Volume 26 (1) |
April 2019 |
ISSN |
|
|
ISSN |
JOURNAL of
ACCOUNTING - BUSINESS & MANAGEMENT
Confidence Crisis in the Application of Cloud Computing |
in |
the Industrial Companies in Jordan a Field Study |
|
Abdullah Mohammed |
Comparative Analysis on Corporate Disclosure Practices of Listed |
|
Companies in |
|
Disclosure Standards |
|
Nunthapin Chantachaimongkol and Shuwen Chen |
|
Capital Structure, Ownership Structure and Corporate Governance of |
|
SMEs in Ghana |
|
Ibrahim Anyass Ahmed |
|
The Tax Cuts and Jobs Act and the Middle Class |
|
Deborah Combs and Brian Nichols |
|
The Locus of Innovation: A Literature Review |
|
Yongliang Stanley Han |
Journal of Accounting – Business & Management vol. 26 no. 1 (2019)
Confidence Crisis in the Application of Cloud Computing
in the Industrial Companies in Jordan a Field Study
Abdullah Mohammed
Ibtissam
Abstract
The current study aimed at determining the extent to which the industrial companies in Jordan have a confidence crisis in applying cloud computing. This crisis is divided into three different categories: a confidence crisis in programs and operations, a confidence crisis in service providers and a confidence crisis in the security and protection offered by service providers. In order to achieve the purpose of the research, a questionnaire was designed covering the three areas of confidence crisis. (120) questionnaires were distributed on a stratified random sample of (81) industrial companies in Al Hassan industrial estate in Irbid; (104) valid questionnaires were retrieved. The results of the study show that there is indeed a confidence crisis in the application of cloud computing in the Jordanian industrial companies within the three aforementioned domains. The researchers recommend that the service providers should educate on the cloud computing mechanisms and how the systems, applications and stored data are protected, so as to avoid such a confidence crisis in the industrial companies.
Keywords: confidence, cloud computing.
I. INTRODUCTION
Technology is constantly spreading new things to the business world. In fact, all companies and associations resort to technology as it saves time and effort and guarantees accuracy in accomplishing all tasks such as
applications, etc) that are available to users upon request
the internet2§ in order to accomplish and improve administrative, accounting and other tasks that the companies require.
*Al
00962 795 530 950.
†Al
2§ See «cloud computing» in the sections below.
2
storage are done by cloud computing service providers, which means that such data are accessible to external parties. This may well cause the company not to have confidence in the service providers for fear of having the data leaked or manipulated3.**.
The study objectives are formulated on the basis of the aforementioned reasons of confidence crisis. Therefore, the primary objective of the study is to investigate whether the industrial companies in Jordan have a confidence crisis with cloud computing service providers.
II. STATEMENT OF THE PROBLEM
Cloud computing has recently emerged in the form of computing resources and systems that are available upon request via the internet (applications, networks, storing, serves); it provides a number of
The aforementioned question motivated the researchers to investigate confidence in cloud computing, which led to the inquiry about the confidence crisis in the companies’ application of cloud computing in the Jordanian context.
III. OBJECTIVES OF THE STUDY
The primary objective of the current study is to determine whether or not the industrial companies in Jordan have a lack of trust in the application of cloud computing. The lack of trust “distrust” is referred to as “confidence crisis” in this study. In line with the previous objective, confidence crisis in the application of cloud computing is divided into three
1.Determining whether or not the industrial companies in Jordan have a confidence crisis in the program and operations offered by the service providers to apply cloud computing.
2.Determining whether or not the industrial companies in Jordan have a confidence crisis in the cloud computing service providers.
3.Determining whether or not the industrial companies in Jordan have a confidence crisis in the security and protection offered by cloud computing service providers.
IV. SIGNIFICANCE OF THE STUDY
The current study gains significance from the fact that technology is indispensable for business improvement in any enterprise or institution. Companies are in a constant need to develop business and enter the world of technology in order to maximize the computing potentials and performance for treating and accessing to datasets and maintaining a reduced cost because cloud computing lets companies manage without the need to buy powerful equipments and servers, and it provides better performance (Sayed, 2013).
3**See «the disadvantages of cloud computing» in the sections below.
3 |
V. STUDY HYPOTHESES
The study was built on a main hypothesis:
1.There is no confidence crisis in the application of cloud computing in the industrial companies in Jordan.
Confidence crisis is divided into three categories: confidence crisis in the
program and operations, confidence crisis in the service providers and confidence crisis in the security and protection. Therefore, the study
1.There is no confidence crisis in the program and operations offered by the service providers to apply cloud computing in the industrial companies in Jordan.
2.There is no confidence crisis in the cloud computing service providers in the industrial companies in Jordan.
3.There is no confidence crisis in the security and protection offered by cloud computing service providers in the industrial companies in Jordan.
VI. RESEARCH METHODOLOGY 6.1. Study Sample and Population
The population of the current study consists of all the industrial companies in
Table 1
Numbers of Study Sample and Population
|
Num- |
|
Industrial Sectors |
|
|
Number of |
|
Percent- |
|
Sample |
|
|
|
|
|
|
|
|
|||||
|
Ber |
|
|
|
Companies |
|
age |
|
Size |
|
|
|
|
|
|
|
|
|
|
||||
|
1. |
|
Food industry |
33 |
0.223 |
18 |
|
||||
|
2. |
|
Textile and cotton industry |
39 |
0.263 |
21 |
|
||||
|
3. |
|
Pharmaceutical industry |
11 |
0.074 |
6 |
|
||||
|
4. |
|
Plastic and rubber industry |
17 |
0.115 |
9 |
|
||||
|
5. |
|
Chemical industry |
14 |
0.094 |
8 |
|
||||
|
6. |
|
Printing, paper and packaging |
4 |
0.027 |
2 |
|
||||
|
7. |
|
Engineering industry (metal & electric) |
22 |
0.149 |
12 |
|
||||
|
8. |
|
Furniture, kitchen and doors industry |
2 |
0.014 |
1 |
|
||||
|
9. |
|
Leather industry |
5 |
0.034 |
3 |
|
||||
|
10. |
|
Construction industry |
1 |
0.007 |
1 |
|
||||
|
|
|
Total |
148 |
1 |
81 |
|
120 questionnaires were distributed on the Chief Financial Officers (CFO’s) and the Assistant Financial Directors (AFD’s). 104 valid questionnaires were retrieved.
6.2. Data Collection Techniques
The data and information needed for the current research were collected in two techniques in accordance with the target information, as follows:
1)Books, Journal and Articles: these were used in order to get the needed information for the theoretical aspect of this study.
2)The questionnaire: the questionnaire consists of two parts:
4
a)Sample personal background: the information in this section contains four aspects as illustrated in the second part of the results.
b)The study fields: the fields of the current study were divided into three main fields, each consists of one element of cloud computing Confidence Crisis. The three fields contain 18 items distributed equally across the three fields as illustrated in the third part of the results.
6.3. Statistical Techniques
The current study makes use of several statistical tests provided by SPSS as follows:
1)Cronbach’s Alpha: in order to measure the research instrument’s reliability.
2)Kolmogorov Smirnov (KS Test): in order to test the natural distribution of data.
3)Frequencies and Percentages.
4)Descriptive Statistics: means and standard deviations.
5)
6)
7)
These tests will be outlined in the results section.
VII. CLOUD COMPUTING
There are many definitions of cloud computing. Some scholars consider it as a new form of computing that includes a group of servers, networks, applications and resources in order to facilitate the sharing of services and resources via the internet instead of having them on local servers or personal computers (Kaushik & Kumar, 2013). In the same view, Sayed (2013, p. 17) considers cloud computing to be a technique that offers computer resources in the form of services that give access to users via the internet “the cloud” without the need to have expertise or knowledge or even control of the supporting
Sharif et al. (2013) state that cloud computing is a technique that provides technological services in
Qurayqaa (2014) elaborates on the concept of cloud computing by dividing it into two parts: the cloud, which is a set of computers and servers that are accessible via the internet in any place; the cloud computing, which is the transfer of outputs into services by which the operations of
5 |
7.1. The Advantages of Cloud Computing
Cloud computing has a
1)Improving the work performance in a way that positively affects business.
2)Reducing the cost of
3)
4)Enhancing profitability due to the easy maintenance and resources reassessment (Hsu & Lin, 2016, p. 791).
5)Expansion of service and enhancing the flexibility of resources (Hurwitz et al., 2010).
6)Creating easy access to services, databases and applications by the service user in the place and time desired because the data is stored in the servers of the service providers and not in personal computers
7)Increasing the storage capacity to save files.
8)
9)Getting access to a large number of applications without the need to register, purchase, install or download them (Turab et al., 2013).
7.2. The Disadvantages of Cloud Computing
Despite the numerous advantages of cloud computing, this service is not without shortcomings. In fact, there are several disadvantages, among which are the following:
1) Security and protection concerns
Users of cloud computing are reluctant to put their files and data in the servers of the service providing company. These users are concerned with the potential of having their data hacked by other parties (Saleem, 2016). Therefore, the cloud computing service provider undertakes the task of providing protection for the data and providing
2) Confidence
The biggest challenge that cloud computing faces is the issue of confidence. It definitely is the prime motivator/inhibitor of the adoption of cloud computing (Mohammed, 2011). This is due to the lack of appropriate procedures and policies ensuring the protection and control of data (Pawar & Udgir, 2016). Furthermore, the use of cloud computing puts the user in constant concern about the
VIII. REVIEW OF THE RELATED LITERATURE
The subject of cloud computing has spilled a lot of ink in the literature due to its importance. This section presents a review of the literature related to the issue of confidence in the application of cloud computing. Most of the studies done in this
6
regard note that the lack of trust in the security and protection that the cloud computing offers is a primary motivator behind the refraining from adopting it. Nevertheless,
8.1.The Study of Bhour (2016) under the Title: “The Presence of Factors
Influencing the Adoption and Application of Cloud Computing in
the Government Institution from the Higher Management Perspective”. This study aimed at investigating the factors influencing the adoption and
application of cloud computing from the perspective of higher management. The sample for this study consisted of the ministry delegates and their assistants and the general managers working in the government ministries in the district of Gaza in Palestine. 170 questionnaires were distributed; 117 of which were retrieved for analysis.
The study concluded that there are many factors influencing the adoption and application of cloud computing in these sectors; the most paramount of which are: the availability of technological
8.2.The Study of
This study aimed at identifying the aspects of banking that can be supported by
cloud computing, and highlighting the advantages and disadvantages thereof. The study also aimed at determining the level of acceptance that cloud computing receives in the Iraqi banks. The sample of the study consisted of the specialists in the information department in the Iraqi banking sectors. A target sample was chosen consisting of 32 members who received the study questionnaire.
The study concluded that the operating systems, applications and hardware, being integral elements of cloud computing
8.3.The Study of Elena and Johnson (2015) under the Title: “Factors
Influencing Risk Acceptance of Cloud Computing Services in the UK Government”.
This study aimed at investigating the factors influencing risk acceptance of cloud computing services in the UK government. The sample of the study consisted of specialists in the field of information technology in the government institutions in the UK. The data was collected through the
The study concluded that there are many factors influencing risk acceptance of cloud computing in the UK government institutions including: social risk; such as tarnishing the institutions’ reputation in case the datasets are leaked or manipulated. Financial risks; such as the
7 |
unauthorized access in addition, the security measures at the level of storage, the control of datasets by the service providers, the technical glitches caused by prospective internet disconnections, the lack of confidence in the quality of cloud computing services.
The study recommended that cloud computing should provide exhaustive information about the protection and security measures and policies in order to safeguard the datasets from potential damage, manipulation or loss.
8.4.The Study of Majhi et al. (2015) under the Title: “Awareness and Usage of
Cloud Computing Application among LIS Professionals: A Case Study of 17 Indian University Libraries”.
This study aimed at investigating the degree to which LIS professionals are aware of the use of cloud computing, and the aim behind using it in libraries, and the most wildly used cloud computing applications, and finally investigating obstacles facing LIS professionals when using the applications of cloud computing. The population of the study consisted of all librarians, deputy librarians, assistant librarians and library technical assistants in the Indian universities (17 universities). 56 questionnaires were distributed on the sample outlined previously.
The study concluded that the library professionals are fully aware of the importance of cloud computing in the field. Moreover, the study concluded that many librarians use the cloud computing application for personal purposes. A final result of the study was the fact that lack of awareness and confidence in cloud computing are major factors influencing the choice of not adopting it.
8.5.The Study of Hashim and Hassan (2015) under the Titles: “Factors that Influence the Users' Adoption of Cloud Computing Services at Iraqi
Universities: An Empirical Study”.
The study aimed at investigating the factors that influence the users' adoption of
cloud computing services at the Iraqi universities. The population of the study consisted of students, teachers and administrators in the Iraqi universities. 312 questionnaires were retrieved for analysis.
The study concluded that there are many factors influencing the adoption of cloud computing including: the expected time and effort, social influence, security and protection, etc. The study recommended that other research studies be conducted in order to
8.6.The Study of Alhammadi et al. (2015) under the Title: “The Determinants of Cloud Computing Adoption in Saudi Arabia”.
This study aimed at investigating the factors that influence the adoption of cloud
computing in the private and public sectors in Saudi Arabia. 43 questionnaires were distributed to the institution of the government sectors and 38 to the institutions of the private sectors, which gives a total of 103 retrieved questionnaires.
The study concluded that there are some statistically significant factors influencing the adoption of cloud computing in the two sectors including: security concerns, institutions readiness to adopt it, the support of higher management, the institutions’ state of affairs, government support and compatibility.
8.7. The Study of Tarmidi et al. (2014) under the Title : “Cloud Computing Awareness and Adoption among Accounting Practitioners in Malaysia”.
This study aimed at investigating the level of awareness of accounting practitioners in the audit and commercial fields among the small and medium companies about cloud computing. The sample of this study consists of all bachelor
8
students of accounting who underwent industrial training. 500 questionnaires were randomly distributed on the sample; 329 of which were retrieved for analysis.
The study concluded that one third of the sample are aware of cloud computing and its benefits as a time and
8.8.The Study of Budniks and Didenko (2014) under the Title: “Factors Determining Application of Cloud Computing Services in Latvian SMEs”.
This study aimed at investigating the factors influencing the entrepreneurs’
The study concluded that cloud computing is used by a small fraction of the surveyed companies. Moreover, the results showed that there is a positive trend towards the development of cloud computing by the service providers as the results show that there is an investment of sufficient financial resources to develop the service.
8.9.The Study of Jelonek and Wyslocka (2014) under the Title: “Barriers to the Development of Cloud Computing Adoption and Usage in SMEs in Poland”.
This study aimed at investigating the obstacles preventing the small and medium companies’ managers in Poland from using cloud computing. The study sample consisted of 134 companies from the transformative industries, trade and service sectors. The primary data was collected via the online questionnaires, which were distributed through the emails of these companies.
The study concluded that there are several reasons inhibiting the use and application of cloud computing in these companies including: lack of confidence in data, difficult access to data and uneasy transfer of data from one service provider to another, loss of control over data, lack of security and protection of data, in addition to other legal issues in case of dispute with the service provider.
8.10.The Study of Alkhater et al. (2014) under the Title: “Factors Influencing an Organization's Intention to Adopt Cloud Computing in Saudi Arabia”.
This study aimed at identifying the factors that affect the organisations’ intention to use cloud computing. The data for this study was collected using
The study concluded that there are several factors influencing the organizations’ intention to adopt cloud computing including: security, privacy, confidence, compliance with regulations, compatibility and the physical location.
8.11.The Study of Gupta et al. (2013) under the Title: “The Usage and Adoption of Cloud Computing by Small and Medium Businesses”.
This study aimed at identifying the factors influencing the usage and adoption of
cloud computing in the small and
9 |
The study concluded that the
8.12.The Study of Abid et al. (2012) under the Title: “Cloud Computing:
A General User’s Perception and Security Issues at Universities of Faisalabad, Pakistan”.
The study aimed at having a deeper understanding about the users’ general perception of cloud computing, and the security issues that come along using it. The population of this study consisted of IT administration and IT staff at four local universities in Faisalabad in Pakistan. A number of questionnaires were distributed on the sample; 50 of which were retrieved for analysis.
The study concluded that the majority of informants are familiar with cloud computing, and that a small fraction of them do not have a clear understanding of it due to the lack of resources. The informants reported that there are many security risks due to the fact that university projects datasets may contain confidential data that is prone to harm when using cloud computing. Another major finding of this researcher was the fact that some universities refrain from adopting cloud computing due to the costs of this service as they do not have sufficient budget to bear its costs. The study recommends that the IT administrators undergo training and workshops in order to shed light on the importance of cloud computing, and that a model of the cloud be made in accordance with the requirements of the IT administrators at the Pakistani universities.
8.13.The Study of Chen (2009) under the Title: “A Feasibility Study of the Adoption of Cloud Computing in the Development of Information
Systems”.
The study aimed at investigating cloud computing, its pros and cons as well as the obstacles inhibiting its implementation in the Taiwanese organizations. In addition, the study aimed at understanding the factors that affect the adoption of cloud computing in these organizations. The population of this study consisted of the IT professionals in ten organizations in Taiwan. The data was collected through the in- depth interview approach.
The study concluded that there are several factors influencing the adoption of cloud computing in the Taiwanese organizations such as: lack of extensive understanding of cloud computing, the lack of innovative models for the Taiwanese enterprises, the insufficient effort of service providers to promote the adoption of cloud computing, the incentive scheme set by the government and officials to accelerate the adoption of cloud computing. The study recommended that the feasibility of the adoption of cloud computing should be investigated by focusing on the comparison of IT service providers’ policies and strategies so that to understand the factors that influence the adoption of cloud computing.
10
IX. RESULTS
The results of the current study will be outlined in five parts as follows:
1. Part One: Internal Reliability and Test for Normality
1)Internal Reliability: the analysis of reliability in this research was conducted using the cronbach’s alpha test of reliability, which gave a value of 73%. This shows that there is a significant level of internal reliability in the questionnaire constructs and items.
2)Test of Normality: in order to test the normal distribution of data, Kolmogrov- Smirnov test was used. The test shows that the data of this study are normally
distributed as the result of the test was above 5% as follows:
Table 2
Test for Normality
|
|
|
|
|
|
The Fields |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Test |
|
|
Confidence Crisis in |
|
Confidence Crisis in |
|
Confidence Crisis in |
|
|
|
|
the Programs and |
|
Service Providers |
|
Protection and |
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
Operations |
|
|
|
Security |
|
|
Kolmogorov- |
1.591 |
1.265 |
1.666 |
|
||||
|
Smirnov |
|
|||||||
|
|
|
|
|
|
|
|
2. Part Two: The Characteristics of the Study Sample
The study sample was grouped with relation to four main characteristics: academic degree, occupation, experience and IT training, as shown in the following table:
Table 3
Frequency and Percent of the Four Sample Characteristics
|
|
Frequency |
|
Percent |
|
Cumulative Percent |
|
|
|
|
|
|
|||
Academic Degree: |
|
|
|
|
|
|
|
Diplomat |
48 |
46.20% |
46.20% |
|
|||
Bachelor |
44 |
42.30% |
88.50% |
|
|||
Master |
12 |
11.50% |
100% |
|
|||
PhD |
0 |
0 |
|
|
|
||
Total |
104 |
100% |
|
|
|
||
Occupation: |
|
|
|
|
|
|
|
Financial Manager |
48 |
46.20% |
46.20% |
|
|||
Assistant Financial Manager |
56 |
53.80% |
100% |
|
|||
Total |
104 |
100% |
|
|
|
||
Experience: |
|
|
|
|
|
|
|
Less than 3 years |
20 |
19.20% |
19.20% |
|
|||
3 to 6 years |
56 |
53.80% |
73.10% |
|
|||
6 to 9 years |
20 |
19.20% |
92.30% |
|
|||
More than 9 years |
8 |
|
|
100% |
|
||
Total |
104 |
100% |
|
|
|
||
IT Training: |
|
|
|
|
|
|
|
Yes |
12 |
11.50% |
11.50% |
|
|||
No |
92 |
88.50% |
100% |
|
|||
Total |
104 |
100% |
|
|
|
The table above shows the representativeness of the study sample of the entire population. The statistics show that the majority of the sample have either a Diplomat or a Bachelor degree; a lesser number have a Master degree, and none of the sample is a PhD holder. This distribution is normal given that the majority of Master degree holder
11 |
have a tendency to carry out their studies, and those who have a PhD degree opt for academic careers rather than field work.
The occupation is almost equally distributed across the sample; almost half of the informants are Financial Managers and the other half are Assistant Financial Managers. This strengthens the distribution of sample in that it creates a balance in the sample, and, consequently, the results. The study sample is limited to these two ranks due to the fact that the study is concerned with
The four levels of experience are equally represented in the sample, which means that the data and results have a high level of credibility.
Last but not least, the percentage of informants who received training is only 11.50%. Having such a small percentage is not counterproductive, given that the majority of employees in these ranks opt for training in finance and administration rather than in Information Technology because the nature of their work necessitates that. However, IT is of vital importance as the world is heading towards a more
3. Part Three: The Fields of Research
The distribution of scale weight must be presented before tackling the study fields. In this respect, the
Table 4
The Weight of the Questionnaire Items’ Answers
|
Values |
|
|
Strongly |
|
Agree |
|
Neutral |
|
Disagree |
|
|
Strongly |
|
Average |
|
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
||||||||||
|
|
|
Agree |
|
|
|
|
|
Disagree |
|
Mean |
|
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
Weight |
5 |
4 |
3 |
2 |
|
1 |
3 |
|
The average mean was calculated by the sum of all weights (15) and the division on the number of cases (5). This represents the fine line between agreement and disagreement on the questionnaire items.
The study fields were divided into three categories as follows:
1)Confidence crisis in the program and operations offered by the service providers.
2)Confidence crisis in the cloud computing service providers.
3)Confidence crisis in the security and protection offered by cloud computing service providers.
The means and standard deviations of the answers of the sample on the
questionnaire items are presented in the table below in order to see the level to which the informants agree or disagree with the questionnaire items.
Insert Table 5 here.
The previous table shows that the average mean of the items related to “the confidence crisis in the programs and operations” is above the average mean of the study (3). This means that the study sample agrees that there is a confidence crisis in the programs and operations offered by cloud computing service providers. This crisis subsumes the lack of confidence in the accounting programs and the processes of payment and data treatment as well as the service providers' databases, which hinders the companies’ implantation of cloud computing. The fifth item shows that the main reason behind such lack of confidence is the fact that the cloud computing are not up to par in terms of being underdeveloped and not adequately efficient.
12
Table 5
Means and Standard Deviations of Confidence Crisis in the Programs and Operations
|
Num- |
|
Item |
|
|
Means |
|
|
Standard |
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|||||
|
Ber |
|
|
|
|
|
Deviation |
|
||
|
|
|
|
|
|
|
|
|
||
|
1. |
|
Company’s lack of confidence in |
the accounting |
3.460 |
|
1.051 |
|
||
|
|
programs offered by service providers. |
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
2.Company’s lack of confidence in the payment process
|
offered by service providers. |
|
|
3.190 |
1.183 |
|
The process of transferring financial data |
from |
one |
|
|
3. |
server to another (internet servers to application servers) |
3.580 |
1.342 |
||
|
reduces the data credibility. |
|
|
|
|
4. |
A Company’s lack of confidence in the cloud treatment |
3.350 |
1.392 |
||
processes and financial data storage. |
|
|
|||
|
|
|
|
|
|
|
A Company’s lack of confidence in the |
accounting |
|
|
|
5. |
applications ability to meet all of its needs |
due to |
the |
3.310 |
1.239 |
|
applications' underdevelopment. |
|
|
||
|
|
|
|
|
|
6. |
A Company’s lack of confidence in the service providers’ |
3.380 |
1.297 |
||
databases. |
|
|
|||
|
|
|
|
|
|
|
Average |
|
|
3.378 |
|
Table 6
Means and Standard Deviations of Confidence Crisis in the Service Providers
|
Num- |
|
Item |
|
|
Means |
|
|
Standard |
|
|
|
|
|
|
|
|||||
|
Ber |
|
|
|
|
|
Deviation |
|
||
|
|
|
|
|
|
|
|
|
||
|
1. |
|
A Company’s lack of confidence in such services due to |
3.500 |
|
1.254 |
|
|||
|
|
its unfamiliarity with such |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
A Company’s lack of confidence in the continuity and |
|
|
|
|
|
|
|
|
2. |
|
consistency of the services offered by the service |
3.270 |
|
1.201 |
|
|||
|
|
|
providers. |
|
|
|
|
|
|
|
|
|
|
A Company’s lack of confidence due to suspected theft, |
|
|
|
|
|
|
|
|
3. |
|
sale or provision of data to other parties by the service |
3.460 |
|
1.372 |
|
|||
|
|
|
provider |
|
|
|
|
|
|
|
|
4. |
|
A Company’s lack of confidence in the sincerity of the |
3.540 |
|
1.454 |
|
|||
|
|
service providers’ policies. |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
Company’s lack of confidence in the service providers’ |
|
|
|
|
|
|
|
|
5. |
|
tendency to attend to their inquiries and change the |
3.460 |
|
1.051 |
|
|||
|
|
|
applications as quickly as required. |
|
|
|
|
|
|
|
|
|
|
Company’s lack of confidence in their ability to break the |
|
|
|
|
|
|
|
|
6. |
|
contract and retrieve all the data in case the company |
3.120 |
|
1.256 |
|
|||
|
|
|
seeks to deal with other service providers. |
|
|
|
|
|
|
|
|
|
|
Average |
3.391 |
|
|
|
|
The previous table presents the human rather the technical aspect of cloud computing; it shows the lack of confidence in the cloud computing service providers, which manifests in the high average score surpassing the average of the study by 0.391. As noted earlier, scores that are higher than the mean are indicative of agreement, and those below it are indicative of disagreement. A Company’s lack of confidence in the sincerity of the service providers’ policies represents the highest form of confidence crisis, followed by the company’s concern about the theft and unauthorized sale of data and its lack of confidence of the service providers’ responsiveness to the required changes to the applications. Another form of confidence crisis in the service providers is represented in the fact that the companies are concerned with their ability to safely retrieve their data in case they desire to deal with other service providers. The reasons
13 |
behind such confidence crisis can be attributed to the first item, which has the highest score, i.e., the companies are not highly familiar with having their data in other servers.
Table 7
Means and Standard Deviations of Confidence Crisis in the Security and Protection
|
Num- |
|
|
|
|
|
|
|
Std. |
|
|
|
Item |
|
|
Means |
|
|
|||
|
Ber |
|
|
|
|
|
deviation |
|
||
|
|
|
|
|
|
|
|
|
||
|
|
|
A Company’s lack of confidence in the security and |
|
|
|
|
|
|
|
|
1. |
|
protection measures that is supposed |
to safeguard the |
3.230 |
|
1.192 |
|
||
|
|
accounting programs against hacking when modified or |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
updated. |
|
|
|
|
|
|
|
|
2. |
|
A Company’s lack of confidence in the service providers’ |
2.960 |
|
1.230 |
|
|||
|
|
confidentiality and privacy needed for their financial data. |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
A Company’s lack of confidence in the security systems |
|
|
|
|
|
|
|
|
3. |
|
and the control measures that the service providers take |
3.540 |
|
1.372 |
|
|||
|
|
against the software that can penetrate and hack the |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
accounting programs and obtain or damage its data. |
|
|
|
|
|
|
|
|
|
|
Company’s lack of confidence in the |
service providers’ |
|
|
|
|
|
|
|
4. |
|
ability to properly recover its data in case of any technical |
3.230 |
|
1.225 |
|
|||
|
|
|
glitch. |
|
|
|
|
|
|
|
|
5. |
|
Companies lack of confidence in the |
service providers’ |
3.080 |
|
1.305 |
|
||
|
|
procedure that are supposed to secure the hardware. |
|
|
||||||
|
|
|
|
|
|
|
|
|
||
|
|
|
Company’s lack of confidence in the procedures and |
|
|
|
|
|
|
|
|
6. |
|
regulations that are supposed to prevent the lead of access |
3.230 |
|
1.225 |
|
|||
|
|
|
data. |
|
|
|
|
|
|
|
|
|
|
Average |
|
3.212 |
|
|
|
|
The average mean of confidence crisis in the security and protection shows a relative agreement of the informant on the items of this section. This means that the companies have a lack of confidence in the protection and security provided by the cloud computing service providers. Such lack of confidence is manifested in the companies’ distrust in the security measures taken by the service providers against the software that can hack the accounting programs, and their lack of confidence in the service providers’ ability to retrieve their data in case of any glitches. Moreover, the table shows that there is a distrust in the measure taken against the employees to prevent the leakage of data. Finally, the analysis shows that there is a lack of confidence in the safeguard of the service providers’ hardware.
4. Part Four: The
In order to investigate the differences in the informants’ responses with regard to their characteristics, two parametric statistical tests were used:
a)
b)
The results of the two tests show that there are no
4.1. The First Difference:
Table 8 shows that there are some statistically significant differences in the responses of the sample to the items of the “confidence crisis in programs and
14
operations” construct. On the other hand, table 9 shows that the Assistant Financial Managers have a higher average mean than that of the Financial Managers, which means that the Assistant Financial Managers are more interactive with the items of his construct. This can be attributed to the fact that the Assistant Managers are closer to the field work than the managers.
Table 8
Variance in Occupation and Confidence Crises in Programs and Operations
|
Field |
|
Variances |
|
T |
|
DF |
|
SIG |
|
|
|
|
|
|
|
|||||
Confidence Crisis in |
|
Equal |
102 |
0.000 |
|
|||||
Programs and |
|
Unequal |
97.623 |
0.000 |
|
|||||
Operations |
|
|
||||||||
|
|
|
|
|
|
|
|
|
Table 9
The Results of Descriptive Statistics Grouped by Occupation
|
Field |
|
Occupation |
|
Frequency |
|
Mean |
|
Std. Deviation |
|
|
|
|
|
|
|
|||||
Confidence Crisis in |
Financial Manager |
48 |
3.181 |
0.392 |
|
|||||
Programs and |
Assistant Financial |
56 |
3.548 |
0.570 |
|
|||||
Operations |
Manager |
|
||||||||
|
|
|
|
|
|
|
||||
|
Total |
|
104 |
|
|
|
|
|
4.2.The Second Difference:
Table 10 shows the statistically significant differences in the responses of
informants about the confidence crisis in the security and protection offered by cloud computing service providers. The results show that the individuals who have received IT training have a higher average mean than the informants who have not (table 11). This means that trained informants have a better understanding of the items of this field and have a better ability to respond to these items. This is due to the fact that these informants are familiar with the issues that can risk the security and protection of the systems.
Table 10
Variance in Occupation and Confidence Crisis in the Security and Protection
|
Field |
|
Variances |
|
T |
|
DF |
|
SIG |
|
|
|
|
|
|
|
|||||
|
Confidence Crisis in the |
|
Equal |
3.318 |
102 |
0.001 |
|
|||
|
Security and Protection |
|
Unequal |
2.820 |
12.955 |
0.015 |
|
Table 11
The Results of Descriptive Statistics Grouped by IT Training
|
Field |
|
Occupation |
|
Frequency |
|
Mean |
|
Std. deviation |
|
|
|
|
|
|
|
|||||
|
Confidence Crisis in the |
|
Yes |
12 |
3.889 |
0.903 |
|
|||
|
Security and Protection |
|
No |
92 |
3.123 |
0.732 |
|
|||
|
Total |
|
|
104 |
|
|
|
|
|
4.3.The Third Difference:
Table 12 shows the statistically significant differences in the responses of
informants about the confidence crisis in the service providers. The analysis shows that the master degree holders have a higher mean average than the rest of the groups. Table 13 shows the numeric differences between each group and the mean of the other two groups combined (referred to as I and J). The subtraction of (J) from (I) gives either positive or negative results. The results of table 13 suggest that the master
15 |
holders have the most consistent responses, which indicate that they have more concerns about the risks when dealing with service providers.
Table 12
Variance in the Academic Degree and Confidence Crisis in the Service Providers
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Source of |
|
Sum of |
|
|
|
|
Average |
|
|
|
|
|
|
|
Field |
|
|
DF |
|
|
|
F |
|
SIG. |
|
||||||
|
|
|
Variances |
|
Squares |
|
|
|
Square |
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
Confidence Crisis in |
|
5.092 |
2 |
2.546 |
|
|
|
|
|
|
||||||
|
the Service Providers |
|
36.229 |
101 |
|
0.359 |
7.097 |
0.001 |
|
||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
Total |
|
|
41.321 |
103 |
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
Table 13
The Results of Descriptive Statistics Grouped by Academic Degree
|
Field |
|
|
(I) |
|
(J) |
|
Mean (I) - (J) |
|
Std. Error |
|
SIG |
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
Diplomat |
|
Bachelor |
- 0.202 |
0.125 |
0.244 |
|
|||
|
|
|
|
|
Master |
- 0.722* |
0.193 |
0.001 |
|
||||
|
|
|
|
|
|
|
|||||||
|
Confidence Crisis in |
|
|
Bachelor |
|
Diplomat |
0.202 |
0.125 |
0.244 |
|
|||
|
the Service Providers |
|
|
|
Master |
- 0.521* |
0.195 |
0.024 |
|
||||
|
|
|
|
|
|
||||||||
|
|
|
|
Master |
|
Diplomat |
0.722* |
0.193 |
0.001 |
|
|||
|
|
|
|
|
Bachelor |
0.521* |
0.195 |
0.024 |
|
||||
|
|
|
|
|
|
|
5. Part Five: Hypotheses Testing
In order to test the hypotheses set for the current study, the researchers used
1)To gain more precision in identifying the aspects of confidence crisis.
2)The sum of the
“There is no confidence crisis in the application of cloud computing in the
industrial companies in Jordan”.
And the study
1)There is no confidence crisis in the program and operations offered by the service providers to apply cloud computing in the industrial companies in Jordan.
2)There is no confidence crisis in the cloud computing service providers in the industrial companies in Jordan.
3)There is on confidence crisis in the security and protection offered by cloud
computing service providers in the industrial companies in Jordon.
Table 14
|
Hypotheses |
|
|
Tabulated |
|
Calculated |
|
|
SIG. |
|
|
Average |
|
Result |
|
|
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
mean |
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|||||
No |
Confidence |
Crisis |
in |
1.960 |
|
7.324 |
|
0.000 |
|
3.278 |
|
Refuted |
||||
the Programs and Operations |
|
|
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
No |
Confidence |
Crisis |
in |
1.960 |
|
6.296 |
|
0.000 |
|
3.391 |
|
Refuted |
||||
the Service Providers |
|
|
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
No |
Confidence |
Crisis |
in |
1.960 |
|
2.739 |
|
0.007 |
|
3.212 |
|
Refuted |
||||
the Security and Protection |
|
|
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
The Main Hypothesis |
|
|
|
|
|
|
|
|
|
|
||||
No |
Confidence |
Crisis in |
the Application |
of Cloud |
|
|
|
|
|
Refuted |
|
|
|
|||
Computing |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16
The null hypothesis is refuted if the Calculated
1)There is a confidence crisis in the program and operations offered by the service providers to apply cloud computing in the industrial companies in Jordan.
2)There is a confidence crisis in the cloud computing service providers in the industrial companies in Jordan.
3)There is a confidence crisis in the security and protection offered by cloud computing service providers in the industrial companies in Jordan.
Since the three null
“There is a confidence crisis in the application of cloud computing in the industrial companies in Jordan”.
The study main results can be concluded as follows:
1.There is a Confidence Crisis in the Application of Cloud Computing in the Industrial Companies in Jordan (the main hypothesis). The categories of this crisis are:
1)Confidence crisis in the program and operations offered by the service providers (the first
a)A Company’s lack of confidence in the process of transferring financial data from one server to another (internet servers to application servers).
b)A Company’s lack of confidence in the accounting programs offered by service providers.
c)A Company’s lack of confidence in the service providers’ databases.
d)A Company’s lack of confidence in the Cloud treatment processes and financial data storage.
e)A Company’s lack of confidence in the accounting applications ability to meet all of its need due to its underdevelopment.
f)A Company’s lack of confidence in the payment process offered by service providers.
2)Confidence crisis in the Cloud Computing service providers in the industrial companies in Jordan (the second
a)A Company’s lack of confidence in the sincerity of the service providers’ policies.
b)A Company’s lack of confidence in such services due to its unfamiliarity with such
c)Company’s lack of confidence due to suspected theft, sale or provision of data to other parties by the service provider.
d)A Company’s lack of confidence in the service providers’ tendency to attend to their inquiries and change the applications as quickly as required.
e)A Company’s lack of confidence in the continuity and consistency of the services offered by the service providers.
f)A Company’s lack of confidence in their ability to break the contract and retrieve all the data in case the company seeks to deal with other service providers.
3)Confidence crisis in the security and protection measures taken by Cloud Computing service providers in the industrial companies in Jordan (the third
17 |
a)A Company’s lack of confidence in the security and protection measures that is supposed to safeguard the accounting programs against hacking when modified or updated.
b)A Company’s lack of confidence in the service providers’ ability to properly recover its data in case of any technical glitch.
c)A Company’s lack of confidence in the procedures and regulations that are supposed to prevent the lead of access data.
d)A Companies lack of confidence in the service providers’ procedure that are
supposed to secure the hardware.
2.There are Statistically Significant Variances in the Study Fields the Sample Characteristics, as Shown in the Following Table:
Table 15
The Statistically Significant Variances in the Study Fields and the Sample Characteristics
|
Num- |
|
|
Field |
|
|
|
|
Sample |
|
|
In favour |
|
Interpretation |
|
|||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
|
ber |
|
|
|
|
|
|
|
Characteristics |
|
|
of |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
1. |
|
Confidence |
Crisis |
|
|
|
Occupation |
(fi- |
|
Assistant |
|
Assistants |
|
|
are |
|||||||
|
|
|
in |
the Programs |
|
|
|
nancial |
manager, |
|
financial |
|
more |
interactive |
||||||||
|
|
|
and Operations |
|
|
|
assistant |
financial |
|
manager |
|
with |
|
the items |
of |
|||||||
|
|
|
|
|
|
|
|
|
manager) |
|
|
|
|
|
|
this field. |
|
|
|
|
||
2. |
|
Confidence |
crisis |
|
|
|
Training (yes/no) |
|
IT- |
|
||||||||||||
|
|
|
in the security and |
|
|
|
|
|
|
|
|
trained |
|
ants |
have |
a better |
||||||
|
|
|
|
|
|
|
|
|
|
|||||||||||||
|
|
|
protection |
|
|
With |
|
|
|
|
|
|
informan |
|
of |
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ts |
|
the |
items |
of |
this |
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
field |
|
and |
have |
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
more |
capacity |
to |
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
respond to them. |
||||||
3. |
|
Confidence |
crisis |
|
|
|
Academic |
degree |
|
Master |
|
Master holders are |
||||||||||
|
|
|
in |
the |
service |
|
|
|
(Diplomat, Bache- |
|
holders |
|
more consistent in |
|||||||||
|
|
|
providers |
|
|
|
|
lor, Master) |
|
|
|
|
|
their responses are |
||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
apparently |
more |
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
concerned |
about |
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
the |
risk |
resulting |
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
from |
dealing |
with |
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
service providers |
X. RECOMMENDATIONS
The researchers recommend the following:
1.Cloud Computing service providing companies should promote and encourage the use and mechanisms of Cloud Computing and the security and protection measures to the systems, applications and data at their disposal so that the companies can get rid with such lack of confidence.
2.Guiding the financial managers and assistant financial managers to receive IT training due to its importance in developing and improving the accounting businesses, and due to the positive impact it has on the confidence in electronic businesses and the most recent technological advances.
3.Conducting more research studies on the factors that prevented the industrial companies in Jordan from having confidence in the implementation of cloud computing.
18
REFERENCES
Abid, M. H., Jan, F., Mustafa, T., & Faridi, M. S. (2012). Cloud computing: A general user’s perceptions and security issues at Universities of Faisalabad, Pakistan. International Journal of Computer Science Issues, 9(5),
268.Retrieved from https://www.iasj.net/iasj?func=fulltext&aId=113471. Alhammadi, A., Stanier, C., & Eardley, A. (2015). The determinants of cloud computing
adoption in Saudi Arabia. Computer Science & Information Technology,
Aljabre, A. (2012). Cloud computing for increased business value. International Journal of
Business & Social Science, 3(1),
Alkhater, N., Wills, G., & Walters, R. (2014, December). Factors influencing an organisation's intention to adopt cloud computing in Saudi Arabia (pp.
(CloudCom). Retrieved from https://eprints.soton.ac.uk/372717/1/ my%2520paper.pdf.
Bansode, S. Y., & Pujar, S. M. (2012). Cloud computing and libraries. DESIDOC Journal of Library & Information Technology, 32(6),
Bhour, K. M. S. (2016). The presence of factors influencing the adoption and application of cloud computing in the government institution from the higher management perspective. Master’s
thesis, Islamic University Gaza, Palestine. Retrieved from https://iugspace.iugaza.edu.ps/handle/20.500.12358/20793.
Budņiks, L., & Didenko, K. (2014). Factors determining application of cloud computing services in Latvian SMEs.
77.Retrieved from https://www.researchgate.net/publication/275544705_ Factors_Determining_Application_of_Cloud_Computing_Services_in_Latvian_ SMEs.
Chen, N. C. (2009). A feasibility study of the adoption of cloud computing in the development of information system. Master's thesis, The University of Sheffield, Sheffield, UK.
Elena, G., & Johnson, C. W. (2015). Factors influencing risk acceptance of cloud computing services in the UK government. International Journal on Cloud Computing: Services & Architecture (IJCCSA), 5(2/3),
19 |
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5),
Hashemi, S. (2013). Cloud computing technology: Security and trust challenges. International Journal of Security, Privacy & Trust Management (IJSPTM), 2(5),
Hashim, H. S., & Hassan, Z. B. (2015, August). Factorsthat influence the users’ adoption of cloud computing services at Iraqi universities: An empirical study. Australian Journal of Basic & Applied Sciences, 9(27),
Hsu, C. L., & Lin, J. C. C. (2016). Factors affecting the adoption of cloud services in enterprises. Information Systems&
from
Hurwitz, J., Bloor, R. & Kaufman, M. (2010). Cloud computing for dummies. Indiana:
WileyPublishing, Inc. Retrieved from: https://fit.mta.edu.vn/files/ DanhSach/_R_Book_HP_cloudcomputingfordummies.pdf.
Hussein, A., & Mohamed, O. (2015). Cloud computing and its effect on performance excellence at higher education institutions in Egypt (an analytical study). European
Scientific Journal, (Special edition),
Jelonek, D., & Wyslocka, E. (2014). Barriers to the development of cloud computing adoption and usage in SMEs in Poland. Advances in Information Science & Applications, 1,
Kaushik, A., & Kumar, A. (2013). Application of cloud computing in libraries. International Journal of Information Dissemination & Technology, 3(4),
Majhi, S., Meher, S., & Maharana, B. (2015). Awareness and usage of cloud computing application among LIS professionals: A case study of 17 Indian University Libraries. Library Philosophy and Practice
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (pp.
Mohammed, D. (2011, May 26). Security in cloud computing: An analysis of key drivers and constraints. Information Security Journal: A Global Perspective, 20(3),
Office of Jordan Industrial Estates Corporation. (2017). Statistics.
Pawar, N., & Udgir, V. (2016, June). A comparative study of data security in cloud computing environment. International Journal of Science, 2(3),
20
Qurayqaa, M. Z. H. (2014). Effectiveness of a training program for the use of cloud computing applications in the development of
Islamic University, Gaza, Palestine. Retrieved from http://library.iugaza.edu.ps/thesis/115027.pdf.
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1),
Romney, M. B., & Steinbart, P. J. (2012). Accounting information systems (12th ed.). Boston: Pearson.
Saleem, T. A. (2016). Cloud computing between theory and Practice. Cybrarians Journal, 42,
Sayed, R. F. A. (2013). Open source cloud computing systems: Comparative analytical study. Iraqi Journal of Information Technology, 5(2),
Sharif, W. A., Hassan, M. A., Kurdi, S. A., &Yaafi, W. A. (2013). Effectiveness of the knowledge cloud containers and its role in supporting
Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15,
Tarmidi, M., Rasid, S. Z. A., Alrazi, B., & Roni, R. A. (2014). Cloud computing awareness and adoption among accounting practitioners in Malaysia. Procedia-
Social & Behavioral Sciences, 164,
Turab, N. M., Taleb, A. A., & Masadeh, S. R. (2013). Cloud computing challenges and solutions. International Journal of Computer Networks & Communications, 5(5), 209- 216. Retrieved from http://airccse.org/journal/cnc/5513cnc15.pdf.
Zhygalova, A. (2013). Perceived value of cloud based information systems. Case: Accounting Information Systems. Master's Thesis, Aalto University. Retrieved from https://aaltodoc.aalto.fi/bitstream/handle/123456789/12746/hse_ethesis_1352 5.pdf?sequence=1&isAllowed=y.
Zissis, D., &Lekkas, D. (2012). Addressing cloud computing security issues. Future
Generation Computer Systems, 28(3),