Risk analysis in adoption of cloud computing in SMEs - a literature review

This paper presents a systematic literature review, to explore the current key issues related to cloud computing adoption in small medium enterprises SMEs. This is achieved by reviewing 55 articles published about cloud computing adoption in SMEs. Using the grounded review approach, articles are classified into four main categories: Cloud computing; adoption of cloud computing; adoption of cloud computing in SMEs; risk analysis in adoption of cloud computing in SMEs. Then, the four categories are divided into one focus abstract: risk analysis in adoption of cloud computing in SMEs, where the former affects the latter. The results of this review indicate that enterprises face serious problems after implementation of cloud computing with respect to risk. Based on the findings, the paper provides a future research agenda to explore the previously under-investigated areas regarding cloud computing adoption factors and processes. This paper calls for further theoretical, methodological, and empirical contributions to the research area of cloud computing adoption in SMEs. It provides a comprehensive view of insights gained in this area of research through the bibliography.

[1]  Songpol Kulviwat,et al.  The role of social influence on adoption of high tech innovations: The moderating effect of public/private consumption , 2009 .

[2]  Dimitris N. Chorafas,et al.  Wealth Management: Private Banking, Investment Decisions, and Structured Financial Products , 2005 .

[3]  Sungyoung Lee,et al.  Adoption issues for cloud computing , 2009, iiWAS.

[4]  Joseph Vithayathil,et al.  The Impact of Cloud Computing: Should the IT Department Be Organized as a Cost Center or a Profit Center? , 2013, J. Manag. Inf. Syst..

[5]  Adeniran Solomon Abiodun A Framework for Implementation of Risk Management System in third Party managed Cloud , 2013 .

[6]  Siani Pearson,et al.  Privacy Risk, Security, Accountability in the Cloud , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[7]  Louis Raymond,et al.  Information technology: Threats and opportunities for small and medium-sized enterprises , 1993 .

[8]  Jukka Ylitalo,et al.  Towards Building an Automated Security Compliance Tool for the Cloud , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  Leon A. Kappelman,et al.  Early Warning Signs of it Project Failure: The Dominant Dozen , 2006, Inf. Syst. Manag..

[10]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[11]  Maryann P. Feldman,et al.  Real Effects of Academic Research: Comment , 1992 .

[12]  Mojtaba Alizadeh,et al.  Associated Risks of Cloud Computing for SMEs , 2012 .

[13]  Schahram Dustdar,et al.  Composable cost estimation and monitoring for computational applications in cloud computing environments , 2010, ICCS.

[14]  Edward W. N. Bernroider Factors in SWOT Analysis Applied to Micro, Small-to-Medium, and Large Software Enterprises:: an Austrian Study , 2002 .

[15]  F. Bell,et al.  Using bricolage to integrate business and information technology innovation in SMEs , 2006 .

[16]  Xiaodong Liu,et al.  Cloud Migration for SMEs in a Service Oriented Approach , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.

[17]  Jack Chin Pang Cheng,et al.  Cloud Computing and Its Implications for Construction IT , 2010 .

[18]  Achmad Nizar Hidayanto,et al.  Analysis of cloud adoption determinants by using BOCR analysis and DEMATEL , 2015, Int. J. Bus. Inf. Syst..

[19]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[20]  Changqing Yin,et al.  BPM Architecture Design Based on Cloud Computing , 2010, Intell. Inf. Manag..

[21]  Thurasamy Ramayah,et al.  A Structural Equation Modeling Approach for the Adoption of Cloud Computing to Enhance the Malaysian Healthcare Sector , 2014, Journal of Medical Systems.

[22]  L. D. Dhinesh Babu,et al.  An execution environment oriented approach for scheduling dependent tasks of cloud computing workflows , 2014, Int. J. Cloud Comput..

[23]  Jörn Altmann,et al.  Cloud Computing Value Chains: Understanding Businesses and Value Creation in the Cloud , 2010, Economic Models and Algorithms for Distributed Systems.

[24]  Abdul Raouf Khan,et al.  ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .

[25]  Arumugam Seetharaman,et al.  The usage and adoption of cloud computing by small and medium businesses , 2013, Int. J. Inf. Manag..

[26]  E. Malecki,et al.  Firms and Innovation Diffusion: Examples from Banking , 1977 .

[27]  Victor I. Chang,et al.  The development that leads to the Cloud Computing Business Framework , 2013, Int. J. Inf. Manag..

[28]  Krishnadas Nanath,et al.  A Model for Cost-Benefit Analysis of Cloud Computing , 2013, Journal of International Technology and Information Management.

[29]  Savvas Papagiannidis,et al.  Cloud computing adoption in Greece , 2013, UKAIS.

[30]  Farid Shirazi,et al.  Factors Influencing the Adoption of Cloud Computing by Small and Medium Size Enterprises (SMEs) , 2014, HCI.

[31]  T. Lau,et al.  The competitiveness of small and medium enterprises - A conceptualization with focus on entrepreneurial competencies , 2002 .

[32]  Ali Rajabzadeh Ghatari,et al.  Factors affecting the adoption of cloud computing in small and medium enterprises , 2015, Int. J. Bus. Inf. Syst..

[33]  Haralambos Mouratidis,et al.  Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts , 2014, Comput. Stand. Interfaces.

[34]  Chia-Lun Yeh,et al.  Cloud Computing: Overview and Risk Analysis , 2012, J. Inf. Syst..

[35]  Magne Jørgensen,et al.  How large are software cost overruns? A review of the 1994 CHAOS report , 2006, Inf. Softw. Technol..

[36]  Nabil Ahmed Sultan,et al.  International Journal of Information Management , 2010 .

[37]  John Pay,et al.  Understanding the competitive process A guide to effective intervention in the small firms sector , 1992 .

[38]  S. Shanthi,et al.  Usability Matrix On Dynamic Datasets For Cloud Storage Solution Framework , 2014 .

[39]  Alok Choudhary,et al.  Risks in Enterprise Cloud Computing: The Perspective of it Experts , 2013, J. Comput. Inf. Syst..

[40]  Jordi Guitart,et al.  Business-driven management of infrastructure-level risks in Cloud providers , 2014, Future Gener. Comput. Syst..

[41]  Fernando García,et al.  Obtaining a 3D Model from a Facial Recognition in 2D , 2013, EUROCAST.

[42]  Eileen Doherty,et al.  Understanding and Supporting Cloud Computing Adoption in IrishSmall and Medium Sized Enterprises (SMEs) , 2013 .

[43]  Frank Teuteberg,et al.  Decision-making in cloud computing environments: A cost and risk based approach , 2011, Information Systems Frontiers.

[44]  Abdulaziz Aljabre Cloud Computing for Increased Business Value , 2012 .

[45]  Maria Leonilde Rocha Varela,et al.  Cloudlet architecture for dashboard in cloud and ubiquitous manufacturing , 2013 .

[46]  A. Băjenaru SOFTWARE-AS-A-SERVICE AND CLOUD COMPUTING, A SOLUTION FOR SMALL AND MEDIUM-SIZED COMPANIES , 2010 .

[47]  Daiva Budrienė,et al.  Cloud Computing Application In Small And Medium-Sized Enterprises , 2012 .

[48]  Daniel Minoli,et al.  Information Security Risk Management , 2009 .

[49]  K. Gaurangkumar,et al.  To Achieve Trust in the Cloud , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[50]  M. Sasikumar,et al.  Trust framework for calculating security strength of a cloud service , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[51]  Sunilkumar S. Manvi,et al.  Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..

[52]  Mazani Manaf,et al.  Data provenance trusted model in cloud computing , 2013, 2013 International Conference on Research and Innovation in Information Systems (ICRIIS).

[53]  Česlovas Christauskas,et al.  Cloud–Computing Based Accounting for Small to Medium Sized Business , 2012 .

[54]  Bu-Sung Lee,et al.  TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[55]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.

[56]  Klaus Turowski,et al.  Risk management in hybrid value creation , 2014, Decis. Support Syst..

[57]  Brenda Whittaker,et al.  What went wrong? Unsuccessful information technology projects , 1999, Inf. Manag. Comput. Secur..

[58]  Xue-mei Xie,et al.  Analysis on the risk of personal cloud computing based on the cloud industry chain , 2013 .

[59]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[60]  Iliya Markov,et al.  Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..