{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:07:50Z","timestamp":1767650870546},"reference-count":30,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"abstract":"<p>This article aims to study the strategic transformative value dimensions of cloud computing. Organizational requirements, managerial strategic objectives, and their attendant challenges are very specific indicators that enable characterization of these dimensions. An exploratory study of 173 cases of companies, covering 17 distinct economic activity sectors, spread over all continents, was conducted, taking into account contingency factors such as culture, size, and structure. The elements of industry, strategy, and technology were also considered, as well as managerial cognition. The analyses of needs, objectives, challenges, implemented solutions, and results of the transformation to cloud computing, enabled us to identify these dimensions. Strategies to maximize the transformative value of cloud computing are then presented. The results of this study can be used by managers to facilitate and optimize this cloud computing transformation.<\/p>","DOI":"10.4018\/jgim.2019010107","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T17:18:11Z","timestamp":1537982291000},"page":"128-143","source":"Crossref","is-referenced-by-count":9,"title":["Strategic Values of Cloud Computing Transformation"],"prefix":"10.4018","volume":"27","author":[{"given":"Mohamed","family":"Makhlouf","sequence":"first","affiliation":[{"name":"KEDGE Business School, Talence, France"}]},{"given":"Oihab","family":"Allal-Ch\u00e9rif","sequence":"additional","affiliation":[{"name":"Kedge Business School, Talence, France"}]}],"member":"2432","reference":[{"key":"JGIM.2019010107-0","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"JGIM.2019010107-1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.12"},{"key":"JGIM.2019010107-2","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.1"},{"key":"JGIM.2019010107-3","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735234"},{"key":"JGIM.2019010107-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55038-6_122"},{"key":"JGIM.2019010107-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2014.10.001"},{"key":"JGIM.2019010107-6","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300203"},{"key":"JGIM.2019010107-7","author":"J.Galbraith","year":"1973","journal-title":"Designing Complex Organizations"},{"key":"JGIM.2019010107-8","author":"B.Glaser","year":"1967","journal-title":"The Discovery of Grounded Theory: Strategies for Quantitative Research"},{"key":"JGIM.2019010107-9","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2015010101"},{"issue":"2","key":"JGIM.2019010107-10","first-page":"123","article-title":"Options for Formulating a Digital Transformation Strategy.","volume":"15","author":"T.Hess","year":"2016","journal-title":"MIS Quarterly Executive"},{"key":"JGIM.2019010107-11","first-page":"25","article-title":"Towards a concept of dynamic fit in contingency theory.","author":"P.Klaas","year":"2004","journal-title":"Proceedings of the 2004 System Dynamics Conference"},{"issue":"5","key":"JGIM.2019010107-12","first-page":"178","article-title":"Cloud-Computing-Software as Service.","volume":"3","author":"G.Kulkarni","year":"2012","journal-title":"International Journal of Computer Trends and Technology"},{"issue":"1","key":"JGIM.2019010107-13","first-page":"31","article-title":"Cloud Services Practices for Small and Medium-Sized Enterprises.","volume":"13","author":"M. C.Lacity","year":"2014","journal-title":"MIS Quarterly Executive"},{"issue":"1","key":"JGIM.2019010107-14","first-page":"11","article-title":"Assessing Cloud Readiness at Continental AG.","volume":"11","author":"C.Loebbecke","year":"2012","journal-title":"MIS Quarterly Executive"},{"key":"JGIM.2019010107-15","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.71"},{"key":"JGIM.2019010107-16","doi-asserted-by":"crossref","unstructured":"Mateescu, G., & Vladescu, M. (2013). Secure on premise-On demand services communication. In 2013 17th International Conference on System Theory, Control and Computing (ICSTCC) (pp. 613-618). New York, NY: IEEE.","DOI":"10.1109\/ICSTCC.2013.6689027"},{"issue":"6","key":"JGIM.2019010107-17","first-page":"1","article-title":"The NIST definition of cloud computing.","volume":"53","author":"P.Mell","year":"2011","journal-title":"National Institute of Standards and Technology"},{"key":"JGIM.2019010107-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.01.008"},{"key":"JGIM.2019010107-19","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.34"},{"issue":"3","key":"JGIM.2019010107-20","first-page":"150","article-title":"Challenges of Cloud Computing in Business: Towards New Organizational Competencies.","volume":"5","author":"J. O.Oredo","year":"2014","journal-title":"International Journal of Business and Social Science"},{"issue":"2","key":"JGIM.2019010107-21","first-page":"354","article-title":"Internet of Things \u2013 A Future of Internet: A Survey.","volume":"2","author":"P.Pande","year":"2014","journal-title":"International Journal of Advance Research in Computer Science and Management Studies"},{"key":"JGIM.2019010107-22","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2014.25"},{"key":"JGIM.2019010107-23","author":"W. R.Scott","year":"2002","journal-title":"Organizations: rational, natural, and open systems"},{"key":"JGIM.2019010107-24","author":"A.Strauss","year":"1998","journal-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory"},{"key":"JGIM.2019010107-25","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260209"},{"key":"JGIM.2019010107-26","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518227"},{"key":"JGIM.2019010107-27","doi-asserted-by":"publisher","DOI":"10.3917\/sim.134.0007"},{"issue":"3","key":"JGIM.2019010107-28","doi-asserted-by":"crossref","first-page":"75","DOI":"10.58729\/1941-6679.1016","article-title":"Privacy and Security in the Cloud: A Review of Guidance and Responses.","volume":"22","author":"E. A.Whitley","year":"2013","journal-title":"Journal of International Technology and Information Management"},{"key":"JGIM.2019010107-29","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2016070104"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T11:56:29Z","timestamp":1693914989000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2019010107"}},"subtitle":["A Multi-Case Study of 173 Adopters"],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jgim.2019010107","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}