2015
DOI: 10.1016/j.ijinfomgt.2015.03.001
|View full text |Cite
|
Sign up to set email alerts
|

The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

10
162
0
6

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 192 publications
(178 citation statements)
references
References 80 publications
10
162
0
6
Order By: Relevance
“…These results support other research stream that considers IT capabilities as multidimensional constructs [infrastructure, management, people, knowledge] (Kim, Shin, Kim, & Lee, 2011) and which analyzes IT value on intermediate performance (Garrison, Wakefield, & Kim, 2015), namely: business processes (Chen et al, 2014) and information quality (Hartono, Li, Na, & Simpson, 2010).…”
Section: Introductionsupporting
confidence: 84%
See 3 more Smart Citations
“…These results support other research stream that considers IT capabilities as multidimensional constructs [infrastructure, management, people, knowledge] (Kim, Shin, Kim, & Lee, 2011) and which analyzes IT value on intermediate performance (Garrison, Wakefield, & Kim, 2015), namely: business processes (Chen et al, 2014) and information quality (Hartono, Li, Na, & Simpson, 2010).…”
Section: Introductionsupporting
confidence: 84%
“…In this case, the partial mediation of performance at the process level to the relationship between IT capabilities and firm performance (H5) supports the assumption of IT benefits, primarily, at the business processes level (Bradley et al, 2012;Garrison et al, 2015;Iyer, 2011;Mithas et al, 2011;Soto-Acosta & Meroño-Cerdan, 2008;Tallon, 2010).…”
Section: Discussionsupporting
confidence: 60%
See 2 more Smart Citations
“…Issues related to cloud security are relevant to the various stakeholders as follows; decision-making on cloud adoption [6], resource management and service quality delivery [7,8], Distributed Denial of Service (DDoS) attacks [9][10][11], fatal attacks [12], machine learning-based cloud security [13], Threat and Risk Management (TRM) schemes [14], an integrated cloud incident handling and forensics model [15], a cross tenant access control model [16], and so on.…”
Section: Introductionmentioning
confidence: 99%