L’envol vers le Cloud: un phénomène de maturations multiples
Keywords:Cloud Computing, Théorie enracinée, Décision d’implantation, Maturations multiples, Configurations, Consumérisation
AbstractCloud Computing is more and more described as the new paradigm of modern computing. In this article, our goal is to understand the mechanisms that lead to the decision to implement a cloud computing solution in organizations. This research adopts a qualitative methodology, based on the analysis of open and semi-structured interviews with people directly involved in the decision process of Cloud Computing implementation. Various trades and sectors are represented, amongst others we interviewed people working in consulting firms, software publishing companies and inside IT management departments of several businesses (which vary in size). This paper has several main contributions. First, the core category that emerged is the concept of multiple maturations. This multiple-maturation concept is seen as a process leading (or not) to an implementation decision. Second, this maturation process emerged at four different levels, as is evidenced by the identification of four different types of maturity: the organizational maturity, the security maturity, the maturity of the cloud solution, and the maturity of the legal environment. Third, our data also suggests that the decision to implement Cloud Computing at the organizational level is related to a broader pressure of the competitive environment and a pressure from users through the consumerization phenomenon. These contributions enrich the existing literature by emphasizing the fact that maturations are multiple and have their own configurations.
● 'SaaS Adoption Hindered by Integration Fears: Report' 2011, Channel Insider, p. 1.
● Anthes, G. (2010), “Security in the Cloud”, Communications Of The ACM, n°53, 11, p. 16-18.
● Armbrust, M. et al. (2009), “Above the Clouds: A Berkeley View of Cloud Computing”, Science, n°53, p.07-013.
● Bohlen, J.M. & Beal, G.M. (1957). “The Diffusion Process”. Special Report No 18, p.1-6.
● Boucher, E. (2009) « Software as a Service, quelle est la maturité de ce marché et les possibilités d’utilisation par les entreprises », Thèse en Management des Systèmes d’Information et de la Technologie, HEC Paris.
● Brynjolfsson, E., Hofmann, P. & Jordan, J. (2010), “Cloud Computing and electricity: beyond the utility model”. Communications of the ACM, n°53, p.32-34.
● Choudhary, V. (2007), “Comparison of Software Quality Under Perpetual Licensing and Software as a Service”, Journal of Management Information Systems, n°24, 2, p.141-165
● Dauber, D., Fink, G., & Yolles, M. (2012). A Configuration Model of Organizational Culture. SAGE Open, 2(1).
● Davis, F.D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”. MIS Quarterly, n°13, 3, p.319.
● Dlodlo, N. (2011), “Legal, Privacy, Security, Access and Regulatory Issues in Cloud Computing”, Proceedings of the European Conference on Information Management & Evaluation, pp. 161-168.
● Eaves, Y.D. (2001), “A synthesis technique for grounded theory data analysis”. Journal of Advanced Nursing, n°35, 5, p.654-663.
● Etchevers, X. et al. (2011). « Auto-configuration d’applications réparties dans le nuage », RenPar’20 / SympA’14 / CFSE 8.
● Etro, F. (2009), “The Economic Impact of Cloud Computing on Business Creation, Employment and Output in Europe An application of the Endogenous Market Structures Approach to a GPT innovation”, Review of Business and Economics, n°2, 2, p.179 - 209.
● Fouquet, M. & Carle, G. (2009). “Cloud Computing for the Masses Position Paper”, Proceedings of the 1st ACM workshop on User provided networking challenges and opportunities, p.31-36.
● Ganguly, A, Nilchiani, R, & Farr, J. (2010), “Defining a Set of Metrics to Evaluate the Potential Disruptiveness of a Technology”, Engineering Management Journal, n°22, 1, p. 34-44.
● Ginovsky, J. (2011), “Clouds in that Cloud?”, ABA Banking Journal, n°103, 4, p. 20-24.
● Glaser, B.G. & Strauss, A.L. (1967). “The Discovery of Grounded Theory: Strategies for Qualitative Research”, Ed., Aldine.
● Glaser, B. (1978). “Theoretical sensitivity: Advances in the methodology of grounded theory”. The Sociology Press.
● Glaser, B. (1998). “Doing Grounded Theory: Issues and Discussions”. Sociology Press, Mill Valley, CA.
● Goethals, F., Snoeck, M., & Lemahieu, W. (2011). Options in inter-organizational systems integration. Systemes d'Information et Management, 16(3), 1-34.
● Grover, V., & Goslar, M. D. (1993). The initiation, adoption, and implementation of telecommunications technologies in US organizations. Journal of Management Information Systems, 141-163.
● Harris, W. (2011), “Cloud Computing-Based IT Solutions for Organizations With Multiregional Branch Offices”, Proceedings of the European Conference on Information Management & Evaluation, p. 435-440.
● Iyer, B, & Henderson, J. (2010), “Preparing for the future: understanding the seven capabilities of Cloud Computing”, MIS Quarterly Executive, n°9, 2, p.117-131.
● Khaiata, M., & Zualkernan, I. A. (2009). A simple instrument to measure IT-business alignment maturity. Information Systems Management, 26(2), 138-152.
● Kandukuri, B.R., V, R.P. & Rakshit, A. (2009), “Cloud Security Issues”, 2009 IEEE International Conference on Services Computing, p.517-520.
● Katzan, H. (2010) “On An Ontological View of Cloud Computing”, Journal of Service Science, Vol. 3, No1.
● KPMG (2011), “Le Cloud Computing en voie d’adoption”, Communiqué de presse, 08/12/2011
● Leimeister, S. et al. (2010), “The Business Perspective of Cloud Computing: Actors, Roles, and Value Networks”, 18th European Conference on Information Systems ECIS.
● Liang, T.-P. & Tanniru, M.R. (2007), “Customer-Centric Information Systems”. Journal of Management Information Systems, n°23, 3, p.9-15.
● Luftman, J. (2004). Assessing business-IT alignment maturity. Strategies for information technology governance, 4, 99.
● Marston, S., et al. (2011), “Cloud Computing - The business perspective”, Decision Support Systems, n°51, 1, p.176-189.
● McAfee, A (2011), “What every CIO needs to know about the Cloud”, Harvard Business Review.
● McCafferty, D. & Reisinger, D (2011), “The Consumerization of IT”, CIO Insight, N°118, p. 8.
● McFarlane, A. (2011), “Consumerisation: a matter of control”, Global Telecoms Business, n°117, p. 46-47.
● Ménard, B. (2010), « L’entreprise numérique: quelles stratégies pour 2015? », Ed. Nuvis.
● Meyer A.D., Tsui A.S. and Hinings C.R. (1993) Configurational approaches to organizational analysis. Academy of Management Journal 36(6), 1175-1195.
● Mikkilineni, R., Sarathy, V. (2009), “Cloud Computing and the Lessons from the Past, Enabling Technologies: Infrastructures for Collaborative Enterprises”. 18th IEEE International Workshops, p.57-62.
● Ngosi, T., Helfert, M., & Braganza, A. (2011, April). Increasing knowledge management maturity in organisations: A capabilities-driven model. In Proceedings of the 3rd European Conference on Intellectual Capital (p. 302).
● Pavlou, P.A. & El Sawy, O.A. (2010). “The “Third Hand”: IT-Enabled Competitive Advantage in Turbulence Through Improvisational Capabilities”, Information Systems Research, n°21, 3, p.443-471.
● Redwine, S. & Riddle, W. (1985), "Software technology maturation.", Proceedings of the Eighth ICSE, May 1985, pp. 189-200.
● Rogers, E.M. (1995). “Diffusion of innovations”, D. W. Stacks & M. B. Salwen, eds., Free Press.
● Seltsikas, P. & Currie, W.L. (2002), “Evaluating the application service provider (ASP) business model: the challenge of integration”, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, p.2801-2809.
● Shaw, M., & Clements, P. (2006). The golden age of software architecture. Software, IEEE, 23(2), 31-39.
● Shivakumar, B, & Raju, T. (2010), “Emerging Role of Cloud Computing in Redefining Business Operations”, Global Management Review, n°4, 4, p. 48-52.
● Smith, R. (2009), “Computing in the Cloud”, Research Technology Management, n°52, 5, p. 65-68.
● Sotola, R. (2011), “Billing in the Cloud: The missing link for Cloud providers”, Journal of Telecommunications Management, n°3, 4, p. 313-320.
● Suddaby, R. (2006), “From the editors: What grounded theory is not”, Academy of Management Journal, n°49, 4.
● Talbot, C. (2011), “Citrix CEO: Don't Fight the Consumerization of IT”, Channel Insider, p. 1-2.
● Vaquero, L.M. et al. (2008), « A break in the Clouds: towards a Cloud definition”, ACM SIGCOMM Computer Communication Review, n°39, 1, p.50-55.
● Xue, L., Ray, G. & Gu, B. (2010) “Environmental Uncertainty and IT Infrastructure Governance: A Curvilinear Relationship”, Information Systems Research, n°22, 2, p.1-13.
The author bears the responsibility for checking whether material submitted is subject to copyright or ownership rights (e.g. figures, tables, photographs, illustrations, trade literature and data). The author will need to obtain permission to reproduce any such items, and include these permissions with their final submission.
It is our policy to ask all contributors to transfer for free the copyright in their contribution to the journal owner. There are two broad reasons for this:
- ownership of copyright by the journal owner facilitates international protection against infringement of copyright, libel or plagiarism;
- it also ensures that requests by third parties to reprint or reproduce a contribution, or part of it, in either print or electronic form, are handled efficiently in accordance with our general policy which encourages dissemination of knowledge within the framework of copyright.
In conformity with the French law, the author keeps the 'moral rights' related to the article:
- The 'authorship right': It is the author's right to have his name associated with each publication and exploitation of the article.
- The 'integrity right': It can be claimed by the author if he finds that during an exploitation, his work has been distorted (cutting, reassembly...).