Toward an Understanding of Government Cloud Acceptance - A Quantitative Study of G-Cloud Acceptance by Saudi Government Agencies using Extended UTAUT

Maha A. Al Rashed, Mutlaq B. Alotaibi

2016

Abstract

With today’s rapid advances in Information and Communication Technologies (ICT), an increasing number of governments worldwide are seeking solutions to enhance their IT infrastructures and services, and reshape their e-government systems to meet public needs of providing easily accessible, cost-effective, high quality, and reliable e-services. In recent years, government cloud (G-Cloud) has emerged as a new and innovative computing paradigm with a promising opportunity for many governments to rationalize the way they manage their services and resources. Government cloud’s potential benefits has been recognized by many governments around the world. This paper will study the acceptance of cloud computing technologies and services in Saudi government agencies by investigating the significant and influential factors that affect the behavioral intentions to use G-Cloud. Moreover, in light of the rising concerns over trust issues in cloud computing which have been reported to be one of the major barriers to the adoption of the cloud, the study proposes an extended Unified Theory of Acceptance and Use of Technology (UTAUT) model by incorporating trust as a key factor in the acceptance of G-Cloud.

References

  1. Adjei, J. K. (2015) 'Explaining the role of trust in cloud computing services', info, 17(1), pp. 54-67.
  2. AlAwadhi, S. and Morris, A. (2008) 'The Use of the UTAUT Model in the Adoption of E-government Services in Kuwait', in Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, Waikoloa, HI, pp. 219-219.
  3. Alharbi, S. T. (2012) 'Users' acceptance of cloud computing in Saudi Arabia: an extension of technology acceptance model', International Journal of Cloud Applications and Computing (IJCAC), 2(2), pp. 1-11.
  4. Alotaibi, M. B. (2014) 'Exploring Users' Attitudes and Intentions toward the Adoption of Cloud Computing in Saudi Arabia: An Empirical Investigation', Journal of Computer Science, 10(11), pp. 2315-2329.
  5. Bradach, J. L. and Eccles, R. G. (1989) 'Price, authority, and trust: From ideal types to plural forms', Annual review of sociology, 15, pp. 97-118.
  6. Burda, D. and Teuteberg, F. (2014) 'The role of trust and risk perceptions in cloud archiving-Results from an empirical study', The Journal of High Technology Management Research, 25(2), pp. 172-187.
  7. Charalabidis, Y., Markaki, O., Lampathaki, F., Mantzakou, I. and Sarantis, D. (2010) 'Towards a scientific approach to e-government research', in tGov Workshop.
  8. Chi, H., Yeh, H. and Hung, W. C. (2012) 'The moderating effect of subjective norm on cloud computing users' perceived risk and usage intention', International Journal of Marketing Studies, 4(6), pp. 95.
  9. Communications and Information Technology Commission (CITC) (2015) 'ICT Report'.
  10. Gefen, D., Karahanna, E. and Straub, D. W. (2003) 'Trust and TAM in online shopping: An integrated model', MIS quarterly, vol. 27(1) pp. 51-90.
  11. Im, I., Hong, S. and Kang, M. S. (2011) 'An international comparison of technology adoption: Testing the UTAUT model', Information & Management, 48(1), pp. 1-8.
  12. Kanwal, A., Masood, R., Ghazia, U. E., Shibli, M. A. and Abbasi, A. G. (2013) 'Assessment Criteria for Trust Models in Cloud Computing', in Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, Beijing, pp. 254-261.
  13. Khan, F., Zhang, B., Khan, S. and Chen, S. (2011) 'Technological leap frogging e-government through cloud computing', in Broadband Network and Multimedia Technology (IC-BNMT), 2011 4th IEEE International Conference, Shenzhen, pp. 201-206.
  14. Khan, K. M. and Malluhi, Q. (2010) 'Establishing trust in cloud computing', IT professional, 12(5), pp. 20-27.
  15. Kim, D. J., Ferrin, D. L. and Rao, H. R. (2008) 'A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents', Decision support systems, 44(2), pp. 544-564.
  16. Kirs, P. and Bagchi, K. (2012) 'The impact of trust and changes in trust: A national comparison of individual adoptions of information and communication technologies and related phenomenon', International Journal of Information Management, 32(5), pp. 431-441.
  17. Ko, R. K., Lee, B. S. and Pearson, S. (2011) 'Towards achieving accountability, auditability and trust in cloud computing', in Advances in Computing and Communications, Springer Berlin Heidelberg, pp. 432-444.
  18. Kurdi, R., Taleb-Bendiab, A., Randles, M. and Taylor, M. (2011) 'E-Government Information Systems and Cloud Computing (Readiness and Analysis)78, in Developments in E-systems Engineering (DeSE), 2011, Dubai, pp. 404-409.
  19. Lian, J. W. (2015) 'Critical factors for cloud based einvoice service adoption in Taiwan: An empirical study', International Journal of Information Management, 35(1), pp. 98-109.
  20. Liang, J. (2012) 'Government Cloud: Enhancing Efficiency of E-Government and Providing Better Public Services', in Service Sciences (IJCSS), 2012 International Joint Conference, pp. 261-265.
  21. Martucci, L., Zuccato, A., Smeets, B., Habib, S. M., Johansson, T. and Shahmehri, N. (2012) 'Privacy, security and trust in cloud computing: The perspective of the telecommunication industry', in Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on, Fukuoka, pp. 627-632.
  22. Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995) 'An integrative model of organizational trust', Academy of Management Review, 20(3), pp. 709-734.
  23. Opitz, N., Langkau, T. F., Schmidt, N. H. and Kolbe, L. M. (2012) 'Technology acceptance of cloud computing: empirical evidence from German IT departments', in System Science (HICSS), 2012 45th Hawaii International Conference on IEEE, Maui, HI, pp. 1593-1602.
  24. Park, S. C. and Ryoo, S. Y. (2013) 'An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective', Computers in Human Behavior, 29(1), pp. 160-170.
  25. Pavlou, P. A. (2003) 'Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model', International journal of electronic commerce, 7(3), pp. 101-134.
  26. Pearson, S. (2013) 'Privacy, security and trust in cloud computing', in Privacy and Security for Cloud Computing, Springer London, pp. 3-42.
  27. Schaupp, L. C., Carter, L. and McBride, M. E. (2010) 'Efile adoption: A study of US taxpayers' intentions', Computers in Human Behavior, 26(4), pp. 636-644.
  28. Seo, J. H., Min, J. S. and Lee, H. (2014) 'Implementation Strategy for a Public Service Based on Cloud Computing at the Government', International Journal of Software Engineering & Its Applications, 8(9), pp. 207-220.
  29. Shen, Y., Yang, J. and Keskin, T. (2012) 'The evolution of IT towards cloud computing in China and US', in Computational Problem-Solving (ICCP), 2012 International Conference on, Leshan, pp. 224-235.
  30. Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003) 'User acceptance of information technology: Toward a unified view', MIS Quarterly, 27(3), pp. 425-478.
  31. Wu, L. and Chen, J. L. (2005) 'An extension of trust and TAM model with TPB in the initial adoption of online tax: an empirical study', International Journal of Human-Computer Studies, 62(6), pp. 784-808.
  32. Wu, W. W., Lan, L. W. and Lee, Y. T. (2013) 'Factors hindering acceptance of using cloud services in university: a case study', The Electronic Library, 31(1), pp. 84-98.
  33. Wyld, D. C. (2009) 'Moving to the cloud: An introduction to cloud computing in government', IBM Center for the Business of Government.
  34. Wyld, D. C. (2010) 'Risk in the clouds?: Security issues facing government use of cloud computing', Innovations in Computing Sciences and Software Engineering, pp. 7-12.
  35. Zhang, W. and Chen, Q. (2010) 'From E-government to C-government via cloud computing', in E-Business and E-Government (ICEE), 2010 International Conference, pp. 679-682.
Download


Paper Citation


in Harvard Style

Al Rashed M. and Alotaibi M. (2016). Toward an Understanding of Government Cloud Acceptance - A Quantitative Study of G-Cloud Acceptance by Saudi Government Agencies using Extended UTAUT . In Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-758-182-3, pages 239-244. DOI: 10.5220/0005835102390244


in Bibtex Style

@conference{closer16,
author={Maha A. Al Rashed and Mutlaq B. Alotaibi},
title={Toward an Understanding of Government Cloud Acceptance - A Quantitative Study of G-Cloud Acceptance by Saudi Government Agencies using Extended UTAUT},
booktitle={Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2016},
pages={239-244},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005835102390244},
isbn={978-989-758-182-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - Toward an Understanding of Government Cloud Acceptance - A Quantitative Study of G-Cloud Acceptance by Saudi Government Agencies using Extended UTAUT
SN - 978-989-758-182-3
AU - Al Rashed M.
AU - Alotaibi M.
PY - 2016
SP - 239
EP - 244
DO - 10.5220/0005835102390244