An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention
Abstract
1. Introduction
2. Literature Review
2.1. Cloud Computing as a Driver of Development
2.2. Overview of Cloud Computing
2.3. Information Security, Privacy, and Their Development Implications
2.4. Theoretical Framework and Development Contexts
2.5. Research Problem and Development Significance
3. Research Design and Conceptual Model
- Performance ExpectancyAccording to Venkatesh, Morris [18], one of the root constructs in the UTAUT is performance expectancy, which determines perceived usefulness. Performance expectancy is the degree to which individuals believe using a system will enhance job performance. Amron, Ibrahim [75] captured it as the level at which users believe using government cloud services will help them achieve performance, which is considered in the research.
- Effort ExpectancyEffort expectancy is the level of ease of use associated with using the system [18]. The construct is significant in contexts where ease of use is important and will be a vital determinant of an individual’s intention to adopt the system. The ease-of-use root construct that contributed to the formation of effort expectancy indicates that the measurement scale should measure how easy it is to learn how to operate the system. According to Amron, Ibrahim [75], individuals with adequate effort expectancy have significant intentions to accept technology.
- Social InfluenceThe social factors (as outlined in the measurement scale, the organisation has supported the use of the system) were identified as one of the root constructs in determining social influence. Social influence, as described by Venkatesh, Morris [18], is the degree to which individuals perceive the importance that others ascribe to using the system. It is the direct determinants of behavioural intention influenced by how others perceive the use of the technology [74]. This study will not consider social influence, as it does not significantly relate to what the research intends to examine.
- Facilitating ConditionsAccording to Venkatesh, Morris [18], facilitating conditions are the level at which an individual believes that an organisation and technical infrastructure exist to support the use of the system. The construct captures operational concepts that include technological and organisational environments designed to remove barriers to using the system. Considering the facilitating conditions, the study assumes that individuals believe that government institutions have a mechanism to mitigate the barrier to adopting cloud services. The security and privacy challenges that hinder the adoption of cloud computing in government can be addressed through organisational support and the development of a governance framework to support government use of cloud computing for trusted service delivery to citizens.
3.1. Conceptual Model
3.2. Research Constructs
- PrivacyPrivacy is a substantive right to protect citizens’ data. Abed and Chavan [41] identified data protection and privacy as significant challenges for multinational corporations in cloud computing. Government institutions aim to achieve better service delivery by adopting cloud computing, but various information security and privacy issues have been a significant concern [58,87]. Privacy has been labelled as one of the leading roles in the adoption of cloud computing because cloud services and technology operate in a manner that access could be granted to users’ personally identifiable information (PII) through a virtualised environment; this is evident in the work of Ukeje, Gutierrez [9], where privacy was identified as a significant challenge to the government’s intention to adopt cloud services. Arafat [36] also confirmed that cloud computing security, especially data security and privacy protection, is the primary inhibitor for adopting cloud computing services.Additionally, privacy captures individual perceptions of how personally identifiable information (PII) is protected, monitored, and possibly misused within a cloud environment. This is highlighted as a key barrier to public cloud adoption in government sectors [17] and observed not just a legal or ethical requirement for cloud providers [81], and the government; instead, it is the foundational element that can significantly influence the behavioural intention of the government to adopt cloud services and identify reliable cloud providers when a public cloud is considered as an option. Therefore, this study proposed a construct to examine the significant influence of privacy on the government’s intention to adopt cloud services.
- Governance FrameworkA governance framework is vital in integrating cloud computing services into government structures and processes. The study proposed a governance framework as the new construct. The governance processes cut across policies, laws, regulations, compliance rules, and frameworks [88] that guide the implementation and adoption of cloud computing for service delivery. The governance framework encompasses several other components, including data protection, regulations, compliance, strategies, and the roles and responsibilities of stakeholders. The process ensures citizens’ privacy and security protection through an outlined framework that guides various attributes like confidentiality, integrity, and availability.From the public sector, a process-oriented and institutional perspective, governance frameworks establish the normative and structural boundaries within which adoption decisions are made. The governance processes are a top management support priority, as they will ultimately affect adoption decisions [89] and build its intention for cloud services adoption. Governments are typically risk averse and operate in highly regulated environments, making top–down regulatory and strategic decisions central to any adoption initiatives. Effective governance frameworks can mitigate perceived institutional risk, enhance inter-agency collaboration, and ensure compliance with national or sectoral regulations [83].This study examines the level of protection and the relationship the governance framework has with the government’s intention to adopt cloud services and, therefore, proposes the governance framework as a construct ensuring compliance in influencing cloud services adoption in government.
- Performance ExpectancyPerformance expectancy, which is one of the UTAUT variables, has been identified to influence behavioural intention to adopt and use information systems and information technology [90,91]. According to Amron, Ibrahim [75] and Venkatesh, Thong [73], these attributes encompass the overall performance and features of technologies that influence adoption decisions. According to Venkatesh, Morris [18], one of the root constructs in determining performance expectancy is perceived usefulness (the degree to which a person believes that using a particular system or technology would enhance their job performance). Performance expectancy (PE) is the level at which users believe using cloud services will help achieve performance improvement [75] and efficiency in governance. Nguyen, Nguyen [74] perceived the usefulness of cloud services in achieving performance (objectives) in governance through citizen participation and effective service delivery. This relates to the proposed research model, where the perceived usefulness of cloud services will positively enhance and influence the government’s intention to adopt them.This construct variable positions an innovative organisation to have a significant advantage over others through the perceived significant influence of performance expectancy on government intention to adopt cloud services and has a strong validation influencing behavioural intention to adopt and use information systems and information technology within the study’s contextual objectives and public sector contexts. Therefore, it is ideal to contend that the performance expectancy influences the government’s intention to adopt cloud services.
- Information SecurityInformation security is critical to protecting critical citizen and government information stored and in transit in cloud computing. Information security generally focuses on protecting confidentiality, integrity, and availability. Amron, Ibrahim [75] highlighted vulnerability within the virtual machine environment of a cloud model that reveals stored and shared data on a cloud platform, which constitutes a security breach that could affect the usage and intention to adopt cloud services for service delivery. The research highlighted various security risks that exist in the use of cloud computing, some of which are associated with cloud technology, misuse of the cloud application by the cloud providers (internal staff), and mismanaging cloud users’ details. Information security is considered critical to adopting government cloud services. Vurukonda and Rao [92] identified that the exponential increase in cloud users could lead to more significant security threats to cloud clients. Any successful attack on any entity could lead to a breach that allows unauthorised access to the data of all cloud users. This risk impact slows down the government’s intention to adopt cloud services. These are heightened within the public cloud environment, especially where national data infrastructures are involved and public sector data are sensitive and related to national security, citizens’ records, and other critical resources [87,88,89]. Therefore, information security was proposed to address the need to protect government information to ensure reliable cloud-based services, given the sensitivity of government data and the critical need to ensure robust security measures to influence citizen trust and the adoption of cloud services.
- Perceived RiskPerceived risk was further adapted to moderate various identified variables related to the government’s intention to adopt cloud services. The survey conducted by Riffai, Grant [93] observed that the moderating effects of the UTAUT model were inconsistent with the intention of technology acceptance. Despite the findings, this study examines the moderating effect of perceived risk to the identified challenging factors (information security and privacy) of government intention to adopt cloud services and the effect of performance expectancy on the government intention and use of cloud services. Further, it explores the moderating effect of the governance framework on the government’s intention to adopt cloud services. This is in relation to the willingness to adopt technology, which depends on the level of risk value; the higher the risk, the less desire to accept it [94].Most studies examined risk as an external factor (moderator) that influences variables of the UTAUT model [95,96]. In this study, it will be observed as the moderator that influences the performance, the likelihood of potential loss of information, and privacy in the use and adoption of cloud services, while there is no effective governance framework. It was further described as the crucial moderator of various significant determinants of an organisation’s intention to adopt cloud services. Alalwan, Dwivedi [95] claimed that perceived risk hinders behavioural intention in the UTAUT, while Chao [97] argued that no study had examined perceived risk as a moderating factor with the UTAUT model, which was postulated in the relationship between effort expectancy and behavioural intention. Therefore, this study adapted perceived risk as the moderator for the relationship between the independent variables (privacy, governance framework, performance expectancy, and information security) and the dependent variable (government intention to adopt cloud services). Thus, perceived risk was proposed as a moderate construct for this study.
4. Research Methodology
4.1. Data Collection Methods
- Data SurveyWe employed a structured questionnaire survey designed [100] to test and validate measurement scales for both technology adoption factors and their perceived influence on government intention to adopt cloud services. The survey instrument was specifically constructed to evaluate whether measurement scales could maintain a validity suitable in the Nigerian government context, where challenging factors significantly influence cloud computing adoption decisions. While questionnaires can be subject to non-response and sampling bias, the cross-sectional survey questionnaire approach [101] was particularly appropriate for testing measurement scales across Nigeria’s diverse governmental landscape.The survey approach facilitated the collection of sufficient data to conduct the psychometric analyses of the measurement scales, allowing us to determine which constructs effectively capture the relationships between cloud adoption challenging factors. We incorporated specific development-oriented measures to assess whether the scales adequately capture the unique challenges faced within public organisations.
- Data CollectionThe data collection procedure gathered responses necessary for psychometric validation of measurement scales from the key stakeholders responsible for technological decision making in Nigerian government institutions. An online survey approach was selected to ensure measurement equivalence across diverse government settings while minimising coverage and non-response errors [102]. The merits of adopting an Internet survey proved particularly relevant for scale validation [98], allowing us to reach a statistically significant sample across Nigeria’s dispersed government agencies.The anonymous online survey targeted participants from relevant Nigerian government organisations within the ministries, departments, and agencies (MDAs), including IT administrators, information security and privacy personnel, and others familiar with cloud computing. This sampling strategy ensured we could validate measurement scales across the full spectrum of stakeholders involved in government technology adoption decisions that impact IT development outcomes. Our methodology included measures to validate the measurement scales developed in the contexts that adequately captured the development dimensions of cloud adoption.
- Survey InstrumentThe survey instrument was meticulously designed to test and validate measurement scales for factors influencing government cloud adoption in developing regions like Nigeria, and we adopted a structured questionnaire format to systematically evaluate the psychometric properties of scales measuring privacy concerns, governance frameworks, performance expectancy, information security, and perceived risk, as well as their relationships.A 5-point Likert scale was used to measure respondents’ viewpoints, ranging from “Strongly Disagree (1) to “Strongly Agree” (5). This response format was selected based on the proven reliability of previous studies and its appropriateness for the Nigerian cultural context. Additional demographic questions using continuous (ratio-scaled) and dichotomous responses were included to enable an analysis of how institutional factors could influence the measurement scale.The research instrument adapted scales from previous studies [18,97,103,104], with careful modifications to ensure contextual relevance to Nigerian government settings and development priorities. While the foundational scales came from UTAUT research [18,105,106], we conceptualised the instrument to establish a measurement scale including items that are pertinent to information security and privacy concerns, public trust, cloud service accessibility, and performance and adoption in government.
4.2. Data Analysis Methods
5. Data Analysis Results and Research Findings
5.1. Coefficient of Reliability
5.2. Exploratory Factor Analysis (EFA)
- Kaiser–Meyer–Olkin (KMO) and Bartlett’s TestThe two statistical measures, the Kaiser–Meyer–Olkin (KMO) measure of sampling adequacy and Bartlett’s Test of Sphericity, give the statistical significance tests of the correlations to indicate the reliability between the pairs of the variables and sampling adequacy [107,114]. Tabachnick and Fidell [114] identify Kaiser’s measure of sampling adequacy as the ratio of the sum of the squared correlations to the sum of the squared correlations plus the sum of squared partial correlations. Pallant [107] suggested checking for data suitability for factor analysis by confirming the value of the Kaiser–Meyer–Olkin (KMO) measure of sampling adequacy value of 0.6 and above, as recommended by Tabachnick and Fidell [114], and Bartlett’s Test of Sphericity value should be significant at 0.05 and smaller.This study applies the Kaiser–Meyer–Olkin (KMO) measure of sampling adequacy and Bartlett’s Test of Sphericity to assess the factorability of the responses and ensure that the factor analysis is appropriate [107,114,124]. Stevens [118] suggested applying KMO and Bartlett’s test when a researcher uses component analysis with a small sample size. The analysis in Table 2 shows the Kaiser–Meyer–Olkin (KMO) measure of the sampling adequacy value of 0.731, and Bartlett’s test of statistical significance indicates <0.001 (p ≤ 0.001); therefore, the factor analysis is appropriate for the study, as specified by Pallant [107] and Tabachnick and Fidell [114].
- Communality Coefficients ValuesCommunality of a variable, as stated by Stevens [118] and Tabachnick and Fidell [114], connotes the number of variances on a variable that account for the set of factors, which is the sum of the square loadings for the variable through the factors. The communality values for the factors measured were also considered in addition to the factor loading of the items. Tabachnick and Fidell [114] described very low communality values as an indication that the variables are unrelated to other variables; therefore, the variable is usually an outlier among different variables and should be ignored or deleted in factor analysis. Thus, this study removed common variance values of less than 0.40 from the measurement scales, as Tabachnick and Fidell [114] recommended. Therefore, component item 1 for government framework (GovtF1) was removed, as shown in communality values for the components in Table 3.
- Total Variance ExplainedThe principal components analysis determines and extracts the number of factors (components) with eigenvalues of 1 or more, which is the common criterion to ascertain useful factors. According to Stevens [118], the eigenvalue indicates the number of variances reported by each factor. This is relevant to determining the number of components that meet Kaiser’s criterion of eigenvalues greater than 1. However, six components are retained in Table 4, as Tabachnick and Fidell [114] specify that a reasonable number of four to six factors is optimal for the total variance explained. The result analysis explained that 70.079% of the total variance consisted of the six factors (privacy, governance framework, performance expectancy, information security, perceived risk, and government intentions), as supported by Tabachnick and Fidell [114].
- Rotated Component MatrixTo further interpret the retention of the six components, the study analysed the components’ rotation matrix with varimax and Kaiser normalisation rotation. The rotation component matrix analysis results in Table 5 show that the first factor was the performance expectancy scale with four (4) items, and the factor loadings ranged between 0.780 and 0.886, explaining 24.798% of the variance. The second factor was the governance framework scale, with seven items, and the factor loading ranged between 0.454 and 0.762, explaining 12.707% of the variance. The third measurement scale is the information security scale with four items, and the factor loading ranged between 0.908 and 0.952, explaining 10.950% of the variance. The fourth factor is privacy, with four items, and the factor loadings ranged between 0.704 and 0.907, explaining 8.789% of the variance. The fifth factor is perceived risk, and the scale has four items with factor loadings ranging between 0.705 and 0.849, explaining 7.771% of the variance. Lastly, the sixth factor is the government intention variable with six items, and the factor loading ranged between 0.442 and 0.848, explaining 5.064% of the variance.The 70.079% total variance explained by the EFA indicates that the scale successfully explains the measured quality of the measurement instrument and the underlying relationship of the measured variables in examining the influence of the challenging factors on the government’s intention to adopt cloud services. Although GovtInt4 has a 0.442 loading slightly above the minimum acceptable loadings, it was retained due to its theoretical relevance and the assertion that a component’s items with a minimum factor loading of above 0.40 on the relevant factors [107,121,122,123] could be retained. However, we acknowledge the lower loading compared to other items and recommend its re-evaluation in future studies. Appendix A.1 shows the constructs and the measurement items with their factor loadings.
6. Discussion
6.1. Development Impact of the Key Factors
6.2. Academic Relevance and Contribution to IT for Development
6.3. Practitioners’ Relevance and Contribution to IT for Development
6.4. Theoretical Implications
6.5. Practical Implications
6.6. Adaptability of the Measurement Scale in Diverse Regions and Institutions
7. Conclusions, Limitations, and Future Research Directions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Appendix A.1
Constructs and Measurement Items | |||
---|---|---|---|
Constructs | Measurements Items | Factor Loadings | |
Privacy | Priva1 | I think using government cloud services will expose my privacy | 0.803 |
Priva2 | I will use government cloud services, knowing my privacy is safe | 0.704 | |
Priva3 | Existing government regulations are enough to safeguard my privacy | 0.907 | |
Priva4 | Privacy issues are a significant challenge to adopting government cloud services | 0.842 | |
Governance framework | GovtF2 | I will use government cloud services, given the available governance framework | 0.737 |
GovtF3 | A governance framework will help to safeguard my information while utilising cloud services. | 0.637 | |
GovtF4 | Having a governance framework will encourage me to accept cloud services | 0.749 | |
GovtF5 | I feel that the government’s intention to adopt cloud services will improve citizens’ participation in governance | 0.658 | |
GovtF6 | I feel that government regulations and laws are sufficient to protect the government’s critical information in the cloud | 0.748 | |
GovtF7 | I feel that having a governance framework will encourage the government’s intention to adopt cloud services | 0.454 | |
GovtF8 | I feel that government regulations and laws are sufficient to protect citizens’ privacy in the cloud | 0.762 | |
Performance expectancy | PerfEx1 | I feel that cloud computing will be helpful in my daily activities | 0.862 |
PerfEx2 | Using cloud services will increase my productivity | 0.862 | |
PerfEx3 | Cloud computing will improve citizens’ participation and efficiency in governance | 0.78 | |
PerfEx4 | Cloud computing will improve my job performance | 0.886 | |
InfoSec1 | I feel that using cloud services will not keep government information safe | 0.912 | |
Information security | InfoSec2 | Security will influence the government and citizens’ adoption of cloud computing | 0.946 |
InfoSec3 | I feel that cloud services are safe to transmit my sensitive information | 0.908 | |
InfoSec4 | I will feel secure providing my sensitive information to government cloud services | 0.952 | |
PerRisk1 | I feel unsafe providing my personally identifiable information while using cloud services | 0.812 | |
Perceived risk | PerRisk2 | I am worried about the likelihood of safe cloud services without a governance framework | 0.842 |
PerRisk3 | I am worried that the likelihood of information leaks on the cloud services will affect my performance | 0.849 | |
PerRisk4 | I am worried that the likelihood of citizens’ information security exposure will depend on the cloud service’s safety | 0.705 | |
GovtInt1 | I feel that the government’s intention to adopt cloud services will depend on information security measures | 0.711 | |
Government intention | GovtInt2 | I feel that the government’s likelihood of losing data and reputation will determine its intention to adopt cloud services | 0.848 |
GovtInt3 | I think the loss of citizen-identifiable information will determine the government’s intention to adopt cloud services | 0.762 | |
GovtInt4 | I think service delivery performance improvement will determine the government’s intention to adopt cloud computing | 0.442 | |
GovtInt5 | I feel that having a governance framework will encourage the government’s intention to adopt cloud computing | 0.792 | |
GovtInt6 | I feel that the government’s intention to adopt cloud service will improve citizens’ participation in governance | 0.612 |
References
- Poudel, N. The Impact of Big Data-Driven Artificial Intelligence Systems on Public Service Delivery in Cloud-Oriented Government Infrastructures. J. Artif. Intell. Mach. Learn. Cloud Comput. Syst. 2024, 8, 13–25. [Google Scholar]
- Ghazaryan, E. Cloud Computing as a Catalyst for Digital Transformation in Enterprises. Am. J. Eng. Technol. 2025, 7, 170–177. [Google Scholar] [CrossRef]
- Worldbank. Cloud Services Advance Digital Transformation for Governments. 2022. Available online: https://www.worldbank.org/en/news/feature/2022/06/07/cloud-services-advance-digital-transformation-for-governments (accessed on 23 June 2025).
- ITA. Nigeria Country Commercial Guide. 2024. Available online: https://www.trade.gov/nigeria-country-commercial-guide (accessed on 23 June 2025).
- Emmanson, J. Cloud Adoption in Nigeria To Yield N30.2 Trillion By 2033, Report Says. 2023. Available online: https://leadership.ng/cloud-adoption-in-nigeria-to-yield-n30-2-trillion-by-2033-report-says/ (accessed on 23 June 2025).
- Guo, Y.-G.; Yin, Q.; Wang, Y.; Xu, J.; Zhu, L. Efficiency and optimization of government service resource allocation in a cloud computing environment. J. Cloud Comput. 2023, 12, 18. [Google Scholar] [CrossRef] [PubMed]
- Abd Al Ghaffar, H.-t.-A.N. Government cloud computing and national security. Rev. Econ. Political Sci. 2024, 9, 116–133. [Google Scholar] [CrossRef]
- Santos, A.; Martins, J.; Pestana, P.D.; Gonçalves, R.; Mamede, H.S.; Branco, F. Factors Affecting Cloud Computing Adoption in the Education Context—Systematic Literature Review. IEEE Access 2024, 12, 71641–71674. [Google Scholar] [CrossRef]
- Ukeje, N.; Gutierrez, J.; Petrova, K. Information security and privacy challenges of cloud computing for government adoption: A systematic review. Int. J. Inf. Secur. 2024, 23, 1459–1475. [Google Scholar] [CrossRef]
- Ari, A.A.A.; Ngangmo, O.K.; Titouna, C.; Thiare, O.; Kolyang; Mohamadou, A.; Gueroui, A.M. Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges. Appl. Comput. Inform. 2024, 20, 119–141. [Google Scholar]
- Kshetri, N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun. Policy 2013, 37, 372–386. [Google Scholar] [CrossRef]
- Onwuegbuna, G.; Etim, E.; Fatile, J. Impact of the ‘new normal’—Induced digital transformation on public service delivery and governance in Nigeria: Challenges and opportunities. In Responsible Management of Shifts in Work Modes–Values for a Post Pandemic Future; Emerald Publishing Limited: Leeds, UK, 2022; Volume 1, pp. 197–215. [Google Scholar]
- Yagboyaju, D.A.; Akinola, A.O. Nigerian State and the Crisis of Governance: A Critical Exposition. SAGE Open 2019, 9, 2158244019865810. [Google Scholar] [CrossRef]
- Wang, S.; Shahzad, M.F.; Ashfaq, M. Data privacy and cybersecurity challenges in the digital transformation of the banking sector. Comput. Secur. 2024, 147, 104051. [Google Scholar] [CrossRef]
- Ang’udi, J.J. Security challenges in cloud computing: A comprehensive analysis. World J. Adv. Eng. Technol. Sci. 2023, 10, 155–181. [Google Scholar] [CrossRef]
- Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022, 22, 927. [Google Scholar] [CrossRef] [PubMed]
- Sun, P. Security and privacy protection in cloud computing: Discussions and challenges. J. Netw. Comput. Appl. 2020, 160, 102642. [Google Scholar] [CrossRef]
- Venkatesh, V.; Morris, M.G.; Davis, G.B.; Fred, D. Davis User Acceptance of Information Technology: Toward a Unified View. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef]
- Alhomdy, S.; Thabit, F.; Abdulrazzak, F.H.; Haldorai, A.; Jagtap, S. The role of cloud computing technology: A savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications. Int. J. Intell. Netw. 2021, 2, 166–174. [Google Scholar] [CrossRef]
- Muda, J.; Tumsa, S.; Tuni, A.; Sharma, D.P. Cloud-enabled E-governance framework for citizen centric services. J. Comput. Commun. 2020, 8, 63–78. [Google Scholar] [CrossRef]
- Abdulsalam, Y.S.; Hedabou, M. Security and Privacy in Cloud Computing: Technical Review. Future Internet 2022, 14, 11. [Google Scholar] [CrossRef]
- Patel, A.; Shah, N.; Ramoliya, D.; Nayak, A. A detailed review of Cloud Security: Issues, Threats & Attacks. In Proceedings of the 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA 2020), Coimbatore, India, 5–7 November 2020; pp. 758–764. [Google Scholar]
- Politou, E.; Alepis, E.; Virvou, M.; Patsakis, C. Privacy and Personal Data Protection. In Privacy and Data Protection Challenges in the Distributed Era; Springer International Publishing: Cham, Switzerland, 2022; pp. 7–12. [Google Scholar]
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards & Technology: Gaithersburg, MA, USA, 2011; p. 2. [Google Scholar]
- Hurwitz, J.S.; Kirsch, D. Cloud Computing for Dummies; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
- Ukeje, N. Cloud Computing and Sustainable Environment. In Proceedings of the 2014 Electronics and Telecommunications Research Seminar Series: 13th Workshop Proceedings, University of Bradford, Bradford, UK, 1 April 2014. [Google Scholar]
- Wenzek, H. Leapfrogging ICT with Cloud Computing in Emerging Countries. In ICT for the Next Five Billion People; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
- Younus, M.; Purnomo, E.P.; Nurmandi, A.; Mutiarin, D.; Manaf, H.A.; Mumtaz, F.; Khairunnisa, T. Analyzing the trend of government support for cloud computing usage in e-government architecture. J. Cloud Comput. 2025, 14, 14. [Google Scholar] [CrossRef]
- Liu, F.; Tong, J.; Mao, J.; Bohn, R.; Messina, J.; Badger, L.; Leaf, D. NIST cloud computing reference architecture. NIST Spec. Publ. 2011, 500, 292. [Google Scholar]
- Kent, S. Federal Cloud Computing Strategy; Executive Office of the President of the United States: Washington, DC, USA, 2019. [Google Scholar]
- Shafiu, I.; Wang, W.Y.C.; Singh, H. Drivers and barriers in the decision to adopt IaaS: A public sector case study. Int. J. Bus. Inf. Syst. 2016, 21, 249–267. [Google Scholar] [CrossRef]
- Arciprete, C.; Ciani, F. Bridging the Disability Gap in Employment: Insights from an Employability Assessment Tool based on the ICF and the Capability Approach. J. Hum. Dev. Capab. 2025, 26, 295–305. [Google Scholar] [CrossRef]
- Sen, A. Development as Freedom; Oxford Uiversity Press: Oxford, UK, 2000; Volume 10, p. 258. [Google Scholar]
- Whitman, M.E.; Mattford, H.J. Management of Information Security, 6th ed.; Cengage Learning: South Melbourne, VA, Australia, 2019. [Google Scholar]
- Khan, A.; Ibrahim, M.; Hussain, A. An exploratory prioritization of factors affecting current state of information security in Pakistani university libraries. Int. J. Inf. Manag. Data Insights 2021, 1, 100015. [Google Scholar] [CrossRef]
- Arafat, M. Information security management system challenges within a cloud computing environment. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, 26–27 June 2018; pp. 1–6. [Google Scholar]
- Kissel, R. Glossary of Key Information Security Terms; Diane Publishing: Collingdale, PA, USA, 2011. [Google Scholar]
- Numan, D.; Sunna, R. Achieving Digital Trust Through IT Governance and Cybersecurity. 2023. Available online: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/achieving-digital-trust-through-it-governance-and-cybersecurity (accessed on 14 July 2025).
- Smith, J. Building Trust in Government Through Digital Transformation. 2024. Available online: https://www.government-transformation.com/en/citizen-experience/building-trust-in-government-through-digital-transformation (accessed on 14 July 2025).
- Shandler, R.; Gomez, M.A. The hidden threat of cyber-attacks—Undermining public confidence in government. J. Inf. Technol. Politics 2023, 20, 359–374. [Google Scholar] [CrossRef]
- Abed, Y.; Chavan, M. The Challenges of Institutional Distance: Data Privacy Issues in Cloud Computing. Sci. Technol. Soc. 2019, 24, 161–181. [Google Scholar] [CrossRef]
- ITU. Privacy in Cloud Computing.pdf. In ITU-T Technology Watch Report March 2012; International Telecommunication Union: Geneva, Switzerland, 2012. [Google Scholar]
- Pearson, S.; Benameur, A. Privacy, security and trust issues arising from cloud computing. In Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 30 November–3 December; IEEE: New York, NY, USA, 2010. [Google Scholar]
- Parikh, S.; Dave, D.; Patel, R.; Doshi, N. Security and Privacy Issues in Cloud, Fog and Edge Computing. Procedia Comput. Sci. 2019, 160, 734–739. [Google Scholar] [CrossRef]
- Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386. [Google Scholar] [CrossRef]
- Manda, M.I.; Backhouse, J. Addressing trust, security and privacy concerns in e-government integration, interoperability and information sharing through policy: A case of South Africa. In Proceedings of the CON-IRM 2016 Proceedings, 67, Cape Town, South Africa, 18–20 May 2016; Available online: https://aisel.aisnet.org/confirm2016/67 (accessed on 14 July 2025).
- El-Kafrawy, P.M.; Abdo, A.A.; Shawish, A.F. Shawish, Security Issues Over Some Cloud Models. Procedia Comput. Sci. 2015, 65, 853–858. [Google Scholar] [CrossRef]
- Nishad, L.S.; Akriti Paliwal, J.; Pandey, R.; Beniwal, S.; Kumar, S. Security, Privacy Issues and challenges in Cloud Computing: A Survey. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, 4–5 March 2016; Association for Computing Machinery: New York, NY, USA, 2016; p. 47. [Google Scholar]
- Fernandes, D.A.; Soares, L.F.; Gomes, J.V.; Freire, M.M.; Inácio, P.R. Security issues in cloud environments: A survey. Int. J. Inf. Secur. 2014, 13, 113–170. [Google Scholar] [CrossRef]
- Soni, P.K.; Dhurwe, H. Challenges and Open Issues in Cloud Computing Services. In Advanced Computing Techniques for Optimization in Cloud; Chapman and Hall/CRC: Boca Raton, FL, USA, 2024; pp. 19–37. [Google Scholar]
- Emeras, J.; Varrette, S.; Plugaru, V.; Bouvry, P. Amazon Elastic Compute Cloud (EC2) versus In-House HPC Platform: A Cost Analysis. IEEE Trans. Cloud Comput. 2019, 7, 456–468. [Google Scholar] [CrossRef]
- Abulhaija, S.; Arroyabe, M.F.; Kwong, C.; Zeng, W. Exploring the impact of external rewards on e-government services adoption: Empirical evidence from Jordan. Public Manag. Rev. 2025, 1–27. [Google Scholar] [CrossRef]
- Neves, C.; Oliveira, T.; Cruz-Jesus, F.; Venkatesh, V. Extending the unified theory of acceptance and use of technology for sustainable technologies context. Int. J. Inf. Manag. 2025, 80, 102838. [Google Scholar] [CrossRef]
- Straub, E.T. Understanding Technology Adoption: Theory and Future Directions for Informal Learning. Rev. Educ. Res. 2009, 79, 625–649. [Google Scholar] [CrossRef]
- Walsham, G.; Robey, D.; Sahay, S. Foreword: Special Issue on Information Systems in Developing Countries. MIS Q. 2007, 31, 317–326. [Google Scholar] [CrossRef]
- Osei-Bryson, K.-M.; Brown, I.; Meso, P. Advancing the Development of Contextually Relevant ICT4D Theories—From Explanation to Design. Eur. J. Inf. Syst. 2022, 31, 1–6. [Google Scholar] [CrossRef]
- Zhou, M.; Zhang, R.; Xie, W.; Qian, W.; Zhou, A. Security and privacy in cloud computing: A survey. In Proceedings of the 2010 Sixth International Conference on Semantics, Knowledge and Grids, Washington, DC, USA, 1–3 November 2010; IEEE: New York, NY, USA, 2010. [Google Scholar]
- Mohammed, F.; Ibrahim, O.; Ithnin, N. Factors influencing cloud computing adoption for e-government implementation in developing countries. J. Syst. Inf. Technol. 2016, 18, 297–327. [Google Scholar] [CrossRef]
- Wilson, B.M.R.; Khazaei, B.; Hirsch, L. Enablers and Barriers of Cloud Adoption among Small and Medium Enterprises in Tamil Nadu. In Proceedings of the 2015 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2015, Bangalore, India, 25–27 November 2015. [Google Scholar]
- Miorandi, D.; Rizzardi, A.; Sicari, S.; Coen-Porisini, A. Sticky Policies: A Survey. IEEE Trans. Knowl. Data Eng. 2020, 32, 2481–2499. [Google Scholar] [CrossRef]
- Jiménez, S.D.O.; Anaya, E.A. A Survey on Information Security in Cloud Computing. Comput. Sist. 2020, 24, 819–833. [Google Scholar]
- Kumar, R.; Goyal, R. On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Comput. Sci. Rev. 2019, 33, 1–48. [Google Scholar] [CrossRef]
- Chikhaoui, E.; Sarabdeen, J.; Parveen, R. Privacy and security issues in the use of clouds in e-health in the Kingdom of Saudi Arabia. In Proceedings of the 28th International Business Information Management Association Conference—Vision 2020: Innovation Management, Development Sustainability, and Competitive Economic Growth, Seville, Spain, 9–10 November 2016. [Google Scholar]
- Gasiba, T.E.; Andrei-Cristian, I.; Lechner, U.; Pinto-Albuquerque, M. Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges. In Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17–20 August 2021; pp. 1–8. [Google Scholar]
- Manzoor, A. Cloud Computing Applications in the Public Sector, in Cloud Computing Technologies for Connected Government; IGI Global Scientific Publishing: Hershey, PA, USA, 2016; pp. 215–246. [Google Scholar]
- Sharma, M.; Sehrawat, R. Quantifying SWOT analysis for cloud adoption using FAHP-DEMATEL approach: Evidence from the manufacturing sector. J. Enterp. Inf. Manag. 2020, 33, 1111–1152. [Google Scholar] [CrossRef]
- Ali, O.; Osmanaj, V. The role of government regulations in the adoption of cloud computing: A case study of local government. Comput. Law Secur. Rev. 2020, 36, 105396. [Google Scholar] [CrossRef]
- Joshi, J.B.; Ghafoor, A.; Aref, W.G.; Spafford, E.H. Security and Privacy Challenges of a Digital Government. In Advances in Digital Government: Technology, Human Factors, and Policy; McIver, W.J., Elmagarmid, A.K., Eds.; Springer US: Boston, MA, USA, 2002; pp. 121–136. [Google Scholar]
- Muhammed, K.; Zaharaddeen, I.; Rumana, K.; Turaki, A.M. Cloud Computing Adoption in Nigeria: Challenges and Benefits. Int. J. Sci. Res. Publ. 2015, 5, 1–7. [Google Scholar]
- Wang, L.; Zhang, Q.; Ding, Y.-Y.; Wong, P.P.W. The Effect of Social and Personal Norm on Intention to Patronize Green Hotels: Extension of Theory of Planned Behavior. J. China Tour. Res. 2023, 19, 311–334. [Google Scholar] [CrossRef]
- Al-Adwan, A.S.; Li, N.; Al-Adwan, A.; Abbasi, G.A.; Albelbisi, N.A.; Habibi, A. Extending the Technology Acceptance Model (TAM) to Predict University Students’ Intentions to Use Metaverse-Based Learning Platforms. Educ. Inf. Technol. 2023, 28, 15381–15413. [Google Scholar] [CrossRef] [PubMed]
- Habibi, A.; Riady, Y.; Al-Adwan, A.S.; Albelbisi, N.A. Beliefs and Knowledge for Pre-Service Teachers’ Technology Integration during Teaching Practice: An Extended Theory of Planned Behavior. Comput. Sch. 2023, 40, 107–132. [Google Scholar] [CrossRef]
- Venkatesh, V.; Thong, J.Y.; Xu, X. Unified theory of acceptance and use of technology: A synthesis and the road ahead. J. Assoc. Inf. Syst. 2016, 17, 328–376. [Google Scholar] [CrossRef]
- Nguyen, T.D.; Nguyen, D.T.; Cao, T.H. Acceptance and use of information system: E-learning based on cloud computing in Vietnam. In Proceedings of the Information and Communication Technology-EurAsia Conference, Bali, Indonesia, 14–17 April 2014; pp. 139–149. [Google Scholar]
- Amron, M.T.; Ibrahim, R.; Bakar, N.A.A. Cloud computing acceptance among public sector employees. Telkomnika (Telecommun. Comput. Electron. Control) 2021, 19, 124–133. [Google Scholar] [CrossRef]
- Akinnuwesi, B.A.; Uzoka, F.-M.E.; Fashoto, S.G.; Mbunge, E.; Odumabo, A.; Amusa, O.O.; Okpeku, M.; Owolabi, O. A modified UTAUT model for the acceptance and use of digital technology for tackling COVID-19. Sustain. Oper. Comput. 2022, 3, 118–135. [Google Scholar] [CrossRef]
- Sharma, R.; Mishra, R. A review of evolution of theories and models of technology adoption. Indore Manag. J. 2014, 6, 17–29. [Google Scholar]
- Hiller, J. Epistemological Foundations of Objectivist and Interpretivist Research in An Introduction to Music Therapy Research; Murphy, K.M., Wheeler, B.L., Eds.; Barcelona Publishers: New Braunfels, TX, USA, 2016; pp. 99–127. [Google Scholar]
- Hagger, M.S. The Reasoned Action Approach and the Theories of Reasoned Action and Planned Behavior; Oxford University Press: Oxford, UK, 2019. [Google Scholar] [CrossRef]
- Kala, D.; Chaubey, D.S.; Meet, R.K.; Al-Adwan, A.S. Impact of user satisfaction with e-government services on continuance use intention and citizen trust using TAM-ISSM framework. Interdiscip. J. Inf. Knowl. Manag. 2024, 19, 001. [Google Scholar] [CrossRef]
- Ciancarini, P.; Giancarlo, R.; Grimaudo, G. Digital Transformation in the Public Administrations: A Guided Tour for Computer Scientists. IEEE Access 2024, 12, 22841–22865. [Google Scholar] [CrossRef]
- Paul, D.; Soundarapandiyan, R.; Krishnamoorthy, G. Security-First Approaches to CI/CD in Cloud-Computing Platforms: Enhancing DevSecOps Practices. Aust. J. Mach. Learn. Res. Appl. 2021, 1, 184–225. [Google Scholar]
- Okon, S.U.; Olateju, O.O.; Ogungbemi, O.S.; Joseph, S.A.; Olisa, A.O.; Olaniyi, O.O. Incorporating Privacy by Design Principles in the Modification of AI Systems in Preventing Breaches Across Multiple Environments, Including Public Cloud, Private Cloud, and On-Prem. J. Eng. Res. Rep. 2024, 26, 136–158. [Google Scholar] [CrossRef]
- Najibi, M.; Hadavinejad, M. From E-Government Readiness to Public Trust: Explaining the Mediating Role of Organizational Transparency. State Stud. 2024, 10, 305–328. [Google Scholar]
- Kumar, R.; Singh, R.; Kumar, K.; Khan, S.; Corvello, V. How Does Perceived Risk and Trust Affect Mobile Banking Adoption? Empirical Evidence from India. Sustainability 2023, 15, 4053. [Google Scholar] [CrossRef]
- Akram, M.S.; Malik, A.; Shareef, M.A.; Goraya, M.A.S. Exploring the interrelationships between technological predictors and behavioral mediators in online tax filing: The moderating role of perceived risk. Gov. Inf. Q. 2019, 36, 237–251. [Google Scholar] [CrossRef]
- Faqih, K.M.S. Factors influencing the behavioral intention to adopt a technological innovation from a developing country context: The case of mobile augmented reality games. Technol. Soc. 2022, 69, 101958. [Google Scholar] [CrossRef]
- Joshi, A.; Benitez, J.; Huygh, T.; Ruiz, L.; De Haes, S. Impact of IT governance process capability on business performance: Theory and empirical evidence. Decis. Support Syst. 2022, 153, 113668. [Google Scholar] [CrossRef]
- Salem, M.M.; Hwang, G.-H. Critical Factors Influencing Adoption of Cloud Computing for Government Organizations in Yemen. J. Distrib. Sci. 2016, 14, 37–47. [Google Scholar] [CrossRef]
- Dwivedi, Y.K.; Rana, N.P.; Jeyaraj, A.; Clement, M.; Williams, M.D. Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model. Inf. Syst. Front. 2019, 21, 719–734. [Google Scholar] [CrossRef]
- Rana, N.P.; Dwivedi, Y.K.; Lal, B.; Williams, M.D.; Clement, M. Citizens’ adoption of an electronic government system: Towards a unified view. Inf. Syst. Front. 2017, 19, 549–568. [Google Scholar] [CrossRef]
- Vurukonda, N.; Rao, B.T. A Study on Data Storage Security Issues in Cloud Computing. Procedia Comput. Sci. 2016, 92, 128–135. [Google Scholar] [CrossRef]
- Riffai, M.M.M.A.; Grant, K.; Edgar, D. Big TAM in Oman: Exploring the promise of on-line banking, its adoption by customers and the challenges of banking in Oman. Int. J. Inf. Manag. 2012, 32, 239–250. [Google Scholar] [CrossRef]
- Hanafizadeh, P.; Behboudi, M.; Koshksaray, A.A.; Tabar, M.J.S. Mobile-banking adoption by Iranian bank clients. Telemat. Inform. 2014, 31, 62–78. [Google Scholar] [CrossRef]
- Alalwan, A.A.; Dwivedi, Y.K.; Rana, N.P.; Algharabat, R. Examining factors influencing Jordanian customers’ intentions and adoption of internet banking: Extending UTAUT2 with risk. J. Retail. Consum. Serv. 2018, 40, 125–138. [Google Scholar] [CrossRef]
- Martins, C.; Oliveira, T.; Popovič, A. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. Int. J. Inf. Manag. 2014, 34, 1–13. [Google Scholar] [CrossRef]
- Chao, C.-M. Factors determining the behavioral intention to use mobile learning: An application and extension of the UTAUT model. Front. Psychol. 2019, 10, 1652. [Google Scholar] [CrossRef]
- Creswell, J.W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 4th ed.; SAGE Publications: Thousand Oaks, CA, USA, 2014. [Google Scholar]
- Ahmadin, M. Social Research Methods: Qualitative and Quantitative Approaches. J. Kaji. Sos. Dan Budaya: Tebar Sci. 2022, 6, 104–113. [Google Scholar]
- Bhattacherjee, A. Social Science Research: Principles, Methods, and Practices; University of South Florida: Tampa, FL, USA, 2012. [Google Scholar]
- Vicente, P.; Reis, E. Using questionnaire design to fight nonresponse bias in web surveys. Soc. Sci. Comput. Rev. 2010, 28, 251–267. [Google Scholar] [CrossRef]
- Leeuw, E.d.; Berzelak, N. The SAGE Handbook of Survey Methodology; SAGE Publications Ltd: London, UK, 2016. [Google Scholar]
- de Sena Abrahão, R.; Moriguchi, S.N.; Andrade, D.F. Intention of adoption of mobile payment: An analysis in the light of the Unified Theory of Acceptance and Use of Technology (UTAUT). RAI Rev. Adm. Inov. 2016, 13, 221–230. [Google Scholar] [CrossRef]
- Khalilzadeh, J.; Ozturk, A.B.; Bilgihan, A. Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Comput. Hum. Behav. 2017, 70, 460–474. [Google Scholar] [CrossRef]
- Venkatesh, V.; Thong, J.Y.; Xu, X. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Q. 2012, 36, 157–178. [Google Scholar] [CrossRef]
- Zhou, T.; Lu, Y.; Wang, B. Integrating TTF and UTAUT to explain mobile banking user adoption. Comput. Hum. Behav. 2010, 26, 760–767. [Google Scholar] [CrossRef]
- Pallant, J. SPSS Survival Manual: A Step by Step Guide to Data Analysis Using, IBM SPSS, 7th ed.; Allen & Unwin: Crows Nest, Australia, 2020. [Google Scholar]
- Lesia, M.P.; Aigbavboa, C.O.; Thwala, W.D. Factors influencing residential location choice in South Africa: Exploratory factor analysis (EFA) and confirmatory factor analysis (CFA). J. Hous. Built Environ. 2024, 39, 133–160. [Google Scholar] [CrossRef]
- Hooper, D. Exploratory Factor Analysis in Approaches to Quantitative Research—Theory Its Practical Application: A Guide to Dissertation Students; Chen, H., Ed.; Oak Tree Press: Cork, Ireland, 2012. [Google Scholar]
- Thompson, B. Exploratory and Confirmatory Factor Analysis: Understanding Concepts and Applications, 1st ed.; American Psychological Association: Washington, DC, USA, 2004. [Google Scholar]
- Antunes, A.A.M.; Neves, G.A.; Rojas, B.P.S.; Vaz, D.V. Test-retest reliability and internal structure of the Brazilian version of the impact on participation and autonomy (IPA-Br4) for individuals with physical disabilities. Braz. J. Phys. Ther. 2025, 29, 101152. [Google Scholar] [CrossRef]
- Ustun, A.B.; Karaoglan-Yilmaz, F.G.; Yilmaz, R.; Ceylan, M.; Uzun, O. Development of UTAUT-based augmented reality acceptance scale: A validity and reliability study. Educ. Inf. Technol. 2024, 29, 11533–11554. [Google Scholar] [CrossRef]
- Yong, A.G.; Pearce, S. A beginner’s guide to factor analysis: Focusing on exploratory factor analysis. Tutor. Quant. Methods Psychol. 2013, 9, 79–94. [Google Scholar] [CrossRef]
- Tabachnick, B.G.; Fidell, L.S. Using Multivariate Statistics, 6th ed.; Pearson Education: Boston, MA, USA, 2013. [Google Scholar]
- Väänänen, N.; Vilhunen, K. Exploratory factor analysis of sustainable craft theory among Finnish craft hobbyists. Craft Res. 2024, 15, 13–40. [Google Scholar] [CrossRef]
- De Winter, J.C.F.; Dodou, D. Factor recovery by principal axis factoring and maximum likelihood factor analysis as a function of factor pattern and sample size. J. Appl. Stat. 2012, 39, 695–710. [Google Scholar] [CrossRef]
- Mabel, O.A.; Olayemi, O.S. A comparison of principal component analysis, maximum likelihood and the principal axis in factor analysis. Am. J. Math. Stat. 2020, 10, 44–54. [Google Scholar]
- Stevens, J. Applied Multivariate Statistics for the Social Sciences, 5th ed.; Routledge: New York, NY, USA, 2009. [Google Scholar]
- Akbulut, Y. SPSS Applications in Social Sciences; Ideal Culture Publishing: Istanbul, Turkey, 2010. [Google Scholar]
- Guadagnoli, E.; Velicer, W.F. Relation of sample size to the stability of component patterns. Psychol. Bull. 1988, 103, 265. [Google Scholar] [CrossRef]
- Fornell, C.; Larcker, D.F. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Cheung, G.W.; Cooper-Thomas, H.D.; Lau, R.S.; Wang, L.C. Reporting reliability, convergent and discriminant validity with structural equation modeling: A review and best-practice recommendations. Asia Pac. J. Manag. 2023, 41, 785–787. [Google Scholar] [CrossRef]
- Hair, J.F., Jr. Multivariate Data Analysis, 7th ed.; Pearson/Prentice Hall: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
- Büyüköztürk, Ş. Data Analysis for Social Sciences Manual Statistics, Research Pattern SPSS Applications and Reviews; Pegem Academy Publishing: Ankara, Turkey, 2018; pp. 001–214. [Google Scholar]
- Yaseen, H.; Al-Adwan, A.S.; Nofal, M.; Hmoud, H.; Abujassar, R.S. Factors Influencing Cloud Computing Adoption Among SMEs: The Jordanian Context. Inf. Dev. 2023, 39, 317–332. [Google Scholar] [CrossRef]
- Lazar, I.M.; Panisoara, G.; Panisoara, I.O. Digital technology adoption scale in the blended learning context in higher education: Development, validation and testing of a specific tool. PLoS ONE 2020, 15, e0235957. [Google Scholar] [CrossRef] [PubMed]
- Mahmood, M.; Vishanth, W.; Chen, W. The influence of transformed government on citizen trust: Insights from Bahrain. Inf. Technol. Dev. 2019, 25, 275–303. [Google Scholar] [CrossRef]
- Levite, A.E.; Kalwani, G. Cloud Governance Challenges: A Survey of Policy and Regulatory Issues; Carnegie Endowment for International Peace: Washington, DC, USA, 2020. [Google Scholar]
- Obi, O.C.; Akagha, O.V.; Dawodu, S.O.; Anyanwu, A.C.; Onwusinkwue, S.; Ahmad, I.A.I. Comprehensive review on cybersecurity: Modern threats and advanced defense strategies. Comput. Sci. IT Res. J. 2024, 5, 293–310. [Google Scholar] [CrossRef]
- Markey, S.; Greg, H.; Manson, D. Closing the implementation gap: A framework for incorporating the context of place in economic development planning. Local Environ. 2008, 13, 337–351. [Google Scholar] [CrossRef]
- Savela, T. The advantages and disadvantages of quantitative methods in schoolscape research. Linguist. Educ. 2018, 44, 31–44. [Google Scholar] [CrossRef]
- Dow, S.C. Methodological Pluralism and Pluralism of Method. In Foundations for New Economic Thinking: A Collection of Essays; Palgrave Macmillan UK: London, UK, 2012; pp. 129–139. [Google Scholar]
S/N | Variables | Number of Measurement Items | Cronbach’s Alpha Reliability |
---|---|---|---|
1 | Privacy (Priva) | 4 | 0.847 |
2 | Governance framework (GovtF) | 8 | 0.807 |
3 | Performance expectancy (PerfEx) | 4 | 0.932 |
4 | Information security (InfoSec) | 4 | 0.950 |
5 | Perceived risk (PerRisk) | 4 | 0.844 |
6 | Government intention (GovtInt) | 6 | 0.815 |
KMO and Bartlett’s Test | ||
---|---|---|
Kaiser–Meyer–Olkin measure of sampling adequacy | 0.731 | |
Bartlett’s Test of Sphericity | Approx. Chi-Square | 1455.806 |
df | 435 | |
Sig. | <0.001 |
Measurement Scale Common Variance Values | Measurement Scale Common Variance Values Above 0.40 | ||||
---|---|---|---|---|---|
Communalities | Communalities | ||||
Initial | Extraction | Initial | Extraction | ||
Priva1 | 1.000 | 0.694 | Priva1 | 1.000 | 0.694 |
Priva2 | 1.000 | 0.570 | Priva2 | 1.000 | 0.570 |
Priva3 | 1.000 | 0.835 | Priva3 | 1.000 | 0.835 |
Priva4 | 1.000 | 0.729 | Priva4 | 1.000 | 0.729 |
GovtF1 | 1.000 | 0.309 | GovtF2 | 1.000 | 0.646 |
GovtF2 | 1.000 | 0.646 | GovtF3 | 1.000 | 0.621 |
GovtF3 | 1.000 | 0.621 | GovtF4 | 1.000 | 0.672 |
GovtF4 | 1.000 | 0.672 | GovtF5 | 1.000 | 0.662 |
GovtF5 | 1.000 | 0.662 | GovtF6 | 1.000 | 0.611 |
GovtF6 | 1.000 | 0.611 | GovtF7 | 1.000 | 0.485 |
GovtF7 | 1.000 | 0.485 | GovtF8 | 1.000 | 0.645 |
GovtF8 | 1.000 | 0.645 | PerfEx1 | 1.000 | 0.817 |
PerfEx1 | 1.000 | 0.817 | PerfEx2 | 1.000 | 0.846 |
PerfEx2 | 1.000 | 0.846 | PerfEx3 | 1.000 | 0.643 |
PerfEx3 | 1.000 | 0.643 | PerfEx4 | 1.000 | 0.837 |
PerfEx4 | 1.000 | 0.837 | InfoSec1 | 1.000 | 0.858 |
InfoSec1 | 1.000 | 0.858 | InfoSec2 | 1.000 | 0.900 |
InfoSec2 | 1.000 | 0.900 | InfoSec3 | 1.000 | 0.859 |
InfoSec3 | 1.000 | 0.859 | InfoSec4 | 1.000 | 0.936 |
InfoSec4 | 1.000 | 0.936 | PerRisk1 | 1.000 | 0.736 |
PerRisk1 | 1.000 | 0.736 | PerRisk2 | 1.000 | 0.717 |
PerRisk2 | 1.000 | 0.717 | PerRisk3 | 1.000 | 0.777 |
PerRisk3 | 1.000 | 0.777 | PerRisk4 | 1.000 | 0.671 |
PerRisk4 | 1.000 | 0.671 | GovtInt1 | 1.000 | 0.666 |
GovtInt1 | 1.000 | 0.666 | GovtInt2 | 1.000 | 0.755 |
GovtInt2 | 1.000 | 0.755 | GovtInt3 | 1.000 | 0.692 |
GovtInt3 | 1.000 | 0.692 | GovtInt4 | 1.000 | 0.610 |
GovtInt4 | 1.000 | 0.610 | GovtInt5 | 1.000 | 0.729 |
GovtInt5 | 1.000 | 0.729 | GovtInt6 | 1.000 | 0.496 |
GovtInt6 | 1.000 | 0.496 |
Total Variance Explained | Cumulative % | Extraction Sums of Squared Loadings | Rotation Sums of Squared Loadings | ||||||
---|---|---|---|---|---|---|---|---|---|
Component | Initial Eigenvalues | ||||||||
Total | % of Variance | Total | % of Variance | Cumulative % | Total | % of Variance | Cumulative % | ||
1 | 7.439 | 24.798 | 24.798 | 7.439 | 24.798 | 24.798 | 5.046 | 16.821 | 16.821 |
2 | 3.812 | 12.707 | 37.505 | 3.812 | 12.707 | 37.505 | 3.848 | 12.827 | 29.648 |
3 | 3.285 | 10.95 | 48.455 | 3.285 | 10.95 | 48.455 | 3.613 | 12.042 | 41.69 |
4 | 2.637 | 8.789 | 57.244 | 2.637 | 8.789 | 57.244 | 3.066 | 10.22 | 51.909 |
5 | 2.331 | 7.771 | 65.015 | 2.331 | 7.771 | 65.015 | 2.969 | 9.895 | 61.804 |
6 | 1.519 | 5.064 | 70.079 | 1.519 | 5.064 | 70.079 | 2.482 | 8.274 | 70.079 |
7 | 1.127 | 3.756 | 73.835 | ||||||
8 | 0.929 | 3.098 | 76.932 | ||||||
9 | 0.742 | 2.473 | 79.405 | ||||||
10 | 0.72 | 2.401 | 81.806 | ||||||
11 | 0.668 | 2.227 | 84.033 | ||||||
12 | 0.542 | 1.808 | 85.841 | ||||||
13 | 0.504 | 1.678 | 87.52 | ||||||
14 | 0.483 | 1.611 | 89.13 | ||||||
15 | 0.438 | 1.46 | 90.591 | ||||||
16 | 0.365 | 1.216 | 91.806 | ||||||
17 | 0.345 | 1.15 | 92.956 | ||||||
18 | 0.296 | 0.986 | 93.942 | ||||||
19 | 0.282 | 0.939 | 94.881 | ||||||
20 | 0.273 | 0.909 | 95.79 | ||||||
21 | 0.221 | 0.736 | 96.525 | ||||||
22 | 0.204 | 0.681 | 97.207 | ||||||
23 | 0.18 | 0.599 | 97.806 | ||||||
24 | 0.162 | 0.54 | 98.346 | ||||||
25 | 0.125 | 0.415 | 98.761 | ||||||
26 | 0.116 | 0.387 | 99.148 | ||||||
27 | 0.096 | 0.32 | 99.468 | ||||||
28 | 0.072 | 0.24 | 99.708 | ||||||
29 | 0.045 | 0.151 | 99.859 | ||||||
30 | 0.042 | 0.141 | 100 |
Rotated Component Matrix a | ||||||
---|---|---|---|---|---|---|
Component | ||||||
1 | 2 | 3 | 4 | 5 | 6 | |
Priva1 | 0.803 | |||||
Priva2 | 0.704 | |||||
Priva3 | 0.907 | |||||
Priva4 | 0.842 | |||||
GovtF1 | ||||||
GovtF2 | 0.737 | |||||
GovtF3 | 0.637 | |||||
GovtF4 | 0.749 | |||||
GovtF5 | 0.658 | |||||
GovtF6 | 0.748 | |||||
GovtF7 | 0.454 | |||||
GovtF8 | 0.762 | |||||
PerfEx1 | 0.862 | |||||
PerfEx2 | 0.862 | |||||
PerfEx3 | 0.780 | |||||
PerfEx4 | 0.886 | |||||
InfoSec1 | 0.912 | |||||
InfoSec2 | 0.946 | |||||
InfoSec3 | 0.908 | |||||
InfoSec4 | 0.952 | |||||
PerRisk1 | 0.812 | |||||
PerRisk2 | 0.842 | |||||
PerRisk3 | 0.849 | |||||
PerRisk4 | 0.705 | |||||
GovtInt1 | 0.711 | |||||
GovtInt2 | 0.848 | |||||
GovtInt3 | 0.762 | |||||
GovtInt4 | 0.442 | |||||
GovtInt5 | 0.792 | |||||
GovtInt6 | 0.612 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ukeje, N.; Gutierrez, J.A.; Petrova, K.; Okolie, U.C. An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention. Future Internet 2025, 17, 326. https://doi.org/10.3390/fi17080326
Ukeje N, Gutierrez JA, Petrova K, Okolie UC. An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention. Future Internet. 2025; 17(8):326. https://doi.org/10.3390/fi17080326
Chicago/Turabian StyleUkeje, Ndukwe, Jairo A. Gutierrez, Krassie Petrova, and Ugochukwu Chinonso Okolie. 2025. "An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention" Future Internet 17, no. 8: 326. https://doi.org/10.3390/fi17080326
APA StyleUkeje, N., Gutierrez, J. A., Petrova, K., & Okolie, U. C. (2025). An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention. Future Internet, 17(8), 326. https://doi.org/10.3390/fi17080326