IDEAS home Printed from https://ideas.repec.org/a/wsi/ijitdm/v15y2016i01ns0219622015500364.html
   My bibliography  Save this article

The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption

Author

Listed:
  • Mario Silic

    (University of St. Gallen/ZSEM Mueller - Friedberg - Str. 8, 9000 St. Gallen, Switzerland)

  • Andrea Back

    (University of St. Gallen, Mueller - Friedberg - Str. 8, 9000 St. Gallen, Switzerland)

Abstract

“Nobody ever got fired for buying IBM,” was a widely used cliché in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecosystem. However, it has also brought important IT security risks that are impacting the OSS IT adoption decision-making process. The recent Heartbleed bug demonstrated the grandeur of the issue. While much of the noise relates to the amplification of perceived risks by the popular mass media coverage, the effect is that many enterprises, mainly for risk reasons, have still chosen not to adopt OSS. We investigated “how do information security related characteristics of OSS affect the risk perception and adoption decision of OSS” by conducting an online survey of 188 IT decision-makers. The proposed Open Source Risk Adoption Model offers novel insights on the importance of the perceived risk antecedents. Our research brings new theoretical contributions, such as understanding the perceived IT security risk (PISR) relationship with adoption intention (AI) in the OSS context, for researchers and important insights for IT information professionals. We have found that IT security risk has a significant role in OSS adoption intention. Our results offer possible future research directions and extend existing theoretical understanding of OSS adoption.

Suggested Citation

  • Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
  • Handle: RePEc:wsi:ijitdm:v:15:y:2016:i:01:n:s0219622015500364
    DOI: 10.1142/S0219622015500364
    as

    Download full text from publisher

    File URL: http://www.worldscientific.com/doi/abs/10.1142/S0219622015500364
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1142/S0219622015500364?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Georges Dionne, 2013. "Risk Management: History, Definition, and Critique," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 16(2), pages 147-166, September.
    2. Paul Chwelos & Izak Benbasat & Albert S. Dexter, 2001. "Research Report: Empirical Test of an EDI Adoption Model," Information Systems Research, INFORMS, vol. 12(3), pages 304-321, September.
    3. Benlian, Alexander & Hess, Thomas, 2011. "Opportunities and risks of Software-as-a-Service: Findings from a survey of IT executives," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 58025, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    4. David A. Harrison & Peter P. Mykytyn & Cynthia K. Riemenschneider, 1997. "Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, INFORMS, vol. 8(2), pages 171-195, June.
    5. Benlian, Alexander & Hess, T., 2010. "The risks of sourcing software as a service — An empirical analysis of adopters and non-adopters," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 57926, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    6. Yi Peng & Gang Kou & Guoxun Wang & Honggang Wang & Franz I. S. Ko, 2009. "Empirical Evaluation Of Classifiers For Software Risk Management," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 8(04), pages 749-767.
    7. Andreas I. Nicolaou & D. Harrison McKnight, 2006. "Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use," Information Systems Research, INFORMS, vol. 17(4), pages 332-351, December.
    8. D. Harrison McKnight & Vivek Choudhury & Charles Kacmar, 2002. "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology," Information Systems Research, INFORMS, vol. 13(3), pages 334-359, September.
    9. Ackermann, Tobias & Miede, André & Buxmann, Peter & Steinmetz, Ralf, 2011. "Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 52207, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    10. Ackermann, Tobias & Widjaja, Thomas & Benlian, Alexander & Buxmann, Peter, 2012. "Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 58577, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    11. Wynne W. Chin & Barbara L. Marcolin & Peter R. Newsted, 2003. "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, INFORMS, vol. 14(2), pages 189-217, June.
    12. Benlian, Alexander & Hess, Thomas, 2011. "Comparing the relative importance of evaluation criteria in proprietary and open-source enterprise application software selection — A conjoint study of ERP and Office systems," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 58024, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    13. Krishnamurthy, Sandeep, 2003. "A managerial overview of open source software," Business Horizons, Elsevier, vol. 46(5), pages 47-56.
    14. Peter, J Paul & Tarpey, Lawrence X, Sr, 1975. "A Comparative Analysis of Three Consumer Decision Strategies," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 2(1), pages 29-37, June.
    15. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    16. Bonaccorsi, Andrea & Rossi, Cristina, 2003. "Why Open Source software can succeed," Research Policy, Elsevier, vol. 32(7), pages 1243-1258, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jianping Li & Minglu Li & Dengsheng Wu & Qianzhi Dai & Hao Song, 2016. "A Bayesian Networks-Based Risk Identification Approach for Software Process Risk: The Context of Chinese Trustworthy Software," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(06), pages 1391-1412, November.
    2. Tianzhi Gao & Qian Lu & Yiping Zhang & Hui Feng, 2024. "Does Farmers’ Cognition Enhance Their Enthusiasm for Adopting Sustainable Digital Agricultural Extension Services? Evidence from Rural China," Sustainability, MDPI, vol. 16(10), pages 1-19, May.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Heng Xu & Hock-Hai Teo & Bernard C. Y. Tan & Ritu Agarwal, 2012. "Research Note ---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services," Information Systems Research, INFORMS, vol. 23(4), pages 1342-1363, December.
    2. Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
    3. Lingling Gao & Kerem Aksel Waechter, 0. "Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    4. Ming Yang & Jinglu Jiang & Melody Kiang & Fangyun Yuan, 2022. "Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision," Information Systems Frontiers, Springer, vol. 24(3), pages 983-1007, June.
    5. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    6. Hu, Bo & Liu, Yu-li & Yan, Wenjia, 2021. "Should I scan my face? The influence of perceived value and trust on Chinese users' intention to use facial recognition payment," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238028, International Telecommunications Society (ITS).
    7. Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
    8. Lingling Gao & Kerem Aksel Waechter, 2017. "Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation," Information Systems Frontiers, Springer, vol. 19(3), pages 525-548, June.
    9. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    10. Wallbach, Sören, 2020. "Assimilation and Diffusion of Multi-Sided Platforms in Dynamic B2B Networks: Inhibiting Factors and Their Consequences," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 123277, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    11. Beke, Frank T. & Eggers, Felix & Verhoef, Peter C. & Wieringa, Jaap E., 2022. "Consumers’ privacy calculus: The PRICAL index development and validation," International Journal of Research in Marketing, Elsevier, vol. 39(1), pages 20-41.
    12. Baozhou Lu & Zhenhua Wang, 2022. "Trust Transfer in Sharing Accommodation: The Moderating Role of Privacy Concerns," Sustainability, MDPI, vol. 14(12), pages 1-18, June.
    13. Viswanath Venkatesh & Hillol Bala, 2012. "Adoption and Impacts of Interorganizational Business Process Standards: Role of Partnering Synergy," Information Systems Research, INFORMS, vol. 23(4), pages 1131-1157, December.
    14. Sullivan, Yulia W. & Kim, Dan J., 2018. "Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-commerce environments," International Journal of Information Management, Elsevier, vol. 39(C), pages 199-219.
    15. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
    16. Grace Fox & Tabitha L. James, 2021. "Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study," Information Systems Frontiers, Springer, vol. 23(6), pages 1537-1562, December.
    17. Jaeki Song & Fatemeh Mariam Zahedi, 2005. "A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model," Management Science, INFORMS, vol. 51(8), pages 1219-1235, August.
    18. Jian Mou & Dong-Hee Shin & Jason F. Cohen, 2017. "Trust and risk in consumer acceptance of e-services," Electronic Commerce Research, Springer, vol. 17(2), pages 255-288, June.
    19. Cheng, Junjun & Chen, Bo & Huang, Zihang, 2023. "Collective-based ad transparency in targeted hotel advertising: Consumers’ regulatory focus underlying the crowd safety effect," Journal of Retailing and Consumer Services, Elsevier, vol. 72(C).
    20. Song, Lianlian & Hu, Baixue & Mou, Jian, 2021. "Investigating consumer binge-watching behavior: A valence framework perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 62(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:ijitdm:v:15:y:2016:i:01:n:s0219622015500364. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/ijitdm/ijitdm.shtml .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.