.\n                (2014), \u201cCloud computing: paradigms and technologies\u201d, in \n                  Xhafa, F.\n                and \n                  Bessis, N.\n                (Eds), \n                  Inter-Cooperative Collective Intelligence: Techniques and Applications\n               , Springer, Berlin and Heidelberg, pp. 39-67.","DOI":"10.1007\/978-3-642-35016-0_2"},{"key":"key2020121423191422500_b63","doi-asserted-by":"crossref","unstructured":"Subashini, S.\n                and \n                  Kavitha, V.\n                (2011), \u201cA survey on security issues in service delivery models of cloud computing\u201d, \n                  Journal of Network and Computer Applications\n               , Vol. 34 No. 1, pp. 1-11.","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"key2020121423191422500_b64","doi-asserted-by":"crossref","unstructured":"Sultan, N.\n                (2014), \u201cMaking use of cloud computing for healthcare provision: opportunities and challenges\u201d, \n                  International Journal of Information Management\n               , Vol. 34 No. 2, pp. 177-184.","DOI":"10.1016\/j.ijinfomgt.2013.12.011"},{"key":"key2020121423191422500_b65","doi-asserted-by":"crossref","unstructured":"Takabi, H.\n               , \n                  Joshi, J.B.D.\n                and \n                  Ahn, G.J.\n                (2010), \u201cSecurity and privacy challenges in cloud computing environments\u201d, \n                  IEEE Security & Privacy Magazine\n               , Vol. 8 No. 6, pp. 24-31.","DOI":"10.1109\/MSP.2010.186"},{"key":"key2020121423191422500_b66","doi-asserted-by":"crossref","unstructured":"Teece, D.J.\n               , \n                  Pisano, G.\n                and \n                  Shuen, A.\n                (1997), \u201cDynamic capabilities and strategic fit\u201d, \n                  Strategic Management Journal\n               , Vol. 18 No. 7, pp. 510-533.","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z"},{"key":"key2020121423191422500_b67","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H.\n                and \n                  Pian, Y.\n                (2003), \u201cA contingency perspective on internet adoption and competitive advantage\u201d, \n                  European Journal of Information Systems\n               , Vol. 12 No. 2, pp. 78-92.","DOI":"10.1057\/palgrave.ejis.3000448"},{"key":"key2020121423191422500_b68","unstructured":"Todorut, A.V.\n                (2008), \u201cThe flexibility of organization and the flexibility of product \u2013 premises of organizational success\u201d, available at: https:\/\/mpra.ub.uni-muenchen.de\/7947\/1\/The_Flexibility_of_Organization_amalia_todorut_2_.pdf (accessed October 17, 2015)."},{"key":"key2020121423191422500_b69","unstructured":"Tornatzky, L.G.\n                and \n                  Fleischer, M.\n                (1990), \n                  The Processes of Technological Innovation\n               , Lexington Books, Lexington, MA."},{"key":"key2020121423191422500_b71","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n                and \n                  Davis, F.D.\n                (2000), \u201cA theoretical extension of the technology acceptance model: four longitudinal field studies\u201d, \n                  Management Science\n               , Vol. 46 No. 2, pp. 186-204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2020121423191422500_b72","unstructured":"Weerdt, N.V.D.\n                (2009), \u201cOrganizational flexibility for hypercompetitive markets\u201d, available at: http:\/\/repub.eur.nl\/pub\/16182\/EPS2009173STR9058922151Weerd.pdf (accessed September 15, 2015)."},{"key":"key2020121423191422500_b73","doi-asserted-by":"crossref","unstructured":"Wu, W.W.\n                (2011), \u201cDeveloping an explorative model for SaaS adoption\u201d, \n                  Expert Systems with Applications\n               , Vol. 38 No. 12, pp. 15057-15064.","DOI":"10.1016\/j.eswa.2011.05.039"},{"key":"key2020121423191422500_b74","doi-asserted-by":"crossref","unstructured":"Wu, W.W.\n               , \n                  Lan, L.W.\n                and \n                  Lee, Y.T.\n                (2011), \u201cExploring decisive factors affecting an organization\u2019s SaaS adoption: a case study\u201d, \n                  International Journal of Information Management\n               , Vol. 31 No. 6, pp. 556-563.","DOI":"10.1016\/j.ijinfomgt.2011.02.007"},{"key":"key2020121423191422500_b75","doi-asserted-by":"crossref","unstructured":"Yang, H.\n                and \n                  Tate, M.\n                (2012), \u201cA descriptive literature review and classification of cloud computing research\u201d, \n                  Communications of the Association for Information Systems\n               , Vol. 31 No. 1, pp. 35-60.","DOI":"10.17705\/1CAIS.03102"},{"key":"key2020121423191422500_b76","doi-asserted-by":"crossref","unstructured":"Yu, J.\n               , \n                  Ha, I.\n               , \n                  Choi, M.\n                and \n                  Rho, J.\n                (2005), \u201cExtending the TAM for a t-commerce\u201d, \n                  Information and Management\n               , Vol. 42 No. 7, pp. 965-976.","DOI":"10.1016\/j.im.2004.11.001"},{"key":"key2020121423191422500_b77","doi-asserted-by":"crossref","unstructured":"Zissis, D.\n                and \n                  Lekkas, D.\n                (2012), \u201cAddressing cloud computing security issues\u201d, \n                  Future Generation Computer Systems\n               , Vol. 28 No. 3, pp. 583-592.","DOI":"10.1016\/j.future.2010.12.006"},{"key":"key2020121423191422500_frd1","doi-asserted-by":"crossref","unstructured":"Tsai, M.C.\n               , \n                  Lai, K.H.\n                and \n                  Hsu, W.C.\n                (2013), \u201cA study of the institutional forces influencing the adoption intention of RFID by suppliers\u201d, \n                  Information and Management\n               , Vol. 50 No. 1, pp. 59-65.","DOI":"10.1016\/j.im.2012.05.006"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JEIM-04-2015-0028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-04-2015-0028\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-04-2015-0028\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:31:10Z","timestamp":1753396270000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/29\/4\/566-588\/216532"}},"subtitle":["An exploratory study"],"short-title":[],"issued":{"date-parts":[[2016,7,11]]},"references-count":77,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,7,11]]}},"alternative-id":["10.1108\/JEIM-04-2015-0028"],"URL":"https:\/\/doi.org\/10.1108\/jeim-04-2015-0028","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2016,7,11]]}}}