{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T04:55:55Z","timestamp":1762059355206,"version":"build-2065373602"},"reference-count":215,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Fog technology is one of the recent improvements in cloud technology that is designed to reduce some of its drawbacks. Fog technology architecture is often widely distributed to minimize the time required for data processing and enable Internet of Things (IoT) innovations. The purpose of this paper is to evaluate the main factors that might influence the adoption of fog technology. This paper offers a combined framework that addresses fog technology adoption based on the technology adoption perspective, which has been comprehensively researched in the information systems discipline. The proposed integrated framework combines the technology acceptance model (TAM) and diffusion of innovation (DOI) theory to develop a holistic perspective on the adoption of fog technology. The factors that might affect the adoption of fog technology are analyzed from the results of an online survey in 43 different organizations across a wide range of industries. These factors are observed based on data collected from 216 participants, including professional IT staff and senior business executives. This analysis was conducted by using structural equation modeling (SEM). The research results identified nine factors with a statistically significant impact on the adoption of fog technology, and these factors included relative advantage, compatibility, awareness, cost-effectiveness, security, infrastructure, ease of use, usefulness, and location. The findings from this research offer insight to organizations looking to implement fog technology to enable IoT and tap into the digital transformation opportunities presented by this new digital economy.<\/jats:p>","DOI":"10.3390\/bdcc6030081","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T22:03:42Z","timestamp":1658873022000},"page":"81","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Evaluation of Key Adoption Factors towards Using the Fog Technology"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5386-8100","authenticated-orcid":false,"given":"Omar","family":"Ali","sequence":"first","affiliation":[{"name":"Management Information Systems Department, American University of the Middle East, Egaila 54200, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2952-0072","authenticated-orcid":false,"given":"Anup","family":"Shrestha","sequence":"additional","affiliation":[{"name":"School of Business, University of Southern Queensland, Toowoomba, QLD 4350, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6686-7972","authenticated-orcid":false,"given":"Ashraf","family":"Jaradat","sequence":"additional","affiliation":[{"name":"Management Information Systems Department, American University of the Middle East, Egaila 54200, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8435-2964","authenticated-orcid":false,"given":"Ahmad","family":"Al-Ahmad","sequence":"additional","affiliation":[{"name":"Management Information Systems Department, American University of the Middle East, Egaila 54200, Kuwait"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ali, A., Ahmed, M., Imran, M., and Khattak, H.A. (2020). Security and Privacy Issues in Fog Computing. Fog Computing: Theory and Practice, John Wiley & Sons.","DOI":"10.1002\/9781119551713.ch5"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1016\/j.future.2018.05.015","article-title":"Toward integrated Cloud\u2013Fog networks for efficient IoT provisioning: Key challenges and solutions","volume":"88","author":"Peng","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","article-title":"Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors","volume":"51","author":"Oliveira","year":"2014","journal-title":"Inf. Manag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1057\/ejis.2013.1","article-title":"Why end-users move to the cloud: A migration-theoretic analysis","volume":"23","author":"Bhattacherjee","year":"2014","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","article-title":"The rise of \u201cbig data\u201d on cloud computing: Review and open research issues","volume":"47","author":"Hashem","year":"2015","journal-title":"Inf. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1080\/0144929X.2018.1488991","article-title":"Perceived potential for value creation from cloud computing: A study of the Australian regional government sector","volume":"37","author":"Ali","year":"2018","journal-title":"Behav. Inf. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCOM.2018.1700707","article-title":"Fog computing architecture, evaluation, and future research directions","volume":"56","author":"Aazam","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","article-title":"Survey on fog computing: Architecture, key technologies, applications and open issues","volume":"98","author":"Hu","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/WEB-160347","article-title":"Factors to be considered in cloud computing adoption","volume":"14","author":"Ali","year":"2016","journal-title":"Web Intell."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Al-Ahmad, A.S., and Kahtan, H. (2018, January 11\u201312). Cloud Computing Review: Features And Issues. Proceedings of the 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, Malaysia.","DOI":"10.1109\/ICSCEE.2018.8538387"},{"key":"ref_11","first-page":"210","article-title":"Mobile Cloud Computing Applications Penetration Testing Model Design","volume":"13","author":"Aljunid","year":"2020","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"ref_12","first-page":"1","article-title":"Benefits and challenges of the adoption of cloud computing in business","volume":"6","author":"Xue","year":"2016","journal-title":"Int. J. Cloud Comput. Serv. Archit."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.procs.2018.10.243","article-title":"Fogology: What is (not) Fog Computing?","volume":"139","author":"Upadhyay","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"173524","DOI":"10.1109\/ACCESS.2019.2956770","article-title":"Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications","volume":"7","author":"Kahtan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_15","unstructured":"Almutiry, O., Wills, G., Alwabel, A., Crowder, R., and WaIters, R. (2013, January 24\u201326). Toward a framework for data quality in cloud-based health information system. Proceedings of the International Conference on Information Society (i-Society 2013), Toronto, ON, Canada."},{"key":"ref_16","first-page":"53","article-title":"Cloud computing: The future of big data management","volume":"5","author":"Ouf","year":"2015","journal-title":"Int. J. Cloud Appl. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1016\/j.procs.2017.11.134","article-title":"The acceptance of cloud computing for IT workers in Thailand","volume":"121","author":"Inmor","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7157192","DOI":"10.1155\/2018\/7157192","article-title":"Fog computing: An overview of big IoT data analytics","volume":"2018","author":"Anawar","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2018.12.004","article-title":"Privacy-preserving public auditing for secure data storage in fog-to-cloud computing","volume":"127","author":"Tian","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.future.2018.07.014","article-title":"Context-aware data quality assessment for big data","volume":"89","author":"Ardagna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.ijinfomgt.2018.07.010","article-title":"Understanding the effect of cloud computing on organizational agility: An empirical examination","volume":"43","author":"Liu","year":"2018","journal-title":"Int. J. Inf. Manag."},{"key":"ref_22","first-page":"2760","article-title":"Factors Influencing Fog Computing Adoption Based on Quality of Results (QoR) For Heterogeneous Data Analysis: A Proposed Framework","volume":"8","author":"Malic","year":"2019","journal-title":"Int. J. Recent Technol. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","article-title":"All one needs to know about fog computing and related edge computing paradigms: A complete survey","volume":"98","author":"Yousefpour","year":"2019","journal-title":"J. Syst. Archit."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.pmcj.2018.12.007","article-title":"A survey on fog computing for the Internet of Things","volume":"52","author":"Bellavista","year":"2019","journal-title":"Pervasive Mob. Comput."},{"key":"ref_25","unstructured":"Rogers, E.M. (1995). Diffusion of Innovations, Simon and Schuster. [4th ed.]."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Q."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: A comparison of two theoretical models","volume":"35","author":"Davis","year":"1989","journal-title":"Manag. Sci."},{"key":"ref_28","unstructured":"Firdhous, M., Ghazali, O., and Hassan, S. Fog Computing: Will It Be the Future of Cloud Computing? In Proceedings of the Third International Conference on Informatics & Applications, Kuala Terengganu, Malaysia, 8\u201310 October 2014."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1002\/itdj.20130","article-title":"A constructive technology assessment approach to ICT planning in developing countries: Evaluating the first phase, the Roundtable workshop","volume":"16","author":"Moens","year":"2009","journal-title":"Inf. Technol. Dev."},{"key":"ref_30","first-page":"1","article-title":"Discourses on ICT and development","volume":"6","author":"Avgerou","year":"2010","journal-title":"Inf. Technol. Int. Dev."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s40887-017-0014-9","article-title":"The impact of technological innovation on building a sustainable city","volume":"3","author":"Goi","year":"2017","journal-title":"Int. J. Qual. Innov."},{"key":"ref_32","unstructured":"Eseonu, C.I., and Egbue, O. (June, January 31). Socio-Cultural Influences on Technology Adoption and Sustainable Development. Proceedings of the 2014 Industrial and Systems Engineering Research Conference, Montr\u00e9al, QC, Canada."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.ijinfomgt.2009.09.004","article-title":"Cloud computing for education: A new dawn?","volume":"30","author":"Sultan","year":"2010","journal-title":"Int. J. Inf. Manag."},{"key":"ref_34","first-page":"8887","article-title":"Fog computing and its role in the internet of things: Concept, security and privacy issues","volume":"975","author":"Saad","year":"2018","journal-title":"Int. J. Comput. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Q."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/S0148-2963(00)00152-1","article-title":"Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research","volume":"55","author":"Frambach","year":"2002","journal-title":"J. Bus. Res."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.ijinfomgt.2015.11.010","article-title":"Conceptualizing a model for adoption of cloud computing in education","volume":"36","author":"Sabi","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1023\/B:SBEJ.0000032036.90353.1f","article-title":"Factors impacting the adoption of the Internet among SMEs","volume":"23","author":"Dholakia","year":"2004","journal-title":"Small Bus. Econ."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/07421222.1993.11517994","article-title":"The initiation, adoption, and implementation of telecommunications technologies in US organizations","volume":"10","author":"Grover","year":"1993","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.im.2005.06.003","article-title":"Migrating to internet-based e-commerce: Factors affecting e-commerce adoption and migration at the firm level","volume":"43","author":"Hong","year":"2006","journal-title":"Inf. Manag."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","article-title":"Identifying the security risks associated with governmental use of cloud computing","volume":"27","author":"Paquette","year":"2010","journal-title":"Gov. Inf. Q."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1108\/EJMBE-10-2017-018","article-title":"Agent-based simulation in management and organizational studies: A survey","volume":"26","author":"Saa","year":"2017","journal-title":"Eur. J. Manag. Bus. Econ."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.ijmedinf.2018.02.008","article-title":"Agent-based computational models to explore diffusion of medical innovations among cardiologists","volume":"112","author":"Borracci","year":"2018","journal-title":"Int. J. Med. Inform."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1080\/07421222.1999.11518227","article-title":"An integrated model of information systems adoption in small businesses","volume":"15","author":"Thong","year":"1999","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_46","first-page":"13","article-title":"Factors affecting the adoption level of c-commerce: An empirical study","volume":"50","author":"Chong","year":"2009","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_47","first-page":"5081","article-title":"Fog computing security and privacy issues, open challenges, and blockchain solution: An overview","volume":"11","author":"Alzoubi","year":"2021","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1550147720906796","DOI":"10.1177\/1550147720906796","article-title":"A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing","volume":"16","author":"Guo","year":"2020","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_49","first-page":"537","article-title":"Smart fog computing for efficient situations management in smart health environments","volume":"17","author":"Achouri","year":"2018","journal-title":"J. Inf. Commun. Technol."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2017.7901470","article-title":"Clarifying fog computing and networking: 10 questions and answers","volume":"55","author":"Chiang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"e145","DOI":"10.1002\/spy2.145","article-title":"Fog computing security and privacy for the Internet of Thing applications: State-of-the-art","volume":"4","author":"Alzoubi","year":"2021","journal-title":"Secur. Priv."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jnca.2018.10.021","article-title":"Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions","volume":"128","author":"Elazhary","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_53","first-page":"436","article-title":"Fog computing architecture, benefits, security, and privacy, for the internet of thing applications: An overview","volume":"99","author":"Alzoubi","year":"2021","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/s10796-021-10108-w","article-title":"Assessment of complexity in cloud computing adoption: A case study of local governments in Australia","volume":"24","author":"Ali","year":"2022","journal-title":"Info. Syst. Front."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K., and Buyya, R. (2016). Fog computing: Principles, architectures, and applications. Internet of Things, Elsevier.","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"e4181","DOI":"10.1002\/dac.4181","article-title":"A survey on privacy and access control schemes in fog computing","volume":"34","author":"Khalid","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things security: A survey","volume":"88","author":"Alaba","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MNET.2018.1700250","article-title":"Data security and privacy in fog computing","volume":"32","author":"Guan","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_59","unstructured":"Kumar, R.A. (2019, January 17\u201318). Possible Solutions on Security and Privacy Issues in Fog Computing. Proceedings of the Second International Conference on Emerging Trends in Science & Technologies For Engineering Systems (ICETSE-2019), Chickballapur, India."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1016\/j.future.2019.07.010","article-title":"Energy and performance aware fog computing: A case of DVFS and green renewable energy","volume":"101","author":"Toor","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"31920","DOI":"10.1109\/ACCESS.2020.2973325","article-title":"Secure fog-based e-learning scheme","volume":"8","author":"Amor","year":"2020","journal-title":"IEEE Access"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., and Ghafir, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors, 19.","DOI":"10.3390\/s19081788"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","article-title":"Securing fog computing for internet of things applications: Challenges and solutions","volume":"20","author":"Ni","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","article-title":"Security and trust issues in Fog computing: A survey","volume":"88","author":"Zhang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Skarlat, O., Schulte, S., Borkowski, M., and Leitner, P. (2016, January 4\u20136). Resource provisioning for IoT services in the fog. Proceedings of the 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA), Macau, China.","DOI":"10.1109\/SOCA.2016.10"},{"key":"ref_66","unstructured":"Hussain, M., Alam, M.S., and Beg, M. (2018). Fog assisted cloud models for smart grid architectures-comparison study and optimal deployment. arXiv."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1186\/s13677-017-0090-3","article-title":"Fog computing security: A review of current applications and security solutions","volume":"6","author":"Khan","year":"2017","journal-title":"J. Cloud Comput."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Brogi, A., Forti, S., and Ibrahim, A. (2017, January 14\u201315). How to best deploy your fog applications, probably. Proceedings of the 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), Madrid, Spain.","DOI":"10.1109\/ICFEC.2017.8"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Song, F., Ai, Z.-Y., Li, J.-J., Pau, G., Collotta, M., You, I., and Zhang, H.-K. (2017). Smart collaborative caching for information-centric IoT in fog computing. Sensors, 17.","DOI":"10.3390\/s17112512"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2018.04.042","article-title":"Towards a proper service placement in combined Fog-to-Cloud (F2C) architectures","volume":"87","author":"Souza","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Nunes, D., Silva, J.S., Figueira, A., Dias, H., Rodrigues, A., Pereira, V., Boavida, F., and Sinche, S. (2016, January 8\u201310). FoTSeC\u2014Human Security in Fog of Things. Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji.","DOI":"10.1109\/CIT.2016.121"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Lee, K., Lee, C., Hong, C.-H., and Yoo, C. (2018). Enhancing the isolation and performance of control planes for fog computing. Sensors, 18.","DOI":"10.3390\/s18103267"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.jnca.2017.08.018","article-title":"Towards port-knocking authentication methods for mobile cloud computing","volume":"97","author":"Khan","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1049\/iet-net.2015.0034","article-title":"Theoretical modelling of fog computing: A green computing paradigm to support IoT applications","volume":"5","author":"Sarkar","year":"2016","journal-title":"Iet Netw."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","article-title":"Fog and IoT: An overview of research opportunities","volume":"3","author":"Chiang","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","article-title":"Data security and privacy-preserving in edge computing paradigm: Survey and open issues","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1111\/j.1564-913X.2001.tb00220.x","article-title":"ICTs and the possibilities for leapfrogging by developing countries","volume":"140","author":"Steinmueller","year":"2001","journal-title":"Int. Labour Rev."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s11205-011-9989-0","article-title":"The diffusion of IT in the historical context of innovations from developed countries","volume":"111","author":"James","year":"2013","journal-title":"Soc. Indic. Res."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1108\/13527609810796844","article-title":"Culture and innovation","volume":"5","author":"Herbig","year":"1998","journal-title":"Cross Cult. Manag."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Ali, O., and Soar, J. (2018). Technology innovation adoption theories. Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications, IGI Global.","DOI":"10.4018\/978-1-5225-5201-7.ch037"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The Theory of Planned Behaviour","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"ref_82","first-page":"21","article-title":"The literature review of technology adoption models and theories for the novelty technology","volume":"14","author":"Lai","year":"2017","journal-title":"J. Inf. Syst. Technol. Manag."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s10796-017-9774-y","article-title":"Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model","volume":"21","author":"Dwivedi","year":"2019","journal-title":"Inf. Syst. Front."},{"key":"ref_84","first-page":"130","article-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","volume":"10","author":"Fishbein","year":"1977","journal-title":"Philos. Rhetor."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1108\/09593841111158365","article-title":"The adoption and continued usage intention of RFID: An integrated framework","volume":"24","author":"Hossain","year":"2011","journal-title":"Inf. Technol. People"},{"key":"ref_86","unstructured":"Tornatzky, L., and Fleischer, M. (1990). The process of technology innovation. Lexington Books, Rowman & Littlefield."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.im.2008.05.001","article-title":"An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models","volume":"45","author":"Bouwman","year":"2008","journal-title":"Inf. Manag."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"26797","DOI":"10.1109\/ACCESS.2019.2899368","article-title":"Integrating technology acceptance model with innovation diffusion theory: An empirical investigation on students\u2019 intention to use E-learning systems","volume":"7","author":"Yahaya","year":"2019","journal-title":"IEEE Access"},{"key":"ref_89","unstructured":"Wibowo, M.P. (2019). Technology Acceptance Models and Theories in Library and Information Science Research. Libr. Philos. Pract., 3674. Available online: https:\/\/digitalcommons.unl.edu\/libphilprac\/3674."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1111\/j.1540-5915.1996.tb01822.x","article-title":"A model of the antecedents of perceived ease of use: Development and test","volume":"27","author":"Venkatesh","year":"1996","journal-title":"Decis. Sci."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/249740","article-title":"Factors affecting the adoption of open systems: An exploratory study","volume":"21","author":"Chau","year":"1997","journal-title":"MIS Q."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.jengtecman.2012.03.007","article-title":"A conceptual model for the process of IT innovation adoption in organizations","volume":"29","author":"Hameed","year":"2012","journal-title":"J. Eng. Technol. Manag."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"185","DOI":"10.15458\/2335-4216.1278","article-title":"Unpacking business intelligence systems adoption determinants: An exploratory study of small and medium enterprises","volume":"16","author":"Puklavec","year":"2014","journal-title":"Econ. Bus. Rev."},{"key":"ref_94","first-page":"625","article-title":"The effectiveness of using e-learning in Malaysian higher education: A case study Universiti Teknologi Malaysia","volume":"6","author":"Othman","year":"2015","journal-title":"Mediterr. J. Soc. Sci."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","article-title":"What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model","volume":"42","author":"Wu","year":"2005","journal-title":"Inf. Manag."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1016\/S0378-7206(01)00127-6","article-title":"Enticing online consumers: An extended technology acceptance perspective","volume":"39","author":"Gillenson","year":"2002","journal-title":"Inf. Manag."},{"key":"ref_97","first-page":"124","article-title":"Adding innovation diffusion theory to the technology acceptance model: Supporting employees\u2019 intentions to use e-learning systems","volume":"14","author":"Lee","year":"2011","journal-title":"J. Educ. Technol. Soc."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","article-title":"Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs","volume":"23","author":"Karahanna","year":"1999","journal-title":"MIS Q."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2003070101","article-title":"TAM or just plain habit: A look at experienced online shoppers","volume":"15","author":"Gefen","year":"2003","journal-title":"J. Organ. End User Comput."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1002\/mar.10110","article-title":"Consumer adoption of the Internet: The case of apparel shopping","volume":"20","author":"Yoh","year":"2003","journal-title":"Psychol. Mark."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1016\/j.im.2003.10.007","article-title":"Acceptance of Internet-based learning medium: The role of extrinsic and intrinsic motivation","volume":"42","author":"Lee","year":"2005","journal-title":"Inf. Manag."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.compedu.2004.10.007","article-title":"The influence of system characteristics on e-learning use","volume":"47","author":"Pituch","year":"2006","journal-title":"Comput. Educ."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.1540-5915.1999.tb01614.x","article-title":"Are individual differences germane to the acceptance of new information technologies?","volume":"30","author":"Agarwal","year":"1999","journal-title":"Decis. Sci."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1111\/j.1540-5915.1997.tb01315.x","article-title":"Toward an understanding of the behavioral intention to use an information system","volume":"28","author":"Jackson","year":"1997","journal-title":"Decis. Sci."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"11605","DOI":"10.1016\/j.eswa.2009.03.024","article-title":"Determinants of behavioral intention to mobile banking","volume":"36","author":"Gu","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"31","DOI":"10.5430\/bmr.v2n1p31","article-title":"An empirical investigation on consumer acceptance of mobile banking services","volume":"2","author":"Jeong","year":"2013","journal-title":"Bus. Manag. Res."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.chb.2013.12.024","article-title":"Predicting teachers\u2019 generative and receptive use of an educational portal by intention, attitude and self-reported use","volume":"34","author":"Pynoo","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_108","first-page":"131","article-title":"Managing a manufacturing company in a wired world","volume":"1","author":"Jambekar","year":"2002","journal-title":"Int. J. Inf. Technol. Manag."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.im.2012.05.002","article-title":"A meta-analysis of relationships between organizational characteristics and IT innovation adoption in organizations","volume":"49","author":"Hameed","year":"2012","journal-title":"Inf. Manag."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/S0378-7206(01)00073-8","article-title":"A perception-based model for EDI adoption in small businesses using a technology\u2013organization\u2013environment framework","volume":"38","author":"Kuan","year":"2001","journal-title":"Inf. Manag."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TEM.2005.851273","article-title":"Utilization of information technology: Examining cognitive and experiential factors of post-adoption behavior","volume":"52","author":"Lippert","year":"2005","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_112","unstructured":"Awa, H.O., Emecheta, B.C., and Ukoha, O. (July, January 30). Location factors as moderators between some critical demographic characteristics and ICT adoption: A study of SMEs. Proceedings of the Informing Science and IT Education Conference (InSITE), Wollongong, Australia."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"da Silva, R.A.C., and da Fonseca, N.L.S. (2019). On the location of fog nodes in fog-cloud infrastructures. Sensors, 19.","DOI":"10.3390\/s19112445"},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4102\/sajim.v12i1.443","article-title":"Factors influencing the adoption of the World Wide Web for job-seeking in South Africa","volume":"12","author":"Pavon","year":"2010","journal-title":"S. Afr. J. Inf. Manag."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.techfore.2010.03.006","article-title":"Understanding the determinants of RFID adoption in the manufacturing industry","volume":"77","author":"Wang","year":"2010","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1108\/BPMJ-06-2014-0047","article-title":"A conceptual framework of RFID adoption in retail using Rogers stage model","volume":"21","author":"Bhattacharya","year":"2015","journal-title":"Bus. Process Manag. J."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.im.2010.05.001","article-title":"Determinants of RFID adoption intention: Evidence from Taiwanese retail chains","volume":"47","author":"Tsai","year":"2010","journal-title":"Inf. Manag."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Wang, R., Fu, Z., and Duan, Y. (2011, January 7\u20139). Understanding ICTs adoption from an evolutionary process perspective. Proceedings of the 2011 International Conference on Management and Service Science, Bangkok, Thailand.","DOI":"10.1109\/ICMSS.2011.5998984"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1207\/S15327744JOCE1302_2","article-title":"A meta-analysis of research on information technology implementation in small business","volume":"13","author":"Premkumar","year":"2003","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1362\/026725704323080470","article-title":"Marketing in cyberspace: What factors drive e-commerce adoption?","volume":"20","author":"Ching","year":"2004","journal-title":"J. Mark. Manag."},{"key":"ref_121","unstructured":"Daylami, N., Ryan, T., Olfman, L., and Shayo, C. (2005, January 3\u20136). Determinants of application service provider (ASP) adoption as an innovation. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1108\/02635571111161262","article-title":"Understanding the determinants of cloud computing adoption","volume":"111","author":"Low","year":"2011","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"2029","DOI":"10.1186\/s40064-016-3708-x","article-title":"Factors affecting RFID adoption in the agricultural product distribution industry: Empirical evidence from China","volume":"5","author":"Shi","year":"2016","journal-title":"SpringerPlus"},{"key":"ref_124","unstructured":"Harindranath, G., Dyerson, R., and Barnes, D. (2008, January 9\u201311). ICT in Small Firms: Factors Affecting the Adoption and Use of ICT in Southeast England SMEs. Proceedings of the 16th European Conference on Information Systems (ECIS 2008 ), Galway, Ireland."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2012.04.001","article-title":"Cloud computing as an innovation: Percepetion, attitude, and adoption","volume":"32","author":"Lin","year":"2012","journal-title":"Int. J. Inf. Manag."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation","volume":"2","author":"Moore","year":"1991","journal-title":"Inf. Syst. Res."},{"key":"ref_127","unstructured":"Rogers, E.M. (2003). Diffusion of Innovations, Simon and Schuster. [5th ed.]."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.techsoc.2018.07.007","article-title":"Perception and adoption of a new agricultural technology: Evidence from a developing country","volume":"55","author":"Mottaleb","year":"2018","journal-title":"Technol. Soc."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1108\/13522750210443245","article-title":"Perceived risks as barriers to Internet and e-commerce usage","volume":"5","author":"Liebermann","year":"2002","journal-title":"Qual. Mark. Res. Int. J."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1080\/02642060902719958","article-title":"Multi-dimensional role of trust in Internet banking adoption","volume":"29","author":"Yousafzai","year":"2009","journal-title":"Serv. Ind. J."},{"key":"ref_131","unstructured":"Saya, S., Pee, L.G., and Kankanhalli, A. (2010, January 12\u201315). The Impact of Institutional Influences on Perceived Technological Characteristics and Real Options in Cloud Computing Adoption. Proceedings of the International Conference on Information Systems (ICIS 2010), Saint Louis, MI, USA."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1016\/j.ejor.2016.03.051","article-title":"Determinants of RFID adoption stage and perceived benefits","volume":"254","author":"Reyes","year":"2016","journal-title":"Eur. J. Oper. Res."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1257\/jep.24.3.207","article-title":"Mobile phones and economic development in Africa","volume":"24","author":"Aker","year":"2010","journal-title":"J. Econ. Perspect."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2002.tb00051.x","article-title":"Re-thinking information and communications technology policy focus on Internet versus teledensity diffusion for Africa\u2019s least developed countries","volume":"9","author":"Mbarika","year":"2002","journal-title":"Electron. J. Inf. Syst. Dev. Ctries."},{"key":"ref_135","first-page":"149","article-title":"How information gives you competitive advantage","volume":"63","author":"Porter","year":"1985","journal-title":"Harv. Bus. Rev."},{"key":"ref_136","unstructured":"Hunter, G.K. (1999). Sales Technology, Relationship-Forging Tasks, and Sales Performance in Business Markets, University of North Carolina at Chapel Hill."},{"key":"ref_137","first-page":"143","article-title":"Using the technology acceptance model in understanding academics\u2019 behavioural intention to use learning management systems","volume":"5","author":"Alharbi","year":"2014","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.ijis.2017.10.001","article-title":"Innovation attributes and managers\u2019 decisions about the adoption of innovations in organizations: A meta-analytical review","volume":"1","author":"Vagnani","year":"2017","journal-title":"Int. J. Innov. Stud."},{"key":"ref_139","unstructured":"Alsaif, M. (2014). Factors Affecting Citizens\u2019 Adoption of e-Government Moderated by Socio-Cultural Values in Saudi Arabia, University of Birmingham."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4067\/S0718-27242012000400001","article-title":"Understanding consumer\u2019s acceptance of technology-based innovations in retailing","volume":"7","author":"Pantano","year":"2012","journal-title":"J. Technol. Manag. Innov."},{"key":"ref_141","first-page":"3424","article-title":"The influence of cultural factors on the adoption of e-learning: A reference to a public University in Sri Lanka","volume":"263","author":"Thowfeek","year":"2013","journal-title":"Appl. Mech. Mater."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1108\/MD-05-2017-0462","article-title":"How does culture influence innovation? A systematic literature review","volume":"56","author":"Tian","year":"2018","journal-title":"Manag. Decis."},{"key":"ref_143","unstructured":"Lee, Y. (2007). Exploring Key Factors That Affect Consumers to Adopt e-Reading Services. [Unpublished Master\u2019s Thesis, Huafan University]."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/07421222.2003.11045751","article-title":"Investigating determinants of software developers\u2019 intentions to follow methodologies","volume":"20","author":"Hardgrave","year":"2003","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_145","unstructured":"Kristensen, S. (2016). Understanding Factors Influencing Danish Consumers\u2019 Intention to Use Mobile Payment at Point-of-Sale\u2019. [Master\u2019s Thesis, Aarhus University]."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1108\/02652321011064917","article-title":"Predicting young consumers\u2019 take up of mobile banking services","volume":"28","author":"Palmer","year":"2010","journal-title":"Int. J. Bank Mark."},{"key":"ref_147","unstructured":"Tobbin, P.E. (2010, January 10\u201311). Modeling adoption of mobile money transfer: A consumer behaviour analysis. Proceedings of the 2nd International Conference on Mobile Communication Technology for Development, Kampala, Uganda."},{"key":"ref_148","unstructured":"Shih, C. (2007). Integrating Innovation Diffusion Theory and UTAUT to Explore the Influencing Factors on Teacher Adopt e-Learning System\u2013with MOODLE as an Example. [Unpublished Master\u2019s Thesis, Dayeh University]."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Thompson, B. (2004). Exploratory and Confirmatory Factor Analysis, American Psychological Association.","DOI":"10.1037\/10694-000"},{"key":"ref_150","first-page":"132","article-title":"Research philosophy debates and classifications: Students\u2019 dilemma","volume":"10","author":"Mkansi","year":"2012","journal-title":"Electron. J. Bus. Res. Methods"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","article-title":"Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems","volume":"37","author":"Venkatesh","year":"2013","journal-title":"MIS Q."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1002\/j.2161-007X.2009.tb00111.x","article-title":"Values in qualitative and quantitative research","volume":"53","author":"Duffy","year":"2009","journal-title":"Couns. Values"},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/249443","article-title":"Personal computing: Toward a conceptual model of utilization","volume":"15","author":"Thompson","year":"1991","journal-title":"MIS Q."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/S0378-7206(00)00064-1","article-title":"Factors influencing corporate web site adoption: A time-based assessment","volume":"38","author":"Beatty","year":"2001","journal-title":"Inf. Manag."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.im.2003.06.001","article-title":"An exploratory study to identify the critical factors affecting the decision to establish Internet-based interorganizational information systems","volume":"41","author":"Soliman","year":"2004","journal-title":"Inf. Manag."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.chb.2009.10.015","article-title":"Factors affecting response rates of the web survey: A systematic review","volume":"26","author":"Fan","year":"2010","journal-title":"Comput. Hum. Behav."},{"key":"ref_157","first-page":"31","article-title":"Strengths and weakness of online surveys","volume":"24","author":"Nayak","year":"2019","journal-title":"IOSR J. Humanit. Soc. Sci."},{"key":"ref_158","unstructured":"Zikmund, W., Babin, B., Carr, J., and Griffin, M. (2013). Business Research Methods, South-Western Cengage Learning. [9th ed.]."},{"key":"ref_159","first-page":"104","article-title":"Response interpolation and scale sensitivity: Evidence against 5-point scales","volume":"5","author":"Finstad","year":"2010","journal-title":"J. Usability Stud."},{"key":"ref_160","unstructured":"Waters, D., and Waters, C.D.J. (2011). Quantitative Methods for Business, Pearson Education Limited."},{"key":"ref_161","unstructured":"Kothari, C.R. (2004). Research Methodology: Methods and Techniques, New Age International."},{"key":"ref_162","unstructured":"Field, A. (2009). Discovering Statistics Using SPSS: (and Sex and Drugs and Rock\u2019n\u2019Roll), Sage."},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Coolican, H. (2014). Research Methods and Statistics in Psychology, Routledge. [6th ed.].","DOI":"10.4324\/9780203769669"},{"key":"ref_164","unstructured":"Gliem, J.A., and Gliem, R.R. (2003, January 8\u201310). Calculating, Interpreting, and Reporting Cronbach\u2019s Alpha Reliability Coefficient for Likert-Type Scales. In Proceedins of the 2003 Midwest Research to Practice Conference in Adult, Continuing, and Community Education, Columbus, OH, USA."},{"key":"ref_165","unstructured":"Warmbrod, J. (2001, January 12). Conducting, Interpreting, and Reporting Quantitative Research. In Proceedins of the Annual National Agricultural Education Research Conference (Pre-Session), New Orleans, LA, USA."},{"key":"ref_166","unstructured":"George, D., and Mallery, M. (2003). Using SPSS for Windows Step by Step: A Simple Guide and Reference, Pearson Education."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1057\/ejis.2010.63","article-title":"Online tax payment systems as an emergent aspect of governmental transformation","volume":"20","author":"Stafford","year":"2011","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_168","first-page":"17","article-title":"How low should you go? Low response rates and the validity of inference in IS questionnaire research","volume":"7","author":"Sivo","year":"2006","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"J. Appl. Psychol."},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"990399","DOI":"10.33151\/ajp.8.3.93","article-title":"Exploratory factor analysis: A five-step guide for novices","volume":"8","author":"Williams","year":"2010","journal-title":"Australas. J. Paramed."},{"key":"ref_171","first-page":"1","article-title":"Validation of the theoretical framework for adoption of accounting information system using structural equation modelling","volume":"1","author":"Jalil","year":"2015","journal-title":"Int. J. Ind. Manag."},{"key":"ref_172","unstructured":"Byrne, B.M. (2001). Structural Equation Modelling with AMOS: Basic Concepts, Applications, and Programming, Lawrence Erlbaum Associates."},{"key":"ref_173","unstructured":"Hair, J., Black, B., Babin, B., Anderson, R., and Tatham, R. (2006). Multivariate Data Analysis, Pearson Prentice Hall."},{"key":"ref_174","unstructured":"Holmes-Smith, P. (2021, April 11). Advanced Structural Equation Modelling Using AMOS. Available online: https:\/\/www.acspri.org.au\/courses\/advanced-structural-equation-modelling-using-amos."},{"key":"ref_175","unstructured":"Holmes-Smith, P. (2001). Introduction to Structural Equation Modeling Using LISREL, ACSPRI-Winter Training Program."},{"key":"ref_176","unstructured":"Arbuckle, J. (2005). AMOS 6.0 User\u2019s Guide, Volume 541, AMOS Development Corporation."},{"key":"ref_177","unstructured":"Byrne, B.M. (1998). Structural Equation Modeling with LISREL, PRELIS, and SIMPLIS: Basic Concepts, Applications, and Programming, Psychology Press."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"1450007","DOI":"10.1142\/S1363919614500078","article-title":"Establishing relationships between innovation characteristics and IT innovation adoption in organisations: A meta-analysis approach","volume":"18","author":"Hameed","year":"2014","journal-title":"Int. J. Innov. Manag."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: Four longitudinal field studies","volume":"46","author":"Venkatesh","year":"2000","journal-title":"Manag. Sci."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behaviour formation in organizations","volume":"53","author":"Safa","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"101419","DOI":"10.1016\/j.giq.2019.101419","article-title":"Assessing information security risks in the cloud: A case study of Australian local government authorities","volume":"37","author":"Ali","year":"2020","journal-title":"Gov. Inf. Q."},{"key":"ref_182","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1108\/ITP-03-2019-0119","article-title":"Cloud computing technology adoption: An evaluation of key factors in local governments","volume":"34","author":"Ali","year":"2020","journal-title":"Inf. Technol. People"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"103697","DOI":"10.1016\/j.respol.2018.10.021","article-title":"Digital technology adoption and knowledge flows within firms: Can the Internet overcome geographic and technological distance?","volume":"48","author":"Forman","year":"2019","journal-title":"Res. Policy"},{"key":"ref_184","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1111\/1467-9663.00223","article-title":"Where are the Web factories: The urban bias of e\u2013business location","volume":"93","author":"Gorman","year":"2002","journal-title":"Tijdschr. Voor Econ. Soc. Geogr."},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.technovation.2007.10.003","article-title":"Determinants of e-business diffusion: A test of the technology diffusion perspective","volume":"28","author":"Lin","year":"2008","journal-title":"Technovation"},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1050.0045","article-title":"Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry","volume":"16","author":"Zhu","year":"2005","journal-title":"Inf. Syst. Res."},{"key":"ref_187","first-page":"6","article-title":"A preliminary investigation of e-commerce adoption in small & medium enterprises in Brunei","volume":"6","author":"Seyal","year":"2003","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"259","DOI":"10.2753\/MIS0742-1222240108","article-title":"A comparison of transaction cost, agency, and knowledge-based predictors of IT outsourcing decisions: A US-Japan cross-cultural field study","volume":"24","author":"Tiwana","year":"2007","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_189","unstructured":"Chaudhury, A., and Bharati, P. (2008, January 14\u201317). IT outsourcing adoption by small and medium enterprises: A diffusion of innovation approach. Proceedings of the Americas Conference on Information Systems (AMCIS 2008), Toronto, ON, Canada."},{"key":"ref_190","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/GKMC-12-2017-0103","article-title":"Awareness and adoption of mobile technologies in the delivery of services in academic libraries in Jordan","volume":"67","author":"Hamad","year":"2018","journal-title":"Glob. Knowl. Mem. Commun."},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"igy002","DOI":"10.1093\/geroni\/igy002","article-title":"Factors predicting decisions about technology adoption among older adults","volume":"1","author":"Berkowsky","year":"2017","journal-title":"Innov. Aging"},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Hargittai, E. (2001). Second-level digital divide: Mapping differences in people\u2019s online skills. arXiv.","DOI":"10.5210\/fm.v7i4.942"},{"key":"ref_193","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1037\/0882-7974.21.2.333","article-title":"Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (CREATE)","volume":"21","author":"Czaja","year":"2006","journal-title":"Psychol. Aging"},{"key":"ref_194","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/08959420.2016.1187036","article-title":"Older adults and emerging digital service delivery: A mixed methods study on information and communications technology use, skills, and attitudes","volume":"29","author":"Siren","year":"2017","journal-title":"J. Aging Soc. Policy"},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1108\/13598541111155848","article-title":"The rise of the \u201cnext-generation bar code\u201d: An international RFID adoption study","volume":"16","author":"Thiesse","year":"2011","journal-title":"Supply Chain. Manag. Int. J."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"3847","DOI":"10.1080\/00207543.2011.594968","article-title":"Impacts of RFID implementation on cost structure in networked manufacturing","volume":"50","author":"Moskvich","year":"2012","journal-title":"Int. J. Prod. Res."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1108\/02635571111170785","article-title":"Adoption of e-commerce applications in SMEs","volume":"111","author":"Ghobakhloo","year":"2011","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_198","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/S0305-0483(98)00071-1","article-title":"Adoption of new information technologies in rural small businesses","volume":"27","author":"Premkumar","year":"1999","journal-title":"Omega"},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1023\/A:1019112722593","article-title":"An analysis of the business characteristics of adopters and non-adopters of World Wide Web technology","volume":"1","author":"Goode","year":"2000","journal-title":"Inf. Technol. Manag."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"631","DOI":"10.2307\/255553","article-title":"Organizational structure, work process, and proposal making in administrative bureaucracies","volume":"23","author":"Aiken","year":"1980","journal-title":"Acad. Manag. J."},{"key":"ref_201","unstructured":"Nkhoma, M.Z., Dang, D., and De Souza-Daw, A. (2013, January 12\u201313). Contributing factors of cloud computing adoption: A technology-organisation-environment framework approach. Proceedings of the Proceedings of the European Conference on Information Management & Evaluation, Gdansk, Poland."},{"key":"ref_202","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1108\/01409171211272651","article-title":"RFID adoption and implementation in warehousing","volume":"35","author":"Osyk","year":"2012","journal-title":"Manag. Res. Rev."},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1111\/j.1540-5915.1995.tb01431.x","article-title":"The role of interorganizational and organizational factors on the decision mode for adoption of interorganizational systems","volume":"26","author":"Premkumar","year":"1995","journal-title":"Decis. Sci."},{"key":"ref_204","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.5465\/amj.2007.28166119","article-title":"The field of management\u2019s devotion to theory: Too much of a good thing?","volume":"50","author":"Hambrick","year":"2007","journal-title":"Acad. Manag. J."},{"key":"ref_205","first-page":"286","article-title":"The Role of CRM fog computing on innovation and customer service quality: An empirical study","volume":"2","author":"Aljawarneh","year":"2020","journal-title":"Mark. Manag. Innov."},{"key":"ref_206","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1016\/j.future.2018.06.009","article-title":"Taming the IoT data deluge: An innovative information-centric service model for fog computing applications","volume":"93","author":"Tortonesi","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_207","first-page":"10","article-title":"Fog in comparison to cloud: A survey","volume":"122","author":"Saharan","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_208","doi-asserted-by":"crossref","first-page":"28078","DOI":"10.1109\/ACCESS.2020.2971007","article-title":"Architectural resilience in cloud, fog and edge systems: A survey","volume":"8","author":"Prokhorenko","year":"2020","journal-title":"IEEE Access"},{"key":"ref_209","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2015.207","article-title":"The benefits of self-awareness and attention in fog and mist computing","volume":"48","author":"Preden","year":"2015","journal-title":"Computer"},{"key":"ref_210","first-page":"32","article-title":"Cloud Computing Technology: Promises and Concerns","volume":"159","author":"Attiya","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2019.04.050","article-title":"FogBus: A blockchain-based lightweight framework for edge and fog computing","volume":"154","author":"Tuli","year":"2019","journal-title":"J. Syst. Softw."},{"key":"ref_212","doi-asserted-by":"crossref","first-page":"101952","DOI":"10.1016\/j.ijinfomgt.2019.05.008","article-title":"The dual effects of the Internet of Things (IoT): A systematic review of the benefits and risks of IoT adoption by organizations","volume":"51","author":"Brous","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_213","doi-asserted-by":"crossref","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","article-title":"A survey on security challenges in cloud computing: Issues, threats, and solutions","volume":"76","author":"Tabrizchi","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_214","doi-asserted-by":"crossref","unstructured":"Sharma, R., Gourisaria, M.K., and Patra, S. (2021). Cloud Computing\u2014Security, Issues, and Solutions. Communication Software and Networks, Springer.","DOI":"10.1007\/978-981-15-5397-4_70"},{"key":"ref_215","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1016\/j.future.2019.11.013","article-title":"Cloud computing security taxonomy: From an atomistic to a holistic view","volume":"107","author":"Mthunzi","year":"2020","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/3\/81\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:56:57Z","timestamp":1760140617000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/3\/81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":215,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["bdcc6030081"],"URL":"https:\/\/doi.org\/10.3390\/bdcc6030081","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2022,7,26]]}}}