Advertisement

Make or Buy? Factors that Impact the Adoption of Cloud Computing on the Content Level

  • Ivo Gonzenbach
  • Christian Russ
  • Jan vom BrockeEmail author
Chapter
Part of the Progress in IS book series (PROIS)

Abstract

The emergence of cloud computing has led enterprises to rethink fundamentally how they organize their content assets. In particular, IT managers are challenged to decide what content should be managed in the cloud and what should not. Grounded in the IS literature on IT outsourcing, this chapter presents a set of criteria that organizations can consider when making this decision. Because it is a make-or-buy decision, transaction cost theory (TCT) was used as a theoretical lens for the study. Accordingly, the chapter suggests specificity (e.g., degree of standardization of content management), frequency (e.g., frequency of usage), and uncertainty (e.g., legal situation) to impact the cloud computing decision.

Keywords

Transaction Cost Cloud Computing Cloud Service Public Cloud Cloud Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Accenture. (2009). Accenture cloud computing accelerator. Retrieved November 9, 2010, from http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Technology_Labs_Cloud_Computing_Accelerator.pdf
  2. Ang, S., & Cummings, L. L. (1997). Strategic response to institutional influences on information systems outsourcing. Organization Science, 8(3), 235–256.CrossRefGoogle Scholar
  3. Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R., Joseph, A. D., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRefGoogle Scholar
  4. Artz, K. W., & Brush, T. H. (2000). Asset specificity, uncertainty and relational norms: An examination of coordination costs in collaborative strategic alliances. Journal of Economic Behavior & Organization, 41(4), 337–362.CrossRefGoogle Scholar
  5. Aubert, B. A., Rivard, S., & Pandey, S. (2004). A transaction cost model of IT outsourcing. Information & Management, 41(7), 921–932.CrossRefGoogle Scholar
  6. Bardhan, I. R., Demirkan, H., Kannan, P. K., Kauffman, R. J., & Sougstad, R. (2010). An interdisciplinary perspective on IT services management and service science. Journal of Management Information Systems, 26(4), 13–64.CrossRefGoogle Scholar
  7. Benlian, A. (2009). A transaction cost theoretical analysis of software-as-a-service (SaaS)-based sourcing in SMBs and enterprises. In Proceedings of the European Conference on Information Systems. Verona.Google Scholar
  8. Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications. Dalian.Google Scholar
  9. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.CrossRefGoogle Scholar
  10. Chen, Y., Paxon, V., & Katz, R. (2010). What’s new about cloud computing security? EECS Department, University of California, Berkeley, CA. Retrieved October 11, 2010, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
  11. Choudhary, V. (2007). Comparison of software quality under perpetual licensing and software as a service. Journal of Management Information Systems, 24(2), 141–165.CrossRefGoogle Scholar
  12. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., et al. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, IL.Google Scholar
  13. Clarke, R. (2010). Computing clouds on the horizon? Benefits and risks from the user’s perspective. In Proceedings of the 23rd Bled eConference. Bled.Google Scholar
  14. Coase, R. H. (1937). The nature of the firm. Economica, 4(16), 386–405.CrossRefGoogle Scholar
  15. Demirkan, H., Cheng, H. K., & Bandyopadhyay, S. (2010). Coordination strategies in an SaaS supply chain. Journal of Management Information Systems, 26(4), 119–143.CrossRefGoogle Scholar
  16. Dibbern, J. (2004). Sourcing of application software services. Empirical evidence of cultural, industry and functional differences. Heidelberg: Physica-Verlag.CrossRefGoogle Scholar
  17. Dibbern, J., Chin, W. W., & Heinzl, A. (2005). The impact of human asset specificity on the sourcing of application services. In Proceedings of the 13th European Conference on Information Systems. Regensburg.Google Scholar
  18. Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information systems outsourcing: A survey and analysis of the literature. The DATA BASE for Advances in Information Systems, 35(4), 6–102.CrossRefGoogle Scholar
  19. ENISA. (2009). Cloud computing: Benefits, risks and recommendations for information security. Retrieved March 28, 2013, from http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport
  20. Fehling, C., Leymann, F., & Mietzner, R. (2010). A framework for optimized distribution of tenants in cloud applications. In Proceedings of the 3rd IEEE Conference on Cloud Computing. Athens.Google Scholar
  21. Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Proceedings of the Grid Computing Environments Workshop. Google Scholar
  22. Gantz, J., & Reinsel, D. (2012). The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. Retrieved March 13, 2013, from http://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf
  23. Gartner. (2010). 2010 Emerging technologies hype cycle is here. Retrieved March 28, 2013, from http://blogs.gartner.com/hypecyclebook/2010/09/07/2010-emerging-technologies-hype-cycle-is-here/
  24. Gartner. (2012). Gartner says worldwide cloud services market to surpass $109 billion in 2012. Retrieved February 5, 2013, from http://www.gartner.com/newsroom/id/2163616
  25. Geyskens, I., Steenkamp, J.-B., & Kumar, N. (2006). Make, buy, or ally: A transaction cost theory meta-analysis. Academy of Management Journal, 49(3), 519–543.CrossRefGoogle Scholar
  26. Hancox, M., & Hackney, R. (2000). IT outsourcing framework for conceptualizing practice and perception. Information Systems Journal, 10(3), 217–237.CrossRefGoogle Scholar
  27. IBM. (2010). Defining a framework for cloud adoption. Retrieved November 8, 2010, from ftp://public.dhe.ibm.com/common/ssi/ecm/en/ciw03067usen/CIW03067USEN.PDF
  28. Jaeger, P., Lin, J., & Grimes, J. (2009). Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing. First Monday, 14(5).Google Scholar
  29. Jenkins, T. (2010). Managing content in the cloud. Waterloo: OpenText Corperation.Google Scholar
  30. Joint, A., Baker, E., & Eccles, E. (2009). Hey, you, get off of that cloud? Computer Law and Security Review, 25(3), 270–274.CrossRefGoogle Scholar
  31. Khajeh-Hosseini, A., Greenwood, D., Smith, J. W., & Sommerville, I. (2010a). The cloud adoption toolkit: Addressing the challenges of cloud adoption in the enterprise. Retrieved November 3, 2010, from http://arxiv.org/ftp/arxiv/papers/1003/1003.3866.pdf
  32. Khajeh-Hosseini, A., Sommerville, I., & Sriram, I. (2010b). Research challenges for enterprise cloud computing. Retrieved March 28, 2013, from http://arxiv.org/ftp/arxiv/papers/1001/1001.3257.pdf
  33. Koehler, P., Anandasivam, A., & Dan, M. (2010). Cloud services from a consumer perspective. In Proceedings of the 16th Americas Conference on Information Systems. Lima.Google Scholar
  34. Kondo, D., Javid, B., Malecot, P., Capello, F., & Anderson, D. P. (2009). Cost-benefit analysis of cloud computing versus desktop grids. In Proceedings of the 18th International Heterogeneity in Computing Workshop, 2009 IEEE International Symposium on Parallel and Distributed Processing. Rome.Google Scholar
  35. Lacity, M. C., & Hirschheim, R. (1993). Information systems outsourcing: Myths, metaphors and realities. Chichester: Wiley.Google Scholar
  36. Lacity, M. C., Khan, S. A., & Willcocks, L. P. (2009). A review of the IT outsourcing literature: Insights for practice. The Journal of Strategic Information Systems, 18(3), 130–146.CrossRefGoogle Scholar
  37. Lacity, M. C., & Willcocks, L. P. (1995). Interpreting information technology sourcing decisions from a transaction cost perspective: Findings and critique. Accounting, Management and Information Technologies, 5(3–4), 203–244.CrossRefGoogle Scholar
  38. Lacity, M. C., & Willcocks, L. P. (2001). Global information technology outsourcing: In search of business advantage. Chichester: Wiley.Google Scholar
  39. Ma, Q., Pearson, J. M., & Tadisina, S. (2005). An exploratory study into factors of service quality for application service providers. Information & Management, 42(8), 1067–1080.CrossRefGoogle Scholar
  40. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing: Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, US Department of Commerce. Retrieved March 28, 2013, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
  41. Nam, K., Rajagopalan, S., Rao, H. R., & Chaudhury, A. (1996). A two-level investigation of information systems outsourcing. Communications of the ACM, 39(7), 37–44.CrossRefGoogle Scholar
  42. Ngwenyama, O. K., & Bryson, N. (1999). Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems. European Journal of Operational Research, 115(2), 351–367.CrossRefGoogle Scholar
  43. O’Callaghan, R., & Smits, M. (2005). A strategy development process for enterprise content management. In Proceedings of the 13th European Conference on Information Systems. Regensburg.Google Scholar
  44. Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245–253.CrossRefGoogle Scholar
  45. Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing. Vancouver.Google Scholar
  46. Pinto, M. B., Pinto, J. K., & Prescott, J. E. (1993). Antecedents and consequences of project team cross-functional cooperation. Management Science, 39(10), 1281–1297.CrossRefGoogle Scholar
  47. Poppo, L., & Zenger, T. (1998). Testing alternative theories of the firm: Transaction cost, knowledge-based, and measurement explanations for make-or-buy decisions in information services. Strategic Management Journal, 19, 853–877.CrossRefGoogle Scholar
  48. Quinn, J. B., & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 35(4), 43–55.Google Scholar
  49. Rindfleisch, A., & Heide, J. B. (1997). Transaction cost analysis: Past, present, and future applications. Journal of Marketing, 61(4), 30–54.CrossRefGoogle Scholar
  50. Sambamurthy, V., & Zmud, R. W. (1999). Arrangements for information technology governance: A theory of multiple contingencies. MIS Quarterly, 23(2), 261–290.CrossRefGoogle Scholar
  51. Schwarz, A., Hirschheim, R., Jayatilaka, B., & Goles, T. (2009). A conjoint approach to understanding IT application services outsourcing. Journal of the Association for Information Systems, 10(10), 748–781.Google Scholar
  52. Smith, M. A., & Kumar, R. L. (2004). A theory of application service provider (ASP) use from a client perspective. Information & Management, 41(8), 977–1002.CrossRefGoogle Scholar
  53. Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. Retrieved March 28, 2013, from http://arxiv.org/abs/1001.3259
  54. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.CrossRefGoogle Scholar
  55. Susarla, A., Barua, A., & Whinston, A. B. (2009). A transaction cost perspective of the “software as a service” business model. Journal of Management Information Systems, 26(2), 205–240.CrossRefGoogle Scholar
  56. Susarla, A., Barua, A., & Whinston, A. B. (2010). Multitask agency, modular architecture, and task disaggregation in SaaS. Journal of Management Information Systems, 26(4), 87–118.CrossRefGoogle Scholar
  57. Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing. Computer Law and Security Review, 26(4), 391–397.CrossRefGoogle Scholar
  58. Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009). A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55.CrossRefGoogle Scholar
  59. Wang, E. T. G. (2002). Transaction attributes and software outsourcing success: An empirical investigation of transaction cost theory. Information Systems Journal, 12(2), 153–181.CrossRefGoogle Scholar
  60. Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16–25.CrossRefGoogle Scholar
  61. Westner, M. K., & Strahringer, S. (2008). Evaluation criteria for selecting offshoring candidates: An analysis of practices in german businesses. Journal of Information Technology Management, 19(4), 16–34.Google Scholar
  62. Williamson, O. E. (1975). Markets and hierarchies: Analysis and antitrust implications. New York: The Free Press.Google Scholar
  63. Williamson, O. E. (1979). Transaction-cost economics: The governance of contractual relations. Journal of Law and Economics, 22(2), 233–261.CrossRefGoogle Scholar
  64. Williamson, O. E. (1981). The modern corporation: Origins, evolution, attributes. Journal of Economic Literature, 19(4), 1537–1568.Google Scholar
  65. Williamson, O. E. (1985). The economic institutions of capitalism: Firms, markets, relational contracting. New York: The Free Press.Google Scholar
  66. Williamson, O. E. (1989). Transaction cost economics. In R. Schmalensee & R. Willing (Eds.), Handbook of industrial organization (pp. 136–182). Amsterdam: Elsevier Science.Google Scholar
  67. Youseff, L., Butrico, M., & Da Silva, D. (2008). Toward a unified ontology of cloud computing. In Proceedings of the Grid Computing Environments Workshop. Retrieved March 30, 2013, from http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntologyPres.pdf
  68. Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Ivo Gonzenbach
    • 1
  • Christian Russ
    • 2
  • Jan vom Brocke
    • 3
    Email author
  1. 1.Steffen Informatik AGGallenSwitzerland
  2. 2.Corporate ITSoftwareONE AGWallisellenSwitzerland
  3. 3.Institute of Information SystemsUniversity of LiechtensteinVaduzLiechtenstein

Personalised recommendations