Background: Modern telecommunication infrastructure enables bridging of the digital divide between rural and urban healthcare services, promoting the provision of suitable medical care and support. Thus far, there has been some positive impacts to applying mobile health (m-Health) solutions, but their full potential in relation to cloud computing has is yet to be realised. It is imperative to develop an innovative approach for addressing the digital divide in a context of developing country. Method: Adopting a design science research approach (DSR), this study describes an innovative m-Health solution utilising cloud computing that enables healthcare professionals and women in rural areas to achieve comprehensive maternal healthcare support. We developed the solution framework through iterative prototyping with stakeholders’ participation, and evaluated the design using focus groups. Results: The cloud-based solution was positively evaluated as supporting healthcare professionals and service providers. It was perceived to help provide a virtual presence for evaluating and diagnosing expectant mothers’ critical healthcare data, medical history, and in providing necessary service support in a virtual clinic environment. Conclusions: The new application offers benefits to target stakeholders enabling a new practice-based paradigm applicable in other healthcare management. We demonstrated utilities to address target problems as well as the mechanism propositions for meeting the information exchange demand for better realisation of practical needs of the end users.
{"title":"On-Cloud Motherhood Clinic: A Healthcare Management Solution for Rural Communities in Developing Countries","authors":"Nilufa Khanom, S. Miah","doi":"10.17705/1pais.12103","DOIUrl":"https://doi.org/10.17705/1pais.12103","url":null,"abstract":"Background: Modern telecommunication infrastructure enables bridging of the digital divide between rural and urban healthcare services, promoting the provision of suitable medical care and support. Thus far, there has been some positive impacts to applying mobile health (m-Health) solutions, but their full potential in relation to cloud computing has is yet to be realised. It is imperative to develop an innovative approach for addressing the digital divide in a context of developing country. Method: Adopting a design science research approach (DSR), this study describes an innovative m-Health solution utilising cloud computing that enables healthcare professionals and women in rural areas to achieve comprehensive maternal healthcare support. We developed the solution framework through iterative prototyping with stakeholders’ participation, and evaluated the design using focus groups. Results: The cloud-based solution was positively evaluated as supporting healthcare professionals and service providers. It was perceived to help provide a virtual presence for evaluating and diagnosing expectant mothers’ critical healthcare data, medical history, and in providing necessary service support in a virtual clinic environment. Conclusions: The new application offers benefits to target stakeholders enabling a new practice-based paradigm applicable in other healthcare management. We demonstrated utilities to address target problems as well as the mechanism propositions for meeting the information exchange demand for better realisation of practical needs of the end users.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"10882 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77716149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingjing Zhang, Farkhondeh Hassandoust, Jocelyn E. Williams
Background: A recent global survey found that almost half of Internet users who never buy online indicated lack of trust as the main reason. The General Data Protection Regulation (GDPR) is new legislation expected to provide the opportunity for organizations to improve their customer trust through personal data governance. Few studies explore online customer trust from the GDPR perspective. This study aims to fill this gap by drawing on the Technology Acceptance Model (TAM) and Self-Determination Theory (SDT), examining the antecedents of online customer trust from the GDPR perspective. The study also attempts to derive insights about the GDPR that may affect online customer trust, but which to date have little presence in frameworks of the antecedents of online trust. The main research questions are as follows. First, what are the impacts of perceived technology, perceived risks and perceived trustworthiness on online customer trust in the GDPR context? Second, what are the GDPR-specific factors that may affect online customer trust? Method: This positivist study used a survey strategy with a deductive approach to investigate the research questions. A questionnaire was designed for primary data collection as the basis for quantitative data analysis. Results: Data analysis confirmed that several GDPR-related trust antecedents – perceived security, perceived third-party assurance and perceived openness – are positively associated with online customer trust. This study offers new insights into the SDT adaptation that suggest the value of motivation theory for trust research in the GDPR context. This study also generates insights about the GDPR that may affect online customer trust. Conclusions: This study suggests that the GDPR plays a significant role in online customer trust by bringing about stronger rights and more transparency for online customers. Both the confirmation and insights are a contribution that can lead seemingly old-fashioned trust antecedents into a new application.
{"title":"Online Customer Trust in the Context of the General Data Protection Regulation (GDPR)","authors":"Jingjing Zhang, Farkhondeh Hassandoust, Jocelyn E. Williams","doi":"10.17705/1pais.12104","DOIUrl":"https://doi.org/10.17705/1pais.12104","url":null,"abstract":"Background: A recent global survey found that almost half of Internet users who never buy online indicated lack of trust as the main reason. The General Data Protection Regulation (GDPR) is new legislation expected to provide the opportunity for organizations to improve their customer trust through personal data governance. Few studies explore online customer trust from the GDPR perspective. This study aims to fill this gap by drawing on the Technology Acceptance Model (TAM) and Self-Determination Theory (SDT), examining the antecedents of online customer trust from the GDPR perspective. The study also attempts to derive insights about the GDPR that may affect online customer trust, but which to date have little presence in frameworks of the antecedents of online trust. The main research questions are as follows. First, what are the impacts of perceived technology, perceived risks and perceived trustworthiness on online customer trust in the GDPR context? Second, what are the GDPR-specific factors that may affect online customer trust? Method: This positivist study used a survey strategy with a deductive approach to investigate the research questions. A questionnaire was designed for primary data collection as the basis for quantitative data analysis. Results: Data analysis confirmed that several GDPR-related trust antecedents – perceived security, perceived third-party assurance and perceived openness – are positively associated with online customer trust. This study offers new insights into the SDT adaptation that suggest the value of motivation theory for trust research in the GDPR context. This study also generates insights about the GDPR that may affect online customer trust. Conclusions: This study suggests that the GDPR plays a significant role in online customer trust by bringing about stronger rights and more transparency for online customers. Both the confirmation and insights are a contribution that can lead seemingly old-fashioned trust antecedents into a new application.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"31 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78917540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Research has demonstrated that sustained top management participation and involvement are important for IT-enabled change. However, this is not always possible. How IT-enabled change can succeed when top management participation and involvement diminish is an unsolved, but important research question. Method: We perform a 5-year exploratory longitudinal case study. Results: Our data is presented in two parts. We first present the contextual elements (goals, people, structures/processes, and artifacts) during the two years top management was actively participating and involved. For the three-year period where top management participation and involvement diminished, we present the contextual elements, and middle management’s enactment of traditional middle management roles (information broker, mediator, facilitator, change agent) on three kinds of threats to the change (deviations from change vision, emergent issues, involving new stakeholders). Conclusions: We find IT-enabled change can succeed when top management participation and involvement diminish if middle management engages in joint action, i.e., intentional collective activity where members consciously choose to coordinate to achieve a goal. We identify three kinds of joint action: Constraining, where actions of the group limit the ability of individual middle managers to deviate from shared goals, Enabling, whereby a group of middle managers adapt the project to changing circumstances, and Extending, where groups of middle managers engage with others not in their functional areas. Joint action emerges when top management embeds, in the project context, (1) key influential stakeholders who are involved in the change, (2) a common goal, (3) structures and processes that promote collective work, and (4) artifacts inscribed with the common goal and collective work.
{"title":"How Do You Perpetuate IT-Enabled Change When Top Management Participation and Involvement Diminish?","authors":"C. Chua, A. Yeow, C. Soh","doi":"10.17705/1pais.11402","DOIUrl":"https://doi.org/10.17705/1pais.11402","url":null,"abstract":"Background: Research has demonstrated that sustained top management participation and involvement are important for IT-enabled change. However, this is not always possible. How IT-enabled change can succeed when top management participation and involvement diminish is an unsolved, but important research question. Method: We perform a 5-year exploratory longitudinal case study. Results: Our data is presented in two parts. We first present the contextual elements (goals, people, structures/processes, and artifacts) during the two years top management was actively participating and involved. For the three-year period where top management participation and involvement diminished, we present the contextual elements, and middle management’s enactment of traditional middle management roles (information broker, mediator, facilitator, change agent) on three kinds of threats to the change (deviations from change vision, emergent issues, involving new stakeholders). Conclusions: We find IT-enabled change can succeed when top management participation and involvement diminish if middle management engages in joint action, i.e., intentional collective activity where members consciously choose to coordinate to achieve a goal. We identify three kinds of joint action: Constraining, where actions of the group limit the ability of individual middle managers to deviate from shared goals, Enabling, whereby a group of middle managers adapt the project to changing circumstances, and Extending, where groups of middle managers engage with others not in their functional areas. Joint action emerges when top management embeds, in the project context, (1) key influential stakeholders who are involved in the change, (2) a common goal, (3) structures and processes that promote collective work, and (4) artifacts inscribed with the common goal and collective work.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84200111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Despite increasing popularity of Social capital, the relationship between social capital and ICT often appears to be an ambivalent one. Existing information systems (IS) literature presented various frameworks and theoretical foundations to facilitate the study of this concept, yet several contradictory findings have been reported indicating a significant knowledge gap in this domain. Current research adopts a holistic approach to address this knowledge gap by answering “How does social capital generate value or benefits in an ICT intervention?” Method: C urrent research employs a systematic literature review coupled with a grounded theory method to investigate proposed research questions. Results: Primary contributions of the current research include (1) the identification of contextual relationship between contextual factors and social capital dimensions, and (2) development of a holistic model of social capital driven benefits during ICT intervention where the ‘enablers’ and the ‘drivers’ of benefit have been identified. Conclusions: Identification of distinct roles and value-drivers related to social capital will help IS researchers in explaining “how and why” benefits are achieved while employing a social capital lens.
{"title":"Social Capital and ICT Intervention: A Holistic Model of Value","authors":"Z. Ahmed, Vinod Kumar, U. Kumar, Evren Eryilmaz","doi":"10.17705/1pais.11403","DOIUrl":"https://doi.org/10.17705/1pais.11403","url":null,"abstract":"Background: Despite increasing popularity of Social capital, the relationship between social capital and ICT often appears to be an ambivalent one. Existing information systems (IS) literature presented various frameworks and theoretical foundations to facilitate the study of this concept, yet several contradictory findings have been reported indicating a significant knowledge gap in this domain. Current research adopts a holistic approach to address this knowledge gap by answering “How does social capital generate value or benefits in an ICT intervention?” Method: C urrent research employs a systematic literature review coupled with a grounded theory method to investigate proposed research questions. Results: Primary contributions of the current research include (1) the identification of contextual relationship between contextual factors and social capital dimensions, and (2) development of a holistic model of social capital driven benefits during ICT intervention where the ‘enablers’ and the ‘drivers’ of benefit have been identified. Conclusions: Identification of distinct roles and value-drivers related to social capital will help IS researchers in explaining “how and why” benefits are achieved while employing a social capital lens.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"117 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89424447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background : Interactive data and information visualization (IDIV) enhances information presentations by providing users with multiple visual representations, active controls, and analytics. Users have greater control over IDIV presentations than standard presentations and as such IDIV becomes a more popular and relevant means of supporting data analytics (DA), as well as augmenting human intellect. Thus, IDIV enables provision of information in a format better suited to users’ decision-making. Method : Synthesizing past literature, we unpack IDIV characteristics and their influence on decision-making. This study adopts a narrative review method. Our conceptualization of IDIV and the proposed decision-making model are derived from a substantial body of literature from within the information systems (IS) and psychology disciplines. Results : We propose an IS centered model of IDIV enhanced decision-making incorporating four bases of decision-making (i.e., predictors, moderators, mediators, and outcomes). IDIV is specifically characterized by rich features compared with standard information presentations, therefore, formulating the model is critical to understanding how IDIV affects decision processes, perceptual evaluations, and decision outcomes and quality. Conclusions : This decision-making model could provide a meaningful frame of reference for further IDIV research and greater specificity in IS theorizing. Overall, we contribute to the systematic description and explanation of IDIV and discuss a potential research agenda for future IDIV research into IS.
{"title":"Interactive Data and Information Visualization: Unpacking its Characteristics and Influencing Aspects on Decision-making","authors":"Arif Perdana, D. A. Robb, Fiona H. Rohde","doi":"10.17705/1pais.11404","DOIUrl":"https://doi.org/10.17705/1pais.11404","url":null,"abstract":"Background : Interactive data and information visualization (IDIV) enhances information presentations by providing users with multiple visual representations, active controls, and analytics. Users have greater control over IDIV presentations than standard presentations and as such IDIV becomes a more popular and relevant means of supporting data analytics (DA), as well as augmenting human intellect. Thus, IDIV enables provision of information in a format better suited to users’ decision-making. Method : Synthesizing past literature, we unpack IDIV characteristics and their influence on decision-making. This study adopts a narrative review method. Our conceptualization of IDIV and the proposed decision-making model are derived from a substantial body of literature from within the information systems (IS) and psychology disciplines. Results : We propose an IS centered model of IDIV enhanced decision-making incorporating four bases of decision-making (i.e., predictors, moderators, mediators, and outcomes). IDIV is specifically characterized by rich features compared with standard information presentations, therefore, formulating the model is critical to understanding how IDIV affects decision processes, perceptual evaluations, and decision outcomes and quality. Conclusions : This decision-making model could provide a meaningful frame of reference for further IDIV research and greater specificity in IS theorizing. Overall, we contribute to the systematic description and explanation of IDIV and discuss a potential research agenda for future IDIV research into IS.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"50 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73145232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At PAJAIS, 50 % of the new submissions are desk-rejected. As the recognition of the journal continues to grow, we believe that authors certainly can make more improvements to lessen the chances of a desk rejection in the review process. With this in mind, the aim of this editorial is to suggest and provide our future authors with the reasons and actions commonly-related to this regard so as to minimize the possibility of getting a desk rejection. After all, we, as researchers, all long to publish high-quality articles.
{"title":"Why Are Papers Desk Rejected at PAJAIS?: A Practical Guide to Avoiding Rejection","authors":"James J. Jiang, J. C. Tsai","doi":"10.17705/1pais.11401","DOIUrl":"https://doi.org/10.17705/1pais.11401","url":null,"abstract":"At PAJAIS, 50 % of the new submissions are desk-rejected. As the recognition of the journal continues to grow, we believe that authors certainly can make more improvements to lessen the chances of a desk rejection in the review process. With this in mind, the aim of this editorial is to suggest and provide our future authors with the reasons and actions commonly-related to this regard so as to minimize the possibility of getting a desk rejection. After all, we, as researchers, all long to publish high-quality articles.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"1"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76165789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: In today’s dynamically changing business environment, organizations are constantly striving to improve their organizational performance, and the use of business intelligence (BI) aids in this process. This is a key reason why BI has captured the attention of many academicians and practitioners. Most of the research on BI highlights its importance and the ways in which it facilitates decision-making; however, there is limited research on how the use of BI tools and applications benefits the organization by enabling it to convert the millions of dollars spent on BI investment into business value. This study validates the “business value of BI” framework by evaluating the business value creation process for BI tools in the UAE. Method: The data for this empirical study were collected via interviews with 15 middle managers from various industries in the UAE, with a focus on BI tools and the use of BI in their organizations. Results: The results show that a business value creation process for BI exists and that it is divided into three subprocesses: the BI conversion process, BI use process, and BI competitive process. Conclusions: The use of BI has become necessary for organizations to compete effectually. The results of this study identify the various BI tools that organizations in the UAE use. Furthermore, the results highlight the business value creation process of BI tools and how the effective use BI offers an information advantage that facilitates decision-making and eventually promotes financial and non-financial benefits for the organization.
{"title":"Understanding the Business Value Creation Process for Business Intelligence Tools in the UAE","authors":"Afrah Ahmed, S. M. Yusof, F. Oroumchian","doi":"10.17705/1pais.11304","DOIUrl":"https://doi.org/10.17705/1pais.11304","url":null,"abstract":"Background: In today’s dynamically changing business environment, organizations are constantly striving to improve their organizational performance, and the use of business intelligence (BI) aids in this process. This is a key reason why BI has captured the attention of many academicians and practitioners. Most of the research on BI highlights its importance and the ways in which it facilitates decision-making; however, there is limited research on how the use of BI tools and applications benefits the organization by enabling it to convert the millions of dollars spent on BI investment into business value. This study validates the “business value of BI” framework by evaluating the business value creation process for BI tools in the UAE. Method: The data for this empirical study were collected via interviews with 15 middle managers from various industries in the UAE, with a focus on BI tools and the use of BI in their organizations. Results: The results show that a business value creation process for BI exists and that it is divided into three subprocesses: the BI conversion process, BI use process, and BI competitive process. Conclusions: The use of BI has become necessary for organizations to compete effectually. The results of this study identify the various BI tools that organizations in the UAE use. Furthermore, the results highlight the business value creation process of BI tools and how the effective use BI offers an information advantage that facilitates decision-making and eventually promotes financial and non-financial benefits for the organization.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"41 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74950917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the previous issue, we outlined the considerations that are a necessary part of any submission and described how future submissions will be evaluated. In each paper, the abstract contains a summary of all key information, which can provide the audience a glance at the fundamental aspects of the paper. Mastering the skill of writing an abstract is essential to increase the visibility of a research paper and convince potential readers that research issues they care about have been addressed. In this issue, we continue to provide guidelines and new standards for writing and submitting abstracts for PAJAIS. This practical guide sets out the basic elements in an abstract and the journal’s requirements.
{"title":"Constructing an Effective Abstract: Guidelines and New Standards in PAJAIS","authors":"James J. Jiang, J. C. Tsai","doi":"10.17705/1pais.11301","DOIUrl":"https://doi.org/10.17705/1pais.11301","url":null,"abstract":"In the previous issue, we outlined the considerations that are a necessary part of any submission and described how future submissions will be evaluated. In each paper, the abstract contains a summary of all key information, which can provide the audience a glance at the fundamental aspects of the paper. Mastering the skill of writing an abstract is essential to increase the visibility of a research paper and convince potential readers that research issues they care about have been addressed. In this issue, we continue to provide guidelines and new standards for writing and submitting abstracts for PAJAIS. This practical guide sets out the basic elements in an abstract and the journal’s requirements.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"1"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90166705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: This study investigates the determinants that influence the user's behavioral intention to use cloud computing in adopter and non-adopter firms. The research model is based on the theory of the Valence Framework of Behavioral Beliefs and Technology Acceptance Model (TAM). The present study examined the factors of perceived ease of use, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs and perceived risks in determining behavioral intention to use cloud computing for the adopter and non-adopter firms. Method: Data were collected using a questionnaire-based survey method. The valid responses received were 458. The sample size of adopters and non-adopter of cloud computing were 239 and 219, respectively. Exploratory Factor Analysis (EFA) and Structural Equation Modeling (SEM) was used for data analysis. Data analysis was done separately for both samples of the adopter and non-adopter firms The results showed that, for adopters firms, perceived usefulness, perceived ease of use, ubiquity, perceived benefits, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. For non-adopters, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. A comparison testing was also performed by examining the difference in the strength of path coefficients between adopters and non-adopters firms. Results: The findings showed that the impact of favorable factors of perceived ubiquity and perceived benefits were found relatively more significant in the case of adopter firms than negative factors. Likewise, the impact of negative factors of perceived risks and perceived costs were found relatively more significant in the case of non-adopter firms. Conclusions : The major contribution of this study is that it contributes to the understanding of progressive changes in the impact of behavioral beliefs and cognitive factors on behavioral intention to use cloud computing in adopter and non-adopter firms. This study also provides managers' practical understandings for cloud computing adoption during each phase of the adoption process.
{"title":"Determinants of Cloud Computing Adoption: A Comparative Study","authors":"Shailja Tripathi","doi":"10.17705/1pais.11303","DOIUrl":"https://doi.org/10.17705/1pais.11303","url":null,"abstract":"Background: This study investigates the determinants that influence the user's behavioral intention to use cloud computing in adopter and non-adopter firms. The research model is based on the theory of the Valence Framework of Behavioral Beliefs and Technology Acceptance Model (TAM). The present study examined the factors of perceived ease of use, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs and perceived risks in determining behavioral intention to use cloud computing for the adopter and non-adopter firms. Method: Data were collected using a questionnaire-based survey method. The valid responses received were 458. The sample size of adopters and non-adopter of cloud computing were 239 and 219, respectively. Exploratory Factor Analysis (EFA) and Structural Equation Modeling (SEM) was used for data analysis. Data analysis was done separately for both samples of the adopter and non-adopter firms The results showed that, for adopters firms, perceived usefulness, perceived ease of use, ubiquity, perceived benefits, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. For non-adopters, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. A comparison testing was also performed by examining the difference in the strength of path coefficients between adopters and non-adopters firms. Results: The findings showed that the impact of favorable factors of perceived ubiquity and perceived benefits were found relatively more significant in the case of adopter firms than negative factors. Likewise, the impact of negative factors of perceived risks and perceived costs were found relatively more significant in the case of non-adopter firms. Conclusions : The major contribution of this study is that it contributes to the understanding of progressive changes in the impact of behavioral beliefs and cognitive factors on behavioral intention to use cloud computing in adopter and non-adopter firms. This study also provides managers' practical understandings for cloud computing adoption during each phase of the adoption process.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"337 3 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77414533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions : Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users.
{"title":"Length of Cloud Application Use on Functionality Expectation, Usability, Privacy, and Security: A Case of Google Docs","authors":"M. Nakayama, Charlie C. Chen","doi":"10.17705/1pais.11302","DOIUrl":"https://doi.org/10.17705/1pais.11302","url":null,"abstract":"Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions : Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"35 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80497210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}