{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:36:09Z","timestamp":1776285369010,"version":"3.50.1"},"reference-count":89,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,2,9]],"date-time":"2015-02-09T00:00:00Z","timestamp":1423440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2,9]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to integrate TAM model and TOE framework for cloud computing adoption at organizational level. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 A conceptual framework was developed using technological and organizational variables of TOE framework as external variables of TAM model while environmental variables were proposed to have direct impact on cloud computing adoption. A questionnaire was used to collect the data from 280 companies in IT, manufacturing and finance sectors in India. The data were analyzed using exploratory and confirmatory factor analyses. Further, structural equation modeling was used to test the proposed model. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The study identified relative advantage, compatibility, complexity, organizational readiness, top management commitment, and training and education as important variables for affecting cloud computing adoption using perceived ease of use (PEOU) and perceived usefulness (PU) as mediating variables. Also, competitive pressure and trading partner support were found directly affecting cloud computing adoption intentions. The model explained 62 percent of cloud computing adoption. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The model can be used as a guideline to ensure a positive outcome of the cloud computing adoption in organizations. It also provides relevant recommendations to achieve conducive implementation environment for cloud computing adoption. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study integrates two of the information technology adoption models to improve predictive power of resulting model.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/jeim-08-2013-0065","type":"journal-article","created":{"date-parts":[[2015,1,15]],"date-time":"2015-01-15T04:52:08Z","timestamp":1421297528000},"page":"107-130","source":"Crossref","is-referenced-by-count":686,"title":["Understanding determinants of cloud computing adoption using an integrated TAM-TOE model"],"prefix":"10.1108","volume":"28","author":[{"given":"Hemlata","family":"Gangwar","sequence":"first","affiliation":[]},{"given":"Hema","family":"Date","sequence":"additional","affiliation":[]},{"given":"R","family":"Ramaswamy","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122623024678700_b91","unstructured":"Achjari, D.\n                and \n                  Quaddus, M.\n                (2002), \u201cWorld wide web diffusion among Indonesian bank employees: a case of international research in information systems\u201d, ACIS 2002 Proceedings, Victoria University, Melbourne, 3-6 December, available at: http:\/\/aisel.aisnet.org\/acis2002\/101 (accessed April 10, 2012)."},{"key":"key2020122623024678700_b2","doi-asserted-by":"crossref","unstructured":"Alshamaila, Y.\n               , \n                  Papagiannidis, S.\n                and \n                  Li, F.\n                (2013), \u201cCloud computing adoption by SMEs in the north east of England: a multi-perspective framework\u201d, \n                  Journal of Enterprise Information Management\n               , Vol. 26 No. 3, pp. 250-275.","DOI":"10.1108\/17410391311325225"},{"key":"key2020122623024678700_b3","doi-asserted-by":"crossref","unstructured":"Amoako-Gyampah, K.\n                and \n                  Salam, A.F.\n                (2004), \u201cAn extension of the technology acceptance model in an ERP implementation environment\u201d, \n                  Information & Management\n               , Vol. 41 No. 6, pp. 731-745.","DOI":"10.1016\/j.im.2003.08.010"},{"key":"key2020122623024678700_b4","unstructured":"Au, Y.A.\n                and \n                  Zafar, H.\n                (2008), \u201cA multi-country assessment of mobile payment adoption\u201d, Working Paper Series No. 0055IS-296-2008, College of Business, The University of Texas, San Antonio, TX."},{"key":"key2020122623024678700_b5","doi-asserted-by":"crossref","unstructured":"Autry, C.W.\n               , \n                  Grawe, S.J.\n               , \n                  Daugherty, P.J.\n                and \n                  Richey, R.G.\n                (2010), \u201cThe effects of technological turbulence and breadth on supply chain technology acceptance and adoption\u201d, \n                  Journal of Operations Management\n               , Vol. 28 No. 6, pp. 522-536.","DOI":"10.1016\/j.jom.2010.03.001"},{"key":"key2020122623024678700_b6","doi-asserted-by":"crossref","unstructured":"Banerjee, P.\n                (2009), \u201cAn intelligent IT infrastructure for the future\u201d, Proceedings of 15th International Symposium on High-Performance Computer Architecture, HPCA, Raleigh, NC, February 14-18.","DOI":"10.1109\/HPCA.2009.4798230"},{"key":"key2020122623024678700_b7","doi-asserted-by":"crossref","unstructured":"Benlian, A.\n                and \n                  Hess, T.\n                (2011), \u201cOpportunities and risks of software-as-a-service: findings from a survey of IT executives\u201d, \n                  Decision Support Systems\n               , Vol. 52 No. 1, pp. 232-246.","DOI":"10.1016\/j.dss.2011.07.007"},{"key":"key2020122623024678700_b8","unstructured":"Browne, M.W.\n                and \n                  Cudeck, R.\n                (1993), \u201cAlternative ways of assessing model fit\u201d, in \n                  Bollen, K.A.\n                and \n                  Long, J.S.\n                (Eds), \n                  Testing Structural Equation Models\n               , Sage, Newbury Park, CA."},{"key":"key2020122623024678700_b9","unstructured":"Buecker, A.\n               , \n                  Lodewijkx, K.\n               , \n                  Moss, H.\n               , \n                  Skapinetz, K.\n                and \n                  Waidner, M.\n                (2009), \n                  Cloud Security Guidance \u2013 IBM Recommendations for the Implementation of Cloud Security\n               , IBM\u00ae Redpapers\u2122, pp. 1-28, available at: www.ibm.com\/redbooks"},{"key":"key2020122623024678700_b10","doi-asserted-by":"crossref","unstructured":"Buyya, R.\n               , \n                  Yeo, C.S.\n               , \n                  Venugopa, S.\n               , \n                  Broberg, J.\n                and \n                  Brandic, I.\n                (2009), \u201cCloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility\u201d, \n                  Future Generation Computer Systems\n               , Vol. 25 No. 6, pp. 599-616.","DOI":"10.1016\/j.future.2008.12.001"},{"key":"key2020122623024678700_b11","doi-asserted-by":"crossref","unstructured":"Calisir, F.\n               , \n                  Gumussoy, C.\n                and \n                  Bayram, A.\n                (2009), \u201cPredicting the behavioral intention to use enterprise resource planning systems: an exploratory extension of the technology acceptance model\u201d, \n                  Management Research News\n               , Vol. 32 No. 7, pp. 597-613.","DOI":"10.1108\/01409170910965215"},{"key":"key2020122623024678700_b12","doi-asserted-by":"crossref","unstructured":"Chau, P.\n                and \n                  Hu, P.\n                (2001), \u201cInformation technology acceptance by individual professionals: a model of comparison approach\u201d, \n                  Decision Sciences\n               , Vol. 32 No. 4, pp. 699-719.","DOI":"10.1111\/j.1540-5915.2001.tb00978.x"},{"key":"key2020122623024678700_b13","unstructured":"Chebrolu, S.B.\n                and \n                  Ness, L.R.\n                (2012), \u201cImpact of cloud aspects on IT effectiveness\u201d, \n                  Journal of Information Technology Management\n               , Vol. 23 No. 1, pp. 1-12."},{"key":"key2020122623024678700_b14","doi-asserted-by":"crossref","unstructured":"Chen, L.\n                and \n                  Tan, J.\n                (2004), \u201cTechnology adaptation in e-commerce: key determinants of virtual stores acceptance\u201d, \n                  European Management Journal\n               , Vol. 22 No. 1, pp. 74-86.","DOI":"10.1016\/j.emj.2003.11.014"},{"key":"key2020122623024678700_b90","doi-asserted-by":"crossref","unstructured":"Chow, R.\n               , \n                  Golle, P.\n               , \n                  Jakobsson, M.\n               , \n                  Shi, E.\n               , \n                  Staddon, J.\n               , \n                  Masuoka, R.\n                and \n                  Molina, J.\n                (2009), \u201cControlling data in the cloud: outsourcing computation without outsourcing control\u201d,Proceedings of the 2009, ACM workshop on Cloud computing security, pp. 85-90.","DOI":"10.1145\/1655008.1655020"},{"key":"key2020122623024678700_b15","doi-asserted-by":"crossref","unstructured":"Chung, B.Y.\n               , \n                  Skibniewski, M.J.\n               , \n                  Lucas, H.C. Jr\n                and \n                  Kwak, Y.H.\n                (2008), \u201cAnalyzing enterprise resource planning system implementation success factors in the engineering \u2013 construction industry\u201d, \n                  Journal of Computing in Civil Engineering\n               , Vol. 22 No. 6, pp. 373-382.","DOI":"10.1061\/(ASCE)0887-3801(2008)22:6(373)"},{"key":"key2020122623024678700_b16","doi-asserted-by":"crossref","unstructured":"Chwelos, P.\n               , \n                  Benbasat, I.\n                and \n                  Dexter, A.\n                (2001), \u201cEmpirical test of an EDI adoption model,\u201d \n                  Information Systems Research\n               , Vol. 12 No. 3, pp. 304-321.","DOI":"10.1287\/isre.12.3.304.9708"},{"key":"key2020122623024678700_b18","unstructured":"CIO\n                (2011 \n               ), \u201cCloud Computing Survey\u201d, available at: http:\/\/mkting.cio.com\/pdf\/CIOCloudSummary.pdf (accessed April 8, 2013)."},{"key":"key2020122623024678700_b87","unstructured":"CIO Report\n                (2010). \u201cCloud computing in India: a CIO research center report\u201d, available at: http:\/\/cioresearchcenter.com\/wordpress\/wp-content\/plugins\/download-monitor\/download.php?id=3 (accessed August 2012)."},{"key":"key2020122623024678700_b19","unstructured":"Davis, F.D.\n                (1986), \u201cA Technology Acceptance Model for empirically testing new end-user information systems: theory and results\u201d, doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA."},{"key":"key2020122623024678700_b20","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n                (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, \n                  MIS Quarterly\n               , Vol. 13 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2020122623024678700_b21","doi-asserted-by":"crossref","unstructured":"Durbhakula, V.V.K.\n                and \n                  Kim, D.J.\n                (2011), \u201cE-business for Nations: a study of National level ebusiness adoption factors using country characteristics-business-technology-government framework\u201d, \n                  Journal of Theoretical and Applied Electronic Commerce Research\n               , Vol. 6 No. 3, pp. 1-12.","DOI":"10.4067\/S0718-18762011000300002"},{"key":"key2020122623024678700_b22","unstructured":"Elson, J.\n                and \n                  Howell, J.\n                (2009), \n                  Refactoring Human Roles Solves systems Problems. In Workshop on Hot Topics in Cloud Computing. HotCloud 2009\n               , USENIX Association, Berkeley, CA, ."},{"key":"key2020122623024678700_b24","unstructured":"Feuerlicht, G.\n                and \n                  Govardhan, S.\n                (2010), \u201cImpact of cloud computing: beyond a technology trend\u201d, The Proceedings of the International Conference on Systems Integration 2010 (CD-ROM), Oeconomica, Prague, June 8-9, pp. 1-8."},{"key":"key2020122623024678700_b23","unstructured":"Feuerlicht, G.\n               , \n                  Burkon, L.\n                and \n                  Sebesta, M.\n                (2011), \u201cCloud computing adoption: what are the issues?\u201d, \n                  System Integration\n               , Vol. 18 No. 2, pp. 187-192."},{"key":"key2020122623024678700_b25","doi-asserted-by":"crossref","unstructured":"Gardner, C.\n                and \n                  Amoroso, D.L.\n                (2004), \u201cDevelopment of an instrument to measure the acceptance of internet technology by consumers\u201d, Proceedings of the 37th Annual Hawaii International Conference, System Sciences, 2004, January 5-8.","DOI":"10.1109\/HICSS.2004.1265623"},{"key":"key2020122623024678700_b26","doi-asserted-by":"crossref","unstructured":"Garrison, G.\n               , \n                  Kim, S.\n                and \n                  Wakefield, R.L.\n                (2012), \u201cSuccess factors for deploying cloud computing\u201d, \n                  Communications of the ACM\n               , Vol. 55 No. 9, pp. 62-68.","DOI":"10.1145\/2330667.2330685"},{"key":"key2020122623024678700_b27","unstructured":"G\u00e9czy, P.\n               , \n                  Izumi, N.\n                and \n                  K\u00f4iti, H.\n                (2012), \u201cCloudsourcing: managing cloud adoption\u201d, \n                  Global Journal of Business Research\n               , Vol. 6 No. 2, pp. 57-70."},{"key":"key2020122623024678700_b28","doi-asserted-by":"crossref","unstructured":"Goscinski, A.\n                and \n                  Brock, M.\n                (2010), \u201cToward dynamic and attribute based publication, discovery and selection for cloud computing\u201d, \n                  Future Generation Computer Systems\n               , Vol. 26 No. 7, pp. 947-970.","DOI":"10.1016\/j.future.2010.03.009"},{"key":"key2020122623024678700_b29","doi-asserted-by":"crossref","unstructured":"Grossman, R.L.\n                (2009), \u201cThe case for cloud computing\u201d, \n                  IT Professionals\n               , Vol. 11 No. 2, pp. 23-27.","DOI":"10.1109\/MITP.2009.40"},{"key":"key2020122623024678700_b30","unstructured":"Hada, P.S.\n               , \n                  Singh, R.\n                and \n                  Manmohan, M.\n                (2011), \u201cSecurity agents: a mobile agent based trust model for cloud computing\u201d, \n                  International Journal of Computer Applications\n               , Vol. 36 No. 12, pp. 12-15."},{"key":"key2020122623024678700_b31","doi-asserted-by":"crossref","unstructured":"Hasan, B.\n                (2007), \u201cExamining the effects of computer self-efficacy and system complexity on technology acceptance\u201d, \n                  Information Resources Management Journal\n               , Vol. 20 No. 3, pp. 76-88.","DOI":"10.4018\/irmj.2007070106"},{"key":"key2020122623024678700_b32","doi-asserted-by":"crossref","unstructured":"Hong, S.\n               , \n                  Thong, J.Y.L.\n                and \n                  Tam, K.Y.\n                (2006), \u201cUnderstanding continued information technology usage behavior: a comparison of three models in the context of mobile internet\u201d, \n                  Decision Support Systems\n               , Vol. 42 No. 3, pp. 1819-1834.","DOI":"10.1016\/j.dss.2006.03.009"},{"key":"key2020122623024678700_b33","doi-asserted-by":"crossref","unstructured":"Hossain, M.A.\n                and \n                  Quaddus, M.\n                (2011), \u201cThe adoption and continued usage intention of RFID: an integrated framework\u201d, \n                  Information Technology & People\n               , Vol. 24 No. 3, pp. 236-256.","DOI":"10.1108\/09593841111158365"},{"key":"key2020122623024678700_b34","doi-asserted-by":"crossref","unstructured":"Igbaria, M.\n               , \n                  Guimaraes, T.\n                and \n                  Davis, G.B.\n                (1995), \u201cTesting the determinants of microcomputer usage via a structural equation model\u201d, \n                  Journal of Management Information Systems\n               , Vol. 11 No. 4, pp. 87-114.","DOI":"10.1080\/07421222.1995.11518061"},{"key":"key2020122623024678700_b35","unstructured":"Jain, L.\n                and \n                  Bhardwaj, S.\n                (2010), \u201cEnterprise cloud computing: key considerations for adoption\u201d, \n                  International Journal of Engineering and Information Technology\n               , Vol. 2 No. 2, pp. 113-117."},{"key":"key2020122623024678700_b36","unstructured":"Jang, S.-H.\n                (2010), \u201cAn empirical study on the factors influencing RFID adoption and implementation\u201d, \n                  Management Review: An International Journal\n               , Vol. 5 No. 2, pp. 55-73."},{"key":"key2020122623024678700_b37","doi-asserted-by":"crossref","unstructured":"Jeyaraj, A.\n               , \n                  Rottman, J.W.\n                and \n                  Lacity, W.C.\n                (2006), \u201cA review of the predictors, linkages, and biases in IT innovation adoption research\u201d, \n                  Journal of Information Technology\n               , Vol. 21 No. 1, pp. 1-23.","DOI":"10.1057\/palgrave.jit.2000056"},{"key":"key2020122623024678700_b38","unstructured":"Kamien, M.\n                and \n                  Schwartz, N.\n                (1982), \n                  Market Structure and Innovation\n               , Cambridge University Press, Cambridge, MA."},{"key":"key2020122623024678700_b39","unstructured":"Katzan, H.\n                (2010), \u201cOn the privacy of cloud computing\u201d, \n                  International Journal of Management and Information Systems\n               , Vol. 14 No. 2, pp. 1-12."},{"key":"key2020122623024678700_b40","doi-asserted-by":"crossref","unstructured":"Kerimoglu, O.\n               , \n                  Basoglu, N.\n                and \n                  Daim, T.\n                (2008), \u201cOrganizational adoption of information technologies: case of enterprise resource planning systems\u201d, \n                  Journal of High Technology Management Research\n               , Vol. 19 No. 1, pp. 21-35.","DOI":"10.1016\/j.hitech.2008.06.002"},{"key":"key2020122623024678700_b41","unstructured":"Kerr, J.\n                and \n                  Teng, K.\n                (2010), \u201cCloud computing: legal and privacy issues\u201d, Proceedings of the Academy of Business Disciplines Conference, available at: www.gcasa.com\/conferences\/vietnam\/paper\/JDK_CLOUDING_9_21_10_Paper-1%5B11%5D.pdf"},{"key":"key2020122623024678700_b89","doi-asserted-by":"crossref","unstructured":"Kim, W.\n                and \n                  Suwon\n                (2009), \u201cCloud computing: today and tomorrow\u201d, \n                  Journal of Object Technology\n               , Vol. 8 No. 1, pp. 65-72.","DOI":"10.5381\/jot.2009.8.1.c4"},{"key":"key2020122623024678700_b42","doi-asserted-by":"crossref","unstructured":"Kim, W.\n               , \n                  Kim, S.D.\n               , \n                  Lee, E.\n                and \n                  Lee S.\n                (2009), \u201cAdoption issues for cloud computing\u201d, ACM 7th International Conference, Arlington, TX, June 29-July 3.","DOI":"10.1145\/1821748.1821751"},{"key":"key2020122623024678700_b43","doi-asserted-by":"crossref","unstructured":"Kowtha, N.\n                and \n                  Choon, T.\n                (2001), \u201cDeterminants of website development: a study of electronic commerce in Singapore\u201d, \n                  Information & Management\n               , Vol. 39 No. 3, pp. 227-242.","DOI":"10.1016\/S0378-7206(01)00092-1"},{"key":"key2020122623024678700_b44","unstructured":"Lee, M.S.\n                (2009), \u201cAn empirical study about RFID acceptance: focus on the employees in Korea\u201d, \n                  International Journal of Human and Social Sciences\n               , Vol. 4 No. 14, pp. 997-1006."},{"key":"key2020122623024678700_b92","doi-asserted-by":"crossref","unstructured":"Lee, D.H.\n               , \n                  Lee, S.M.\n               , \n                  Olson, D.L.\n                and \n                  Chung, S.H.\n                (2010), \u201cThe effect of organizational support on ERP implementation\u201d, \n                  Industrial Management and Data Systems\n               , Vol. 110 No. 2, pp. 269-283.","DOI":"10.1108\/02635571011020340"},{"key":"key2020122623024678700_b45","doi-asserted-by":"crossref","unstructured":"Legris, P.\n               , \n                  Ingham, J.\n                and \n                  Collerette, P.\n                (2003), \u201cWhy do people use information technology? A critical review of the technology acceptance model\u201d, \n                  Information & Management\n               , Vol. 40 No. 3, pp. 191-204.","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"key2020122623024678700_b46","doi-asserted-by":"crossref","unstructured":"Lin, A.\n                and \n                  Chen, N.-C.\n                (2012), \u201cCloud computing as an innovation: percepetion, attitude, and adoption\u201d, \n                  International Journal of Information Management\n               , Vol. 32 No. 6, pp. 533-540.","DOI":"10.1016\/j.ijinfomgt.2012.04.001"},{"key":"key2020122623024678700_b47","doi-asserted-by":"crossref","unstructured":"Lin, H.-F.\n                and \n                  Lin, S.-M.\n                (2008), \u201cDeterminants of e-business diffusion: a test of the technology diffusion perspective\u201d, \n                  Technovation\n               , Vol. 28 No. 3, pp. 135-145.","DOI":"10.1016\/j.technovation.2007.10.003"},{"key":"key2020122623024678700_b48","unstructured":"Lippert, S.K.\n                and \n                  Govindarajulu, C.\n                (2006), \u201cTechnological, organizational, and environmental antecedents to web services adoption\u201d, \n                  Antecedents to Web Services Adoption\n               , Vol. 6 No. 1, pp. 146-158."},{"key":"key2020122623024678700_b49","doi-asserted-by":"crossref","unstructured":"Low, C.\n               , \n                  Chen, Y.\n                and \n                  Wu, M.\n                (2011), \u201cUnderstanding the determinants of cloud computing adoption\u201d, \n                  Industrial Management & Data Systems\n               , Vol. 111 No. 7, pp. 1006-1023.","DOI":"10.1108\/02635571111161262"},{"key":"key2020122623024678700_b50","doi-asserted-by":"crossref","unstructured":"Marston, S.\n               , \n                  Li, Z.\n               , \n                  Bandyopadhyay, S.\n               , \n                  Juheng, Z.\n                and \n                  Anand, G.\n                (2011), \u201cCloud computing -the business perspective\u201d, \n                  Decision Support Systems\n               , Vol. 51 No. 1, pp. 176-189.","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"key2020122623024678700_b52","doi-asserted-by":"crossref","unstructured":"Mell, P.\n                and \n                  Grance, T.\n                (2010), \u201cThe NIST definition of cloud computing\u201d, available at: www.newinnovationsguide.com\/NIST_Cloud_Definition.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"key2020122623024678700_b53","doi-asserted-by":"crossref","unstructured":"Mell, P.\n                and \n                  Grance, T.\n                (2011), \n                  The NIST Definition of Cloud Computing\n               , Computer Security Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"key2020122623024678700_b54","doi-asserted-by":"crossref","unstructured":"Misra, S.C.\n                and \n                  Mondal, A.\n                (2011), \u201cIdentification of a company\u2019s suitability for the adoption of cloud computing and modeling its corresponding return on investment\u201d, \n                  Mathematical and Computer Modelling\n               , Vol. 53 Nos 3\/4, pp. 504-521.","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"key2020122623024678700_b55","unstructured":"Morgan, L.\n                and \n                  Conboy, K.\n                (2013), \u201cFactors affecting the adoption of cloud computing: an exploratory study\u201d, Paper presented at the Procedings of the 21st European Conference on Information Systems, Utrecht, available at: www.staf.science.u.nl\/\u223cVlan107\/ecis\/files\/ECIS2013-0710-paper.pdf"},{"key":"key2020122623024678700_b56","unstructured":"Musawa, M.S.\n                and \n                  Wahab, E.\n                (2012), \u201cThe adoption of electronic data interchange (EDI) technology by Nigerian SMEs: a conceptual framework\u201d, \n                  Journal of Business Management and Economics\n               , Vol. 3 No. 2, pp. 55-68."},{"key":"key2020122623024678700_b58","unstructured":"Oliveira, T.\n                and \n                  Martins, M.F.\n                (2010), \u201cFirms patterns of e-business adoption: evidence for the European Union-27\u201d, \n                  The Electronic Journal Information Systems Evaluation\n               , Vol. 13 No. 1, pp. 47-56."},{"key":"key2020122623024678700_b59","unstructured":"Parveen, F.\n                and \n                  Sulaiman, A.\n                (2008), \u201cTechnology complexity, personal innovativeness and intention to use wireless internet using mobile devices in Malaysia\u201d, \n                  International Review of Business Research Papers\n               , Vol. 4 No. 5, pp. 1-10."},{"key":"key2020122623024678700_b60","doi-asserted-by":"crossref","unstructured":"Peng, R.\n               , \n                  Xiong, L.\n                and \n                  Yang, Z.\n                (2012), \u201cExploring tourist adoption of tourism mobile payment: an empirical analysis\u201d, \n                  Journal of Theoretical and Applied Electronic Commerce Research\n               , Vol. 7 No. 1, pp. 21-33.","DOI":"10.4067\/S0718-18762012000100003"},{"key":"key2020122623024678700_b88","unstructured":"Porter, M.E.\n                and \n                  Millar, V.E.\n                (1985), \u201cHow information gives you competitive advantage\u201d, \n                  Harvard Business Review\n               , Vol. 63 No. 4, pp. 149-160."},{"key":"key2020122623024678700_b61","unstructured":"Power, D.J.\n                and \n                  Sohal, A.S.\n                (2002), \u201cBest practice in implementation and usage of electronic commerce: a comparative study of 10 Australian companies\u201d, \n                  Benchmarking-Special Issue on Electronic Commerce: A Best Practice Perspective\n               , Vol. 9 No. 2, pp. 190-208."},{"key":"key2020122623024678700_b62","doi-asserted-by":"crossref","unstructured":"Premkumar, G.\n                and \n                  Roberts, M.\n                (1999), \u201cAdoption of new information technologies in rural small businesses\u201d, \n                  Omega: The International Journal of Management Science\n               , Vol. 27 No. 4, pp. 467-484.","DOI":"10.1016\/S0305-0483(98)00071-1"},{"key":"key2020122623024678700_b63","doi-asserted-by":"crossref","unstructured":"Ramdani, B.\n               , \n                  Kawalek, P.\n                and \n                  Lorenzo, O.\n                (2009), \u201cPredicting SMEs\u2019 adoption of enterprise systems\u201d, \n                  Journal of Enterprise Information Management\n               , Vol. 22 Nos 1\/2, pp. 10-24.","DOI":"10.1108\/17410390910922796"},{"key":"key2020122623024678700_b64","doi-asserted-by":"crossref","unstructured":"Raymond, L.\n                and \n                  Uwizeyemungu, S.\n                (2007), \u201cA profile of ERP adoption in manufacturing SMEs\u201d, \n                  Journal of Enterprise Information Management\n               , Vol. 20 No. 4, pp. 487-502.","DOI":"10.1108\/17410390710772731"},{"key":"key2020122623024678700_b65","unstructured":"Riyadh, A.N.\n               , \n                  Akter, M.S.\n                and \n                  Islam, N.\n                (2009), \u201cThe adoption of e-banking in developing countries: a theoretical model for SMEs\u201d, \n                  International Review of Business Research Papers\n               , Vol. 5 No. 6, pp. 212-230."},{"key":"key2020122623024678700_b66","unstructured":"Rogers, E.M.\n                (1983), \n                  Diffusion of Innovation\n               , The Free Press, New York, NY."},{"key":"key2020122623024678700_b67","unstructured":"Rogers, E.M.\n                (2003), \n                  Diffusion of Innovations\n               , The Free Press, New York, NY."},{"key":"key2020122623024678700_b68","doi-asserted-by":"crossref","unstructured":"Salwani, M.I.\n               , \n                  Marthandan, G.\n               , \n                  Norzaidi, M.D.\n                and \n                  Chong, S.C.\n                (2009), \u201cE-commerce usage and business performance in the Malaysian tourism sector: empirical analysis\u201d, \n                  Information Management & Computer Security\n               , Vol. 17 No. 2, pp. 166-185.","DOI":"10.1108\/09685220910964027"},{"key":"key2020122623024678700_b69","doi-asserted-by":"crossref","unstructured":"Sandhu, R.\n               , \n                  Boppana, R.\n               , \n                  Krishnan, R.\n               , \n                  Reich, J.\n               , \n                  Wolff, T.\n                and \n                  Zachry, J.\n                (2010), \u201cTowards a discipline of mission-aware cloud computing\u201d, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, ACM, New York, NY, pp. 13-18.","DOI":"10.1145\/1866835.1866839"},{"key":"key2020122623024678700_b70","doi-asserted-by":"crossref","unstructured":"Schillewaert, N.\n               , \n                  Ahearne, M.J.\n               , \n                  Frambach, R.T.\n                and \n                  Moenaert, R.K.\n                (2005), \u201cThe adoption of information technology in the sales force\u201d, \n                  Industrial Marketing Management\n               , Vol. 34 No. 4, pp. 323-336.","DOI":"10.1016\/j.indmarman.2004.09.013"},{"key":"key2020122623024678700_b71","doi-asserted-by":"crossref","unstructured":"Senk, C.\n                (2013, \u201cAdoption of security as a service\u201d, \n                  Journal of Internet Services and Applications\n               , Vol. 4 No. 11, pp. 1-16.","DOI":"10.1186\/1869-0238-4-11"},{"key":"key2020122623024678700_b72","unstructured":"Sonnenwald, D.H.\n               , \n                  Maglaughlin, K.L.\n                and \n                  Whitton, M.C.\n                (2001), \u201cUsing innovation diffusion theory to guide collaboration technology evaluation\u201d, IEEE 10th International Workshop on Enabling Technologies, Work in progress, Infrastructure for Collaborative Enterprises, Cambridge, MA."},{"key":"key2020122623024678700_b74","doi-asserted-by":"crossref","unstructured":"Subashini, S.\n                and \n                  Kavitha, V.\n                (2011), \u201cA survey on security issues in service delivery models of cloud computing\u201d, \n                  Journal of Network and Computer Applications\n               , Vol. 34 No. 1, pp. 1-11.","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"key2020122623024678700_b75","doi-asserted-by":"crossref","unstructured":"Tan, J.\n               , \n                  Tyler, K.\n                and \n                  Manica, A.\n                (2007), \u201cBusiness-to-business adoption of e-commerce in China\u201d, \n                  Information & Management\n               , Vol. 44 No. 3, pp. 332-351.","DOI":"10.1016\/j.im.2007.04.001"},{"key":"key2020122623024678700_b76","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H.\n               , \n                  Lin, S.\n                and \n                  Lai, K.-H.\n                (2009), \u201cAdopters and non-adopters of e-procurement in Singapore: an empirical study\u201d, \n                  Omega\n               , Vol. 37 No. 5, pp. 972-987.","DOI":"10.1016\/j.omega.2008.11.001"},{"key":"key2020122623024678700_b77","unstructured":"Tornatzky, L.G.\n                and \n                  Fleischer, M.\n                (1990), \n                  The Processes of Technological Innovation\n               , Lexington books, Lexington, MA."},{"key":"key2020122623024678700_b79","unstructured":"Velte, A.T.\n               , \n                  Velte, T.J.\n                and \n                  Elsenpeter, R.\n                (2009), \n                  Cloud Computng: A Practical Approach\n               , Tata McGraw-Hill, New York, NY."},{"key":"key2020122623024678700_b","unstructured":"Wang, M.W.\n               , \n                  Lee, O.-K.\n                and \n                  Lim, K.H.\n                (2007). \u201cKnowledge management systems diffusion in Chinese enterprises: a multi-stage approach with the technology-organization-environment framework\u201d, PACIS 2007 Proceedings, Paper 70, Auckland, July"},{"key":"key2020122623024678700_b81","doi-asserted-by":"crossref","unstructured":"Wang, Y.\n               , \n                  Wang, Y.\n                and \n                  Yang, Y.\n                (2010), \u201cUnderstanding the determinants of RFID adoption in the manufacturing industry\u201d, \n                  Technological Forecasting & Social Change\n               , Vol. 77 No. 5, pp. 803-815.","DOI":"10.1016\/j.techfore.2010.03.006"},{"key":"key2020122623024678700_b82","doi-asserted-by":"crossref","unstructured":"Wen, K.\n                and \n                  Chen, Y.\n                (2010), \u201cE-business value creation in small and medium enterprises: a US study using the TOE framework\u201d, \n                  International Journal of Electronic Business\n               , Vol. 8 No. 1, pp. 80-100.","DOI":"10.1504\/IJEB.2010.030717"},{"key":"key2020122623024678700_b83","doi-asserted-by":"crossref","unstructured":"Wu, W.-W.\n                (2011), \u201cDeveloping an explorative model for SaaS adoption\u201d, \n                  Expert Systems with Applications\n               , Vol. 38 No. 12, pp. 15057-15064.","DOI":"10.1016\/j.eswa.2011.05.039"},{"key":"key2020122623024678700_b84","doi-asserted-by":"crossref","unstructured":"Zhu, K.\n                and \n                  Kraemer, K.L.\n                (2005), \u201cPost-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry\u201d, \n                  Information Systems Research\n               , Vol. 16 No. 1, pp. 61-84.","DOI":"10.1287\/isre.1050.0045"},{"key":"key2020122623024678700_b86","doi-asserted-by":"crossref","unstructured":"Zhu, K.\n               , \n                  Kraemer, K.L.\n                and \n                  Xu, S.\n                (2006), \u201cThe process of innovation assimilation by firms in different countries: a technology diffusion perspective on e-business\u201d, \n                  Management Science\n               , Vol. 52 No. 10, pp. 1557-1576.","DOI":"10.1287\/mnsc.1050.0487"},{"key":"key2020122623024678700_b85","doi-asserted-by":"crossref","unstructured":"Zhu, K.\n               , \n                  Kraemer, K.L.\n               , \n                  Xu, S.\n                and \n                  Dedrick, J.\n                (2004), \u201cThe complementarity of information technology infrastructure and e-commerce capability: a resource based assessment of their business value\u201d, \n                  Journal of Management Information Systems\n               , Vol. 21 No. 1, pp. 167-202.","DOI":"10.1080\/07421222.2004.11045794"},{"key":"key2020122623024678700_frd1","unstructured":"Mell, P.\n                and \n                  Grance, T.\n                (2009), \u201cThe NIST definition of cloud computing\u201d, Tech report National Institute of Standards and Technology."},{"key":"key2020122623024678700_frd2","doi-asserted-by":"crossref","unstructured":"Upadhyay, P.\n               , \n                  Jahanyan, S.\n                and \n                  Dan, P.K.\n                (2011), \u201cFactors influencing ERP implementation in Indian manufacturing organisations: a study of micro, small and medium-scale enterprises\u201d, \n                  Journal of Enterprise Information Management\n               , Vol. 24 No. 2, pp. 130-145.","DOI":"10.1108\/17410391111106275"},{"key":"key2020122623024678700_frd3","unstructured":"www.newinnovationsguide.com\/NIST_Cloud_Definition.pdf"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JEIM-08-2013-0065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-08-2013-0065\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-08-2013-0065\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:31:49Z","timestamp":1753396309000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/28\/1\/107-130\/200490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,9]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2,9]]}},"alternative-id":["10.1108\/JEIM-08-2013-0065"],"URL":"https:\/\/doi.org\/10.1108\/jeim-08-2013-0065","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2015,2,9]]}}}