SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 716∼725
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.13871 Ì 716
Technology organization environment framework
in cloud computing
Iqbal Ahmed
Department of Computer Science and Engineering, University of Chittagong, Bangladesh
Article Info
Article history:
Received Aug 12, 2019
Revised Jan 2, 2020
Accepted Feb 7, 2020
Keywords:
Cloud computing
SMEs
Technology adoption
TOE framework
ABSTRACT
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical frame-
work based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Iqbal Ahmed,
Department of Computer Science and Engineering,
University of Chittagong, Chittagong-4331, Bangladesh,
Email: iqbal.ahmed@cu.ac.bd
1. INTRODUCTION
Nowadays, cloud computing has been a major agenda in the computing field. Cloud computing is the
on-demand delivery of computer system resources as a service over the network [1]. The features of cloud
computing, including scalability, flexibility and pay-per-usage model [2] has the potential to influence the
various aspects of social and economic activities globally in various types of enterprises. Cloud computing
offers enormous benefits to all organizations and enterprises, including SMEs [3]. SMEs are the enterprises
in which amount of personnel are less than certain limits, and they are control the data of high sensitivity.
Some cases of sensitive data which is controlled by SMEs are: data of intelligence agencies and government
federal, financial data of companies, purchase contracts, company databases, de-identified research data, bank
associated data like bank accounts, pin, passwords, balances and dealings, trade secrets, email accounts, drug
formulas, accounting records and source codes [4]. The adoption of cloud computing is growing rapidly as it
allows enterprises to concentrate on their essential business events, and, thus, efficiency is improved [5]. An
adequately adopted cloud provides a plenty of benefits to the enterprises such as unlimited computing power,
easy access of data and applications, lower IT expenditure, and build up competitive advantage. Recently,
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
TELKOMNIKA Telecommun Comput El Control Ì 717
SMEs has shown a great concern in including cloud computing to their overall Information technology (IT)
strategies. A recent report by Mckinsey [6] on the adoption rate of cloud service by SMEs informed that, 70%
of SMEs have formerly bought at least two cloud service, and 40% have bought six or more cloud services.
Nevertheless the touted benefits of cloud computing, its adoption and implementation in SMEs is faced with
many challenges including national and international regulations, shortage of industry-specific conformism
to principles, security and privacy threats [7-9]. Due to these challenges, some enterprises are quiet anxious
around the threats of shifting business-critical applications to the cloud. There is therefore the need to under-
stand the factors that can influence their rate of adoption in companies in order to grow in cloud computing.
This study will examine the perception of IT professionals as regards cloud services in the context
of the Technology Organization Environment (TOE) and IT professionals are concerned about their adoption
[10]. Recently, adoption of technology has become the most advanced area for research in Information Systems.
Most researchers focused on the new factors that affect technology adoption at both the individual, the organiza-
tional levels. Various theories and models established to explain technological adoption, assuming new factors
in all practicable areas. These include Reasoned Action Theory (ART), Planned Conduct Theory, Technology
Model for Acceptance (TAM), comprehensive TAM, unified technology (UTAUT) and the motivational model,
the Theory of Innovation Dissemination, social cognitive theory and Technological Environment Organization
(TOE). Much research conducted at the individual level of technology adoption and a few organizational tasks.
This study focuses mainly on the organizational framework, such as the Environment Technology Organization
(TOE). The context of an organization has a big effect on accepting and carrying out the revolution. TOE is the
framework covering three different roots in the perspective of an organization in the decision-making process.
Technological, organizational and environmental contexts are these fundamental principles. In this field of
technical adoption, it takes an hour to look at future research opportunities. The TOE Framework contributes
too many areas by explaining different technological developments, such as e-commerce, business resource
planning, green IT Start-Up, cloud computing, Small and medium-sized companies (SMEs), etc.
2. BACKGROUND STUDY
2.1. Technology Adoption
Technology adoption for information systems is a mature field of research. In [11]defined technology
adoption as the stage in which an individual or an organization will be able to choose a technology for use.
The problems relating to technology adoption have gained more prominence in recent days with rapid progress
in technology innovations of every imaginable field. Great investment for the introduction of new technologies,
made by organizations and governments that can bring a change in the life of users. However, such investments
cannot produce results unless the intended users adopt innovations. The evolution of this field of research in
information systems must understood and future research opportunities examined [12].
Figure 1. Common Cloud Computing Adoption Models
Technology organization environment... (Iqbal Ahmed)
718 Ì ISSN: 1693-6930
2.2. Cloud Computing
According to National Standards and Technology Institute (NIST) ”cloud-based computing as a model
that provides fast, convenient on-demand network access to an interaction with a shared bundle of computer
resources configurable (e.g., networks, Servers, Storage, Applications, Services). It fosters availabilities that are
composed of five basic features (self service on-demand, broad network access, pooling of resource sources,
rapid elasticity and measured service) three models: (Software as a Service (SaaS), Platform as a Service
(PaaS), Infrastructure as a Service (IaaS). A variety of cloud services have been available over the past several
years. The cloud deployment models in particular need to be taken into account for a cloud infrastructure
installation organization. Here, one of the four models can be selected. A private cloud provides organizational
computing services to members of a single organization. Your cloud system is located in your own data center
or via an internet data center, which is rented out and operated on-site or managed on an individual basis by
a third party [13]. The community cloud provides computer services to enable collaboration for a mission,
security or compliance for a specific purpose. Public clouds may be operated by any public cloud company,
such as Amazon, Microsoft and Sales Force [14]. The cloud is not limited to one person or a company.
There is a hybrid cloud model running on two or more models [15]. As computer services are required, the
market continues to increase for companies that cover latency-free and worldwide safe services [16]. Unbiased,
companies have started considering how to use hybrid IT in a complex IT environment by combining IT systems
and services? Therefore, companies need a systemic approach to set key cloud computing models and IT
network values should help to effectively manage cloud computing systems [17].
2.3. Adoption Methods and Theories
There are a number of technological innovation and technological adoption theories and studies.
Various theories and models for clarifying the occurrences of technological adopt hypothesize new factors
in all practicable fields [18]. Utmost common theorization is Technology Acceptance Model (TAM), Theory of
Planned Behavior (TPB), Unified Theory of Acceptance and Use of Technology (UTAUT) and TOE framework
(Technology- Organization-Environment). The Figure 1 shows few common cloud computing adoption models
and Table 1 presents their brief descriptions.
Table 1. Adoption methods and theories
Adoption Models Developed By Published Year Used As
Diffusion of Innovation (DOI) Everett Roger In 1960 Individually/Organizationally
Theory of Reasoned Action (TRA) Fishbein and Ajzen In 1975 Individually
Social Cognitive Theory Albert Bandura In 1986 Individually/Organizationally
Technology Acceptance Model (TAM) Davis, Bagozzi and Warshaw In 1989 Individually/ Organizationally
Technology Organization Environment (TOE) Fleischer and Tornatzky In 1990 Individually/Organizationally
Theory of Planned Behavior (TPB) Ajzen In 1991 Individually
Motivation Model Davis et al. In 1992 Individually
Extended TAM Venkatesh and Davis In 1996 Individually/Organizationally
Unified Theory of Acceptance and Use of
Technology (UTAUT)
Venkatesh and Morris In 2003 Individually/Organizationally
2.4. Technology Organization Environment (TOE)
Technological Organizinng Environmental (TOE) framework is proposed to study the use of tecnolog-
ical innovations [19]. They maintain that the decision to adopt technological innovation based on environmental
and organizational factors and technological characteristics. This framework therefore envisages a three-fold
framework for technological innovation assumption and execution: the technical, the structural and the envi-
ronmental context.
(a) Technological Context The technological background refers to the relevant technologies in the enterprise.
This includes existing, company- related tools and emerging technologies.
(b) Organizational Context The organizational perspective describes the organizational characteristics. Joint
organizational characteristics include corporate size, centralizing degree, formality, management
structure complexity, Quality of its human resources and domestic slack resources [20]. Organizational
characteristics may also reduce or make it possible for technological innovations to be adopted
and implemented.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
TELKOMNIKA Telecommun Comput El Control Ì 719
(c) Environmental Context The environment is the space where an organization carries out its activities. This
includes occupational associates, participants and the administration [21]. It is outside of an organization,
which has restrictions and prospects on high-tech revolution. This makes the TOE structure widely
applicable in various disciplines, because researchers can choose each dimension based on innovation
and organizational characteristics such as the work of [22]. In contrast to certain theories or models in
the study of Information Systems, the TOE Framework is a generic theory which only mentions several
aspects of adoption, without stating the factors of each dimension.
3. THE PROBLEM STATEMENT
There is plenty of study at the individual level of technology adoption and a few organizational activ-
ities. The purpose of this paper is to conduct a collected , systematic review analysis to classify critical aspects
of information technology adoption in cloud computing organizations under the roof TOE framework.
4. RESEARCH AND REVIEW ANALYSIS METHOD
Followed by the methodology of systematic literature review, research documents with proper key-
words and buzzwords are downloaded from various authentic sources. The following electronic databases were
retrieved for the literature search, chosen due to their content being related to the discipline: Google Scholar,
academic databases including IEEEXplore, Springer Link, ScienceDirect, ACM Digital Library, Elsevier etc.
The next Figure 2 gives the idea of systematic review process.
Figure 2. The Systematic Literature Review Process
This paper examined what most of the researchers in this field were focusing on. In the initial search,
the paper focused on keywords like model of technology adoption, theories and model of adoption in SMEs
etc. Hottest documents have again searched online to contain any missing documents, which have been left out
due to new keywords. Since we wanted to look over the years and not apply these theories and models, we have
collected papers that provide a general overview of some of the main theories evolved over the years. Seminar
and Conference papers on these theories have been downloaded and thoroughly studied to understand the TOE
in the domain of Cloud Computing.
5. SYSTEMATIC LITERATURE REVIEW
Although some identified factors may vary from study to research in three contexts, TOE has a strong
theory and consistent support [23]. For example, In [24], they regarded the TOE as the main historical evidence
of e-business diffusion, while in [25] proposed the TOE model to understand the use of RFID by manufacturing
companies that want to increase the visibility and efficiency of the supply chain. SMEs use the green practices
to analyze the drivers that influenced by TOE Framework. In the [26], results have demonstrated that SMEs’
use of Enterprise Adoption (EA) affects technology, organization and environment, concentrated on aspects
that affect SMEs adoption of Customer Relationship Management (CRM) and e-procurement systems. This
Technology organization environment... (Iqbal Ahmed)
720 Ì ISSN: 1693-6930
implies that the TOE model is a powerful tool for foreseeing how SMEs will accept EA. The factors of use of
CRMs in hospitals have been discussed in [27]. The TOE framework was used as a test model by [28], who
carried out a query to investigate electronic commerce factors among mid-to small- scale (small and medium)
926 companies in Vietnam. Mobile corporations have been investigating through TOE conjunction [29].
The TOE framework used to analyze and develop hierarchical dynamics that stimulus the use of cloud
computing in companies [30]. Following an analysis of factors, the most important effects on companies,
the organization, and the environment, have been found in technology. These findings have shown that TOE
is an appropriate framework for research on Information Technology (IT) system adoption. The results of
the study may also allow companies to dedicate resources to develop the successful rates of cloud computing
according to the mass of each factor, with lower costs and higher efficiency. Furthermore, results for cloud
providers can provide information on the needs of customers and offer appropriate operations and marketing
strategies. This defines the three-factor hierarchy that influences cloud computing adoption in companies which
represents in Table 2.
Table 2. Three layer hierarchy factors affecting EA of cloud computing
Technology organization environment (toe)
Technology
Related Improvement
- Cost Advantage
- Efficiency
- Flexibility
- Capacity Management
- Robustness
- Security Concern
Compatibility
- Easy to use
- Usefulness
Organization
Top Management Support
- Vision for Long term
- Commitment of Resources
- Establishing Goal
Organization Readiness
- Financial Readiness
- Technological Infrastructure
Environment
Competitive Pressure
- Industrial Structure Variations
- Relatively Economic Position Increase
- New Business Peer Group
Administration Regulation
- Management Inducement
- Regulation, Strategy
Technology Support Infrastructure
- Access to the Vendor
- Suitable User and Technical Assistance
- Provider Relationship
6. TOE IN CLOUD COMPUTING ADOPTION REVIEW ANALYSIS
Most cloud adoption studies expending the TOE framework define a technological context in terms of
innovative technology features. A brief review of articles using the TOE Framework to understand cloud
adoption described in Table 3. This paper shows how different perspectives can consolidated through an
integrated approach to the understanding of cloud organizations. With four key themes, cloud offerings and
their compatibility with business needs can reviewed by organizations. Consequently, this article affects both
research and practice. Additionally, the quick checklist use to see how the cloud organization’s different
aspects work. Further, this paper can help to understand how different factors affect cloud adoption probabilities
in different SMEs. The following are sample questions designed from the three perspectives, which must
comply with the Technology Organization Environment (TOE) selection when adopting cloud computing.
The designed questionnaires represents in Table 4
The adoption of TOE in cloud computing for 20 SMEs in Bangladesh are analyzed under the three
context (Technical, Organizational and Environmental). All these SMEs are ready to adopt cloud computing
the designed questionnaire of Table 4 has been used to them. The analysis of TOE adoption in cloud computing
for 20 SMEs of Bangladesh are shown in next Figure 3.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
TELKOMNIKA Telecommun Comput El Control Ì 721
Table 3. TOE in Cloud Computing and Review Analysis with four main theme
Papers Domain Method Technology
Context
Organization
Context
Environment
Context
Low, Chen
et al. [31]
Business A framework based sur-
vey collected data from
111 high-tech companies
in Taiwan.
Relative Benefit, Com-
plexity and Compatibility
Support for top
management, firm
size, readiness for
technology
Competitive Pres-
sures and pressure
from trading part-
ners
Nasir and
Niazi [32]
Business Effectiveness of the
CAAM in assessing
readiness of the organiza-
tion to implement cloud
computing is assessed
through 3 case studies
Not Significant Learning Capacity,
IT Capacity of the
organization
Competitive
pressure, Net-
work dominance
expectations
Borgman,
Bahli et al.
[33]
Business In semi-structured inter-
views, this qualitative re-
search project compiled
data in 15 different SMEs
by adopting the theoretical
TOE framework.
Compatibility, Complex-
ity, trail ability, relation
advantage
Innovation and
knowledge prior to
that.
Size, top manage-
ment support, in-
novation, IT expe-
rience prior to im-
plementation
Borgman,
Bahli et al.
[33]
Business Developed an enlarged
TOE framework in a
number of hypotheses
carried out by 24 global
firms in several industries
Compatibility and Rela-
tive Advantage
Top management
assistance, firm size
and business user
IT expertise
Environmental
Competition and
regulation
Lorraine
Morgan
[34]
Business 3 case studies by service
providers and their cus-
tomers in literature will
build on this research,
which does not address the
complex and diverse na-
ture of adoption in existing
cloud technologies
Compatibility and Com-
plexity, relative advantage
and ability to test
IT executives
fear of losing
control of their
IT environment
is necessary for
collaboration and
openness, increased
traceability and
auditability
Risk assessment
and safety and
legal issues
Mathews
Z. Nkhoma
[35]
Business The quantitative approach
for this study is the devel-
opment and validation of a
conceptual theory model
Compatibility, Security,
Reliability and Availabil-
ity, Extension of existing
applications
Lack of compliance
with IT standards
Complexities
in the hidden,
Shared best
practices, Cost
Flexibility, market
adaptability
Amin
Saedi [36]
Business
Technical
The researcher analyzed
the data after gathering the
data from the interview
Relative benefits, Compat-
ibility, Accessibility, Data
Security, Privacy Manage-
ment
Compatibility, ac-
cessibility, privacy
and data security
deficiencies
Savings in costs,
relative benefits,
compatibility,
accessibility, se-
curity and privacy
impairments
Hsu, Ray et
al. [37]
Business They have empirically
tested their research
model with 200 Taiwanese
companies
Benefits received, business
issues
Capacity for IT Not Significant
Technology organization environment... (Iqbal Ahmed)
722 Ì ISSN: 1693-6930
Table 3. TOE in Cloud Computing and Review Analysis with four main theme
Papers Domain Method Technology
Context
Organization
Context
Environment
Context
Ezer Osei
Yeboah-
Boateng
[38]
Business In order to overcome the
sample selection error,
random sampling and
purposeful sampling were
used.
Cloud service testing
capacity, provision of
essential IT infrastructure
and resources, existing
system compatibility,
strength of in-built
safety systems, employee
learning capacity, limited
technological expertise
in similar technologies,
non-performance of cloud
services in support of
operational operations
Top management
support and partici-
pation, resistance to
new technologies,
work, culture and
style conformity,
organizational
structure and size
impacts and an
Initial Industry
Adopters
Providers appro-
priate user and
technical support,
the selection of
qualified and
expert cloud
vendors, market
influence, nature
of industry,
relations be-
tween suppliers,
government and
competitors
Gangwar,
Date et al.
[15]
Business Data was gathered from
280 IT, manufacturing and
finance companies in India
through a questionnaire
Compatibility, Complex-
ity, relative benefit
Preparation, Top
management,
Training and
Education
Support for Com-
petitive pressure
and trade partners
Nedev [39] Business A case study is carried
out from information col-
lected by a large multi-
national company through
interviews with four IT
managers. The results
for the studied popula-
tion can only be gener-
alized by the qualitative
method and comfort sam-
pling technique
A relative benefit, compat-
ibility, redundancy, safety
and performance
Pressure on com-
petitive and busi-
ness partners
Size and techno-
logical prepared-
ness of a company
Table 4. TOE questioner of cloud computing
TOE of cloud adoption
Technology
- Does the cloud support the systems that are complex?
- How does this cloud supplier have safety mechanisms and expertise?
- Could the cloud replicate the security measures?
- Is the cloud capable of interfacing seamlessly with other legacy cloud applications?
Organization
- How well the top managers are aware of the advantages and risks of moving to the cloud?
- How large would the project be depending on the company’s size?
- How well qualified are our IT resources for cloud-based application issues?
- How dramatically the system’s working environment will change for cloud employees?
- Is the cloud-based work environment a new way to do things?
Environment
- How far the cloud-based application has entered the industry?
- Do the cloud already been adopted by important competitors?
- Will pass all regulatory and audit controls in the cloud based system?
- How many cloud-based suppliers have industry expertise and organizational application?
- Do these suppliers have references in the industry or in the specific application?
- A large number of suppliers can be chosen?
- Can cloud vendors replicate or guarantee current terms and conditions?
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
TELKOMNIKA Telecommun Comput El Control Ì 723
Figure 3. Analysis of TOE framework in Bangladesh’s SMEs
7. CONCLUSION
The ultimate objective of this study was to conceptualized the link between the TOE framework and
the decision of organizations (SMEs) to adopt cloud computing and all three factors that are positively linked
to the decision to adopt cloud computing. In addition, the analysis of the review was significant to understand
the factors to adopt cloud computing in TOE framework for many recent days organizations. This paper is not
free of limiting factors, it only looked for academic papers, white papers, magazine articles, other academic
literature databases and papers from forward and backwards searches, whose inclusion would help capture more
cloud adoption problems for different types of organizations. In this study, from application to environment,
various micro as well as macro level aspects considered in the integrated perspective. Finally, the quick
checklist can serve as the roadmap to support organizations/SMEs, using the relevant questions, in exploring
four distinction aspects of cloud acceptance.
REFERENCES
[1] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic “Cloud Computing and emerging IT
platforms: Vision, hype, and reality for delivering computing as the 5th
utility” , Future Generation
Computer Systems 25, no. 6, pp.599-616, 2009.
[2] A. A. Dahiru, Julian M. Bass, and Ian K. Allison, “Cloud Computing: A comparison of adoption issues
between UK and Sub-Saharan Africa SMEs” , In Eur. Mediterr. Middle East. Conf. Information System,
vol. 2014, no. 2010, pp. 1-12, 2014.
[3] D. Benton, “How cloud computing will influence banking strategies in the future” , 2010: 2014. Retrieved
13 March 2019, from https://www.accenture.com/us-en/industries/banking-index.
[4] Misra, Subhas Chandra, and Arka Mondal, ”Identification of a company’s suitability for the adoption of
cloud computing and modelling its corresponding Return on Investment” , Mathematical and Computer
Modelling 53, no. 3-4,pp. 504-521, 2011.
[5] Gary Garrison, Kim Sanghyum, and Robin L. Wakefield, “Success factors for deploying cloud
computing” , Communications of the ACM 55, no. 9, pp. 62-68, 2012.
[6] J. Avrane-Chopard, Th. Bourgault, A. Dubey, and L. Moodley, “Big business in small business: Cloud
Services for SMBs” , RECALL No 25, 2014.
[7] M. Armburst, Armando Fox, Rean Griffith, Anthony D Joseph, R. H. Katz, Andy Konwinski, and Gunho
Lee, “ A view of cloud computing” , Communications of the ACM, vol. 53, 2010.
[8] Thomas Kern, Jeroen Krijger, and Leslie Willcocks, “Exploring ASP as sourcing strategy: theoretical
perspectives, propositions for practice” , The Journal of Strategic Information Systems 11, no. 2, pp.153-
177, 2002.
[9] Sean Marston, Zhi Li, S. Bandyopadhay, Juheng Zhang, and Anand Ghalsasi, “Cloud Computing- The
business prespective” , Decision Support Systems 51, no. 1, pp. 176-189, 2011.
[10] A Lin and N. C. Chen, ”Cloud computing as an innovation: Percepetion, attitude, and adoption”, Inter-
national Journal of Information Management, vol. 6, no. 32, pp. 533-540, 2012.
Technology organization environment... (Iqbal Ahmed)
724 Ì ISSN: 1693-6930
[11] V. H. Jr Carr, “Technology adoption and diffusion” , Technology Center for Interactive Technology, 1999.
[12] R. M. Rajesh Sharma ”A Review of Evolution of Theories and Models of Technology Adoption.” Indore
Management Journal, vol.6, no. 2, 2014.
[13] K. M. Yashpalsinh Jadeja, ”Cloud Computing - Concepts, Architecture and Challenges.” International
Conference on Computing, Electronics and Electrical Technologies, no. 12, 2012.
[14] B. P. Rimal, E. Choi, and Ian Lumb, “A Taxonomy and Survey of Cloud Computing Systems” In the
proceedings of fifth International Joint Conference on INC, IMS and IDC, pp. 44-51, 2009.
[15] H. Gangwar, and et. al, ”Understanding determinants of cloud computing adoption using an integrated
TAM-TOE model”, Journal of Enterprise Information Management, vol. 28, no. 1, pp. 107-130, 2015.
[16] W. Venters and E. A. Whitley, ”A Critical Review of Cloud Computing: Researching Desires and Reali-
ties”, Journal of Information Technology, vol 27,no. 3, pp.179-197, 2012.
[17] L. Morgan, Lero Conboy, and Kieran, ”Factors Affecting The Adoption of Cloud Computing: An Ex-
ploratory Study”, Proceedings of the 21st European Conference on Information Systems, 2013.
[18] E. Hoti, ”The technological, organizational and environmental framework of IS innovation adaption in
small and medium enterprises Evidence from research over the last 10 years”, International Journal of
Business and Management, vol 3, no. 4, pp. 1-14, 2015.
[19] J. Eveland “Technological Innovation as a Process” , 2016.
[20] K. Y. Tam, and P. Y. K. Chau, “Factors Affecting the Adoption of Open Systems: An Exploratory
Study”,Management Information Systems Research Center,vol 21, no.1,pp. 1-24, 2014.
[21] O. Portia, “Barter trading: An empirical investigation of management practices” , African Journal of
Business Management, vol. 5, no. 31, 2011.
[22] A. N. H. Dinna Amelina, Nur Fitriah Ayuning Budi, Puspa Sandhyaduhita, Rifki Shihab, “Investigating
Critical Factors ofSocial CRM Adoption Using Technology, Organization, and Environment (TOE)
Framework and Analytical Hierarchy Process (AHP)” , ICACSIS, 2016.
[23] T. Oliveira, and M. F. Martins, “Literature Review of Information Technology Adoption Models at Firm
Level” , The Electronic Journal Information Systems Evaluation, vol. 14, no. 1, pp. 110-121, 2011.
[24] K. Zhu, and K. L. Kraemer, “Post-Adoption Variations in Usage and Value of E-Business by Organiza-
tions: Cross-Country Evidence from the Retail Industry” , Information Systems Research, vol.16, issue.
1, pp.61-84, 2005.
[25] Y. M. Wang and et al., “Understanding the determinants of RFID adoption in the manufacturing industry”
, Technological Forecasting and Social Change, vol. 77, no. 5, pp. 803-815, 2010.
[26] B. Ramdani, and et al., “SMEs adoption of enterprise applications” , Journal of Small Business and
Enterprise Development, vol. 20, no. 4, pp. 735-753, 2013.
[27] P. Racherla, and C. Hu, “eCRM System Adoption by Hospitality Organizations: A Technology-
Organization-Environment (TOE) Framework”, Journal of Hospitality & Leisure Marketing, vo. 17, no.1-
2, pp. 30-58, 2008.
[28] V.H. Le, F. R Duane Truex, M. Q. Huynh, “An empirical Study of Determinants of E-commerce Adoption
in SMEs in Vietnam an economy in transition” ,Journal of Global Information Management, vol. 20, no.
3, 2012.
[29] San Mart´ın, and et al., “Factors determining firms’ perceived performance of mobile commerce” , Indus-
trial Management & Data Systems, vol. 112, no. 6, pp. 946-963, 2012.
[30] Hsin-Pin Fu, Tsung-Sheng Chang and Li-Chun Liu1, “Factor Analysis on Enterprises Adopting Cloud
Computing” , International Conference on Communications, Information Management and Network Se-
curity, 2016.
[31] C Low, and et al., “Understanding the determinants of cloud computing adoption” , Industrial Manage-
ment & Data Systems, vol.111, no. 7, pp.1006-1023, 2011.
[32] Nasir U, and M. Niazi, “Cloud computing adoption assessment model (CAAM)” , Proceedings of the
12th International Conference on Product Focused Software Development and Process Improvement, vol.
11, pp.34-37, 2011.
[33] H. P. Borgman, and et al., “Cloudrise: Exploring Cloud Computing Adoption and Governance with the
TOE Framework” , 2013 46th Hawaii International Conference on System Sciences, pp. 4425-4435, 2013.
[34] K. C Lorraine Morgan, “Factors Affecting The Adoption Of Cloud Computing: An Exploratory Study” ,
Association for Information Systems AIS Electronic Library, 2013.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
TELKOMNIKA Telecommun Comput El Control Ì 725
[35] Mathews Z. Nkhoma, and Dang D, “Contributing Factors of Cloud Computing Adoption: a Technology-
Organisation-Environment Framework Approach” , International Journal of Information Systems and
Engineering (IJISE), vol.1, no.1, pp.38-49, 2013.
[36] A. Saedi, N. A Iahad, “An integrated theoretical framework for cloud computing adoption by small and
medium-sized enterprises” , Association for Information Systems AIS Electronic Library, PACIS 2013
Proceedings 48, 2013.
[37] P. F. Hsu, and et al. , “Examining cloud computing adoption intention, pricing mechanism, and deploy-
ment model” , International Journal of Information Management, vol. 34, no. 4, pp.474-488, 2014.
[38] E. O Yeboah-Boateng, and K. A Essandoh,“Factors Influencing the Adoption of Cloud Computing by
Small and Medium Enterprises in Developing Economies” , International Journal of Emerging Science
and Engineering, vol. 2, no. 4, pp. 13-20, 2014.
[39] S. Nedev, “Exploring the factors influencing the adoption of Cloud computing and the challenges faced by the
business” , BSc Dissertation, Business and ICT, Sheffield Hallam University, UK, vol, 5, 2014.
BIOGRAPHY OF AUTHOR
Iqbal Ahmed got his Bachelor of Science (BSc) Honors degree in Computer Science and
Engineering from University of Chittagong, Bangladesh in 2007 and achieved joint Master de-
gree from PERCCOM program of European Union in September 2015. He received his Master of
Complex System Engineering degree from University of Lorraine (UL), France then Master in Tech-
nology from Lappeenranta University of Technology (LUT), Finland and Master degree in Pervasive
Computing and Communication for Sustainable development from Lulea University of Technology
(LTU), Sweden. He received his Ph.D. degree from the Department of Information Science, Saga
University, Japan in 2018. He has been working as an Associate Professor in the department of com-
puter science & Engineering in University of Chittagong since August 2018. His current research
interest lies in the field of green and sustainable computing, cloud computing and information pro-
cessing. He has been awarded Cat-A scholarship of Erasmus Mundus from European Union two
times in 2010 and 2013 respectively.
Technology organization environment... (Iqbal Ahmed)

More Related Content

What's hot

Manufacturing
ManufacturingManufacturing
Manufacturing
Viet NguyenHoang
 
Computer integrated manufacturing
Computer  integrated  manufacturingComputer  integrated  manufacturing
Computer integrated manufacturing
GIEDEEAM SOLAR and Gajanana Publications, LIC
 
Network layer and circuit switching
Network layer and circuit switchingNetwork layer and circuit switching
Network layer and circuit switchingasimnawaz54
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance Introduction
Keith Rackley
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
Sukanya Ben
 

What's hot (7)

Manufacturing
ManufacturingManufacturing
Manufacturing
 
Computer integrated manufacturing
Computer  integrated  manufacturingComputer  integrated  manufacturing
Computer integrated manufacturing
 
Network layer and circuit switching
Network layer and circuit switchingNetwork layer and circuit switching
Network layer and circuit switching
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance Introduction
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 

Similar to Technology organization environment framework in cloud computing

MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
csandit
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Hitachi Vantara
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
The Economist Media Businesses
 
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
Amanda Summers
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET Journal
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
Emily Smith
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
International Journal of Science and Research (IJSR)
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
 
The determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabiaThe determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabia
csandit
 
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIATHE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
cscpconf
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
IJMIT JOURNAL
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
csandit
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ijitcs
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
ingenioustech
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
juliennehar
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
KHakash
 

Similar to Technology organization environment framework in cloud computing (20)

MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
 
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
The determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabiaThe determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabia
 
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIATHE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

Technology organization environment framework in cloud computing

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 716∼725 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2.13871 Ì 716 Technology organization environment framework in cloud computing Iqbal Ahmed Department of Computer Science and Engineering, University of Chittagong, Bangladesh Article Info Article history: Received Aug 12, 2019 Revised Jan 2, 2020 Accepted Feb 7, 2020 Keywords: Cloud computing SMEs Technology adoption TOE framework ABSTRACT Cloud Computing is a rapidly emerging technology over the last few years, that has abolished the burden of purchasing heavy hardware and software. Cloud computing has been advantageous to Small and Medium-sized Enterprises (SMEs), though many SMEs have not adopted to delve into its appealing benefits. To increase the cloud adoption rate in these Enterprises, the most important thing is to understand the aspects which influence the cloud adoption. The article focuses on these factors, which influence the use of cloud services by establishing the three layer hierarchical frame- work based on the grounded on the Technology Oriented Environmental (TOE) framework through systematic literature review. Because cloud-based solutions offer numerous benefits for companies, they have precious cloud determinants. This paper therefore took into account the Technology Organization Environment TOE model for Cloud Computing adoption. In addition, the questionaries designed at the end also indicate the significant connection in the decision of adoption between three context of TOE. Moreover, the designed questionaries has been used for the analysis of cloud computing adoption in Bangladeshi SMEs. This is an open access article under the CC BY-SA license. Corresponding Author: Iqbal Ahmed, Department of Computer Science and Engineering, University of Chittagong, Chittagong-4331, Bangladesh, Email: iqbal.ahmed@cu.ac.bd 1. INTRODUCTION Nowadays, cloud computing has been a major agenda in the computing field. Cloud computing is the on-demand delivery of computer system resources as a service over the network [1]. The features of cloud computing, including scalability, flexibility and pay-per-usage model [2] has the potential to influence the various aspects of social and economic activities globally in various types of enterprises. Cloud computing offers enormous benefits to all organizations and enterprises, including SMEs [3]. SMEs are the enterprises in which amount of personnel are less than certain limits, and they are control the data of high sensitivity. Some cases of sensitive data which is controlled by SMEs are: data of intelligence agencies and government federal, financial data of companies, purchase contracts, company databases, de-identified research data, bank associated data like bank accounts, pin, passwords, balances and dealings, trade secrets, email accounts, drug formulas, accounting records and source codes [4]. The adoption of cloud computing is growing rapidly as it allows enterprises to concentrate on their essential business events, and, thus, efficiency is improved [5]. An adequately adopted cloud provides a plenty of benefits to the enterprises such as unlimited computing power, easy access of data and applications, lower IT expenditure, and build up competitive advantage. Recently, Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
  • 2. TELKOMNIKA Telecommun Comput El Control Ì 717 SMEs has shown a great concern in including cloud computing to their overall Information technology (IT) strategies. A recent report by Mckinsey [6] on the adoption rate of cloud service by SMEs informed that, 70% of SMEs have formerly bought at least two cloud service, and 40% have bought six or more cloud services. Nevertheless the touted benefits of cloud computing, its adoption and implementation in SMEs is faced with many challenges including national and international regulations, shortage of industry-specific conformism to principles, security and privacy threats [7-9]. Due to these challenges, some enterprises are quiet anxious around the threats of shifting business-critical applications to the cloud. There is therefore the need to under- stand the factors that can influence their rate of adoption in companies in order to grow in cloud computing. This study will examine the perception of IT professionals as regards cloud services in the context of the Technology Organization Environment (TOE) and IT professionals are concerned about their adoption [10]. Recently, adoption of technology has become the most advanced area for research in Information Systems. Most researchers focused on the new factors that affect technology adoption at both the individual, the organiza- tional levels. Various theories and models established to explain technological adoption, assuming new factors in all practicable areas. These include Reasoned Action Theory (ART), Planned Conduct Theory, Technology Model for Acceptance (TAM), comprehensive TAM, unified technology (UTAUT) and the motivational model, the Theory of Innovation Dissemination, social cognitive theory and Technological Environment Organization (TOE). Much research conducted at the individual level of technology adoption and a few organizational tasks. This study focuses mainly on the organizational framework, such as the Environment Technology Organization (TOE). The context of an organization has a big effect on accepting and carrying out the revolution. TOE is the framework covering three different roots in the perspective of an organization in the decision-making process. Technological, organizational and environmental contexts are these fundamental principles. In this field of technical adoption, it takes an hour to look at future research opportunities. The TOE Framework contributes too many areas by explaining different technological developments, such as e-commerce, business resource planning, green IT Start-Up, cloud computing, Small and medium-sized companies (SMEs), etc. 2. BACKGROUND STUDY 2.1. Technology Adoption Technology adoption for information systems is a mature field of research. In [11]defined technology adoption as the stage in which an individual or an organization will be able to choose a technology for use. The problems relating to technology adoption have gained more prominence in recent days with rapid progress in technology innovations of every imaginable field. Great investment for the introduction of new technologies, made by organizations and governments that can bring a change in the life of users. However, such investments cannot produce results unless the intended users adopt innovations. The evolution of this field of research in information systems must understood and future research opportunities examined [12]. Figure 1. Common Cloud Computing Adoption Models Technology organization environment... (Iqbal Ahmed)
  • 3. 718 Ì ISSN: 1693-6930 2.2. Cloud Computing According to National Standards and Technology Institute (NIST) ”cloud-based computing as a model that provides fast, convenient on-demand network access to an interaction with a shared bundle of computer resources configurable (e.g., networks, Servers, Storage, Applications, Services). It fosters availabilities that are composed of five basic features (self service on-demand, broad network access, pooling of resource sources, rapid elasticity and measured service) three models: (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS). A variety of cloud services have been available over the past several years. The cloud deployment models in particular need to be taken into account for a cloud infrastructure installation organization. Here, one of the four models can be selected. A private cloud provides organizational computing services to members of a single organization. Your cloud system is located in your own data center or via an internet data center, which is rented out and operated on-site or managed on an individual basis by a third party [13]. The community cloud provides computer services to enable collaboration for a mission, security or compliance for a specific purpose. Public clouds may be operated by any public cloud company, such as Amazon, Microsoft and Sales Force [14]. The cloud is not limited to one person or a company. There is a hybrid cloud model running on two or more models [15]. As computer services are required, the market continues to increase for companies that cover latency-free and worldwide safe services [16]. Unbiased, companies have started considering how to use hybrid IT in a complex IT environment by combining IT systems and services? Therefore, companies need a systemic approach to set key cloud computing models and IT network values should help to effectively manage cloud computing systems [17]. 2.3. Adoption Methods and Theories There are a number of technological innovation and technological adoption theories and studies. Various theories and models for clarifying the occurrences of technological adopt hypothesize new factors in all practicable fields [18]. Utmost common theorization is Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), Unified Theory of Acceptance and Use of Technology (UTAUT) and TOE framework (Technology- Organization-Environment). The Figure 1 shows few common cloud computing adoption models and Table 1 presents their brief descriptions. Table 1. Adoption methods and theories Adoption Models Developed By Published Year Used As Diffusion of Innovation (DOI) Everett Roger In 1960 Individually/Organizationally Theory of Reasoned Action (TRA) Fishbein and Ajzen In 1975 Individually Social Cognitive Theory Albert Bandura In 1986 Individually/Organizationally Technology Acceptance Model (TAM) Davis, Bagozzi and Warshaw In 1989 Individually/ Organizationally Technology Organization Environment (TOE) Fleischer and Tornatzky In 1990 Individually/Organizationally Theory of Planned Behavior (TPB) Ajzen In 1991 Individually Motivation Model Davis et al. In 1992 Individually Extended TAM Venkatesh and Davis In 1996 Individually/Organizationally Unified Theory of Acceptance and Use of Technology (UTAUT) Venkatesh and Morris In 2003 Individually/Organizationally 2.4. Technology Organization Environment (TOE) Technological Organizinng Environmental (TOE) framework is proposed to study the use of tecnolog- ical innovations [19]. They maintain that the decision to adopt technological innovation based on environmental and organizational factors and technological characteristics. This framework therefore envisages a three-fold framework for technological innovation assumption and execution: the technical, the structural and the envi- ronmental context. (a) Technological Context The technological background refers to the relevant technologies in the enterprise. This includes existing, company- related tools and emerging technologies. (b) Organizational Context The organizational perspective describes the organizational characteristics. Joint organizational characteristics include corporate size, centralizing degree, formality, management structure complexity, Quality of its human resources and domestic slack resources [20]. Organizational characteristics may also reduce or make it possible for technological innovations to be adopted and implemented. TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
  • 4. TELKOMNIKA Telecommun Comput El Control Ì 719 (c) Environmental Context The environment is the space where an organization carries out its activities. This includes occupational associates, participants and the administration [21]. It is outside of an organization, which has restrictions and prospects on high-tech revolution. This makes the TOE structure widely applicable in various disciplines, because researchers can choose each dimension based on innovation and organizational characteristics such as the work of [22]. In contrast to certain theories or models in the study of Information Systems, the TOE Framework is a generic theory which only mentions several aspects of adoption, without stating the factors of each dimension. 3. THE PROBLEM STATEMENT There is plenty of study at the individual level of technology adoption and a few organizational activ- ities. The purpose of this paper is to conduct a collected , systematic review analysis to classify critical aspects of information technology adoption in cloud computing organizations under the roof TOE framework. 4. RESEARCH AND REVIEW ANALYSIS METHOD Followed by the methodology of systematic literature review, research documents with proper key- words and buzzwords are downloaded from various authentic sources. The following electronic databases were retrieved for the literature search, chosen due to their content being related to the discipline: Google Scholar, academic databases including IEEEXplore, Springer Link, ScienceDirect, ACM Digital Library, Elsevier etc. The next Figure 2 gives the idea of systematic review process. Figure 2. The Systematic Literature Review Process This paper examined what most of the researchers in this field were focusing on. In the initial search, the paper focused on keywords like model of technology adoption, theories and model of adoption in SMEs etc. Hottest documents have again searched online to contain any missing documents, which have been left out due to new keywords. Since we wanted to look over the years and not apply these theories and models, we have collected papers that provide a general overview of some of the main theories evolved over the years. Seminar and Conference papers on these theories have been downloaded and thoroughly studied to understand the TOE in the domain of Cloud Computing. 5. SYSTEMATIC LITERATURE REVIEW Although some identified factors may vary from study to research in three contexts, TOE has a strong theory and consistent support [23]. For example, In [24], they regarded the TOE as the main historical evidence of e-business diffusion, while in [25] proposed the TOE model to understand the use of RFID by manufacturing companies that want to increase the visibility and efficiency of the supply chain. SMEs use the green practices to analyze the drivers that influenced by TOE Framework. In the [26], results have demonstrated that SMEs’ use of Enterprise Adoption (EA) affects technology, organization and environment, concentrated on aspects that affect SMEs adoption of Customer Relationship Management (CRM) and e-procurement systems. This Technology organization environment... (Iqbal Ahmed)
  • 5. 720 Ì ISSN: 1693-6930 implies that the TOE model is a powerful tool for foreseeing how SMEs will accept EA. The factors of use of CRMs in hospitals have been discussed in [27]. The TOE framework was used as a test model by [28], who carried out a query to investigate electronic commerce factors among mid-to small- scale (small and medium) 926 companies in Vietnam. Mobile corporations have been investigating through TOE conjunction [29]. The TOE framework used to analyze and develop hierarchical dynamics that stimulus the use of cloud computing in companies [30]. Following an analysis of factors, the most important effects on companies, the organization, and the environment, have been found in technology. These findings have shown that TOE is an appropriate framework for research on Information Technology (IT) system adoption. The results of the study may also allow companies to dedicate resources to develop the successful rates of cloud computing according to the mass of each factor, with lower costs and higher efficiency. Furthermore, results for cloud providers can provide information on the needs of customers and offer appropriate operations and marketing strategies. This defines the three-factor hierarchy that influences cloud computing adoption in companies which represents in Table 2. Table 2. Three layer hierarchy factors affecting EA of cloud computing Technology organization environment (toe) Technology Related Improvement - Cost Advantage - Efficiency - Flexibility - Capacity Management - Robustness - Security Concern Compatibility - Easy to use - Usefulness Organization Top Management Support - Vision for Long term - Commitment of Resources - Establishing Goal Organization Readiness - Financial Readiness - Technological Infrastructure Environment Competitive Pressure - Industrial Structure Variations - Relatively Economic Position Increase - New Business Peer Group Administration Regulation - Management Inducement - Regulation, Strategy Technology Support Infrastructure - Access to the Vendor - Suitable User and Technical Assistance - Provider Relationship 6. TOE IN CLOUD COMPUTING ADOPTION REVIEW ANALYSIS Most cloud adoption studies expending the TOE framework define a technological context in terms of innovative technology features. A brief review of articles using the TOE Framework to understand cloud adoption described in Table 3. This paper shows how different perspectives can consolidated through an integrated approach to the understanding of cloud organizations. With four key themes, cloud offerings and their compatibility with business needs can reviewed by organizations. Consequently, this article affects both research and practice. Additionally, the quick checklist use to see how the cloud organization’s different aspects work. Further, this paper can help to understand how different factors affect cloud adoption probabilities in different SMEs. The following are sample questions designed from the three perspectives, which must comply with the Technology Organization Environment (TOE) selection when adopting cloud computing. The designed questionnaires represents in Table 4 The adoption of TOE in cloud computing for 20 SMEs in Bangladesh are analyzed under the three context (Technical, Organizational and Environmental). All these SMEs are ready to adopt cloud computing the designed questionnaire of Table 4 has been used to them. The analysis of TOE adoption in cloud computing for 20 SMEs of Bangladesh are shown in next Figure 3. TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
  • 6. TELKOMNIKA Telecommun Comput El Control Ì 721 Table 3. TOE in Cloud Computing and Review Analysis with four main theme Papers Domain Method Technology Context Organization Context Environment Context Low, Chen et al. [31] Business A framework based sur- vey collected data from 111 high-tech companies in Taiwan. Relative Benefit, Com- plexity and Compatibility Support for top management, firm size, readiness for technology Competitive Pres- sures and pressure from trading part- ners Nasir and Niazi [32] Business Effectiveness of the CAAM in assessing readiness of the organiza- tion to implement cloud computing is assessed through 3 case studies Not Significant Learning Capacity, IT Capacity of the organization Competitive pressure, Net- work dominance expectations Borgman, Bahli et al. [33] Business In semi-structured inter- views, this qualitative re- search project compiled data in 15 different SMEs by adopting the theoretical TOE framework. Compatibility, Complex- ity, trail ability, relation advantage Innovation and knowledge prior to that. Size, top manage- ment support, in- novation, IT expe- rience prior to im- plementation Borgman, Bahli et al. [33] Business Developed an enlarged TOE framework in a number of hypotheses carried out by 24 global firms in several industries Compatibility and Rela- tive Advantage Top management assistance, firm size and business user IT expertise Environmental Competition and regulation Lorraine Morgan [34] Business 3 case studies by service providers and their cus- tomers in literature will build on this research, which does not address the complex and diverse na- ture of adoption in existing cloud technologies Compatibility and Com- plexity, relative advantage and ability to test IT executives fear of losing control of their IT environment is necessary for collaboration and openness, increased traceability and auditability Risk assessment and safety and legal issues Mathews Z. Nkhoma [35] Business The quantitative approach for this study is the devel- opment and validation of a conceptual theory model Compatibility, Security, Reliability and Availabil- ity, Extension of existing applications Lack of compliance with IT standards Complexities in the hidden, Shared best practices, Cost Flexibility, market adaptability Amin Saedi [36] Business Technical The researcher analyzed the data after gathering the data from the interview Relative benefits, Compat- ibility, Accessibility, Data Security, Privacy Manage- ment Compatibility, ac- cessibility, privacy and data security deficiencies Savings in costs, relative benefits, compatibility, accessibility, se- curity and privacy impairments Hsu, Ray et al. [37] Business They have empirically tested their research model with 200 Taiwanese companies Benefits received, business issues Capacity for IT Not Significant Technology organization environment... (Iqbal Ahmed)
  • 7. 722 Ì ISSN: 1693-6930 Table 3. TOE in Cloud Computing and Review Analysis with four main theme Papers Domain Method Technology Context Organization Context Environment Context Ezer Osei Yeboah- Boateng [38] Business In order to overcome the sample selection error, random sampling and purposeful sampling were used. Cloud service testing capacity, provision of essential IT infrastructure and resources, existing system compatibility, strength of in-built safety systems, employee learning capacity, limited technological expertise in similar technologies, non-performance of cloud services in support of operational operations Top management support and partici- pation, resistance to new technologies, work, culture and style conformity, organizational structure and size impacts and an Initial Industry Adopters Providers appro- priate user and technical support, the selection of qualified and expert cloud vendors, market influence, nature of industry, relations be- tween suppliers, government and competitors Gangwar, Date et al. [15] Business Data was gathered from 280 IT, manufacturing and finance companies in India through a questionnaire Compatibility, Complex- ity, relative benefit Preparation, Top management, Training and Education Support for Com- petitive pressure and trade partners Nedev [39] Business A case study is carried out from information col- lected by a large multi- national company through interviews with four IT managers. The results for the studied popula- tion can only be gener- alized by the qualitative method and comfort sam- pling technique A relative benefit, compat- ibility, redundancy, safety and performance Pressure on com- petitive and busi- ness partners Size and techno- logical prepared- ness of a company Table 4. TOE questioner of cloud computing TOE of cloud adoption Technology - Does the cloud support the systems that are complex? - How does this cloud supplier have safety mechanisms and expertise? - Could the cloud replicate the security measures? - Is the cloud capable of interfacing seamlessly with other legacy cloud applications? Organization - How well the top managers are aware of the advantages and risks of moving to the cloud? - How large would the project be depending on the company’s size? - How well qualified are our IT resources for cloud-based application issues? - How dramatically the system’s working environment will change for cloud employees? - Is the cloud-based work environment a new way to do things? Environment - How far the cloud-based application has entered the industry? - Do the cloud already been adopted by important competitors? - Will pass all regulatory and audit controls in the cloud based system? - How many cloud-based suppliers have industry expertise and organizational application? - Do these suppliers have references in the industry or in the specific application? - A large number of suppliers can be chosen? - Can cloud vendors replicate or guarantee current terms and conditions? TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
  • 8. TELKOMNIKA Telecommun Comput El Control Ì 723 Figure 3. Analysis of TOE framework in Bangladesh’s SMEs 7. CONCLUSION The ultimate objective of this study was to conceptualized the link between the TOE framework and the decision of organizations (SMEs) to adopt cloud computing and all three factors that are positively linked to the decision to adopt cloud computing. In addition, the analysis of the review was significant to understand the factors to adopt cloud computing in TOE framework for many recent days organizations. This paper is not free of limiting factors, it only looked for academic papers, white papers, magazine articles, other academic literature databases and papers from forward and backwards searches, whose inclusion would help capture more cloud adoption problems for different types of organizations. In this study, from application to environment, various micro as well as macro level aspects considered in the integrated perspective. Finally, the quick checklist can serve as the roadmap to support organizations/SMEs, using the relevant questions, in exploring four distinction aspects of cloud acceptance. REFERENCES [1] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic “Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility” , Future Generation Computer Systems 25, no. 6, pp.599-616, 2009. [2] A. A. Dahiru, Julian M. Bass, and Ian K. Allison, “Cloud Computing: A comparison of adoption issues between UK and Sub-Saharan Africa SMEs” , In Eur. Mediterr. Middle East. Conf. Information System, vol. 2014, no. 2010, pp. 1-12, 2014. [3] D. Benton, “How cloud computing will influence banking strategies in the future” , 2010: 2014. Retrieved 13 March 2019, from https://www.accenture.com/us-en/industries/banking-index. [4] Misra, Subhas Chandra, and Arka Mondal, ”Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment” , Mathematical and Computer Modelling 53, no. 3-4,pp. 504-521, 2011. [5] Gary Garrison, Kim Sanghyum, and Robin L. Wakefield, “Success factors for deploying cloud computing” , Communications of the ACM 55, no. 9, pp. 62-68, 2012. [6] J. Avrane-Chopard, Th. Bourgault, A. Dubey, and L. Moodley, “Big business in small business: Cloud Services for SMBs” , RECALL No 25, 2014. [7] M. Armburst, Armando Fox, Rean Griffith, Anthony D Joseph, R. H. Katz, Andy Konwinski, and Gunho Lee, “ A view of cloud computing” , Communications of the ACM, vol. 53, 2010. [8] Thomas Kern, Jeroen Krijger, and Leslie Willcocks, “Exploring ASP as sourcing strategy: theoretical perspectives, propositions for practice” , The Journal of Strategic Information Systems 11, no. 2, pp.153- 177, 2002. [9] Sean Marston, Zhi Li, S. Bandyopadhay, Juheng Zhang, and Anand Ghalsasi, “Cloud Computing- The business prespective” , Decision Support Systems 51, no. 1, pp. 176-189, 2011. [10] A Lin and N. C. Chen, ”Cloud computing as an innovation: Percepetion, attitude, and adoption”, Inter- national Journal of Information Management, vol. 6, no. 32, pp. 533-540, 2012. Technology organization environment... (Iqbal Ahmed)
  • 9. 724 Ì ISSN: 1693-6930 [11] V. H. Jr Carr, “Technology adoption and diffusion” , Technology Center for Interactive Technology, 1999. [12] R. M. Rajesh Sharma ”A Review of Evolution of Theories and Models of Technology Adoption.” Indore Management Journal, vol.6, no. 2, 2014. [13] K. M. Yashpalsinh Jadeja, ”Cloud Computing - Concepts, Architecture and Challenges.” International Conference on Computing, Electronics and Electrical Technologies, no. 12, 2012. [14] B. P. Rimal, E. Choi, and Ian Lumb, “A Taxonomy and Survey of Cloud Computing Systems” In the proceedings of fifth International Joint Conference on INC, IMS and IDC, pp. 44-51, 2009. [15] H. Gangwar, and et. al, ”Understanding determinants of cloud computing adoption using an integrated TAM-TOE model”, Journal of Enterprise Information Management, vol. 28, no. 1, pp. 107-130, 2015. [16] W. Venters and E. A. Whitley, ”A Critical Review of Cloud Computing: Researching Desires and Reali- ties”, Journal of Information Technology, vol 27,no. 3, pp.179-197, 2012. [17] L. Morgan, Lero Conboy, and Kieran, ”Factors Affecting The Adoption of Cloud Computing: An Ex- ploratory Study”, Proceedings of the 21st European Conference on Information Systems, 2013. [18] E. Hoti, ”The technological, organizational and environmental framework of IS innovation adaption in small and medium enterprises Evidence from research over the last 10 years”, International Journal of Business and Management, vol 3, no. 4, pp. 1-14, 2015. [19] J. Eveland “Technological Innovation as a Process” , 2016. [20] K. Y. Tam, and P. Y. K. Chau, “Factors Affecting the Adoption of Open Systems: An Exploratory Study”,Management Information Systems Research Center,vol 21, no.1,pp. 1-24, 2014. [21] O. Portia, “Barter trading: An empirical investigation of management practices” , African Journal of Business Management, vol. 5, no. 31, 2011. [22] A. N. H. Dinna Amelina, Nur Fitriah Ayuning Budi, Puspa Sandhyaduhita, Rifki Shihab, “Investigating Critical Factors ofSocial CRM Adoption Using Technology, Organization, and Environment (TOE) Framework and Analytical Hierarchy Process (AHP)” , ICACSIS, 2016. [23] T. Oliveira, and M. F. Martins, “Literature Review of Information Technology Adoption Models at Firm Level” , The Electronic Journal Information Systems Evaluation, vol. 14, no. 1, pp. 110-121, 2011. [24] K. Zhu, and K. L. Kraemer, “Post-Adoption Variations in Usage and Value of E-Business by Organiza- tions: Cross-Country Evidence from the Retail Industry” , Information Systems Research, vol.16, issue. 1, pp.61-84, 2005. [25] Y. M. Wang and et al., “Understanding the determinants of RFID adoption in the manufacturing industry” , Technological Forecasting and Social Change, vol. 77, no. 5, pp. 803-815, 2010. [26] B. Ramdani, and et al., “SMEs adoption of enterprise applications” , Journal of Small Business and Enterprise Development, vol. 20, no. 4, pp. 735-753, 2013. [27] P. Racherla, and C. Hu, “eCRM System Adoption by Hospitality Organizations: A Technology- Organization-Environment (TOE) Framework”, Journal of Hospitality & Leisure Marketing, vo. 17, no.1- 2, pp. 30-58, 2008. [28] V.H. Le, F. R Duane Truex, M. Q. Huynh, “An empirical Study of Determinants of E-commerce Adoption in SMEs in Vietnam an economy in transition” ,Journal of Global Information Management, vol. 20, no. 3, 2012. [29] San Mart´ın, and et al., “Factors determining firms’ perceived performance of mobile commerce” , Indus- trial Management & Data Systems, vol. 112, no. 6, pp. 946-963, 2012. [30] Hsin-Pin Fu, Tsung-Sheng Chang and Li-Chun Liu1, “Factor Analysis on Enterprises Adopting Cloud Computing” , International Conference on Communications, Information Management and Network Se- curity, 2016. [31] C Low, and et al., “Understanding the determinants of cloud computing adoption” , Industrial Manage- ment & Data Systems, vol.111, no. 7, pp.1006-1023, 2011. [32] Nasir U, and M. Niazi, “Cloud computing adoption assessment model (CAAM)” , Proceedings of the 12th International Conference on Product Focused Software Development and Process Improvement, vol. 11, pp.34-37, 2011. [33] H. P. Borgman, and et al., “Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework” , 2013 46th Hawaii International Conference on System Sciences, pp. 4425-4435, 2013. [34] K. C Lorraine Morgan, “Factors Affecting The Adoption Of Cloud Computing: An Exploratory Study” , Association for Information Systems AIS Electronic Library, 2013. TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
  • 10. TELKOMNIKA Telecommun Comput El Control Ì 725 [35] Mathews Z. Nkhoma, and Dang D, “Contributing Factors of Cloud Computing Adoption: a Technology- Organisation-Environment Framework Approach” , International Journal of Information Systems and Engineering (IJISE), vol.1, no.1, pp.38-49, 2013. [36] A. Saedi, N. A Iahad, “An integrated theoretical framework for cloud computing adoption by small and medium-sized enterprises” , Association for Information Systems AIS Electronic Library, PACIS 2013 Proceedings 48, 2013. [37] P. F. Hsu, and et al. , “Examining cloud computing adoption intention, pricing mechanism, and deploy- ment model” , International Journal of Information Management, vol. 34, no. 4, pp.474-488, 2014. [38] E. O Yeboah-Boateng, and K. A Essandoh,“Factors Influencing the Adoption of Cloud Computing by Small and Medium Enterprises in Developing Economies” , International Journal of Emerging Science and Engineering, vol. 2, no. 4, pp. 13-20, 2014. [39] S. Nedev, “Exploring the factors influencing the adoption of Cloud computing and the challenges faced by the business” , BSc Dissertation, Business and ICT, Sheffield Hallam University, UK, vol, 5, 2014. BIOGRAPHY OF AUTHOR Iqbal Ahmed got his Bachelor of Science (BSc) Honors degree in Computer Science and Engineering from University of Chittagong, Bangladesh in 2007 and achieved joint Master de- gree from PERCCOM program of European Union in September 2015. He received his Master of Complex System Engineering degree from University of Lorraine (UL), France then Master in Tech- nology from Lappeenranta University of Technology (LUT), Finland and Master degree in Pervasive Computing and Communication for Sustainable development from Lulea University of Technology (LTU), Sweden. He received his Ph.D. degree from the Department of Information Science, Saga University, Japan in 2018. He has been working as an Associate Professor in the department of com- puter science & Engineering in University of Chittagong since August 2018. His current research interest lies in the field of green and sustainable computing, cloud computing and information pro- cessing. He has been awarded Cat-A scholarship of Erasmus Mundus from European Union two times in 2010 and 2013 respectively. Technology organization environment... (Iqbal Ahmed)