Precursors of Cloud Computing Adoption in Selected Banks in Kenya

Authors

  • Odhiambo Abok Fredrick Jomo Kenyatta University of Agriculture and Technology
  • Dr. Thomas Mose (PhD) Lecturer, Jomo-Kenyatta University of Agriculture and Technology
  • Dr. Tobias Mwalili (PhD) Lecturer, Jomo-Kenyatta University of Agriculture and Technology

DOI:

https://doi.org/10.47604/ijts.1676

Keywords:

Cloud, Computing, Innovation, Adoption, Banks

Abstract

Purpose: The study analyzed the precursors of adoption of cloud computing in selected banks in Kenya. Specifically, the study sought to establish the effect of data security on adoption of cloud computing in selected banks in Kenya, to establish how organizational culture affects adoption of cloud computing in selected banks in Kenya, to establish how supplier lock- in affects adoption of cloud computing in selected banks in Kenya and to establish how regulatory policy affects adoption of cloud computing in selected banks in Kenya.

Methodology: The study employed descriptive research design and inferential statistics. The target population was 366 ICT staff from 3 selected banks namely NCBA, KCB Bank and Equity bank. The selected banks had the largest market share according to published CBK supervisory report for year 2020. The sample size was 191 respondents. A structured questionnaire was used to collect the data. Responses in the questionnaires were tabulated, coded and processed by use of a computer statistical package for social sciences version 28 (SPSS) program to analyze the data. The responses from the open-ended questions were listed to obtain proportions appropriately and then reported by descriptive narrative. Descriptive statistics like mean, standard deviation were used. The ANOVA test was used to establish the findings from the study and results presented in graphs and charts.

Findings: Cloud computing adoption was evaluated for the select commercial banks across three areas namely core-banking systems, middle office and compliance systems and back-office, data science and innovation systems over a period of five years. The respondents indicated that no more than one cloud computing project was either in planning, implementation, failed or completed stages, indicating that despite the perceived benefits of cloud computing there are precursors that need to be addressed if the commercial banks are to fully embrace cloud computing.

Unique contribution to theory, practice and policy: In terms of policy, the  findings of the study will be important to regulators like CA, CBK and other institutions that regulate financial institutions in coming up with relevant guidelines when it comes to handling customer data within Cloud Computing environment. It gives banking sector perspective of some of the issues that require attention if the envisaged benefits of clod computing are to be fully realized. This is important not only to the policy makers but also to the cloud service providers . Additionally, the findings give a theoretical basis of validating the antecedents of cloud computing adoption in the banking sector in Kenya and this can be extended to the rest of the world. The findings give a practical perspective of the real concerns the banks have to contend with from a practical perspective and therefore very critical in advancement of cloud computing technologies.

Downloads

Download data is not yet available.

References

Ahirrao, S., & Ingle, R. (2015, November 15). Scalable transactions in cloud data stores. The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA), 4(21).

Akin, O. C., Matthew, F. T., & Comfort, D. (2014). The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria. (IJACSA) International Journal of Advanced Computer Science and Applications, 5(8), 13-19. Retrieved June 25, 2016, from http://thesai.org/Downloads/Volume5No8/Paper_3-The_Impact_ and _Challenges_of_Cloud_Computing_Adoption.pdf

Altman, I. (1977). Privacy Regulation. Journal of Social Issues, 33(3). Retrieved July 2, 2016, from http://courses.cs.vt.edu/cs6204/Privacy-Security/Papers/Privacy/Privacy-Regulation.pdf

Amazon EC2 - Virtual Server Hosting. (n.d.). Retrieved June 25, 2016, from Amazon.com: http://www.amazon.com/gp/browse.html?

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., . . . Zaharia, M. ( 2009). Above the clouds. A Berkeley view of cloud computing. University of California, Electrical Engineering and Computer Sciences. California: Electrical Engineering and Computer Sciences University of California at Berkeley. Retrieved June 25, 2016, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., . . . Zaharia, M. (2010). A View of Cloud Computing : Clearing the Clouds Away from the True Potential and Obstacles Posed by This Computing Capability. communications of the ac m, 53(4), 50-58.

Beal, V. (2015). What is Cloud Computing? Webopedia Definition. Retrieved June 28, 2016, from http://www.webopedia.com/TERM/C/cloud_computiWhat is Cloud Computing? Webopedia Definition. Retrieved June 28, 2016, from http://www.web. Retrieved June 28, 2016, from webopedia.com: Beal, V. (2015). What is Cloud Computing? Web http://www.webopedia.com/TERM/C/cloud_computing.html.

Beekhuyzen, Hellens, L. V., & Siedle, M. (2005). Cultural barriers in the adoption of emerging technologies. Retrieved June 25, 2016, from http://www.ucd.smartinternet.com.au/Documents/Cultural Barriers.pdf

Bendassolli, P. F. (2013). Theory Building in Qualitative Research: Reconsidering the Problem of Induction. Qualitative Social Research. 14(1), Art. 25,, p. 50 paragraphs. Forum Qualitative Sozialforschung . Retrieved from http://nbn-resolving.de/urn:nbn:de:0114-fqs1301258

Bharti, S. K., Babu, K. S., & Jena, S. K. (2015, August 26). A Survey on Auditability for Data Storage on Cloud. researchgate.net. Retrieved July 27, 2016, from https://www.researchgate.net/publication/281272264_A_Survey_on_Auditability_for_Data_Storage_on_Cloud_Computing

Black, J. (2010). Principles-based regulation. Retrieved June 21, 2016, from http://www.alrc.gov.au/publications/4. Regulating Privacy/regulatory-theory#_ftnref3.

Brunette, G., & Mogull, R. (Eds.). (2009). Security Guidance for Critical Areas of Focus in Cloud Computing. 2.1. Retrieved June 25, 2016, from Cloud Security Alliance: https://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf

Catteddu, D., & Hogben, G. (Eds.). (2009, November). Cloud Computing - Benefits, risks and recommendations for information security. The European Network and Information Security Agency (ENISA). Retrieved June 25, 2016, from https://www.enisa.europa.eu/publications/Cloud Computing Security Risk Assessment (1).pdf

Central Bank of Kenya Prudential guidelines on Business Continuity. Circular to Banks and Financial Institutions. (2008). Nairobi, Kenya, Nairobi.

Central Bank of Kenya. Bank supervision report 2017. (2017). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/849246690_2017%20Annual%20Report.pdf

Central Bank of Kenya. Bank supervision report 2018. (2018). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/1174296311_2018%20Annual%20Report.pdf

Central Bank of Kenya. Bank supervision report 2019. (2019). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/197965474_BSDANNUALREPORT2019%20.pdf

Central Bank of Kenya. Bank supervision report 2020. (2020). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/468154612_2020%20Annual%20Report.pdf

Cloud Computing. (n.d.). Retrieved June 25, 2016, from https://en.wikipedia.org: https://en.wikipedia.org/wiki/Cloud_computing

Cloud computing forum. (n.d.). Retrieved March 10, 2016, from http://www.cloudforum.org

Cloud Security Alliance. (2010). Top Threats to Cloud Computing . Retrieved June 20, 2016, from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Cluley, G. (2014, July 08). Google Drive Found Leaking Private Data - Another Warning About Shared Links. Retrieved June 25, 2016, from http://blogs.intralinks.com/collaborista/2014/07/google-drive-found-leaking-private-data-warning-shared-links

Cooper, D. R., & Schindler, P. S. (2003). Business Research Methods (8th edn). New York : McGraw-Hill.

Cowan, P. (2015, July 27). Labor wants customer consent for offshore data storage. Retrieved July 28, 2016, from iTnews.com.au: iTnews.com.au

Crandell, M. (2011, may 29). How to Ensure Business Continuity in the Cloud. Retrieved July 28, 2016, from gigaom.com: https://gigaom.com/2011/05/29/how-to-design-your-service-for-failures-in-the-cloud

Dawson, K. ( 2013, January 21 ). The Total Cost of Ownership of Cloud and Premise-Based Contact Center Systems - Ovum. Retrieved June 28, 2016, from http://www.ovum.com/research/the-total-cost-of-ownership-of-cloud-and-premise-based-contact-center-systems

Diantina, P., Bletre, S., & Southwood, R. (2011, January 19). Data Centre Markets in Africa . Retrieved June 30, 2016, from http://www.balancingact-africa.com/reports/telecoms-and-interne/data-centre-markets

Donald, C. (2006). Synthesizing Research; A guide for Literature Reviews (3rd edn). Sage: Thousand Oaks.

Eisold, K. (2010, may 26). Resistance to Change in Organizations. Retrieved July 22, 2016, from Psychology today: www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations

Franklin, J. (2010). Benefits and Limits of Cloud Computing. Retrieved June 29, 2016, from http://www.aia.org/aiaucmp/groups/aia/documents/pdf/aiab086678.pdf

Geier, E. (2013). Everything You Ever Wanted to Know About Network VPN Connections | iComputer Denver Mac & PC Computer Repair Services and IT Network Support. Retrieved June 28, 2016, from http://icomputerdenver.com/everything-you-ever-wanted-to-know-about-network-vpn-connections

Ghule, S., Chikhale, R., & Parmar, K. (2014). Cloud computing in banking services. Persistent Systems Limited. International Journal of Scientific and Research Publications, 4(6). Retrieved June 28, 2016, from http://www.ijsrp.org/research-paper-0614/ijsrp-p3045.pdf

Goscinski, A., & Brock, M. (2010). Toward dynamic and attribute based publication, discovery and selection for cloud computing. Elsevier BV, 26(7), 947-970. Retrieved June 28, 2016, from http://hdl.handle.net/10536/DRO/DU:30033864

HAMDAQA, M., & TAHVILDARI, L. (2012). Cloud Computing Uncovered:A Research Landscape. Software Technologies Applied Research (STAR) Group,University of Waterloo, Waterloo, 86, 41-84.

Harris, T. (2015). Cloud Computing Overview. Retrieved June 28, 2016, from http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf

Hassan, Q. F. (2011). Demystifying Cloud Computing. CrossTalk. Retrieved june 28, 2016, from http://static1.1.sqspcdn.com/static/f/702523/10181434/1294788395300/201101-Hassan.pdf

Hurwitz, J., Kaufman, M., & Kirsch, D. (2015). Ibm-2284-Hybrid Cloud for Dummies (C. A. Johnson, Ed.). (C. A. Johnson, Ed.) Retrieved June 22, 2016, from https://www.scribd.com/doc/302469555/Ibm-2284-Hybrid-Cloud-for-Dummies

Huth, A., & Cebula, J. (2011). The Basics of Cloud Computing. Retrieved June 22, 2016, from https://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf

IBM Perspective on Cloud Computing. (2008). Retrieved June 22, 2016, from https://www-935.ibm.com/services/in/cio/pdf/ibm _perspective_on_cloud_computing.pdf

ICTA Cloud Computing Standard Technical Committee. (2016, October 01). http://icta.go.ke/pdf/Cloud%20Computing%20Standard.pdf. Retrieved March 10, 2017, from http://icta.go.ke: http://icta.go.ke/pdf/Cloud%20Computing%20Standard.pdf

Jaques, E. (1951). The Changing Culture of a Factory.

Kaminski, J. (2011). Theory applied to informatics - Lewin's Change Theory. CJNI: Canadian Journal of Nursing Informatics, 6(1). Retrieved june 22, 2016, from http://cjni.net/journal/?p=1210

Kenya National Bureau of Statistics (KNBS). (2010). http://www.ca.go.ke/images//downloads/universal_access/survey. (C. C. Kenya, Ed.) Retrieved March 10, 2017, from http://www.ca.go.ke: http://www.ca.go.ke/images//downloads/universal_access/survey/National%20ICT%20Survey.pdf

klrc. (2010, August 27). http://www.klrc.go.ke/index.php/constitution-of-kenya. Retrieved March 13, 2017, from http://www.klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-fundamental-freedoms/197-31-privacy: http://www.klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-fundamental-freedoms/197-31-privacy

Kothari, C. R. (2000). Research Methodology: Methods and Techniques. New Delhi: Wiley.

Kotler, P., Clark, E., & Adam, S. (2001). Principals of Marketing. Frenchs Forest, N.S.W: Prentice Hall.

Kurtus, R. (2012). Theory of Security. Retrieved June 22, 2016, from http://www.school-for-champions.com/security/theory_of_security.htm#

Lemos, R. (2010, April 15). Retrieved July 22, 2016, from http://www.networkworld.com/article/2207138/security/cloud-computing--early-adopters-share-five-key-lessons.html

Lewin, K. (n.d.). The Kurt Lewin Model Of Change. Retrieved July 02, 2016, from http://www.change-management-coach.com/kurt_lewin.html

Maaref, S. (2012). C l o u d C o m p u t i n g i n A f r i c a-S i t u at i o n a n d P e r s p e c t i v e s. International Telecommunication Union. Retrieved June 25, 2016, from http://www.itu.int/en/ITU-T/ focusgroups /cloud/Pages/default.aspx

Marks, M. L. (n.d.). Retrieved from The Wall Street Journal.

McCarthy, J. (1983). REMINISCENCES ON THE HISTORY OF TIME SHARING. Retrieved June 14, 2016, from http://www-formal.stanford.edu/jmc/history/timesharing/timesharing.html

McLaughlin, J. (n.d.). what-is-organizational-culture-definition-characteristics. Retrieved July 26, 2016, from study.com: http://study.com/academy/lesson/what-is-organizational-culture-definition-characteristics.html

Mell, P., & Grance, T. (2009). The NIST Definition of Cloud Computing. Retrieved June 22, 2016, from http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf

Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Retrieved June 22, 2016, from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

Misra, S. C., & Mondal, A. (2011, February). Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment. Mathematical and Computer Modelling: An International Journal, 53(3-4), 504-521. Retrieved from www.elsevier.com/locate/mcm

Morrill, D. (2011). Cloud Computing in Education. Retrieved June 25, 2016, from https://www.cloudave.com/14857/cloud-computing-in-education

Mugenda, O. M., & Mugenda, A. G. (1999). Research Methods, Quantitative & Qualitative Approaches. Nairobi: Acts Press.

Mugenda, O., & Mugenda, A. (2003). Research Methods, Quantitative & Qualitative Approaches. Nairobi.: Acts Press.

Ngechu. (2004). An investigation into competitive Intelligence Practices and their effect on profitability of firms. 5-6.

Ngugi, B., Pelowski, M., & Ogembo, J. G. (2010). M-Pesa: A case study of the critical early adopters' role in the rapid adoption of mobile money banking in Kenya. The Electronic Journal on Information Systems in Developing Countries, 43(3), 1-16. Retrieved July 22, 2016, from http://www.ejisdc.org

Oredo, J., Njihia, J., & Iraki, X. (2019). Adoption of Cloud Computing by Firms in Kenya: The Role of Institutional Pressures. The African Journal of Information Systems, 11(3). Retrieved August 26, 2021, from https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=1605&context=ajis

Rabbetts, A. (2013, December). Retrieved July 26, 2016, from http://www.computerweekly.com/opinion/Cloud-vendor-lock-in-our-experience

Rausand, M. (2014). Reliability of Safety Critical Systems:theory and applications. United States of America: John Wiley & Sons.

Republic of Kenya. (2020). Economic Survey. Nairobi, Kenya: Government Printers. Retrieved August 26, 2021, from https://www.knbs.or.ke/?wpdmpro=economic-survey-2020

Richard, S. A. (2013). Research Guides. usc.edu. Retrieved July 01, 2016, from http://libguides.usc.edu/writingguide/theoreticalframework

Rogers, E. (2003). Diffusion of Innovations (G. Orr, Ed.). Stanford Education. Retrieved June 24, 2016, from https://web.stanford.edu/class/symbsys205/Diffusion of Innovations.htm.

Salcedo, H. (Ed.). (2014, November 20). Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List. Retrieved June 25, 2016, from https://psg.hitachi-solutions.com/credeon/blog/google-drive-dropbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list

Schein, E. H. (1988). Organizational Culture. Massachussets Institute of Technology, Sloan School of Management. Sloan School of Management.

Sclater, N. (2010, september). CLOUD COMPUTING IN EDUCATION-POLICY BRIEF. Moscow, Russian Federation: UNESCO Institute for Information Technologies in education. Retrieved June 25, 2016, from http://iite.unesco.org/files/policy_briefs/pdf/en/cloud_computing.pdf

searchcompliance. (n.d.). Retrieved July 28, 2016, from http://searchcompliance.techtarget.com/definition/regulatory-compliance

Singh, A. N., & Hemalatha, M. (2012, February). Cloud Computing for Academic Environment. International Journal of Information and Communication Technology Research, 2(2), 97-101. Retrieved June 28, 2016, from http://esjournals.org/journaloftechnology/archive/vol2no2/vol2no2_1.pdf

spamlaws.com. (n.d.). Retrieved from http://www.spamlaws.com/data-security.html: http://www.spamlaws.com/data-security.html

Sriram, I., & Hosseini, A. K. (2010). Research Agenda in Cloud Technologies. Computer Science Distributed, Parallel, and Cluster Computing, 2(4). doi:1001.3259

Stiglitz, J. (2012). On liberty, the right to know and public discourse: The role of transparency in public life. (M. Gibney, Ed.) Oxford: Oxford University Press.

Subashini, S., & Kavitha, V. (2010). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.

Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116.

Tsagklis, I. (2013). Advantages and Disadvantages of Cloud Computing - Cloud computing pros and cons (K. Cai, Trans.). Javacodegeeks. Retrieved June 28, 2016, from https://www.javacodegeeks.com/2013/04/advantages-and-disadvantages-of-cloud-computing-cloud-computing-pros-and-cons.html

Ume, A., Bassey, A., & Ibrahim, H. (2012). Impediments Facing the Introduction of Cloud Computing Among Organizations in Developing Countries: Finding the Answer. Asian Transactions on Computers (ATC), 02(04).

Violino, B. (2013, June 07). Business Continuity Encompasses the Cloud. Retrieved July 28, 2016, from baselinemag.com: http://www.baselinemag.com/business-continuity/business-continuity-encompasses-the-cloud

Ware, G. (2011). The Africa Report. Retrieved July 01, 2016, from http://www.theafricareport.com/News-Analysis/ict-from-the-ocean-to-the-cloud.html

what-is-ipaas-gartner-provides-reference-model. (n.d.). Retrieved from https://www.mulesoft.com: https://www.mulesoft.com/resources/cloudhub/what-is-ipaas-gartner-provides-reference-model

World Bank . (2012). E-government preparedness in sub-Saharan Africa. The critical role of ICT in organizational success. Washington: World Bank.

Downloads

Published

2022-10-27

How to Cite

Odhiambo, F., Mose, T., & Mwalili , T. (2022). Precursors of Cloud Computing Adoption in Selected Banks in Kenya. International Journal of Technology and Systems, 7(2), 56–94. https://doi.org/10.47604/ijts.1676

Issue

Section

Articles