An investigation of influential factors in adopting the cloud computing in Saudi Arabia: an application of technology acceptance model


  • Shayem ALresheedi
  • Songfeng Lu
  • Ismail Yaqub. Maolood
  • Abdulaziz Abdulwahab Fatanid
  • Mahmut Ince



Cloud computing is an emerging concept in the technological sphere. Its development enables many applications to avail information online and on demand. It is becoming an essential element for businesses due to its ability to diminish the costs of IT infrastructure and is being adopted in Saudi Arabia. However, there exist many factors that affect its adoption. Several researchers in the field have ignored the study of the TAM model for identifying the relevant factors and their impact for adopting of cloud computing.


[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., “A view of cloud computing,†Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

[2] P. Mell, T. Grance et al., “The NIST definition of cloud computing,†2011.

[3] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,†Future Generation computer systems, vol. 25, no. 6, pp. 599–616, 2009.

[4] M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, “Cloud computing: Distributed internet computing for it and scientific research,†IEEE Internet computing, vol. 13, no. 5, 2009.

[5] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “The eucalyptus open-source cloud-computing system,†in Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE Computer Society, 2009, pp. 124–131.

[6] N. Sultan, “Cloud computing for education: A new dawn?†International Journal of Information Management, vol. 30, no. 2, pp. 109–116, 2010.

[7] N. A. Sultan, “Reaching for the cloud: How SMEs can manage,†International journal of information management, vol. 31, no. 3, pp. 272–278, 2011.

[8] P. Hofmann and D. Woods, “Cloud computing: The limits of public clouds for business applications,†IEEE Internet Computing, vol. 14, no. 6, pp. 90–93, 2010.

[9] H. R. Motahari-Nezhad, B. Stephenson, and S. Singhal, “Outsourcing business to cloud computing services: Opportunities and challenges,†IEEE Internet Computing, vol. 10, no. 4, pp. 1–17, 2009.

[10] T. Dillon, C. Wu, and E. Chang, “Cloud computing: issues and challenges,†in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, 2010, pp. 27–33.

[11] B. Iyer and J. C. Henderson, “Preparing for the future: Understanding the seven capabilities cloud computing.†MIS Quarterly Executive, vol. 9, no. 2, 2010.

[12] S. Ostermann and R. Prodan, “Impact of variable priced cloud resources on scientific workflow scheduling.†in Euro-Par, vol. 12. Springer, 2012, pp. 350–362.

[13] C. Low, Y. Chen, and M. Wu, “Understanding the determinants of cloud computing adoption,†Industrial management & data systems, vol. 111, no. 7, pp. 1006–1023, 2011.

[14] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing the business perspective,†Decision support systems, vol. 51, no. 1, pp. 176–189, 2011.

[15] E. N. Wiebe, E. Roberts, and T. S. Behrend, “An examination of two mental workload measurement approaches to understanding multimedia learning,†Computers in Human Behaviour, vol. 26, no. 3, pp. 474–481, 2010.

[16] F. Lombardi and R. Di Pietro, “Secure virtualization for cloud computing,†Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1113–1122, 2011.

[17] M. S. Musawa, E. Wahab et al., “The adoption of electronic data interchange (edi) technology by nigerian smes: A conceptual framework,†Journal of Business Management and Economics, vol. 3, no. 2, pp. 55– 68, 2012.

[18] D. Shin, “Beyond user experience of cloud service: Implication for value sensitive approach,†Telematics and Informatics, vol. 32, no. 1, pp. 33–44, 2015.

[19] S. Dustdar and H.-L. Truong, “Virtualizing software and humans for elastic processes in multiple clouds–a service management perspective,†International Journal of Next-Generation Computing, vol. 3, no. 2, 2012.

[20] A. Goscinski and M. Brock, “Toward dynamic and attribute based publication, discovery and selection for cloud computing,†Future generation computer systems, vol. 26, no. 7, pp. 947–970, 2010.

[21] J.-W. Lian, “Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study,†International Journal of Information Management, vol. 35, no. 1, pp. 98–109, 2015.

[22] L. Riungu-Kalliosaari et al., “Empirical study on the adoption, use and effects of cloud-based testing,†ACTA Universitatis Lappeenrantaensis, 2014.

[23] C. Gudolle Sobragi, A. C. Gastaud Mac¸ Ada, and M. Oliveira, “Cloud computing adoption: A multiple case study,†Revista Base da UNISINOS, vol. 11, no. 1, 2014.

[24] I. Grubisic, “ERP in clouds or still below,†Journal of Systems and Information Technology, vol. 16, no. 1, pp. 62–76, 2014.

[25] X. Ma, “The adoption of cloud computing for small and medium accounting firms.†2015.

[26] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,†in ACM SIGOPS operating systems review, vol. 37, no. 5. ACM, 2003, pp. 164–177.

[27] T. Lu, M. Chen, and L. L. Andrew, “Simple and effective dynamic provisioning for power-proportional data centers,†IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1161–1171, 2013.

[28] T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments: Obstacles and solutions,†ACM Computing Surveys (CSUR), vol. 46, no. 1, p. 12, 2013.

[29] I. Ajzen and M. Fishbein, “Understanding attitudes and predicting social behaviour,†1980.

[30] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User acceptance of information technology: Toward a unified view,†MIS quarterly, pp. 425–478, 2003.

[31] F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,†MIS quarterly, pp. 319–340, 1989.

[32] F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, “User acceptance of computer technology: a comparison of two theoretical models,†Management science, vol. 35, no. 8, pp. 982–1003, 1989.

[33] S. Al-Gahtani, “The applicability of tam outside North America: An empirical test in the United Kingdom,†Information Resources Management Journal, vol. 14, no. 3, p. 37, 2001.

[34] S. A. Al-Somali, R. Gholami, and B. Clegg, “An investigation into the acceptance of online banking in Saudi Arabia,†Technovation, vol. 29, no. 2, pp. 130–141, 2009.

[35] A. Barua, R. Chellappa, and A. B. Whinston, “Creating a collaboratory in cyberspace: theoretical foundation and an implementation,†Journal of Organizational Computing and Electronic Commerce, vol. 5, no. 4, pp. 417–442, 1995.

[36] M. B. Alotaibi, “Exploring users attitudes and intentions toward the adoption of cloud computing in Saudi Arabia: an empirical investigation,†Journal of Computer Science, vol. 10, no. 11, pp. 2315–2329, 2014.

[37] M. Atkinson and C. Kydd, “Individual characteristics associated with World Wide Web use: an empirical study of playfulness and motivation,†ACM SIGMIS Database, vol. 28, no. 2, pp. 53–62, 1997.

[38] J.-W. Moon and Y.-G. Kim, “Extending the tam for a world-wide-web context,†Information & management, vol. 38, no. 4, pp. 217–230, 2001.

[39] D. Gefen and D. W. Straub, “Gender differences in the perception and use of e-mail: An extension to the technology acceptance model,†MIS quarterly, pp. 389–400, 1997.

[40] D. Gefen, “What makes an ERP implementation relationship worthwhile: Linking trust mechanisms and ERP usefulness,†Journal of Management Information Systems, vol. 21, no. 1, pp. 263–288, 2004.

[41] M. Fishbein and I. Ajzen, Predicting and changing behaviour: The reasoned action approach.†Taylor & Francis, 2011.

[42] M. Igbaria, N. Zinatelli, P. Cragg, and A. L. Cavaye, “Personal computing acceptance factors in small firms: a structural equation model,†MIS quarterly, pp. 279–305, 1997.

[43] P. Y. Chau, “An empirical assessment of a modified technology acceptance model,†Journal of management information systems, vol. 13, no. 2, pp. 185–204, 1996.

[44] H. M. Selim, “An empirical investigation of student acceptance of course websites,†Computers & Education, vol. 40, no. 4, pp. 343–360, 2003.

[45] H. Lou, W. Luo and D. Strong, “Perceived critical mass effect on groupware acceptance,†European journal of information systems, vol. 9, no. 2, pp. 91–103, 2000.

[46] W. Ralph, “Help! The art of computer technical support,†1991.

[47] R. Mirani and W. R. King, “Impacts of end-user and information centre characteristics on end-user computing support,†Journal of Management Information Systems, vol. 11, no. 1, pp. 141–166, 1994.

[48] U. Sekaran and R. Boogie, “Research methods for business: A skill building approach.†John Wiley & Sons, 2016.

[49] J. Pallant, “SPSS survival manual: a step by step guide to data analysis using SPSS†Maidenhead, 2010.

View Full Article: