• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 4
  • 2
  • Tagged with
  • 10
  • 10
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Relationen mellan Shadow IT och tyst kunskap.

Carnerud, Jessica January 2020 (has links)
Organisationer möter nya utmaningar då IT möjliggör för delning av information att ske i stora mängder och i hög hastighet. De alltmer utsuddade gränserna mellan privatliv och arbetsliv leder till att privat teknik används för arbetsrelaterade syften, så kallad shadow IT [SIT]. För att anskaffa sig konkurrensfördelar ställs krav på organisationer att hantera informationsteknologier, men också en av de största tillgångarna organisationer besitter: medarbetarnas kunskap. Denna uppsats ämnar till att undersöka relationen mellan shadow IT och tyst kunskap. SECI-modellen som innehåller konverteringar mellan tyst och explicit kunskap har använts som ett verktyg för att undersöka kunskapsdimensioner (socialisering, internalisering, kombination och externalisering) och hur dessa förhåller sig till SIT. Inom ramen för denna kvalitativa studie har 7 intervjuer genomförts, varav 3 telefonintervjuer och 4 besöksintervjuer. Resultatet visar att kunskapkonverteringarna residerar i olika informationstyper, där indikationer visar att shadow it [SIT] är kopplat till tyst kunskap och target IT [TIT] är kopplat till explicit kunskap. SIT spelar en stor roll i socialiseringsprocessen på grund av teknikens förmåga att bygga relationer som kan ligga till grund för delningen av tyst kunskap. SIT utgör vidare en plattform för internalisering genom att skapa ett forum för att skapa och dela arbetsmaterial på ett informellt sätt. Utan SIT finns det en risk att delningen av tyst kunskap inte skulle ske i samma utsträckning, vilket är något organisationer måste ta i beaktning. I och med SITs inbyggda ‘sense of urgency’-design kan kunskapskonverteringar även ske i en hög hastighet då medarbetarna behandlar förfrågningar mer brådskande. / Organizations face new challenges as IT enables information sharing in large quantities and at a high speed. The increasingly blurred boundaries between private and working life lead to usage of private technology for work-related purposes, so called shadow IT [SIT]. In order to gain competitive advantages organizations must manage its information technologies, but also one of the largest assets an organization possess: the knowledge that resides within their employees. This paper aims to explore the relationship between shadow IT and tacit knowledge. The SECI-model that contains conversions between tacit and explicit knowledge has been used as a tool for exploring knowledge dimensions (socialization, internalization, combination and externalization) and how these relate to SIT. Within the framework of this qualitative study, 7 interviews have been conducted, of which 3 telephone interviews and 4 visit interviews. The result shows that the knowledge conversation resides in various information concepts, where indications show that shadow IT [SIT] is linked to tacit knowledge and target IT [TIT] is linked to explicit knowledge. SIT plays a major role in the socialization process due to its ability to build relationships that can form the basis for tacit knowledge sharing. SIT further provides a platform for internalizing by creating a forum for creating and sharing work materials in a informative manner. Without SIT, the sharing of tacit knowledge might not happen to the same extent, which is something organization must take into consideration. Due to the build-in ‘sense of urgency’-design in SIT, knowledge conversions can also happen at a high rate since employees process request more urgently.
2

Shadow IT – Skuggsystem : En förklarande fallstudie om när verksamheten tar makten över IT

Malmer, Johan, Seipel, Niklas January 2017 (has links)
Sådana system i en organisation som inte är sanktionerade kallas skuggsystem. I detta arbete har vi genomfört en fallstudie vid Försvarets materielverk FMV för att undersöka vad som orsakar att skuggsystem uppkommer. I studien har ett antal skuggsystem identifierats och möjliga orsaker har analyserats. Det är viktigt för en organisation att skaffa kunskap om skuggsystemens existens för att kunna hantera dem och därför är det viktigt med en förståelse för orsakerna bakom. / Systems in an organization that are not formally sanctioned are called shadow systems. In this paper we have conducted a case study at the Swedish Defence Material Administration FMV to better understand the drivers behind the creation of shadow systems. The study has identified a number of shadow systems and possible drivers have been analyzed. It is important for an organization to gain knowledge about the existence of shadow systems in order to manage them. Therefore it is important to have an understanding of the drivers behind shadow systems.
3

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
4

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
5

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
6

Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

Fager, Adam January 2023 (has links)
This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. The objective is to understand how Cloud-Based Shadow IT affects employees' compliance with cloud services and to examine the understanding of IT managers regarding this phenomenon. The research problem addresses the challenges faced in ensuring compliance with regulations and effective utilization of cloud technology. By identifying the strengths, weaknesses, possibilities, and risks associated with Cloud-Based Shadow IT, this study aimed to provide insights for companies and IT managers in making informed decisions. It explores the relationship between Shadow IT and cloud services and investigates employees' and IT managers' adherence to and understanding of these issues.    The findings indicate that employees have varying levels of understanding, with limited knowledge of approved cloud services. Managers prioritize security concerns, including data compliance and ownership, but lack strategies to address knowledge gaps. The use of Cloud-Based Shadow IT has both positive and negative consequences, including increased productivity and collaboration but also data loss and non-compliance risks. Factors such as education and awareness of security risks are important for employees to understand and comply with policies. Overall, the study highlights the need for continuous education and awareness programs to improve understanding and decision-making regarding cloud services and Shadow IT.
7

O impacto das características do trabalho no comportamento Workaround e no uso da Shadow IT relacionados com o desempenho individual

Pinto, Aline de Vargas January 2018 (has links)
Devido a insatisfação dos usuários com os sistemas de informação (SI) disponíveis nas organizações e a necessidade de melhorar o desempenho individual na execução das tarefas, muitos grupos de trabalho implementam, de forma autônoma, recursos de tecnologia e sistemas não disponíveis pelo departamento de TI. Assim, a satisfação e o comportamento produtivo no trabalho podem ser explicados pela teoria das características do trabalho proposta por Hackman e Oldham, que podem atuar como variável preditora do uso de soluções e tecnologias alternativas. Motivada por esse contexto, esta pesquisa tem por objetivo analisar como as características do trabalho estão relacionadas com o comportamento workaround e com uso da shadow IT, avaliando o impacto no desempenho individual. O objetivo desta pesquisa foi alcançado ao longo da execução de 3 artigos. O artigo 1 apresenta uma revisão de literatura sobre os fatores: características do trabalho, comportamento workaround, uso da shadow IT e desempenho individual, sendo comprovado teoricamente a relação entre as temáticas, dando origem ao desenvolvimento do modelo teórico testado no artigo 2. No artigo 2 foi realizada a aplicação de um survey com 369 usuários de TI que possibilitou a realização de testes estatísticos para assegurar a validade e confiabilidade do modelo de pesquisa proposto no artigo 1, além do teste das 5 hipóteses propostas neste estudo. Neste artigo pode-se concluir que as características do trabalho possuem uma relação positiva com o comportamento workaround e com o uso da shadow IT. Com relação ao impacto no desempenho individual, os achados desta pesquisa demonstram que tanto o comportamento workaround quanto o uso da shadow IT possuem uma relação positiva com o desempenho individual. Ademais, confirma-se a relação entre o comportamento workaround e o uso da shadow IT que são conceitos semelhantes, mas que possuem importantes diferenças. Dentre as sugestões de pesquisa, recomenda-se o estudo do comportamento workaround com o compartilhamento do conhecimento, pois o uso de soluções alternativas proporciona uma comunicação mais rápida e dinâmica, impulsionando a colaboração entre colegas de trabalho, parceiros externos e cliente. Por fim, no artigo 3 buscou-se verificar o papel mediador do comportamento workaround e do uso da shadow IT na relação entre as características do trabalho e o desempenho individual. O principal resultado deste artigo evidencia que o efeito direto entre as características do trabalho e o desempenho não foi suportado, o que confirma a mediação total, já que o efeito indireto foi maior do que o efeito direto que não apresentou significância. Assim, o efeito das características do trabalho no desempenho individual é melhor explicado pela variável comportamento workaround e pelo uso da shadow IT. Como a análise e moderação e a mediação são conceitos similares pois descrevem uma situação em que o relacionamento de 2 construtos depende de uma terceira variável em que as diferenças estão na fundamentação teórica e na interpretação dos resultados, sugere-se um estudo comparativo que demonstre como os construtos deste modelo se comportam através da análise de moderação. / Users' dissatisfaction with the information systems (IS) available in organizations and the need to improve individual performance in the execution of tasks, many workgroups autonomously implement technology resources and systems not available to the IT department. Thus, satisfaction and productive behavior at work can be explained by the theory of the job characteristics proposed by Hackman and Oldham, which can act as a predictor of the use of alternative solutions and technologies. Motivated by this context, this research aims to analyze how the job characteristics are related to the workaround behavior and using shadow IT, evaluating the impact on individual performance. The objective of this research was achieved during the execution of 3 articles. Article 1 presents a review of the literature on the factors: job characteristics, workaround behavior, use of shadow IT and individual performance, theoretically proving the relationship between the themes, giving rise to the development of the theoretical model tested in article 2. In the article 2 a survey was carried out with 369 IT users that allowed the performance of statistical tests to ensure the validity and reliability of the research model proposed in article 1, in addition to the test of the 5 hypotheses proposed in this study. In this paper it can be concluded that the job characteristics have a positive relationship with the workaround behavior and the use of shadow IT. Regarding the impact on individual performance, the findings of this research demonstrate that both the workaround behavior and the use of shadow IT have a positive relationship with individual performance. In addition, the relationship between the workaround behavior and the use of shadow IT is confirmed, which are similar concepts, but which have important differences. Among research suggestions, it is recommended to study workaround behavior with knowledge sharing, as the use of alternative solutions provides faster and more dynamic communication, boosting collaboration among colleagues, external partners and the client. Finally, article 3 sought to verify the mediating role of the workaround behavior and the use of shadow IT in the relation between the job characteristics and the individual performance. The main result of this article shows that the direct effect between the job characteristics and the performance was not supported, which confirms the total mediation, since the indirect effect was greater than the direct effect that did not present significance. Thus, the effect of job characteristics on individual performance is best explained by the variable workaround behavior and by the use of shadow IT. Since analysis and moderation and mediation are similar concepts because they describe a situation in which the relationship of 2 constructs depends on a third variable in which the differences are in the theoretical basis and in the interpretation of the results, a comparative study is suggested that demonstrates how the constructs of this model behave through moderation analysis.
8

Användning av skuggsystem hos organisationer med sanktionerade intranätverk

Högström, Anton, Mood, Lisa January 2019 (has links)
Företag och organisationer använder sig ofta av sanktionerade, specialanpassade IT-system för att hantera information och kontrollera sin verksamhet. När anställda frångår policys och riktlinjer kring användningen av dessa system kallas det Shadow IT, eller skuggsystem. Detta innebär att de anställda utvecklar nya rutiner, hård- eller mjukvara eller vänder sig till annan etablerad programvara. Detta arbete innefattar en kvalitativ undersökning där kommunikatörer och informatörer vid Uppsala universitet har intervjuats för en orsaksinventerande studie av skuggsytem i förhållande till universitetets sanktionerade intranät Medarbetarportalen. Orsaker som kunnat fastställas till varför användare frångår rutiner och väljer skuggsystem är bristande reglering, mänskliga faktorer, såsom bekvämlighet och motvilja, brister hos systemets kvalitet samt informationens kvalitet. Vidare orsaker är utvecklingen av mer specifika, bättre egna lösningar i form av olika skuggsystem, samt organisationens struktur och kultur. Då Uppsala universitet påverkas av akademisk frihet och anställdas valmöjligheter i och med detta, saknas tydlig kontroll genom policys och föreskrifter från ledningens sida angående användning.
9

KONSTEN ATT BALANSERA SÄKERHET OCH ÖPPENHET : En kvalitativ studie av offentliga organisationers hantering av säkerhetshot / THE ART OF BALANCING SECURITY AND OPENNESS : A qualitative study of public organizations' management of security threats

Johansson, Matthias, Påander, Erik January 2023 (has links)
Offentliga organisationer har flera krafter som trycker och påverkar deras säkerhetspraktik, dessa är både externa men även interna. För att förstå hur den offentliga organisationen hanterar dessa krafter som kräver öppenhet respektive IT-säkerhet har studien använt sig av kvalitativ datainsamling i form av intervjuer med medarbetare med olika roller inom den offentliga sektorn. Studien har inspirerats av induktion som ansats och utvecklat sitt teoretiska ramverk efter det att empirin färdigställts. Teoretiska begrepp som används i analysen är bland annat det politiska systemet, skugg-IT och Information Security Awareness. Empirin består av intervjuer med personer som är anställda hos en offentlig organisation. Utmaningar för IT-säkerhetspraktiken uppstår i form av syn på utbildning och svårigheten att nå ut till personal som följd av den komplexitet som är inneboende i den offentliga organisationen. Studien ger insyn och förslag på hur detta skulle kunna hanteras för att göra arbetet att upprätthålla säkerheten mer effektiv. Arbetet utmynnar i framtagandet av ett ramverk som visualiserar det förlopp som aktualiseras i studien, där knyts sambandet mellan olika krafter och synpunkter som påverkar varandra. / Public organizations face various forces that exert pressure and influence their security practices, both externally and internally. To understand how public organizations manage these forces, which require both transparency and IT security, this study employed qualitative data collection in the form of interviews with employees in different roles within the public sector. The study was inspired by an inductive approach and developed its theoretical framework after the completion of empirical data gathering. The theoretical concepts used in the analysis include the political system, shadow IT, and Information Security Awareness. The empirical data consists of interviews with individuals employed by a public organization. Challenges for IT security practices arise in the form of differing views on education and the difficulty of reaching personnel due to the inherent complexity of the public organization. The study provides insight and suggestions on how to address these challenges in order to make the task of maintaining security more effective. The work culminates in the development of a framework that visualizes the progression highlighted in the study, establishing connections between the various forces and perspectives that influence one another.
10

Factors Influencing the Adoption of Cloud Computing: A Mixed-Methods Approach

Walterbusch, Marc 01 August 2016 (has links)
Cloud computing is a technology that has gained increasing attention because of its considerable benefits, which include reduced costs, reduced complexity and increased flexibility. To obtain these benefits, cloud computing utilizes existing technologies, such as grid computing, virtualization and web services, for online delivery of scalable information technology (IT) services, frequently on the basis of a pay-per-use pricing model. In 2008, the Gartner Group predicted that cloud computing would reach the mainstream within two to five years. However, in their latest hype cycle for emerging technologies, they stated that cloud computing had not yet reached the plateau of productivity but rather was still in the trough of disillusionment. The reason for this situation may be that cloud computing continues to face skepticism because of various concerns regarding, e.g., data privacy and security. In particular, (enterprise) customers transfer (sensitive) data to cloud computing providers, and the end-user rents the right to use cloud computing services via a web browser with minimal need to interact or even without the necessity of interacting directly with a sales assistant. These two aspects result in a strong unilateral dependency and require a high degree of trust in the provider. Additionally, publicity regarding the PRISM program has brought these aspects to the forefront of public interest. Consequently, specific requirements regarding, e.g., security, privacy, accountability, and auditability, must be met to fulfill the expectations of business partners and to build long-term business relationships. Thus, overcoming information asymmetry, enhancing transparency and eradicating behavioral uncertainty is of high importance to build trust between cloud computing providers and their (prospective) customers. Therefore, although most research to date has focused on technical aspects and aimed to improve the actual security of cloud computing services, there is also an urgent need to understand the factors that affect the adoption of cloud computing services from the points of view of both private users and companies. If cloud computing is to reach its full potential, a clear understanding of the factors that influence its adoption is mandatory to improve both present and future cloud computing services. Motivated by these considerations, the aim of this doctoral thesis is to explore, describe, analyze and explain the factors that influence the adoption of cloud computing using various qualitative and quantitative research methods, i.e., by employing a mixed-methods analysis. As a first step, a serious game is conducted to explore various factors that influence the adoption of cloud computing services. Based on these initial findings, the factors explored during the serious game and some additional factors are described and analyzed in detail. These factors include the cloud computing market, costs, trust, affectedness, shadow IT, and sustainability. Furthermore, the factor of information asymmetry, especially regarding bridging the information asymmetry with various information presentation methods, is explained. Following these findings, a research agenda, which contains a recommended research design and lists the theories that are relevant in the context of the adoption of cloud computing, is proposed. Subsequently, a synthesis of the research findings in terms of their implications for practice and research, including limitations, are discussed.

Page generated in 0.437 seconds