Understanding the Complex Adoption Behavior of Cloud Services by SMEs Based on Complexity Theory: A Fuzzy Sets Qualitative Comparative Analysis

Complexity 2021:1-17 (2021)
  Copy   BIBTEX

Abstract

To survive in a competitive environment, small and medium enterprises have had to adapt to the digital environment in order to adjust to customer needs globally, particularly in the post-COVID-19 world. The advantages of cloud computing provide opportunities for SMEs with a restricted budget and limited resources. To understand how SMEs adopt cloud computing in a complex digital environment, this study examines how antecedents combine with each other to explain the high adoption of cloud computing. From the perspectives of holism and set theory, we draw on complexity and configuration theories, present a conceptual model including seven antecedents based on the technology-organization-environment framework, and conduct an asymmetric fuzzy-set qualitative comparative analysis. Through an empirical study with 123 Chinese companies, we identify nine combinations of determinant antecedents that lead to the high adoption of cloud computing. The results show that none of the factors are indispensable to explain a high adoption on their own; instead, they are insufficient but necessary parts of the causal combinations that explain a high adoption. This study contributes to the literature on cloud computing adoption by extending current knowledge on how antecedents combine to increase the adoption and identify specific patterns of SMEs for whom these factors are essential and greatly influence their adoption.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.

Analytics

Added to PP
2021-04-03

Downloads
4 (#1,595,600)

6 months
2 (#1,232,442)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references