The role of government regulations in the adoption of cloud computing: A case study of local government

Abstract Cloud computing is a technology that facilitates improved productivity, improved efficiency and lower costs. This technology has the potential to improve the reliability and scalability of organizational systems and leads to an enhanced focus on core business and strategy. Despite the Australian Federal Government's ‘cloud-first’ strategy and policies and the Queensland State Government's ‘digital-first’ strategy, the adoption of cloud services at the local government level has been limited, largely due to a lack of specificity among government regulations and a lack of regulations that provide support to local governments. This empirical study deploys a mixed research method designed to develop a cloud regulations model to assist governments in adopting cloud computing services. By integrating Australian Cloud Policy Frameworks with the extant research on cloud computing, this study conducted 21 field interviews with Information Technology (IT) managers and surveyed 480 IT staff from Australia's 47 local governments. This research paper presents and validates a revised set of factors used to develop government regulations specific to cloud computing adoption. The factors that we found to be statistically significant were cost, quality of services, security, privacy, management, government-based facilitating conditions, and firm-based facilitating conditions regulations. Based on these findings, this research concludes that government regulation is a significant aspect in decision making for the adoption of any new technology such as cloud computing.

[1]  John Effah,et al.  Preliminary insight into cloud computing adoption in a developing country , 2016, J. Enterp. Inf. Manag..

[2]  Jim Minifie The silver lining: cloud computing and small and medium enterprises A Grattan paper , 2014 .

[3]  W. Zikmund Business Research Methods , 1984 .

[4]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[5]  Thomas F. Stafford,et al.  Online tax payment systems as an emergent aspect of governmental transformation , 2011, Eur. J. Inf. Syst..

[6]  Eduardo B. Fernández,et al.  A survey of compliance issues in cloud computing , 2016, Journal of Internet Services and Applications.

[7]  David C. Yen,et al.  An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital , 2014, Int. J. Inf. Manag..

[8]  C. Perry,et al.  Convergent interviewing: a starting methodology for an enterprise research program , 2007 .

[9]  John T. Scholz,et al.  Duty, Fear, and Tax Compliance: The Heuristic Basis of Citizenship Behavior , 1995 .

[10]  Nick von Tunzelmann,et al.  Mapping public support for innovation : a comparison of policy alignment in the UK and France , 2008 .

[11]  Keith Punch,et al.  Introduction to Social Research: Quantitative and Qualitative Approaches , 1998 .

[12]  Andy P. Field,et al.  Discovering Statistics Using SPSS , 2000 .

[13]  A. Zaied,et al.  Barriers to E-Commerce Adoption in Egyptian SMEs , 2012 .

[14]  J. Hair Multivariate data analysis , 1972 .

[15]  C. D. J. Waters Quantitative Methods for Business , 1997 .

[16]  Nick Doty,et al.  Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[17]  C. Perry,et al.  Qualitative Marketing Research , 2001 .

[18]  B. Byrne Structural Equation Modeling with LISREL, PRELIS, and SIMPLIS: Basic Concepts, Applications, and Programming , 1998 .

[19]  Hsin Hsin Chang,et al.  Technical and management perceptions of enterprise information system importance, implementation and benefits , 2006, Inf. Syst. J..

[20]  M. Shin,et al.  Affective Policy Performance Evaluation Model: A Case of an International Trade Policy Implementation , 2018 .

[21]  Geoff Walsham,et al.  Doing interpretive research , 2006, Eur. J. Inf. Syst..

[22]  Hsiu-Fang Hsieh,et al.  Three Approaches to Qualitative Content Analysis , 2005, Qualitative health research.

[23]  A. Scupola,et al.  The Adoption of Internet Commerce by SMEs in the South of Italy: An Environmental, Technological and Organizational Perspective , 2003 .

[24]  Colin Robson,et al.  Real World Research: A Resource for Social Scientists and Practitioner-Researchers , 1993 .

[25]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[26]  Paul T. Jaeger,et al.  Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .

[27]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[28]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[29]  Sven Helmer,et al.  A survey study on major technical barriers affecting the decision to adopt cloud services , 2015, J. Syst. Softw..

[30]  Paul T. Jaeger,et al.  The impact of polices on government social media usage: Issues, challenges, and recommendations , 2012, Gov. Inf. Q..

[31]  Eric Hand,et al.  Head in the clouds , 2007, Nature.

[32]  A. Onwuegbuzie,et al.  Mixed Methods Research: A Research Paradigm Whose Time Has Come , 2004 .

[33]  Irit Hadar,et al.  Applying ontology-based rules to conceptual modeling: a reflection on modeling decision making , 2007, Eur. J. Inf. Syst..

[34]  G. Gaskell,et al.  Individual and Group Interviewing , 2000 .

[35]  Wasfi Alrawabdeh Environmental Factors Affecting Mobile Commerce Adoption- An Exploratory Study on the Telecommunication Firms in Jordan , 2014 .

[36]  N. Kshetri Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .

[37]  Mathews Nkhoma,et al.  Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach , 2013 .

[38]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[39]  Kenneth L. Kraemer,et al.  The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business , 2006, Manag. Sci..

[40]  Tiago Oliveira,et al.  Literature Review of Information Technology Adoption Models at Firm Level , 2011 .

[41]  Ray Hackney,et al.  Towards an e-Government efficiency agenda: the impact of information and communication behaviour on e-Reverse auctions in public sector procurement , 2007, Eur. J. Inf. Syst..

[42]  Dietmar Nedbal,et al.  Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors , 2014, 2014 47th Hawaii International Conference on System Sciences.

[43]  John Hulland,et al.  Use of causal models in marketing research: A review , 1996 .

[44]  Akemi Takeoka Chatfield,et al.  Assessing information security risks in the cloud: A case study of Australian local government authorities , 2020, Gov. Inf. Q..

[45]  Zaigham Mahmood,et al.  Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.

[46]  Sudha N. Setty Surveillance, Secrecy, and the Search for Meaningful Accountability , 2014 .

[47]  Urs Gasser,et al.  Governments and Cloud Computing: Roles, Approaches, and Policy Considerations , 2014 .

[48]  Dimitrios Zissis,et al.  Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..

[49]  C. Teddlie,et al.  Foundations of mixed methods research , 2013 .

[50]  J. Soar,et al.  Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study , 2015 .

[51]  David C. Yen,et al.  Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department , 2007, Decision Support Systems.

[52]  Michael Grimsley,et al.  e-Government information systems: Evaluation-led design for public value and client trust , 2007, Eur. J. Inf. Syst..

[53]  Jeffrey Soar,et al.  Perceived potential for value creation from cloud computing: a study of the Australian regional government sector , 2018, Behav. Inf. Technol..

[54]  Dong-Hee Shin,et al.  User centric cloud service model in public sectors: Policy implications of cloud services , 2013, Gov. Inf. Q..

[55]  Matthew N. O. Sadiku,et al.  Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.

[56]  Jennifer Caroline Greene,et al.  Defining and describing the paradigm issue in mixed‐method evaluation , 1997 .

[57]  Tony Thomas,et al.  Cloud Based Medical Image Exchange-Security Challenges , 2012 .

[58]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[59]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[60]  Lukács Adrienn,et al.  What is Privacy? The History and Definition of Privacy , 2016 .

[61]  Jeffrey C. Carrico,et al.  Licensed to ILL , 2004 .

[62]  Shuhua Monica Liu,et al.  Special issue on internet plus government: New opportunities to solve public problems? , 2018, Gov. Inf. Q..

[63]  Kathryn E. Newcomer,et al.  Handbook of Practical Program Evaluation , 2010 .

[64]  R. Chenail,et al.  Values in Qualitative and Quantitative Research , 2009 .

[65]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[66]  Abhinav Mishra,et al.  Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[67]  Zhihai Zhang,et al.  An instrument for measuring TQM implementation for Chinese manufacturing companies , 2000 .

[68]  Patrick Y. K. Chau,et al.  A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework , 2001, Inf. Manag..

[69]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[70]  M. Grimmer,et al.  The mix of qualitative and quantitative research in major marketing journals, 1993‐2002 , 2007 .

[71]  C. Girard,et al.  Towards a Model of Corporate and Social Stakeholder Engagement: Analyzing the Relations Between a French Mutual Bank and Its Members , 2012 .

[72]  Jun-jie Wang,et al.  Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.

[73]  Mcdp Mathieu Weggeman,et al.  Determinants of the Level of Knowledge Application: A Knowledge‐Based and Information‐Processing Perspective* , 2005 .

[74]  Matt Bishop,et al.  Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[75]  Michael D. Myers,et al.  Qualitative Research in Information Systems , 1997, MIS Q..

[76]  Sevgi Özkan,et al.  e-Government adoption model based on theory of planned behavior: Empirical validation , 2011, Gov. Inf. Q..

[77]  E. B. Zechmeister,et al.  Research Methods in Psychology. , 1990 .

[78]  Krystal Lynn Conniry National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare , 2016 .

[79]  J. Victor Strategic Lobbying: Demonstrating How Legislative Context Affects Interest Groups' Lobbying Tactics , 2007 .

[80]  Kristina Irion,et al.  Government Cloud Computing and National Data Sovereignty , 2012 .

[81]  Zheng Yan,et al.  Factors affecting response rates of the web survey: A systematic review , 2010, Comput. Hum. Behav..

[82]  Tiago Oliveira,et al.  Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..

[83]  Karim Djemame,et al.  Legal issues in clouds: towards a risk inventory , 2013, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[84]  Othman Ibrahim,et al.  Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development , 2016, J. Syst. Inf. Technol..

[85]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..

[86]  John Ngugi Makena,et al.  FACTORS THAT AFFECT CLOUD COMPUTING ADOPTION BY SMALL AND MEDIUM ENTERPRISES IN KENYA , 2013 .

[87]  Inwon Kang,et al.  Service Evaluation Model for Medical Tour Service , 2014 .

[88]  Ling Liu,et al.  Agyaat: mutual anonymity over structured P2P networks , 2006, Internet Res..

[89]  Viswanath Venkatesh,et al.  Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..

[90]  B MilesMatthew,et al.  Qualitative Data Analysis , 2009, Approaches and Processes of Social Science Research.

[91]  Laurence J. O'Toole,et al.  The Selection of Policy Instruments: a Network-based Perspective , 1998, Journal of Public Policy.

[92]  David C. Yen,et al.  Critical factors for adopting PACS in Taiwan: Views of radiology department directors , 2006, Decis. Support Syst..

[93]  Luke A. Stewart,et al.  The Impact of Regulation on Innovation in the United States: A Cross-Industry Literature Review , 2011 .

[94]  Jan Schilling On the Pragmatics of Qualitative Assessment , 2006 .