Hajjat et al., (2010) proposed a model for the
migration of an enterprise’s applications to a hybrid
cloud. The aim of this study was to identify the costs
and benefits of migrating part of the system to the
cloud. The effectiveness of this approach was briefly
evaluated based on a case study of the migration of
applications to the cloud. However, this work does
not mention how the cost can be computed and only
focuses on one type of cloud (the hybrid cloud).
They also did not consider the security aspect.
Hu and Klein (2009) have carried out a study to
investigate privacy issues during migrating e-
commerce applications to the cloud. Their study
suggests that the user’s data and critical business
information must be encrypted during the migration
process. The authors have also studied and
compared existing data encryption methods in
different layers (storage, database, middleware and
application). They argue that the middleware layer
encryption is the most effective approach for
migrating e-commerce applications to the cloud in
terms of performance. The evaluation of their work
was based on a case study for an e-marketplace
application. Indeed, this approach discussed data
encryption, particularly for the transmission of e-
commerce applications to the cloud. This method
helps to ensure privacy of data and provides
protection for applications during the migration
process. Nevertheless, the authors did not point out
how the data and applications would be migrated to
the cloud; they also ignored the other aspects of
security and privacy that need to be considered.
Hao et al., (2009) proposed a cost model that can
be used to determine the type of services included in
migration and their possible location. The model that
they developed used a genetic algorithm to provide
an effective decision for service migration, by
looking for the most optimal migration decisions. In
this study, besides considering the cost of service
migration, they evaluated the cost of consistency
maintenance and communication. It is important to
have strong decision support for the infrastructure
support, prior to migration. However, the authors
omit security in the migration process and they deal
only with the security aspect that involves accessing
the control process by proposed mutual
authentication using certificate authority.
Kaisler and Money (2011) have conducted a
study to investigate issues associated with service
migration to a cloud, as well as the security
problems involved with service implementation.
They considered several security challenges. It is
noticeable that this study simply lists the possible
challenges without any evaluation; it also ignores the
security aspects in the migration process.
2.3 A Review of Proposed Models for
the Adoption of New Technologies
This section describes relevant theories and
frameworks for the adoption of new technologies. It
includes the TOE framework, the Diffusion of
Innovations (DOI) theory and the institutional
theory, which have been widely adopted by
researchers.
Tornatzky and Fleischer (1990) proposed the
TOE framework to analyse the acceptance of new IT
technologies at an organisational level. The TOE
framework investigates the impact of three factors,
Technology, Organisation and Environment, on the
organisation’s decision to adopt a new technology.
According to Tornatzky and Fleischer (1990) and
Chau and Tam (1997), TOE can be summarised as
follows:
The technology aspect describes the internal and
external characteristics of the new technology
and how adopting a new technology can
influence the organisation.
The organisational context is focused on
different measures that can influence the
direction of the organisation, for example, firm
size and scope of interests.
The environmental context refers to the
characteristics of the environment where an
organisation operates its business and might have
a significant impact on their decision.
Government regulation and competitors are an
example of the environmental context.
The DOI was proposed by Rogers (1995). DOI is a
widely used theory in information system research to
examine user acceptance of new ideas and
technologies. The DOI theory presents five attributes
that have a direct influence on adoption rate: relative
advantage, complexity, compatibility, trialability and
observability.
The institutional theory is one of the common
theories usually used for explaining the adoption of
IT technologies (Scott and Christensen, 1995; Scott,
2001). The different between the TOE framework
and institutional theory is that institutional theory
contains two important elements (trading partner
pressure and competitors) in the environmental
context of the TOE framework which might play an
important role in an organisation’s decision to adopt
new technologies.
The other models which have been built based on
previous theories in order to identify the factors that
affect on a firm's decision to implement cloud
computing are presented in a previous work
ESaaSA2015-WorkshoponEmergingSoftwareasaServiceandAnalytics
82