Metrika članka

  • citati u SCindeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:16
  • preuzimanja u poslednjih 30 dana:16
članak: 7 od 37  
Back povratak na rezultate
Serbian Journal of Management
2018, vol. 13, br. 2, str. 335-352
jezik rada: engleski
vrsta rada: originalan članak
doi:10.5937/sjm13-13207

Creative Commons License 4.0
Određivanje faktora koji utiču na prihvatanje 'cloud' usluga u Indiji
DIT University, Dehradun Institute of Technology, Dehradun, Uttarakhand, India

e-adresa: garimaverma.research@gmail.com

Sažetak

U ovom istraživanju identifikuju se faktori koji utiču na prihvatanje 'cloud' usluga u Indiji, koristeći 'Unified Theory of Acceptance and Use of Technology (UTAUT)' model. Ispitana je i uloga percepcionog rizika kao moderatora u usvajanju 'cloud' servisa sa drugim moderatorima kao što su pol, starost, iskustvo i voluntarnost upotrebe, kako je navedeno u 'UTAUT' modelu. Nakon deskriptivnog dizajna istraživanja, sprovedeno je ispitivanje i strukturiran upitnik je nasumično urađen na uzorku od 379 ispitanika u Dehradun regionu. Većina veza potvrdila je 'UTAUT' model. Očekivani učinak i očekivani napor pojavili su se kao dva najznačajnija faktora koji utiču na usvajanje usluga 'cloud'. Opaženi rizik je, takođe, igrao značajnu ulogu u usvajanju 'cloud' servisa od strane moderatora. Usluge zasnovane na 'cloud' servisu relativno su nove za potrošače u Indiji. Prednosti 'cloud' tehnologije mogu se u potpunosti iskoristiti ako ih sve više i više korisnika usvoji. Takođe, razne vrste rizika, kao što su finansijski gubici, gubitak podataka, privatnost itd. povezuju se sa korišćenjem 'cloud' servisa. Prema tome, ova studija može imati neposredne implikacije za 'cloud' pružaoce usluga.

Ključne reči

usvajanje; moderator; uticaj; usluga; određivanje faktora

Reference

*** Influence of the user's psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33(1), 341-350
Ajzen, I. (1991) The theory of planned behavior. Organizational behavior and Human Decision Processes, 50, 179-211
Ajzen, I., Fishbein, M. (1980) Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice-Hall
Alharbi, S.T. (2014) Trust and Acceptance of Cloud Computing: A Revised UTAUT Model. u: 2014 International Conference on Computational Science and Computational Intelligence, Institute of Electrical and Electronics Engineers (IEEE), str. 131-134
Bagozzi, R. (2007) The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift. Journal of the Association for Information Systems, 8(4): 244-254
Bauer, R.A. (1960) Consumer behavior as risk taking. u: Hancock R.S. [ur.] Dynamic marketing for a changing world, Chicago: American Marketing Association, 389-398
Bettman, J.R. (1973) Perceived Risk and Its Components: A Model and Empirical Test. Journal of Marketing Research, 10(2): 184
Burda, D., Teuteberg, F. (2014) The role of trust and risk perceptions in cloud archiving - Results from an empirical study. Journal of High Technology Management Research, 25(2): 172-187
Cao, Y., Bi, X., Wang, L. (2013) A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. u: 2013 International Conference on Information Science and Cloud Computing Companion, Institute of Electrical and Electronics Engineers (IEEE), str. 287-293
Chang, S., Lou, S., Cheng, S., Lin, C. (2015) Exploration of usage behavioral model construction for university library electronic resources. Electronic Library, 33(2): 292-307
Chonka, A., Xiang, Y., Zhou, W., Bonti, A. (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications, 34(4): 1097-1107
Davis, F.D., Bagozzi, R.P., Warshaw, P.R. (1989) User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(6), str. 982-1002
Davis, F.D., Bagozzi, R.P., Warshaw, P.R. (1992) Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1. Journal of Applied Social Psychology, 22(14): 1111-1132
Dowling, G.R., Staelin, R. (1994) A Model of Perceived Risk and Intended Risk-Handling Activity. Journal of Consumer Research, 21(1): 119
Engel, J., Blackwell, R., Miniard, P. (1986) Consumer Behavior. New York: CBS College Publishing
Festinger, L. (1957) A Theory of Cognitive Dissonance. Stanford CA: Stanford University Press
Fishbein, M., Ajzen, I. (1975) Beliefs, attitude and behavior: An introduction to theory and research. Reading, MA, itd: Addison-Wesley
Gemünden, H.G. (1985) Perceived risk and information search. A systematic meta-analysis of the empirical evidence. International Journal of Research in Marketing, 2(2): 79-100
Gray, A. (2013) Conflict of laws and the cloud. Computer Law & Security Review, 29(1): 58-65
Gupta, P., Seetharaman, A., Raj, J.R. (2013) The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5): 861-874
Hair, J.F.Jr., Anderson, R.E., Tatham, R.L., Black, W.C. (2010) Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall International, 7th Edition
Karakas, F., Manisaligil, A. (2012) Reorienting self‐directed learning for the creative digital era. European Journal of Training and Development, 36(7): 712-731
Lian, J. (2015) Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management, 35(1): 98-109
Marchewka, J.T., Liu, C., Kostiwa, K. (2007) An application of the UTAUT model for understanding student perceptions using course management software. Communications of the IIMA, 7(2), 93
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. (2011) Cloud computing - The business perspective. Decision Support Systems, 51(1): 176-189
Min, Q., Ji, S., Qu, G. (2008) Mobile commerce user acceptance study in China: A revised UTAUT model. Tsinghua Science and Technology, 13(3): 257-264
Opitz, N., Langkau, T.F., Schmidt, N.H., Kolbe, L.M. (2012) Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments. u: 2012 45th Hawaii International Conference on System Sciences, Institute of Electrical and Electronics Engineers (IEEE), str. 1593-1602
Park, E., Kim, K.J. (2014) An integrated adoption model of mobile cloud services: Exploration of key determinants and extension of information management. 34(1), 28-36
Park, S.C., Ryoo, S.Y. (2013) An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1): 160-170
Rogers, E.M. (1995) Diffusion of innovations. New York, NY: Free Press
Shin, D. (2013) User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30(2): 194-203
Stein, S., Ware, J., Laboy, J., Schaffer, H.E. (2013) Improving K-12 pedagogy via a Cloud designed for education. International Journal of Information Management, 33(1): 235-241
Stieninger, M., Nedbal, D. (2014) Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors. u: 2014 47th Hawaii International Conference on System Sciences, Institute of Electrical and Electronics Engineers (IEEE), str. 3307-3316
Taylor, C.W., Hunsinger, D.S. (2011) A study of student use of cloud computing applications. Journal of Information Technology Management, 22(3); 36-50
Taylor, J.W. (1974) The Role of Risk in Consumer Behavior. Journal of Marketing, 38(2): 54-60
Taylor, S., Todd, P. (1995) Assessing IT Usage: The Role of Prior Experience. MIS Quarterly, 19(4): 561
Udo, G., Bagchi, K., Maity, M. (2016) Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture. Journal of Business Ethics, 135(3): 517-541
Venkatesh,, Morris,, Davis,, Davis (2003) User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3): 425
Vouk, M.A. (2008) Cloud Computing Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4): 235
Wu, P.F. (2009) Opening the black boxes of TAM: Towards a mixed methods approach. u: International Conference on Information Systems, Paper 101. http://aisle.aisnet.org/icis2009/101
Wu, W. (2011) Mining significant factors affecting the adoption of SaaS using the rough set approach. Journal of Systems and Software, 84(3): 435-441
Zaltman, G., Wallendorf, M. (1983) Consumer Behavior. New York: Wiley