Precursors of Cloud Computing Adoption in Selected Banks in Kenya
DOI:
https://doi.org/10.47604/ijts.1676Keywords:
Cloud, Computing, Innovation, Adoption, BanksAbstract
Purpose: The study analyzed the precursors of adoption of cloud computing in selected banks in Kenya. Specifically, the study sought to establish the effect of data security on adoption of cloud computing in selected banks in Kenya, to establish how organizational culture affects adoption of cloud computing in selected banks in Kenya, to establish how supplier lock- in affects adoption of cloud computing in selected banks in Kenya and to establish how regulatory policy affects adoption of cloud computing in selected banks in Kenya.Methodology: The study employed descriptive research design and inferential statistics. The target population was 366 ICT staff from 3 selected banks namely NCBA, KCB Bank and Equity bank. The selected banks had the largest market share according to published CBK supervisory report for year 2020. The sample size was 191 respondents. A structured questionnaire was used to collect the data. Responses in the questionnaires were tabulated, coded and processed by use of a computer statistical package for social sciences version 28 (SPSS) program to analyze the data. The responses from the open-ended questions were listed to obtain proportions appropriately and then reported by descriptive narrative. Descriptive statistics like mean, standard deviation were used. The ANOVA test was used to establish the findings from the study and results presented in graphs and charts.
Findings: Cloud computing adoption was evaluated for the select commercial banks across three areas namely core-banking systems, middle office and compliance systems and back-office, data science and innovation systems over a period of five years. The respondents indicated that no more than one cloud computing project was either in planning, implementation, failed or completed stages, indicating that despite the perceived benefits of cloud computing there are precursors that need to be addressed if the commercial banks are to fully embrace cloud computing.
Unique contribution to theory, practice and policy: In terms of policy, the findings of the study will be important to regulators like CA, CBK and other institutions that regulate financial institutions in coming up with relevant guidelines when it comes to handling customer data within Cloud Computing environment. It gives banking sector perspective of some of the issues that require attention if the envisaged benefits of clod computing are to be fully realized. This is important not only to the policy makers but also to the cloud service providers . Additionally, the findings give a theoretical basis of validating the antecedents of cloud computing adoption in the banking sector in Kenya and this can be extended to the rest of the world. The findings give a practical perspective of the real concerns the banks have to contend with from a practical perspective and therefore very critical in advancement of cloud computing technologies.
Downloads
References
Ahirrao, S., & Ingle, R. (2015, November 15). Scalable transactions in cloud data stores. The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA), 4(21).
Akin, O. C., Matthew, F. T., & Comfort, D. (2014). The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria. (IJACSA) International Journal of Advanced Computer Science and Applications, 5(8), 13-19. Retrieved June 25, 2016, from http://thesai.org/Downloads/Volume5No8/Paper_3-The_Impact_ and _Challenges_of_Cloud_Computing_Adoption.pdf
Altman, I. (1977). Privacy Regulation. Journal of Social Issues, 33(3). Retrieved July 2, 2016, from http://courses.cs.vt.edu/cs6204/Privacy-Security/Papers/Privacy/Privacy-Regulation.pdf
Amazon EC2 - Virtual Server Hosting. (n.d.). Retrieved June 25, 2016, from Amazon.com: http://www.amazon.com/gp/browse.html?
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., . . . Zaharia, M. ( 2009). Above the clouds. A Berkeley view of cloud computing. University of California, Electrical Engineering and Computer Sciences. California: Electrical Engineering and Computer Sciences University of California at Berkeley. Retrieved June 25, 2016, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., . . . Zaharia, M. (2010). A View of Cloud Computing : Clearing the Clouds Away from the True Potential and Obstacles Posed by This Computing Capability. communications of the ac m, 53(4), 50-58.
Beal, V. (2015). What is Cloud Computing? Webopedia Definition. Retrieved June 28, 2016, from http://www.webopedia.com/TERM/C/cloud_computiWhat is Cloud Computing? Webopedia Definition. Retrieved June 28, 2016, from http://www.web. Retrieved June 28, 2016, from webopedia.com: Beal, V. (2015). What is Cloud Computing? Web http://www.webopedia.com/TERM/C/cloud_computing.html.
Beekhuyzen, Hellens, L. V., & Siedle, M. (2005). Cultural barriers in the adoption of emerging technologies. Retrieved June 25, 2016, from http://www.ucd.smartinternet.com.au/Documents/Cultural Barriers.pdf
Bendassolli, P. F. (2013). Theory Building in Qualitative Research: Reconsidering the Problem of Induction. Qualitative Social Research. 14(1), Art. 25,, p. 50 paragraphs. Forum Qualitative Sozialforschung . Retrieved from http://nbn-resolving.de/urn:nbn:de:0114-fqs1301258
Bharti, S. K., Babu, K. S., & Jena, S. K. (2015, August 26). A Survey on Auditability for Data Storage on Cloud. researchgate.net. Retrieved July 27, 2016, from https://www.researchgate.net/publication/281272264_A_Survey_on_Auditability_for_Data_Storage_on_Cloud_Computing
Black, J. (2010). Principles-based regulation. Retrieved June 21, 2016, from http://www.alrc.gov.au/publications/4. Regulating Privacy/regulatory-theory#_ftnref3.
Brunette, G., & Mogull, R. (Eds.). (2009). Security Guidance for Critical Areas of Focus in Cloud Computing. 2.1. Retrieved June 25, 2016, from Cloud Security Alliance: https://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
Catteddu, D., & Hogben, G. (Eds.). (2009, November). Cloud Computing - Benefits, risks and recommendations for information security. The European Network and Information Security Agency (ENISA). Retrieved June 25, 2016, from https://www.enisa.europa.eu/publications/Cloud Computing Security Risk Assessment (1).pdf
Central Bank of Kenya Prudential guidelines on Business Continuity. Circular to Banks and Financial Institutions. (2008). Nairobi, Kenya, Nairobi.
Central Bank of Kenya. Bank supervision report 2017. (2017). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/849246690_2017%20Annual%20Report.pdf
Central Bank of Kenya. Bank supervision report 2018. (2018). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/1174296311_2018%20Annual%20Report.pdf
Central Bank of Kenya. Bank supervision report 2019. (2019). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/197965474_BSDANNUALREPORT2019%20.pdf
Central Bank of Kenya. Bank supervision report 2020. (2020). Nairobi, Kenya. Retrieved August 26, 2021, from https://www.centralbank.go.ke/uploads/banking_sector_annual_reports/468154612_2020%20Annual%20Report.pdf
Cloud Computing. (n.d.). Retrieved June 25, 2016, from https://en.wikipedia.org: https://en.wikipedia.org/wiki/Cloud_computing
Cloud computing forum. (n.d.). Retrieved March 10, 2016, from http://www.cloudforum.org
Cloud Security Alliance. (2010). Top Threats to Cloud Computing . Retrieved June 20, 2016, from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Cluley, G. (2014, July 08). Google Drive Found Leaking Private Data - Another Warning About Shared Links. Retrieved June 25, 2016, from http://blogs.intralinks.com/collaborista/2014/07/google-drive-found-leaking-private-data-warning-shared-links
Cooper, D. R., & Schindler, P. S. (2003). Business Research Methods (8th edn). New York : McGraw-Hill.
Cowan, P. (2015, July 27). Labor wants customer consent for offshore data storage. Retrieved July 28, 2016, from iTnews.com.au: iTnews.com.au
Crandell, M. (2011, may 29). How to Ensure Business Continuity in the Cloud. Retrieved July 28, 2016, from gigaom.com: https://gigaom.com/2011/05/29/how-to-design-your-service-for-failures-in-the-cloud
Dawson, K. ( 2013, January 21 ). The Total Cost of Ownership of Cloud and Premise-Based Contact Center Systems - Ovum. Retrieved June 28, 2016, from http://www.ovum.com/research/the-total-cost-of-ownership-of-cloud-and-premise-based-contact-center-systems
Diantina, P., Bletre, S., & Southwood, R. (2011, January 19). Data Centre Markets in Africa . Retrieved June 30, 2016, from http://www.balancingact-africa.com/reports/telecoms-and-interne/data-centre-markets
Donald, C. (2006). Synthesizing Research; A guide for Literature Reviews (3rd edn). Sage: Thousand Oaks.
Eisold, K. (2010, may 26). Resistance to Change in Organizations. Retrieved July 22, 2016, from Psychology today: www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations
Franklin, J. (2010). Benefits and Limits of Cloud Computing. Retrieved June 29, 2016, from http://www.aia.org/aiaucmp/groups/aia/documents/pdf/aiab086678.pdf
Geier, E. (2013). Everything You Ever Wanted to Know About Network VPN Connections | iComputer Denver Mac & PC Computer Repair Services and IT Network Support. Retrieved June 28, 2016, from http://icomputerdenver.com/everything-you-ever-wanted-to-know-about-network-vpn-connections
Ghule, S., Chikhale, R., & Parmar, K. (2014). Cloud computing in banking services. Persistent Systems Limited. International Journal of Scientific and Research Publications, 4(6). Retrieved June 28, 2016, from http://www.ijsrp.org/research-paper-0614/ijsrp-p3045.pdf
Goscinski, A., & Brock, M. (2010). Toward dynamic and attribute based publication, discovery and selection for cloud computing. Elsevier BV, 26(7), 947-970. Retrieved June 28, 2016, from http://hdl.handle.net/10536/DRO/DU:30033864
HAMDAQA, M., & TAHVILDARI, L. (2012). Cloud Computing Uncovered:A Research Landscape. Software Technologies Applied Research (STAR) Group,University of Waterloo, Waterloo, 86, 41-84.
Harris, T. (2015). Cloud Computing Overview. Retrieved June 28, 2016, from http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf
Hassan, Q. F. (2011). Demystifying Cloud Computing. CrossTalk. Retrieved june 28, 2016, from http://static1.1.sqspcdn.com/static/f/702523/10181434/1294788395300/201101-Hassan.pdf
Hurwitz, J., Kaufman, M., & Kirsch, D. (2015). Ibm-2284-Hybrid Cloud for Dummies (C. A. Johnson, Ed.). (C. A. Johnson, Ed.) Retrieved June 22, 2016, from https://www.scribd.com/doc/302469555/Ibm-2284-Hybrid-Cloud-for-Dummies
Huth, A., & Cebula, J. (2011). The Basics of Cloud Computing. Retrieved June 22, 2016, from https://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf
IBM Perspective on Cloud Computing. (2008). Retrieved June 22, 2016, from https://www-935.ibm.com/services/in/cio/pdf/ibm _perspective_on_cloud_computing.pdf
ICTA Cloud Computing Standard Technical Committee. (2016, October 01). http://icta.go.ke/pdf/Cloud%20Computing%20Standard.pdf. Retrieved March 10, 2017, from http://icta.go.ke: http://icta.go.ke/pdf/Cloud%20Computing%20Standard.pdf
Jaques, E. (1951). The Changing Culture of a Factory.
Kaminski, J. (2011). Theory applied to informatics - Lewin's Change Theory. CJNI: Canadian Journal of Nursing Informatics, 6(1). Retrieved june 22, 2016, from http://cjni.net/journal/?p=1210
Kenya National Bureau of Statistics (KNBS). (2010). http://www.ca.go.ke/images//downloads/universal_access/survey. (C. C. Kenya, Ed.) Retrieved March 10, 2017, from http://www.ca.go.ke: http://www.ca.go.ke/images//downloads/universal_access/survey/National%20ICT%20Survey.pdf
klrc. (2010, August 27). http://www.klrc.go.ke/index.php/constitution-of-kenya. Retrieved March 13, 2017, from http://www.klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-fundamental-freedoms/197-31-privacy: http://www.klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-fundamental-freedoms/197-31-privacy
Kothari, C. R. (2000). Research Methodology: Methods and Techniques. New Delhi: Wiley.
Kotler, P., Clark, E., & Adam, S. (2001). Principals of Marketing. Frenchs Forest, N.S.W: Prentice Hall.
Kurtus, R. (2012). Theory of Security. Retrieved June 22, 2016, from http://www.school-for-champions.com/security/theory_of_security.htm#
Lemos, R. (2010, April 15). Retrieved July 22, 2016, from http://www.networkworld.com/article/2207138/security/cloud-computing--early-adopters-share-five-key-lessons.html
Lewin, K. (n.d.). The Kurt Lewin Model Of Change. Retrieved July 02, 2016, from http://www.change-management-coach.com/kurt_lewin.html
Maaref, S. (2012). C l o u d C o m p u t i n g i n A f r i c a-S i t u at i o n a n d P e r s p e c t i v e s. International Telecommunication Union. Retrieved June 25, 2016, from http://www.itu.int/en/ITU-T/ focusgroups /cloud/Pages/default.aspx
Marks, M. L. (n.d.). Retrieved from The Wall Street Journal.
McCarthy, J. (1983). REMINISCENCES ON THE HISTORY OF TIME SHARING. Retrieved June 14, 2016, from http://www-formal.stanford.edu/jmc/history/timesharing/timesharing.html
McLaughlin, J. (n.d.). what-is-organizational-culture-definition-characteristics. Retrieved July 26, 2016, from study.com: http://study.com/academy/lesson/what-is-organizational-culture-definition-characteristics.html
Mell, P., & Grance, T. (2009). The NIST Definition of Cloud Computing. Retrieved June 22, 2016, from http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Retrieved June 22, 2016, from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Misra, S. C., & Mondal, A. (2011, February). Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment. Mathematical and Computer Modelling: An International Journal, 53(3-4), 504-521. Retrieved from www.elsevier.com/locate/mcm
Morrill, D. (2011). Cloud Computing in Education. Retrieved June 25, 2016, from https://www.cloudave.com/14857/cloud-computing-in-education
Mugenda, O. M., & Mugenda, A. G. (1999). Research Methods, Quantitative & Qualitative Approaches. Nairobi: Acts Press.
Mugenda, O., & Mugenda, A. (2003). Research Methods, Quantitative & Qualitative Approaches. Nairobi.: Acts Press.
Ngechu. (2004). An investigation into competitive Intelligence Practices and their effect on profitability of firms. 5-6.
Ngugi, B., Pelowski, M., & Ogembo, J. G. (2010). M-Pesa: A case study of the critical early adopters' role in the rapid adoption of mobile money banking in Kenya. The Electronic Journal on Information Systems in Developing Countries, 43(3), 1-16. Retrieved July 22, 2016, from http://www.ejisdc.org
Oredo, J., Njihia, J., & Iraki, X. (2019). Adoption of Cloud Computing by Firms in Kenya: The Role of Institutional Pressures. The African Journal of Information Systems, 11(3). Retrieved August 26, 2021, from https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=1605&context=ajis
Rabbetts, A. (2013, December). Retrieved July 26, 2016, from http://www.computerweekly.com/opinion/Cloud-vendor-lock-in-our-experience
Rausand, M. (2014). Reliability of Safety Critical Systems:theory and applications. United States of America: John Wiley & Sons.
Republic of Kenya. (2020). Economic Survey. Nairobi, Kenya: Government Printers. Retrieved August 26, 2021, from https://www.knbs.or.ke/?wpdmpro=economic-survey-2020
Richard, S. A. (2013). Research Guides. usc.edu. Retrieved July 01, 2016, from http://libguides.usc.edu/writingguide/theoreticalframework
Rogers, E. (2003). Diffusion of Innovations (G. Orr, Ed.). Stanford Education. Retrieved June 24, 2016, from https://web.stanford.edu/class/symbsys205/Diffusion of Innovations.htm.
Salcedo, H. (Ed.). (2014, November 20). Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List. Retrieved June 25, 2016, from https://psg.hitachi-solutions.com/credeon/blog/google-drive-dropbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list
Schein, E. H. (1988). Organizational Culture. Massachussets Institute of Technology, Sloan School of Management. Sloan School of Management.
Sclater, N. (2010, september). CLOUD COMPUTING IN EDUCATION-POLICY BRIEF. Moscow, Russian Federation: UNESCO Institute for Information Technologies in education. Retrieved June 25, 2016, from http://iite.unesco.org/files/policy_briefs/pdf/en/cloud_computing.pdf
searchcompliance. (n.d.). Retrieved July 28, 2016, from http://searchcompliance.techtarget.com/definition/regulatory-compliance
Singh, A. N., & Hemalatha, M. (2012, February). Cloud Computing for Academic Environment. International Journal of Information and Communication Technology Research, 2(2), 97-101. Retrieved June 28, 2016, from http://esjournals.org/journaloftechnology/archive/vol2no2/vol2no2_1.pdf
spamlaws.com. (n.d.). Retrieved from http://www.spamlaws.com/data-security.html: http://www.spamlaws.com/data-security.html
Sriram, I., & Hosseini, A. K. (2010). Research Agenda in Cloud Technologies. Computer Science Distributed, Parallel, and Cluster Computing, 2(4). doi:1001.3259
Stiglitz, J. (2012). On liberty, the right to know and public discourse: The role of transparency in public life. (M. Gibney, Ed.) Oxford: Oxford University Press.
Subashini, S., & Kavitha, V. (2010). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116.
Tsagklis, I. (2013). Advantages and Disadvantages of Cloud Computing - Cloud computing pros and cons (K. Cai, Trans.). Javacodegeeks. Retrieved June 28, 2016, from https://www.javacodegeeks.com/2013/04/advantages-and-disadvantages-of-cloud-computing-cloud-computing-pros-and-cons.html
Ume, A., Bassey, A., & Ibrahim, H. (2012). Impediments Facing the Introduction of Cloud Computing Among Organizations in Developing Countries: Finding the Answer. Asian Transactions on Computers (ATC), 02(04).
Violino, B. (2013, June 07). Business Continuity Encompasses the Cloud. Retrieved July 28, 2016, from baselinemag.com: http://www.baselinemag.com/business-continuity/business-continuity-encompasses-the-cloud
Ware, G. (2011). The Africa Report. Retrieved July 01, 2016, from http://www.theafricareport.com/News-Analysis/ict-from-the-ocean-to-the-cloud.html
what-is-ipaas-gartner-provides-reference-model. (n.d.). Retrieved from https://www.mulesoft.com: https://www.mulesoft.com/resources/cloudhub/what-is-ipaas-gartner-provides-reference-model
World Bank . (2012). E-government preparedness in sub-Saharan Africa. The critical role of ICT in organizational success. Washington: World Bank.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Odhiambo Abok Fredrick, Dr. Thomas Mose (PhD), Dr. Tobias Mwalili (PhD)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.