{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:58:52Z","timestamp":1773262732637,"version":"3.50.1"},"reference-count":65,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>Cloud computing can be classified as a third-generation computing platform which refers to on-demand delivery of computing infrastructure and services via a network, usually the Internet. Cloud computing promises to provide several advantages to its adopters such as: cost advantage, availability, scalability, flexibility, reduced time to market and dynamic access to computational resources. Notwithstanding the numerous advantages of cloud computing, its implementation and adoption in developing countries is still limited and surrounded by variety of issues. Hence, the main objective of this article is to identify the main challenges facing the utilization of these services in developing countries, particularly Jordan. To achieve the above-mentioned objective, six in-depth interviews with ICT officials and experts in the domain of cloud computing were used as the main data collection method. The challenges of cloud computing adoption emerged in this study are classified into technological, organizational and environmental factors.<\/jats:p>","DOI":"10.4018\/ijebr.2018070105","type":"journal-article","created":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T17:37:53Z","timestamp":1528220273000},"page":"77-94","source":"Crossref","is-referenced-by-count":72,"title":["Challenges of Cloud Computing Adoption From the TOE Framework Perspective"],"prefix":"10.4018","volume":"14","author":[{"given":"Omar","family":"Al-Hujran","sequence":"first","affiliation":[{"name":"Princess Sumaya University for Technology, Amman, Jordan"}]},{"given":"Enas M.","family":"Al-Lozi","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan, Amman, Jordan"}]},{"given":"Mutaz M.","family":"Al-Debei","sequence":"additional","affiliation":[{"name":"The University of Jordan, Amman, Jordan"}]},{"given":"Mahmoud","family":"Maqableh","sequence":"additional","affiliation":[{"name":"The University of Jordan, Amman, Jordan"}]}],"member":"2432","reference":[{"key":"IJEBR.2018070105-0","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.21"},{"key":"IJEBR.2018070105-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.06.025"},{"key":"IJEBR.2018070105-2","doi-asserted-by":"publisher","DOI":"10.1108\/13590791311287337"},{"key":"IJEBR.2018070105-3","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-016-0021-9"},{"key":"IJEBR.2018070105-4","doi-asserted-by":"publisher","DOI":"10.1108\/17410391311325225"},{"key":"IJEBR.2018070105-5","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"IJEBR.2018070105-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.01.024"},{"key":"IJEBR.2018070105-7","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2010070102"},{"key":"IJEBR.2018070105-8","doi-asserted-by":"publisher","DOI":"10.4135\/9780857020079"},{"key":"IJEBR.2018070105-9","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.132"},{"key":"IJEBR.2018070105-10","first-page":"509","article-title":"Grounded theory: objectivist and constructivist methods","author":"K.Charmaz","year":"2000","journal-title":"Handbook of Qualitative Research"},{"key":"IJEBR.2018070105-11","doi-asserted-by":"publisher","DOI":"10.1362\/026725704323080470"},{"key":"IJEBR.2018070105-12","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345469"},{"key":"IJEBR.2018070105-13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016108804453"},{"key":"IJEBR.2018070105-14","year":"2011","journal-title":"Cloud Infrastructure and Services Student Guide"},{"key":"IJEBR.2018070105-15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-026-4.ch591"},{"key":"IJEBR.2018070105-16","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-08-2013-0065"},{"key":"IJEBR.2018070105-17","author":"G.Gibbs","year":"2002","journal-title":"Qualitative Data Analysis: Explorations with Nvivo"},{"key":"IJEBR.2018070105-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.07.001"},{"key":"IJEBR.2018070105-19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_7"},{"key":"IJEBR.2018070105-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.04.006"},{"key":"IJEBR.2018070105-21","doi-asserted-by":"publisher","DOI":"10.1108\/17410390610645085"},{"key":"IJEBR.2018070105-22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022445108617"},{"key":"IJEBR.2018070105-23","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1821748.1821751","article-title":"Adoption issues for cloud computing.","author":"W.Kim","year":"2009","journal-title":"Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia"},{"key":"IJEBR.2018070105-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.04.011"},{"issue":"1","key":"IJEBR.2018070105-25","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MC.2009.20","article-title":"Is cloud computing really ready for prime time?","author":"N.Leavitt","year":"2009","journal-title":"Computer"},{"issue":"4","key":"IJEBR.2018070105-26","first-page":"57","article-title":"Discriminant analysis of technology adoption behavior: A case of Internet technologies in small businesses.","volume":"44","author":"J.Lee","year":"2004","journal-title":"Journal of Computer Information Systems"},{"key":"IJEBR.2018070105-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.005"},{"key":"IJEBR.2018070105-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.09.004"},{"key":"IJEBR.2018070105-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.04.001"},{"key":"IJEBR.2018070105-30","doi-asserted-by":"publisher","DOI":"10.1108\/02635571111161262"},{"key":"IJEBR.2018070105-31","unstructured":"Markoff, J., & Barboza, D. (2010). Researchers Trace Data Theft to Intruders in China. The New York Times."},{"key":"IJEBR.2018070105-32","author":"C.Marshall","year":"1999","journal-title":"Designing Qualitative Research"},{"key":"IJEBR.2018070105-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"IJEBR.2018070105-34","author":"T.Mather","year":"2009","journal-title":"Cloud security and privacy: An enterprise perspective on risks and compliance"},{"issue":"6","key":"IJEBR.2018070105-35","first-page":"50","article-title":"The NIST Definition of Cloud Computing.","volume":"53","author":"P.Mell","year":"2011","journal-title":"Communications of the ACM"},{"key":"IJEBR.2018070105-36","author":"M.Miles","year":"1994","journal-title":"Qualitative Data Analysis: An Expanded Sourcebook"},{"key":"IJEBR.2018070105-37","doi-asserted-by":"crossref","unstructured":"Mohammed, D. (2011). Security in cloud computing: an analysis of key drivers and constraints. Information Security Journal: A Global Perspective, 20(3), 123-127.","DOI":"10.1080\/19393555.2010.544704"},{"key":"IJEBR.2018070105-38","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.362"},{"key":"IJEBR.2018070105-39","unstructured":"Mujinga, M., & Chipangura, B. (2011). Cloud computing concerns in developing economies."},{"key":"IJEBR.2018070105-40","article-title":"Adoption of cloud computing in organizations.","author":"H.Nuseibeh","year":"2011"},{"key":"IJEBR.2018070105-41","unstructured":"Office of the Privacy Commissioner of Canada. (2007). Fact sheet: Privacy impact assessments. Retrieved from http:\/\/www.privcom.gc.ca\/"},{"key":"IJEBR.2018070105-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.03.006"},{"issue":"3","key":"IJEBR.2018070105-43","first-page":"94","article-title":"Determinants of the adoption of enterprise resource planning within the technology-organization-environment framework: Taiwan\u2019s communications.","volume":"48","author":"M.-J.Pan","year":"2008","journal-title":"Journal of Computer Information Systems"},{"key":"IJEBR.2018070105-44","doi-asserted-by":"publisher","DOI":"10.1080\/15424065.2011.626360"},{"key":"IJEBR.2018070105-45","first-page":"59","article-title":"Big data analytics for developing countries\u2013using the cloud for operational BI in health.","author":"S.Purkayastha","year":"2013","journal-title":"The Electronic Journal on Information Systems in Developing Countries"},{"key":"IJEBR.2018070105-46","author":"E. M.Rogers","year":"1995","journal-title":"Diffusion of innovations"},{"key":"IJEBR.2018070105-47","volume":"Vol. 3","author":"M. J.Rosenberg","year":"2001","journal-title":"E-learning: Strategies for delivering knowledge in the digital age"},{"key":"IJEBR.2018070105-48","article-title":"A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa.","author":"H. M.Sabi","year":"2017","journal-title":"Information Systems Frontiers"},{"key":"IJEBR.2018070105-49","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-02-2014-0017"},{"key":"IJEBR.2018070105-50","unstructured":"Salleh, S. M., Teoh, S. Y., & Chan, C. (2012). Cloud enterprise systems: A review of literature and its adoption. In PACIS (p. 76). Association for Information Systems. AIS Electronic Library (AISeL)."},{"key":"IJEBR.2018070105-51","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2014.25"},{"key":"IJEBR.2018070105-52","author":"U.Sekaran","year":"2010","journal-title":"Research Methods for Business: A Skill Building Approach"},{"key":"IJEBR.2018070105-53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.073"},{"key":"IJEBR.2018070105-54","unstructured":"Shimba, F. (2010). Cloud computing: Strategies for cloud computing adoption. Unpublished master\u2019s thesis, Dublin Institute of Technology, Dublin."},{"key":"IJEBR.2018070105-55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.09.004"},{"key":"IJEBR.2018070105-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.08.001"},{"key":"IJEBR.2018070105-57","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.05.005"},{"key":"IJEBR.2018070105-58","author":"L. G.Tornatzky","year":"1990","journal-title":"The processes of technological innovation"},{"key":"IJEBR.2018070105-59","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-012-0120-4"},{"key":"IJEBR.2018070105-60","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2012.17"},{"key":"IJEBR.2018070105-61","doi-asserted-by":"publisher","DOI":"10.1504\/IJEB.2010.030717"},{"key":"IJEBR.2018070105-62","doi-asserted-by":"publisher","DOI":"10.1108\/02640471311299155"},{"key":"IJEBR.2018070105-63","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"IJEBR.2018070105-64","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000650"}],"container-title":["International Journal of E-Business Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=207321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:55:26Z","timestamp":1651830926000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJEBR.2018070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":65,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijebr.2018070105","relation":{},"ISSN":["1548-1131","1548-114X"],"issn-type":[{"value":"1548-1131","type":"print"},{"value":"1548-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}