{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:58:07Z","timestamp":1775066287127,"version":"3.50.1"},"reference-count":115,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T00:00:00Z","timestamp":1549238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2019,2,4]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Although studies have investigated reasons for software as a service (SaaS) adoption, it is unclear how firm-level SaaS use impacts future SaaS intentions. The purpose of this paper is to propose a theoretical model that integrates the technology-organization-environment framework, institutional theory, diffusion-of-innovation theory and the opportunity-risk framework to analyze the drivers of SaaS use and its continuance intention.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors evaluated the direct, moderating and mediating effects of determinants on SaaS continuance intentions using structural equation modeling and data from 301 firms.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Results found that top management support and normative pressures influenced SaaS use. Cost saving and security concerns were direct predictors of perceived opportunities and perceived risks, respectively. Perceived opportunities and risks and actual SaaS use influenced SaaS continuance. Interestingly, perceived opportunities were found to be a negative moderator on the relationship between SaaS use and SaaS continuance.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The results reveal insightful and controversial findings for SaaS research.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/itp-01-2018-0027","type":"journal-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T10:07:44Z","timestamp":1546942064000},"page":"189-216","source":"Crossref","is-referenced-by-count":43,"title":["Firms\u2019 continuance intention on SaaS use \u2013 an empirical study"],"prefix":"10.1108","volume":"32","author":[{"given":"Ricardo","family":"Martins","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Manoj","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Tom\u00e1s","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020092502071331700_ref001","first-page":"67","article-title":"The organizational critical success factors for adopting cloud computing in SMEs","volume":"4","year":"2013","journal-title":"Journal of Information Systems Research and Innovation"},{"issue":"3","key":"key2020092502071331700_ref002","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1108\/09593841111158365","article-title":"The adoption and continued usage intention of RFID: an integrated framework","volume":"24","year":"2011","journal-title":"Information Technology & People"},{"key":"key2020092502071331700_ref003","first-page":"189","article-title":"Factors influencing the continuous use of cloud computing services in organization level","year":"2017"},{"issue":"4","key":"key2020092502071331700_ref004","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","year":"2010","journal-title":"Communications of the ACM"},{"issue":"7","key":"key2020092502071331700_ref005","doi-asserted-by":"crossref","first-page":"361","DOI":"10.17705\/1jais.00367","article-title":"Enhanced use of IT: a new perspective on post-adoption","volume":"15","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"5","key":"key2020092502071331700_ref006","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1007\/s10796-011-9329-6","article-title":"Routinisation of B2B e-commerce by small firms: a process perspective","volume":"14","year":"2012","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"key2020092502071331700_ref007","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.jsis.2010.07.001","article-title":"Paradoxical effects of institutionalisation on the strategic awareness of technology in organisations","volume":"19","year":"2010","journal-title":"The Journal of Strategic Information Systems"},{"issue":"1","key":"key2020092502071331700_ref008","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.dss.2011.07.007","article-title":"Opportunities and risks of software-as-a-service: findings from a survey of IT executives","volume":"52","year":"2011","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2020092502071331700_ref009","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s12599-009-0068-x","article-title":"Drivers of SaaS-adoption \u2013 an empirical study of different application types","volume":"1","year":"2009","journal-title":"Business & Information Systems Engineering"},{"issue":"3","key":"key2020092502071331700_ref010","doi-asserted-by":"crossref","first-page":"85","DOI":"10.2753\/MIS0742-1222280303","article-title":"Service quality in software-as-a-service: developing the SaaS-qual measure and examining its role in usage continuance","volume":"28","year":"2011","journal-title":"Journal of Management Information Systems"},{"key":"key2020092502071331700_ref011","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.jss.2013.09.013","article-title":"Performance optimization of deployed software-as-a-service applications","volume":"87","year":"2014","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"key2020092502071331700_ref012","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/3250921","article-title":"Understanding information systems continuance: an expectation-confirmation model","volume":"25","year":"2001","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020092502071331700_ref013","doi-asserted-by":"crossref","first-page":"229","DOI":"10.2307\/25148634","article-title":"Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test","volume":"28","year":"2004","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020092502071331700_ref014","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jsis.2011.01.003","article-title":"Integrative framework for assessing firms\u2019 potential to undertake green IT initiatives via virtualization \u2013 a theoretical perspective","volume":"20","year":"2011","journal-title":"The Journal of Strategic Information Systems"},{"issue":"1","key":"key2020092502071331700_ref015","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.jsis.2010.09.006","article-title":"Compliance with institutional imperatives on environmental sustainability: building theory on the role of Green IS","volume":"20","year":"2011","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2020092502071331700_ref300","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1080\/00207543.2012.693961","article-title":"Determinants of mobile supply chain management system diffusion: a structural equation analysis of manufacturing firms","volume":"51","year":"2013","journal-title":"International Journal of Production Research"},{"issue":"1","key":"key2020092502071331700_ref016","first-page":"1","article-title":"Issues and opinion on structural equation modeling","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020092502071331700_ref017","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study","volume":"14","year":"2003","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020092502071331700_ref018","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1111\/j.1365-2575.2012.00407.x","article-title":"Understanding customers\u2019 repeat purchase intentions in B2C e-commerce: the roles of utilitarian value, hedonic value and perceived risk","volume":"24","year":"2014","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2020092502071331700_ref019","first-page":"1","article-title":"An integrative framework of comparing SaaS adoption for core and non-core business operations: an empirical study on Hong Kong industries","volume":"17","year":"2013","journal-title":"Information Systems Frontiers"},{"issue":"10","key":"key2020092502071331700_ref020","doi-asserted-by":"crossref","first-page":"8645","DOI":"10.1016\/j.eswa.2012.01.201","article-title":"Structural equation modeling for multi-stage analysis on radio frequency identification (RFID) diffusion in the health care industry","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"key2020092502071331700_ref021","doi-asserted-by":"crossref","first-page":"141","DOI":"10.2753\/MIS0742-1222240206","article-title":"Comparison of software quality under perpetual licensing and software as a service","volume":"24","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2020092502071331700_ref022","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1177\/002224377901600110","article-title":"A paradigm for developing better measures of marketing constructs","volume":"16","year":"1979","journal-title":"Journal of Marketing Research"},{"issue":"2","key":"key2020092502071331700_ref023","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1287\/mnsc.36.2.123","article-title":"Information technology implementation research \u2013 a technological diffusion approach","volume":"36","year":"1990","journal-title":"Management Science"},{"key":"key2020092502071331700_ref024","article-title":"A behavioral theory of the firm","year":"1963"},{"issue":"2","key":"key2020092502071331700_ref025","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/2095101","article-title":"The iron cage revisited: institutional isomorphism and collective rationality in organizational fields","volume":"48","year":"1983","journal-title":"American Sociological Review"},{"issue":"C","key":"key2020092502071331700_ref026","first-page":"64","article-title":"Understanding cloud computing adoption issues: a Delphi study approach","volume":"118","year":"2016","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"key2020092502071331700_ref027","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.future.2011.10.013","article-title":"A tenant-based resource allocation model for scaling software-as-a-service applications over cloud computing infrastructures","volume":"29","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"key2020092502071331700_ref028","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.jss.2017.12.011","article-title":"Reusing empirical knowledge during cloud computing adoption","volume":"138","year":"2018","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"key2020092502071331700_ref029","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.ejor.2008.04.023","article-title":"Short-term and long-term competition between providers of shrink-wrap software and software as a service","volume":"196","year":"2009","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key2020092502071331700_ref030","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"key2020092502071331700_ref031","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.im.2009.03.002","article-title":"Risks and benefits of business process outsourcing: a study of transaction services in the German banking industry","volume":"46","year":"2009","journal-title":"Information & Management"},{"issue":"2","key":"key2020092502071331700_ref032","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1080\/10196780410001675077","article-title":"A cross-country investigation of the determinants of the scope of e-commerce use: an institutional approach","volume":"14","year":"2004","journal-title":"Electronic Markets"},{"key":"key2020092502071331700_ref033","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ijpe.2013.12.027","article-title":"An institutional theory perspective on sustainable practices across the dairy supply chain","volume":"152","year":"2014","journal-title":"International Journal of Production Economics"},{"issue":"C","key":"key2020092502071331700_ref034","first-page":"73","article-title":"Rethinking the role of security in client satisfaction with software-as-a-service (SaaS) providers","volume":"70","year":"2015","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2020092502071331700_ref035","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","article-title":"The usage and adoption of cloud computing by small and medium businesses","volume":"33","year":"2013","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2020092502071331700_ref036","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","article-title":"An assessment of the use of partial least squares structural equation modeling in marketing research","volume":"40","year":"2012","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"3","key":"key2020092502071331700_ref037","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1851175.1851179","article-title":"Who is out there?: exploring the effects of trust and perceived risk on SaaS adoption intentions","volume":"41","year":"2010","journal-title":"ACM SIGMIS Database"},{"issue":"3","key":"key2020092502071331700_ref038","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.jsis.2013.07.003","article-title":"An institutional theory perspective on e-HRM\u2019s strategic potential in MNC subsidiaries","volume":"22","year":"2013","journal-title":"The Journal of Strategic Information Systems"},{"key":"key2020092502071331700_ref039","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","article-title":"The use of partial least squares path modeling in international marketing","volume":"20","year":"2009","journal-title":"Advances in International Marketing"},{"issue":"3","key":"key2020092502071331700_ref040","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1016\/j.dss.2006.03.009","article-title":"Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet","volume":"42","year":"2006","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020092502071331700_ref041","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1287\/isre.2013.0501","article-title":"A framework and guidelines for context-specific theorizing in information systems research","volume":"25","year":"2014","journal-title":"Information Systems Research"},{"issue":"4","key":"key2020092502071331700_ref042","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1108\/ITP-06-2016-0133","article-title":"The development and validation of a two-staged adoption model of RFID technology in livestock businesses","volume":"30","year":"2017","journal-title":"Information Technology & People"},{"issue":"4","key":"key2020092502071331700_ref043","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2753\/JEC1086-4415100401","article-title":"Determinants of e-business use in U.S. firms","volume":"10","year":"2006","journal-title":"International Journal of Electronic Commerce"},{"issue":"2","key":"key2020092502071331700_ref044","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.jsis.2007.05.004","article-title":"The role of external and internal influences on information systems security\u2013a neo-institutional perspective","volume":"16","year":"2007","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2020092502071331700_ref045","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1142\/S0219622011004543","article-title":"An empirical analysis of factors influencing Internet\/e-business technologies adoption by SMEs in Canada","volume":"10","year":"2011","journal-title":"International Journal of Information Technology & Decision Making"},{"issue":"3","key":"key2020092502071331700_ref046","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems","volume":"29","year":"2005","journal-title":"MIS Quarterly"},{"key":"key2020092502071331700_ref047","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.chb.2016.10.022","article-title":"Enterprise 2.0 post-adoption: extending the information system continuance model based on the technology-organization-environment framework","volume":"67","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020092502071331700_ref048","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1016\/j.dss.2008.11.008","article-title":"How do mediated and non-mediated power affect electronic supply chain management system adoption? The mediating effects of trust and institutional pressures","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2020092502071331700_ref049","doi-asserted-by":"crossref","first-page":"1252","DOI":"10.1016\/j.camwa.2012.03.069","article-title":"An innovative method for data and software integration in SaaS","volume":"64","year":"2012","journal-title":"Computers & Mathematics with Applications"},{"issue":"4","key":"key2020092502071331700_ref050","first-page":"372","article-title":"Privacy and security issues in cloud computing: the role of institutions and institutional evolution","volume":"37","year":"2013","journal-title":"Telecommunications Policy"},{"issue":"4","key":"key2020092502071331700_ref051","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1057\/jit.2015.14","article-title":"An integrated environmental perspective on software as a service adoption in manufacturing and retail firms","volume":"30","year":"2015","journal-title":"Journal of Information Technology"},{"issue":"3","key":"key2020092502071331700_ref052","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.jsis.2009.06.002","article-title":"A review of the IT outsourcing literature: insights for practice","volume":"18","year":"2009","journal-title":"Journal of Strategic Information Systems"},{"key":"key2020092502071331700_ref053","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","article-title":"Determinants of end-user acceptance of biometrics: integrating the \u2018Big 3\u2019 of technology acceptance with privacy context","volume":"56","year":"2013","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2020092502071331700_ref054","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.elerap.2008.11.006","article-title":"Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit","volume":"8","year":"2009","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"key2020092502071331700_ref055","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1016\/j.chb.2005.12.001","article-title":"Factors affecting the implementation success of internet-based information systems","volume":"23","year":"2007","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"key2020092502071331700_ref056","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.im.2013.07.006","article-title":"Using balanced scorecards for the evaluation of \u2018software-as-a-service\u2019","volume":"50","year":"2013","journal-title":"Information & Management"},{"issue":"3","key":"key2020092502071331700_ref057","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.ijinfomgt.2013.01.006","article-title":"Drivers and inhibitors of SaaS adoption in Korea","volume":"33","year":"2013","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2020092502071331700_ref058","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1146\/annurev.so.14.080188.001535","article-title":"Organizational learning","volume":"14","year":"1988","journal-title":"Annual Review of Sociology"},{"issue":"8","key":"key2020092502071331700_ref059","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1016\/j.im.2014.07.004","article-title":"Understanding post-adoption behaviors of e-service users in the context of online travel services","volume":"51","year":"2014","journal-title":"Information & Management"},{"issue":"1","key":"key2020092502071331700_ref060","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2020092502071331700_ref061","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.jom.2009.11.010","article-title":"The role of institutional pressures and organizational culture in the firm\u2019s intention to adopt internet-enabled supply chain management systems","volume":"28","year":"2010","journal-title":"Journal of Operations Management"},{"issue":"7","key":"key2020092502071331700_ref062","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1108\/02635571111161262","article-title":"Understanding the determinants of cloud computing adoption","volume":"111","year":"2011","journal-title":"Industrial Management & Data Systems"},{"key":"key2020092502071331700_ref063","unstructured":"McHall, T. (2011), \u201cGartner says worldwide software as a service revenue is forecast to grow 21 percent in 2011\u201d, Gartner.com, Gartner, available at: www.gartner.com\/It\/Page.Jsp"},{"issue":"4","key":"key2020092502071331700_ref064","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1080\/10919392.2015.1087702","article-title":"Assessing organizational adoption of information systems outsourcing","volume":"25","year":"2015","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"C","key":"key2020092502071331700_ref065","first-page":"19","article-title":"An empirical analysis to assess the determinants of SaaS diffusion in firms","volume":"62","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020092502071331700_ref066","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1108\/ITP-07-2015-0168","article-title":"Understanding microblogging continuance intention: the directed social network perspective","volume":"31","year":"2018","journal-title":"Information Technology & People"},{"issue":"1","key":"key2020092502071331700_ref067","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1287\/isre.1070.0115","article-title":"Antecedents and consequences of internet use in procurement: an empirical investigation of US manufacturing firms","volume":"18","year":"2007","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020092502071331700_ref068","first-page":"110","article-title":"Literature review of information technology adoption models at firm level","volume":"14","year":"2011","journal-title":"The Electronic Journal Information Systems Evaluation"},{"issue":"5","key":"key2020092502071331700_ref069","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","article-title":"Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors","volume":"51","year":"2014","journal-title":"Information & Management"},{"issue":"3","key":"key2020092502071331700_ref070","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.ipm.2014.02.002","article-title":"The effects of personalization on user continuance in social networking sites","volume":"50","year":"2014","journal-title":"Information Processing & Management"},{"issue":"1","key":"key2020092502071331700_ref071","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s10586-015-0516-y","article-title":"Factors affecting the continuous use of cloud service: focused on security risks","volume":"19","year":"2016","journal-title":"Cluster Computing"},{"issue":"5","key":"key2020092502071331700_ref072","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1057\/ejis.2014.15","article-title":"An organizational perspective on m-business: usage factors and value determination\u2020","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"key2020092502071331700_ref073","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"key2020092502071331700_ref074","volume-title":"The New Institutionalism in Organizational Analysis","year":"1991"},{"issue":"3","key":"key2020092502071331700_ref075","doi-asserted-by":"crossref","first-page":"879","DOI":"10.3758\/BRM.40.3.879","article-title":"Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models","volume":"40","year":"2008","journal-title":"Behavior Research Methods"},{"key":"key2020092502071331700_ref076","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.chb.2017.07.027","article-title":"Understanding and predicting the determinants of cloud computing adoption: a two staged hybrid SEM \u2013 neural networks approach","volume":"76","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2020092502071331700_ref077","unstructured":"Ringle, C.M., Wende, S. and Becker, J.-M. (2015), \u201cSmartPLS 3\u201d, SmartPLS GmbH, Boenningstedt, available at: www.smartpls.com"},{"issue":"4","key":"key2020092502071331700_ref078","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1016\/j.chb.2007.06.001","article-title":"Understanding e-learning continuance intention in the workplace: a self-determination theory perspective","volume":"24","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"key2020092502071331700_ref079","volume-title":"Diffusion of Innovations","year":"2010"},{"issue":"4","key":"key2020092502071331700_ref080","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1177\/002224377401100409","article-title":"Estimating consumer preferences for a new durable brand in an established product class","volume":"11","year":"1974","journal-title":"Journal of Marketing Research"},{"issue":"3","key":"key2020092502071331700_ref081","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1111\/j.1365-2575.2011.00389.x","article-title":"Understanding post-adoption IS usage stages: an empirical assessment of self-service information systems","volume":"23","year":"2013","journal-title":"Information Systems Journal"},{"issue":"6","key":"key2020092502071331700_ref082","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.im.2008.06.002","article-title":"Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems","volume":"45","year":"2008","journal-title":"Information & Management"},{"issue":"1","key":"key2020092502071331700_ref083","first-page":"1","article-title":"Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing","volume":"31","year":"2014","journal-title":"Journal of Information Technology"},{"key":"key2020092502071331700_ref084","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.chb.2015.03.059","article-title":"Making the most of information technology & systems usage: a literature review, framework and future research agenda","volume":"49","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020092502071331700_ref085","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/01449290701814232","article-title":"An empirical investigation of a modified technology acceptance model of IPTV","volume":"28","year":"2009","journal-title":"Behaviour & Information Technology"},{"issue":"6","key":"key2020092502071331700_ref086","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1111\/j.1467-8721.2006.00461.x","article-title":"Risk perception and affect","volume":"15","year":"2006","journal-title":"Current Directions in Psychological Science"},{"issue":"1","key":"key2020092502071331700_ref087","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TEM.2007.912806","article-title":"Why do firms adopt e-procurement systems? Using logistic regression to empirically test a conceptual model","volume":"55","year":"2008","journal-title":"IEEE Transactions on Engineering Management"},{"key":"key2020092502071331700_ref088","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.ins.2015.09.004","article-title":"Dynamic remote data auditing for securing big data storage in cloud computing","volume":"380","year":"2017","journal-title":"Information Sciences"},{"key":"key2020092502071331700_ref089","volume-title":"Organizations and their Environments","year":"1976"},{"issue":"2","key":"key2020092502071331700_ref090","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/248922","article-title":"Validating instruments in MIS research","volume":"13","year":"1989","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020092502071331700_ref091","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1287\/mnsc.1120.1634","article-title":"Services and the business models of product firms: an empirical analysis of the software industry","volume":"59","year":"2013","journal-title":"Management Science"},{"issue":"1","key":"key2020092502071331700_ref092","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"key2020092502071331700_ref093","doi-asserted-by":"crossref","first-page":"87","DOI":"10.2753\/MIS0742-1222260404","article-title":"Multitask agency, modular architecture, and task disaggregation in SaaS","volume":"26","year":"2010","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2020092502071331700_ref094","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/30036518","article-title":"Predicting intention to adopt interorganizational linkages: an institutional perspective","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"key":"key2020092502071331700_ref095","volume-title":"The Processes of Technological Innovation","year":"1990","edition":"Ma, ed."},{"issue":"6","key":"key2020092502071331700_ref096","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/S0378-7206(02)00079-4","article-title":"Factors influencing the usage of websites: the case of a generic portal in the Netherlands","volume":"40","year":"2003","journal-title":"Information & Management"},{"issue":"7","key":"key2020092502071331700_ref097","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.im.2008.03.005","article-title":"Information systems continuance intention of web-based applications customers: the case of online banking","volume":"45","year":"2008","journal-title":"Information & Management"},{"issue":"4","key":"key2020092502071331700_ref098","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1287\/isre.1110.0404","article-title":"Adoption and impacts of interorganizational business process standards: role of partnering synergy","volume":"23","year":"2012","journal-title":"Information Systems Research"},{"key":"key2020092502071331700_ref099","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2020092502071331700_ref100","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","article-title":"Extending the two-stage information systems continuance model: incorporating UTAUT predictors and the role of context","volume":"21","year":"2011","journal-title":"Information Systems Journal"},{"key":"key2020092502071331700_ref101","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.chb.2014.01.034","article-title":"Antecedents and consequences of perceived value in mobile government continuance use: an empirical research in China","volume":"34","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020092502071331700_ref102","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1177\/0092070303255379","article-title":"An analysis of e-business adoption and its impact on business performance","volume":"31","year":"2003","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"12","key":"key2020092502071331700_ref103","doi-asserted-by":"crossref","first-page":"15057","DOI":"10.1016\/j.eswa.2011.05.039","article-title":"Developing an explorative model for SaaS adoption","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"key2020092502071331700_ref104","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.jss.2010.11.890","article-title":"Mining significant factors affecting the adoption of SaaS using the rough set approach","volume":"84","year":"2011","journal-title":"Journal of Systems and Software"},{"issue":"6","key":"key2020092502071331700_ref105","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.ijinfomgt.2011.02.007","article-title":"Exploring decisive factors affecting an organization\u2019s SaaS adoption: a case study","volume":"31","year":"2011","journal-title":"International Journal of Information Management"},{"key":"key2020092502071331700_ref106","doi-asserted-by":"crossref","unstructured":"Xin, M. and Levina, N. (2008), \u201cSoftware-as-a-service model: elaborating client-side adoption factors\u201d, in Boland, R., Limayem, M. and Pentland, B. (Eds), Proceedings of the 29th International Conference on Information Systems, Paris, pp. 14-17.","DOI":"10.2139\/ssrn.1319488"},{"issue":"C","key":"key2020092502071331700_ref107","first-page":"219","article-title":"User continuance intention to use cloud storage service","volume":"52","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"key2020092502071331700_ref108","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.chb.2014.12.022","article-title":"Understanding SaaS adoption from the perspective of organizational users: a tripod readiness model","volume":"45","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2020092502071331700_ref109","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1016\/j.chb.2012.12.003","article-title":"Why aren\u2019t organizations adopting virtual worlds?","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2020092502071331700_ref110","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.ipm.2014.04.010","article-title":"Understanding the adoption of location-based recommendation agents among active users of social networking sites","volume":"50","year":"2014","journal-title":"Information Processing & Management"},{"issue":"1","key":"key2020092502071331700_ref111","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1050.0045","article-title":"Post-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry","volume":"16","year":"2005","journal-title":"Information Systems Research"},{"issue":"10","key":"key2020092502071331700_ref112","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1287\/mnsc.1050.0487","article-title":"The process of innovation assimilation by firms in different countries: a technology diffusion perspective on e-business","volume":"52","year":"2006","journal-title":"Management Science"},{"issue":"6","key":"key2020092502071331700_ref113","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1057\/palgrave.ejis.3000650","article-title":"Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies","volume":"15","year":"2006","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2020092502071331700_ref114","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.dss.2012.05.045","article-title":"A service oriented architecture to provide data mining services for non-expert data miners","volume":"55","year":"2013","journal-title":"Decision Support Systems"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-01-2018-0027\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-01-2018-0027\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:03Z","timestamp":1753394043000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/32\/1\/189-216\/183277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,4]]},"references-count":115,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,4]]}},"alternative-id":["10.1108\/ITP-01-2018-0027"],"URL":"https:\/\/doi.org\/10.1108\/itp-01-2018-0027","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2,4]]}}}