Next Article in Journal
A Water Tank Level Control System with Time Lag Using CGSA and Nonlinear Switch Decoration
Previous Article in Journal
Electric Field Analysis on the Corona Discharge Phenomenon According to the Variable Air Space between the Ionizer and Ground Current Collector
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Innovative Usage of Grid Solutions with a Technology Behavior Model in a Medium-Size Enterprise

by
Poh Soon JosephNg
Faculty of Data Science and Information Technology, INTI International University, Persiaran Perdana BBN, Putra Nilai, Nilai 71800, Negeri Sembilan, Malaysia
Appl. Syst. Innov. 2023, 6(1), 11; https://doi.org/10.3390/asi6010011
Submission received: 29 December 2022 / Revised: 5 January 2023 / Accepted: 6 January 2023 / Published: 15 January 2023

Abstract

:
Integrating technology innovation within human behaviour challenged a new paradigm shift during business uncertainty. Virtualized grid server implementation is still in its infancy for the “Medium Size Enterprise” that is sandwiched between financial constraints and growing economies of scale opportunities. Grounded by the “Technology Acceptance Model” with the “Theory of Planned Behaviour”, the proposed “Technology Behaviour Model” is developed. A “convenient sampling” method was applied to gather feedback through mixed methods from various enterprises in Malaysia on several considerations that influence technology and behaviour. The research applies “PLS-SEM” with statistic triangulation, exploratory, and cross-sectional analysis. The results show that the adoption of the BOINC share-product solution to structure the returns, by encouraging monetary savings, utilized composed interworks which were consequently further developed. In ascertaining union legitimacy, the extensive unwavering quality is more noteworthy than 0.9, and the mean Average Variance Extracted is above 0.85. The Hetero-Trait-Mono-Trait relationship proportion above 0.85 is normally used to assess the Dependent Variable, with a time span of 95% arriving at 1. This new model uses “Exostructure as a Service” organic server virtualization to drive digital transformation that relooks into the infrastructure overheads. From the tested hypothesis at the Slightly Critical and Most Critical correlation, further theoretical and management contributions were elaborated.

1. Introduction

The Malaysian “Medium Size Enterprise (MSE)” remained an overwhelming participant of the economy contributing to 32.8% of employment prospects and 22.3% of “Gross Domestic Product (GDP)” [1] Having been caught amid the unviable practicality of “Small and Micro Enterprise (SME)” and the more prominent incomparable “Multi-National Corporation (MNC)”, it confines these enterprises to immense difficulty. Such immense contention emerges from the commitment of an “MSE” with 18,289 firms, even though it just shares 4% of local business areas, the “MSE” made a whopping GDP contribution of RM 1.3 billion USD in 2019 [1]. Such prevalent organizations will safeguard attempting to fight with a more noteworthy competitor, and they are reluctant, or bungled, to use additional assets to upgrade under the speculation of new progress. This is an outcome of the fascination of the amount of volume markdown, productivity, information experience, or range of abilities. In many cases, “MSEs” from other Asia Pacific nations that have embraced innovation have now exploited their shift gains when they showed up distinctively relative to the venture that was slow in experiencing advancement [2,3]. Jung et al. stated that “opportunities limits, returns performance and industry movement will diminish the probability of disappointment” [4]. Virtualization technology has worked with imaginative associations towards significant level returns to utilize new highlights with refreshed execution, adaptability, and improving their profitability [3,4]. This is similar to the advancement of enterprise, competition, and nation. An enterprise’s IT system platform that has virtualized environmental elements with adaptable assets can meet the necessities of another physical IT structure movement [5,6]. Anticipating that the “MSE” will expand locally and globally, the present virtualization system features the turn of events and its interests, especially with lesser created uncertainty [7] and the following problems, summarised below:
  • Inevitable investment expenses and escalating operating expenditures.
  • Unrealized returns via emerging immature technology.
  • Inconsistency with strategic digital direction.
  • Unmanageable external market turbulence control.
The “MSE” was impacted by the single-sided IT development that zeroed in on the standard basic functional techniques. As huge organizations concentrated on each activity, it has made an IT structure with all the additional expenses. The “MSE” is likewise quietened in related past deals due to the ignorance of technology utilization planning progress by considering the obvious lesser competitive aspects, rather than more significant multinational advancement [8]. Past literature has uncovered that various “MSEs” got singed by their interest in unfamiliar virtualization establishments while setting extra stress on the technology superiority theory and irrefutably impacting sensibility [2,9]. More recent and mystifying innovations were included in the existing complicated IT structure yet more desktop computing as simple word processing and spreadsheet automation usage was left.
The rise of the digital economy is transforming the global business landscape. Execution of an IT framework could assist the “MSE” with greater visionary benefits with a lesser amount of extreme speculation, particularly for the “MSE”. Furstenau et al. have advised that an association can reduce about RM 5 million of innovation expenditures when such expenditure is observed [10]. In any case, this evaluation has shown that essential desktop computing is unoptimized. Then again, by far most enterprises are hoping to develop their IT experience more than their earlier year use planned.
Inadequate resources, budgets, and specialised skills are the major challenges faced by enterprises seeking to digitally transform. As the monetary disturbance winds up being even more tangled, contention among associations has gotten outstandingly contradictory [11,12,13]. The money-related shortcoming is a shaky monetary circumstance where arrangements made at that specific period are absent, or inadequate for financial recuperation. Besides the monetary shortcoming time frame, it settles on additional IT spending choices which is more dangerous because of restricted compensation to help higher working costs. In any case, a business needs to have more expansive virtualization to get a handle on their evaluation design and obligation to the extent it is important for them when moving and coordinating into the paradigm shift toward a state-of-the-art business. In addition, the focus has been more on absolute modernization development, instead of supporting modernization business survey re-planning. Megari highlighted that “there is constraint knowledge of the contribution where technology features shapes in moulding management sense-making from innovative IT infrastructure, and how management response contributed in it sense-making” [11]. Yet, the suggested practical arrangement is presently being perceived for its persistent insurgency, the apportionment of such transformation is regularly inconceivable in the corporate scene.
To succeed in digital transformation, strategic IT executives need to adopt a business-driven road, shift the bulk of IT spending to virtualization, take small steps now and gradually amass acceptance within the enterprise’s behaviour. “Exostructure as a Service (EaaS)” adopted from “Grid Computing” systems incorporate an adaptable execution procedure that is designed from available local devices. It joined numerous physical computers to frame a greater virtual server without the need to put more resources into extra actual hardware and expenditure [14,15,16,17]. Such virtualization is situated inside the local premises. Such license requirement oversight moves and screens to identify with external outsourced hosting web facilitating administration, especially in optimizing idleness from the outer web, facilitating the need for a server to be nearby, assembling the mechanization framework and administration level. Being an inner solution similarly suggests a more ensured security conviction level. As the competition landscape ends up being further novel, still costlier, and schedule dependent, the prerequisite for the least outside obstructions should be avoided in whatever amount as could be anticipated. Hereafter, to achieve these, referred to previously, the EaaS model is a versatile course of action. The virtual specialist is an amazing labourer that blends in with the climate of big business. As the undertakings mirror the turn of business performance, they will reliably develop their technology capability and capacity in a like manner, placing more assets into extra handling power. As the work area’s advancement improves, innovation’s limits are reached, and abilities are updated, so will the “EaaS Virtual Framework”. Such environment yields extend (or decline) the framework expectations, focusing on competition performance to organize the strength and weaknesses of the framework accomplishment within the shown dynamic industry landscape. At whatever point expected, the EaaS frameworks can be downsized, as shown by when the industry experiences a troublesome phase. This versatility will help the operation with maintaining profitability and assist with keeping up the “Barebone” theory expense from the unusual industry, especially the ineffectually added tasks.
At last, there were lacking commentaries about the utilization of “Grid Computing” for the more modest organization stage, especially the “MSE”. Alkhanak et al. portrayed development execution as a key mechanism to redesign earnestness and to regulate the organization in the securing of, taking care of, and reinforcing of modernization to withstand the arrangement that ought to be practical with the foundation’s essential objective [18]. They centered that while advancement headway is a gigantic revelation to work on yield rate, improvement isn’t the lone decision to upgrade the work movement. From these fears, the difficulties of conflict have created the following hypothesis:
H1: 
“EaaS enhances existing resources when investing in new IT infrastructure. The hypothesis is supported.”
H2: 
“EaaS prevents unnecessary maintenance when investing in new IT infrastructure. The hypothesis is supported.”
H3: 
“EaaS alters the budget provision paradigm when investing in new IT infrastructure. The hypothesis is supported.”
H4: 
“EaaS differentiates economic turbulence separately when investing in new IT infrastructure. The hypothesis is supported.”
Utilizing the development of a virtualization concept, “MSE” can have the opportunity to put themselves in the path of a further important operation environment that was unrealistic previously. Alkhanak et al. stressed that enterprises need to “invest in information technology that permits the enterprise to generate extra data without overburdening the technological barriers”. While during virtualization growth or variation, its business cycle has remained blended so that foreseen operations pushed tasks like manufacturing computerization has compelled “MSE” to be significantly beyond imaginative, in this approach opening up their generic influence.
Figure 1 illustrates the association between the various proposition structures with the primary analysis domain. It moreover describes the domain in relation to the “Dependent Variable” and its associated “Independent Variable”. These statistics were assessed utilising “Regression Analysis”, “Model Fitting”, “Goodness of Fit”, and “Chi-Square” severance for adopting standard respondents.
While most solutions focus on the development of a traditional cloud-based solution, our research illustrates an alternative method perspective that may be necessary to determine the intricate “MSE” that triggered problems with financial obligations, financial turbulence, diminishing attractiveness of recruiting skillful competencies, and expensive support structures. This research starts with the discoveries using three gathering techniques (“Quantitative, Qualitative, and Delphi”). The re-tested method intended for “MSE” overall advancement can similarly be drawn inside “Multi-National Corporation”, closely to a related virtualization concept. Eventually, our paper contributes to establishing an inexpensive solution that enhances existing resources to prevent unnecessary maintenance, while altering the budget provision to ride through economic turbulence. The research forethought progressively identifies comparisons contained by the “Medium Size Enterprise” to expand its present impactful virtualization closer to a compliant but essential long-haul recuperation.

2. Technology and Behavior Model Direction Literature

2.1. Technology Acceptance Model

The “Technology Acceptance Model” is a rationale performance to study users’ acceptance of information or technology systems. The use of the system is governed by “behavioural intention”, which is jointly governed by “perceived usefulness” and “ease of use” [19,20]. The use of TAM in this experiment can improve how enterprise perceives the “usefulness and ease of use” of virtualization through the use of grid computing in operations to change the user behaviour of enterprises to use virtualization actively. People’s acceptance of using extended virtualization was collected through subjective awareness, good impression, and active choice [21,22]. Based on the current understanding of relevant information, virtualization can play a crucial position in virtualization, convenient for the user to operate, improving the success rate of virtualization, changing people’s behaviour, and approving the use of virtualization in “MSE”.

2.2. Theory of Planned Behaviour

The “Theory of Planned Behaviour”, established by “Icek Ajzen”, helps us understand how people change their behaviour [23]. It has five elements that include “attitude, subjective norms, perceived behavioural control, behavioural intention, and behaviour”. The more positive an individual’s “attitude in relation to a behaviour is, the stronger the individual’s behavioural intention” will be. The more “positive the subjective norm of behaviour is, the stronger the individual’s behavioural intention”. The further encouraging the “attitude” and “subjective” norms are, and the clearer the apparent “behavioural” control is, the stronger the individual’s behavioural “intention”. Attitudes, subjective norms, and perceptual behaviour are all identification behaviours independent of each other and related to each other.
Both the “Technology Acceptance Model (TAM)” and “Theory of Planned Behavior (TPB)” are derived from the “Theory of Rational Behavior (TRA)”. The TAM model focuses on information technology adoption, while the “TPB model” is used to describe individual behavior. Both TAM and TPB aim to study actual behaviour, so a new theoretical framework, the Technology Behavior Model (TBM), is proposed. According to TPB, perception and behavioural control are analyzed, focusing on the influence of people’s autonomous perception and cognition on actual behaviour, which can be used in IT infrastructure investigation, and TAM can change the “perceived usefulness and ease of use” through some external variables, thus affecting actual actions. This study applies to the technical analysis of virtualization. Therefore, this study can comprehensively analyze the embodiment of human consciousness and perceptual behaviour to actual action through a new theoretical framework.
Important and primary generation concepts obtained to realise the appropriation and use of new technology are included in the “Technology Acceptance Model (TAM)” [21,22]. The concept of originality is not without restrictions. “TAM” indicated that the original purpose is recognized with someone’s attitude toward using new technology and the model acknowledged first-rate elements towards “Perceived Usefulness (PU)”, including “Perceived Ease of Use (PEOU)”, as shown in Figure 2. Primarily, the “Technology Acceptance Model” emerged with improvement closer to explaining the system embracing of an e-mail solution within the agency environment. Though, the acknowledgement varied on functions with the silo team of workers from the corporation. As such the price is often carried by the corporation with the acknowledgement enforced. Moreover, Ooi et al. and Wei-Han stress that customers ought to have good enough records and abilities to make use of another era when distinguished from people in a corporation, wherein preparing and specialised help are given [19,20].
Ooi et al. emphasized that “TAM” usability and adaptability in their specific structure are not precious when predicting some other IT/IS choice, especially so for the “Medium Size Enterprise” situation [21]. The author clarified that the reason that innovation presently cannot appear to reach mass extensive or slim intensity, most of the organisations would not have the choice to check the modernization, and, therefore, “TAM” is not applicable. As most of the typical computing in “MSE” has similarly restrained the ability to simplify the requisition of recent enhancements, this has improved and changed the “TAM” with recent necessities. The approach supports increasing the distinction explanation and arguing for “TAM” appropriateness. Hence, “TAM” is unsuitable to be implemented in “MSE”.
Virtualization development has agitated “Anything-as-a-Service”. Figure 3 illustrates that such assertion leads to the expansion of a distinctive element across the combined service termed “Exostructure as a Service (EaaS)” after the presently accessible “Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS)”. “MSE” are usually conducted within the particular “Local Area Network (LAN)” platform. Prior to the “MSE” expanding its connection to the numerous sites, involving various regions, it must initially build its base in the vicinity of its primary location. It is essential to assess and enhance their assets prior to intensifying elsewhere, assessing it at the “LAN” framework level before enlarging into the virtualization.
Figure 2 illustrates the incorporation of “Grid Computing Virtualization” implemented into the “Local Area Network (LAN)”. Numerous current personal computers operate from the various departments for regular functions. The “Berkeley Open Infrastructure for Network Computing (BOINC) is an open-source middleware system for volunteer computing and grid computing” [24,25]. From the personal computers, it is configured as a “BOINC client application”. Selected better specification personal computers are designated like a “BOINC controller” which oversee other balance “BOINC client” personal computers. Since each “centralized virtual server” was designed within the same environment from numerous less significant utilized computers, controllers or associated processing devices are surrounded by the environment proving virtualization on “Infrastructure as a Service (IaaS)”. A subsequent “centralized server” was established using a personal computer (accessible assets via additional disused devices) as a standby “BOINC Controller”. The applied “IaaS” then disperse the essential “Software as a Service (SaaS)” devices around each platform’s “Enterprises Resource Planning (ERP)” solution towards optimizing the procedures task flow.
Typically, every member of staff in the “Medium Size Enterprise”s is assigned a devoted computing device. Derived from work method activity, comfort, and information confidentiality, these computers are generally not distributed or utilized by other clients. Such established surroundings of wasteful consumption of every laptop extended its working price. The “BOINC shareware solution” is applied on the present computing devices without comprising the computer’s overall performance features and utilization, whilst nevertheless it is capable of performing without much-specialised talent requirement [24,25]. Besides this, “BOINC” is set up in a regular personal computer, which requires lesser pricey justification in comparison to traditional hardware. BOINC currently has been connected to several virtualization environments without the need to devote new specialized hardware or has not required enormously skilled manpower and computing support amenities. Consequently, the “BOINC” function is to lessen future expenditure on storage, but yet it can still accomplish the need for “Grid Computing”. Besides, with the expanding recognition of employing “BOINC” from the studies focusing on practice management, it the necessary to optimize a vast element to drive for a priceless solution.
Senior executives constantly focus on the fundamental standards of development and where the organization can utilize IT to extend seriously. Various investments have even expected to mechanize their methodologies by taking advantage of IT [12]. Standard highlights, for example, include trusting the notion that the IT system has greater abilities and exceptionality that can impact the business’s fundamental headings. In any case, undiscovered rivalry ought not to be an uncommon strength or opportunity in each circumstance separated from even more considerations, being sparse is the indispensable component. For a gigantic part of the circumstance, major IT assets have come about and prudently anticipated. IT has evolved toward acquiring generally an overhead of a virtualized environment that ought to be remunerated by all ventures yet gives no separation where the unreasonable supposition does not provide fundamental added intensity.
Furstenau et al. rehashed that the “whole virtualization models and the persevering presence of enormous business are dependent upon the consistency, accessibility, the flexibility of IT system” that “MSE” may use for the crucial replacement to manual activities among the competition players [10]. Alternatively, abiding mindfully of advancement can be a significant choice in the perspective of “MSE” monetary inadequacy. Thus, “MSEs”s need to consider some sacrifices in the focal point of competition towards the most recent intense improvements by synchronizing with the monetary investment to get serious.
Narayanan suggested that undertaking can achieve reasonable separation by presenting new features that significantly decrease costs while skillfully offering the advantages and features customers deem essential inside a reasonable innovation development [13]. Building up the most recent attributes thoughtlessly incorporates higher excellent contributions to exploit the potential outcomes, while setting up cutting-edge highlights makes it incapable to deliver sizeable peculiarity to advance allure. “The acknowledgement of an endeavour be subject on its ability to the high-level improvement of the advancement swings to disturb in their business models and ultimately too big business particularly” can be the strong reminder.
Though fiscal plus information prerequisites are a notable worry in the more modest “MSE”, in whichever circumstance, it very well may be superfluous for their principal angles to avoid setting sensible highlights, as restricting IT structures ends up being more evolved [6,7]. Plus, combining IT structures around big business mechanization task practice will simply build up clear results after a total execution after a past customary administration fundamental nervousness slanted assumption [8,9]. From now on, the IT establishment is an “extended now persistent capital speculation” the whole way across the propelling competition period, structure, and, in addition, is feasibly overhauled towards the insecure business storm structure.
Anticipating the challenges laid forward has impacted the “MSE”s foundation moving toward strategies. Acknowledging that web development is made with much robustness, the current cash-associated shortcoming gave broadened crushing variables and unpredictability around the undertakings. Framework businesses results outline has translated to a seriously unassuming schedule, persuading opinion decisions were stunningly more confused. With the escalating business associate obliged, different organizations, while reluctantly, have squandered ridiculously in their IT foundation, influencing their business’ cash-associated outcomes [26,27]. Such unacceptable progress divergences, while theoretically bringing positive results, were unpredictable towards its development and were silently covered up by the public. The result of the technology strategy has improved recall and an excellent depiction, subordinate to different business conditions. During the migration of virtualized servers, the more suitable efforts ought not specifically be on confining shared assistance using virtualization, but on upgrading local desktop services as the possible strategies.

3. Methodology

The two-overlapping mixed assessment approach ideas by which a double-overlay “PLS-SEM” quantitative and double-overlay subjective are used is being utilized [28,29]. The evaluation reconsideration approach gives further unsurprising findings that were led from the independent fundamental data accumulated. From the investigation inquiries referred to as of now, the argument had cultivated a few generous discoveries for the conversation inside the assessment.
Discoveries and assessments focus to supplement and underline fundamental association, situate essential frameworks, and experiences and settle the on-decision demand [30,31,32,33,34,35]. Each element of the assessment inspected will explain the investigation questions and help the creation of a fundamental EaaS diagram with new developments and gatherings. Fundamental data found across this survey was examined to grasp the outstanding development assessment [36,37,38,39,40,41,42,43,44,45]. While the quantitative data recognizes the inconsistency of the circumstance, the qualitative data returns to the emotional viewpoint for behaviour understanding, presented in Table 1.
The data collected for this research was from the management team from Malaysia. Since they have requests for working on the effectiveness of their association, their requests for virtualization can be straightforwardly reflected by gathering their perspectives. In 2019, Malaysia’s number of “Medium Size Enterprises” is 18,289 [1]. Due to of the difficulty of deciding the specific populace size and the need to guarantee that the example size is satisfactorily adequate for the outcomes to be helpful and of importance, in reality, the all-out populace of Malaysia will be examined.
Certainty levels estimate a given recommendation’s level of truth and believability. Normal certainty levels are 90%, 95%, and almost 100%, each comparing the Z-score. Certainty intervals are the scope of conceivable assessed mistakes between factual qualities and populace boundaries [46,47]. The example populace is the extent of substantial examples acquired when inspecting them. If all else fails, half is generally used to lessen test mistake examination. The certainty level of this review is 90%, and the room for the give-and-take range is 0.05. The example size acquired through internet-based estimation is 227. The deviation of survey results brought about by the inability to react to other rea-children will have stayed away later on. The estimation recipe of online example size is as per the following formula and Figure 4:
Finite   Population :   n = n 1 + z 2 p ( 1 p ) ε 2
where:
z is the Z-Score (According to the query, the Z-Score of 90% is 1.8
ε is the margin of error (ensure the accuracy of sample quantity is set to the minimum value of 0.05)
n is the population size
p is the population fraction
Figure 4. Sample Size Calculator. (https://www.calculator.net/sample-size-calculator.html?type=1&cl=90&ci=5&pp=70&ps=20000&x=56&y=18, accessed on: 24 November 2021).
Figure 4. Sample Size Calculator. (https://www.calculator.net/sample-size-calculator.html?type=1&cl=90&ci=5&pp=70&ps=20000&x=56&y=18, accessed on: 24 November 2021).
Asi 06 00011 g004
In more important examinations, unwavering quality and legitimacy tests are regularly needed to assess outer estimation designs. Dependability implies that the primary unwavering quality of the estimation is by and large needed to be more prominent than 0.7 [46,47]. It is dictated by assessing the ROH A worth. As displayed in Table 2, ROH A in all investigations is more noteworthy than 0.9, a long way past the standard limit. It tends to be seen that the information in this review is profoundly solid. As far as legitimacy, intermingling legitimacy, and discriminant legitimacy tests are utilized. Intermingling legitimacy alludes to the level of relationship between things in a similar idea. What’s more, discriminant legitimacy alludes to how much things in various ideas vary from one another. In ascertaining union legitimacy, the variable element load surpasses 0.7, and the normal change extraction (AVE) of the location standard for intermingling legitimacy surpasses the 0.5 edges [46,47]. In Table 3, the extensive unwavering quality is more noteworthy than 0.9, and the mean AVE is above 0.85. In discriminant legitimacy (DV) computations, the “Hetero-Trait-Mono-Trait” (HTMT) relationship proportion is normally used to assess DV. A HTMT of <0.85 is used. HTMT of each heap factor in Table 3 is the compound standard worth [48]. HTMT induction in Table 3, joined with the deviation revision, and the speed increase, is inside the ordinary reach. Since there is no certainty timespan and 95% arrived at 1, the DV of the review factors on the primary model was unique, and legitimacy was set up.

4. Results and Findings

Table 4 illustrates various correlations among numerous “Dependent Variable (Q12a)” including “Independent Variables (Q6a, Q10b, Q8c & Q4c)” propositions. “Economic Uncertainty” can be regarded as a “Dependent Variable” whilst “Budget Cost”, “Maintenance”, and “Product Knowledge” with “Complex Infrastructure” have been regarded as “Independent Variables”.
While Budget Cost is considered the most critical item at 45.0% in this study due to the traditional limitations associated with the smaller enterprise, economic uncertainty at 61.9% (34.7 + 27) should not be underestimated due to emerging environmental challenges. While having a complex infrastructure at 85.2% is critical to tap into new technology innovation, it seems to be non-critical at 61.9% (33.6 + 28.3) for product knowledge. Furthermore, “Medium Size Enterprises” are very concerned about the ability to maintain these complex infrastructures due to the criticalness at 89.2% (43.7 + 45.5). In Table 5, the overall correlation coefficient r-value is below 0.25, showing a “Very Weak Relationship” between all the variables. The overall significant p values are also below 0.05, signaling that the original null hypothesis can be rejected that led to the acceptance of the revised hypothesis.
Since the research is generally associated with the restricted spending plan among a “Medium Size Enterprise”, they are more diligent for carrying out the considerably more complicated framework that accompanies further developed highlights. Notwithstanding the coefficient of 0.243, it appears that the “Medium Size Enterprise” isn’t confronting any significant troubles. Information from the strategic interviews shows that businesses are using freeware systems to accomplish advanced change without updating their framework vigorously. The subject matter experts from the Delphi iteration have additionally reaffirmed that the undertaking has, as of now, developed towards the execution of imaginative hardware snared on their regular standard working strategies. This blended mode information from the quantitative overview, subjective meeting, and subjective centre gathering shows emphasis has approved the consistency of discoveries. Even though the association is extremely frail, it indicated encouraging ramifications to the venture from an innovation recognition and improvement stage. Such scant assets customarily connected among “Medium Size Enterprises” does not obstruct their undertaking to optimize the advantages of implementing EaaS framework processing highlights.
Such extremely low worth from 0.221 from Table 6 indicates the reduced reliance on huge upkeep costs related to using a perplexing foundation for the “Medium Size Enterprise” and this diminishes the planned expense. As EaaS matrix computing reutilizes the current accessible work area in the environment, it does not need new or extra speculation for the complex actual server and, subsequently, has a lesser impression inside the all-around squeezed “Medium Size Enterprise”. Excluding each requirement in the committed server farm using cluttered power cabling and cooling, additional accessible assets (monetary) can be used for other administration needs. Moreover, EaaS is accessible as a costless “Grid Computing” minus costly annual royalty charges, nor yearly systems upkeep reestablishment costs. In any event, when there is a work area breakdown that is unavoidable, the expense of fixing it is irrelevantly lower than an undeniable conventional server. Additionally, trade spare parts for the work area are a lot simpler to be obtained and aptitude is accessible than more expensive cutthroat choices.
Beyond saving direct principal investment, “Medium Size Enterprises” can similarly decrease some necessity of the expensive expenses by getting subject matter experts to do the complicated establishment, as exhibited by the exceptionally frail association of 0.209. Virtualization application is presented within the PC and intended to self-run, as needs are diminishing any fickle care for the customer. Most PC support is successfully open at the amazingly least help charges. Furthermore, when a device encounters several technical matters, the replacement component is readily obtained and for a minimal price. Along the movement of the “Enterprise Resource Management” application maintained by projected inclination, the organization at the moment entails locally taking care of and hard-plate on the spot for ceaseless close-by collecting robotization.
In the maintenance against new data, the incredibly feeble worth of 0.243 highlighted the base dependence of enrolling exorbitant authority just for ICT assignments. Being a workspace, most end-customer can be climbed to turn out to be close by ICT support staff with principal arrangements given, following the progression of web preparation like YouTube. Online help, in fundamental cases, can be great for re-appropriating abilities to interface with the close manual activities, without the prerequisite for aggravating moving time and stopping costs. “EaaS Grid Computing” has been used earnestly by various players, notably in the fiscal-responsive industry, to manage on outright least maintenance by expertise.
While the high-level revolution intends to further develop productivities, “EaaS” takes in addition facilitated with diminishing the action expense illustrated from Table 5 from “Budgeted Cost” against “Support” at 0.838. Such strong association regard reflects the lesser assistance expense arising even with a perplexing system at a drop of expense, having reduced the expected capable team. Such cost of dropping development lower, avoiding software licences, and faster immediately availability within local and remotely, this is the right second to executing the “EaaS Grid Computing”. It improves far improved development features adoption and subsequently drives the electronic activities for the “Medium Size Enterprise”, decreasing the prerequisite for accessing replication and congestion exercises [49,50]. Table 6 sums up the general discoveries of the assessment dependent on three essential information assortment techniques, as talked about before.
At the point when the organization faces a diverse business stage, each stage might include distinctive virtualization establishment essentials [23,24,49,50]. Within the enthusiastic development of the task, the expanding of requirements has been reasonably safeguarded anyway after the undertaking deal with monetary weaknesses while procuring resource deficiencies, the venture might be committed to enduring the raised mass charge of upkeep as shown in Figure 5.
Based on Figure 5, the “Grid Computing” framework illustrates the outlines of how each of the current storage inactive capacity and inactive CPU can be detected and improved as a superior reproduced framework in a cross-section organization [51,52]. While the particulars of the computing capabilities are expanded, so will the EaaS stage size be developed. Besides, when the business extends, it will likewise grow past the limit of virtualization. This delivered extra inexpensive assets on the venture and produced lower vain action exorbitant for extra substantial virtualization [23,24]. For sure, even the dedicated BOINC controller was made taking advantage of the current inactive PC inside the organization, consequently killing the need for a dedicated genuine server, one more cost-preserving development to the asset imperative “MSE”. While “Grid Computing” is utilizing the current computing area assets, it doesn’t overburden it. The BOINC regulator joining with the virtualization working frameworks “Performance Monitor and Resource Monitor” device will want to control the basic cut-over zone for ideal execution.
Improvement in IT framework administration conveyance has pressed the requirement for “Anything-as-a-Service”. This assertion prompts the improvement of another element idea around the common office in Figure 4 entitled “Exostructure as a Service (EaaS)” from the present accessible “Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS)”. “MSE” regularly work in a solitary “Local Area Network (LAN)” climate. Instead of the “MSE” moving into the multi-area, including various regions, they should initially assemble their establishment in the vicinity at the core of their central administration [53,54,55,56]. It should assess and improve available assets prior to growing out, testing them at the LAN network prior to venturing towards distributed virtualization framework.
The engineering in Figure 6 is the coordination of Grid Computing and Virtualization, sent once again into the “Local Area Network (LAN)”. Every venture has many existing work areas that they utilize for day-by-day activities. Every work area is then introduced with an extra BOINC customer application. One of the (better quality) work areas is chosen as the BOINC regulator that will deal with the other BOINC customer work areas. The “concentrated virtual server” is made from the inward joining of various lesser-utilized PCs, workstations, or related ICT gadgets inside the association, building up a stage on “Framework as a Service (IaaS)”. The second “concentrated server”, if necessary, is be made from a work area (if accessible assets from a more repetitive work area) as a reinforcement server. The IaaS is utilized to disseminate the required “Programming as a Service (SaaS)” apparatuses towards executing their “Enterprise Resource Planning (ERP)” application to expand work process efficiency.
This assessment uses the BOINC (“Berkeley University Open Infrastructure for Network Computing”) open-source framework course of action. It empowers a more significant interest in the practice of development, minus most initial expensive capital utilization, by and large, associated with computerization authentication costs [14,15,16,17]. It also helps with assuaging execution challenges while watching out for unsound business and the shortfall of authority. BOINC has been executed in 56 associations, with 10,139,730 customers and 2,015,526 hosts. Being open-source, it similarly allows significantly more broad adaptabilities later on in the redesign and the least yearly help charges [23,24]. All of the workstations, which could be typical workspaces or PC, are presented with a central BOINC regulator application. A central work area will be used to manage the whole system plan. This work area can in a similar manner be organized from a current specialist, likewise, cutting down the fundamental capital financing. Whenever the workstation is a startup, the regulator work area will start the BOINC application as an established organization. It will be set up to get the matrix task from the BONIC work area from the local workstation. The work area will perceive and screen the openness or execution capacities and cutoff points of each workstation, as the organization grows, or contracts per the business scene to decide challenges looked at by the unsteady business for the synergetic turn of events. The framework task is covered at a specific constraint of the close-by workstation, getting limits ready so as not to inconvenience the customer front-end application taking care of capacities and bend their presentations.
Ordinarily, every client inside the “Medium Size Enterprise” is allotted a devoted work area. Because of work process exercises, comfort, and information protection, these work areas are typically not shared or utilized by different clients. This established a climate of poor usage of every work area and expanded the company’s working expense [57,58]. The BOINC is a shareware arrangement that is utilized on the current work area without involving the work area’s exhibition abilities and limits, while still being ready to work without particular abilities required. Moreover, as BOINC is introduced in an ordinary PC, it doesn’t need highly costly support when contrasted with actual servers. Until now, “BOINC” was introduced in various environments, excluding putting resources into the latest isolated actual hardware, nor does it require exceptionally talented experts and server farm offices. In this manner, BOINC’s job is to limit further spending on IT infrastructure, yet it can in any case satisfy the requirement for virtualization. Besides, with the developing prevalence of utilizing “BONIC” from the exploration community into industry utilization, the necessity to popularize it become a huge element to move forward for practical arrangements [59,60].

5. Conclusions and Limitation

Development on “Grid Computing” has traditionally centred around non-business elements. At the same time, revelations are inconclusive due to the minimal outlooks of “Medium Size Enterprise” [29,60]. The reduced production scales for such an enterprise segment present restricted inspiration to proceed with “Grid Computing” research, prompting the retirement of such an incredible technology feature. This research extends the group of information, explicitly in the “Medium Size Enterprise”. Moreover, senior executives’ greater attention is to the profits of interest in innovation, while reluctantly helpless outlooks on the immediate commitment of the innovation and difficulties of visioning provides significant sunrise prospects on commitment. The idea of additional investment intends to change the outlook mentality that innovation is presently not an attractive investment perceived.
The revelations of this research included that recent differentiation highlights configurations that are underutilized of the present computing devices is an alternate critical component of IT establishment undertakings. Adding more distress is the impact of financial limitation when productivity is unsure. Additionally, it demonstrates that leakage in the IT structure course of action is an essential component of the enterprise with discouraging profitability, projecting a fundamental effect on the excessive adventure, and excessive monetary arrangements. Tagging along with unsteadiness, weakness, multi-layered nature, and comparable worries keep tormenting the task, a drastically further adaptable IT establishment diagram has been requested. The survey incites the support of presented natural IT structure systems that could expand or lessen per the investment, scene-setting off the development concerning the “Exostructure as a Service” specification in the development organization credentials. A theoretical contribution using BOINC fiscal accommodating edge work handling strategy has been passed on toward the standard establishment structure to make another virtualized activity.
The practical contribution focus on (1) reducing pointless waste for the organization from expensive infrastructure and system permit fees. In addition, it engaged (2) reuse in the solution by recommending integrated interior innovation highlights without outside arrangement conditions. This engages work coordination and consequently amazingly further develops synergistic contribution. They save resources from more slim capital investment and operating expenses from (3) recycling a created and stable response for growing financial backing. Even more, altogether, this assessment (4) provokes the rethinking of the usage of the created virtualization course of action in the assets that have for the most part compromised the “Medium Size Enterprise”. The research also contributes to society by emphasizing the need to optimize the existing carbon footprint to prevent further unnecessary usage of additional devices in the SME.
Significantly, the findings, plus discussion, from the results present an original perspective on the utilization of inner IT frameworks to distribute computing and virtual servers. It gives a top to bottom investigation of the avocation to help the proposal of sending a covered-up yet accessible practical and developed GRID arrangement. This occurs, however, the improvement of computing was a neglected need in most enterprises and was staying under the radar as simply one more normal office computerization running word processing or spreadsheets, while undertaking centres around overhauling their servers. It became evident that there exists a nearly unavailable or irrelevant connection between most computing devices for normal “Medium Size Enterprise” besides the “Multi-National Corporation”, so the centre challenges evolved from the advancement of the technology framework rather than the acquisition of novel virtualization foundation innovation highlights. Our review incites an enlivening with regards to the incredible capability of a developed virtualization arrangement that necessitates worldview communal attitude deviations to see the value in its advantages.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All data is available inside the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. SMECorp. 2020. Available online: https://www.smecorp.gov.my/images/SMEAR/SMEAR2018_2019/final/english/SME%20AR%20%20English%2020All%20Chapter%20Final%2024Jan2020.pdf (accessed on 18 February 2020).
  2. Guo, Z.; Li, J.; Ramesh, R. Optimal Management of Virtual Infrastructure Under Flexible Cloud Service Agreement. Inf. Syst. Res. 2019, 30, 1424–1446. [Google Scholar] [CrossRef]
  3. Rao, J.J.; Kumar, V. Technology Adoption in the SME Sector for Promoting Agile Manufacturing Practices. In Smart Intelligent Computing and Applications; Smart Innovation, Systems and Technologies; Satapathy, S., Bhateja, V., Das, S., Eds.; Springer: Singapore, 2019; p. 105. [Google Scholar]
  4. Jung, H.; Hwang, J.T.; Kim, B.K. Does R&D investment increase SME survival during a recession. Technol. Forecast. Soc. Change 2018, 137, 190–198. [Google Scholar]
  5. Zhang, D.; Nault, B.R.; Wei, X. The strategic value of information technology in setting productive capacity. Inf. Syst. Res. 2019, 30, 1124–1144. [Google Scholar] [CrossRef]
  6. Benitez, J.; Ray, G.; Henseler, J. Impact of information technology infrastructure flexibility on mergers and acquisitions. MIS Q. 2018, 42, 25–43. [Google Scholar] [CrossRef]
  7. Valacich, J.S.; Wang, X.; Jessup, L.M. Did I Buy the Wrong Gadget? How the Evaluability of Technology Features Influences Technology Feature Preferences and Subsequent Product Choice. MIS Q. 2018, 42, 633–644. [Google Scholar] [CrossRef]
  8. Banares, J.A.; Altmann, J. Economics behind ICT infrastructure management. Electron. Mark. 2018, 28, 7–9. [Google Scholar] [CrossRef] [Green Version]
  9. Urbach, N.; Ahlemann, F. Infrastructure as Commodity: IT Infrastructure Services are Traded on Free Markets and Purchased as Required. In IT Management in the Digital Age; Springer: Berlin/Heidelberg, Germany, 2016; pp. 75–84. [Google Scholar]
  10. Furstenau, D.; Baiyere, A.; Kliewer, N. A dynamic model of embeddedness in digital infrastructure. Inf. Syst. Res. 2019, 30, 1319–1342. [Google Scholar] [CrossRef]
  11. Mesgari, M.; Okoli, C. Critical review of organization-technology sensemaking: Towards technology materiality. discovery and action. Eur. J. Inf. Syst. 2019, 28, 205–232. [Google Scholar] [CrossRef]
  12. Jahantigh, F.F. A conceptual framework for business intelligence critical success factors. Int. J. Bus. Inf. Syst. 2019, 30, 109–123. [Google Scholar] [CrossRef]
  13. Narayanan, V.K. Radical cost innovation. Strategy Leadersh. 2019, 47, 53–54. [Google Scholar] [CrossRef] [Green Version]
  14. Chauhan, S.; Jaiswal, M.; Rai, S.; Motiwalla, L.; Pipino, L. Determinants of adoption for open-source office applications: A plural investigation. Inf. Syst. Manag. 2018, 35, 80–97. [Google Scholar] [CrossRef]
  15. Clinton, V. Savings without sacrifice: A case report on open-source textbook adoption. Open Learn. J. Open Distance e-Learn. 2018, 33, 177–189. [Google Scholar] [CrossRef]
  16. Garin, A.M.; Garcia, J.A.M.; Medel, J.M.; Lizarraga, J.M. Environmental monitoring system based on an Open Source Platform and Internet of Things for building energy retrofit. Autom. Constr. 2018, 87, 201–214. [Google Scholar] [CrossRef]
  17. Olson, D.L. Open source ERP business model framework. Robot. Comput. Integr. Manuf. 2018, 50, 30–36. [Google Scholar] [CrossRef]
  18. Alkhanak, E.N.; Lee, S.P.; Rezaei, R.; Parizi, R.M. Cost optimization approaches for scientific workflow scheduling in the cloud and grid computing: A review, classifications, and open issues. J. Syst. Softw. 2016, 113, 1–26. [Google Scholar] [CrossRef]
  19. Ooi, K.B.; Lew, S.; Tan, G.W.H.; Loh, X.M.; Hew, J.J. The disruptive mobile wallet in the hospitality industry: An extended mobile technology acceptance model. Technol. Soc. 2020, 63, 101430. [Google Scholar] [CrossRef]
  20. Wei-Han Tan, G.; Ooi, K.B.; Yuan, Y.P.; Lim, W.L. Can the COVID-19 pandemic influence experience response in mobile learning? Telemat. Inform. 2021, 64, 101676. [Google Scholar] [CrossRef]
  21. Yousif, A.; Alqhtani, S.M.; Bashir, M.B.; Ali, A.; Hamza, R.; Hassan, A.; Tawfeeg, T.M. Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing. Sensors 2022, 22, 850. [Google Scholar] [CrossRef]
  22. Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 1989, 13, 319–339. [Google Scholar] [CrossRef] [Green Version]
  23. Ajzen, I. The theory of planned behaviour: Frequently asked questions. Hum. Behav. Emerg. Technol. 2020, 2, 314–324. [Google Scholar] [CrossRef]
  24. Anderson, D.P. BOINC: A Platform for Volunteer Computing, Computer Science; Cornell University Press: Ithaca, NY, USA, 2018; pp. 1–37. [Google Scholar]
  25. Anderson, D.P. BOINC: A platform for volunteer computing. J. Grid Comput. 2020, 18, 99–122. [Google Scholar] [CrossRef]
  26. Venkatesh, V.; Brown, S.A.; Sullivan, Y.W. Guidelines for Conducting Mixed-methods Research: An Extension and Illustration. J. Assoc. Inf. Syst. 2016, 17, 435–495. [Google Scholar] [CrossRef] [Green Version]
  27. Zhang, K.; Alasmari, T. Mobile learning technology acceptance in Saudi Arabian high education: An extended framework and a mixed-method study. Educ. Inf. Technol. 2019, 24, 2127–2144. [Google Scholar]
  28. Lin, T.T.C. Multiscreen Social TV System: A mixed-method understanding of users; attitude and adoption intention. Int. J. Hum. -Comput. Interact. 2018, 35, 99–108. [Google Scholar] [CrossRef]
  29. Creswell, J.W. Research Designs: Qualitative, Quantitative and Mixed Methods Approach, 5th ed.; Sage Publication: Thousand Oaks, CA, USA, 2018. [Google Scholar]
  30. JosephNg, P.S.; Loh, Y.F.; Eaw, H.C. Grid Computing for “MSE” during Volatile Economy. In Proceedings of the International Conference on Control, Automation and Systems, IEEE Explore, Busan, Republic of Korea, 13–16 October 2022; pp. 709–714. [Google Scholar]
  31. Soon, J.P.; Moy, K.C.; Mahmood, A.K.; Wan, W.S.; Yuen, P.K.; Hui, S.S.; Theam, L.J. EaaS: Available yet Hidden Infrastructure inside “MSE”. In Proceedings of the 5th International Conference on Network, Communication and Computing, ACM International Conference Proceeding Series, Kyoto, Japan, 17–21 December 2016; pp. 17–20. [Google Scholar]
  32. Soon, J.; Wan, W.; Yuen, P.; Heng, L.; Theam, L.; Wei, L. BareBone cloud IaaS: Revitalization disruptive technology. In Proceedings of the 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), Penang, Malaysia, 7–8 April 2014; pp. 49–54. [Google Scholar] [CrossRef]
  33. JosephNg, P.S.; Kang, C.M.; Choo, P.Y.; Wong, S.W.; Phan, K.Y.; Lim, E.H. Beyond cloud infrastructure services in medium size manufacturing. In Proceedings of the International Symposium on Mathematical Sciences & Computing Research, Ipoh, Malaysia, 19–20 May 2015; pp. 150–155. [Google Scholar]
  34. Joseph, N.P.; Choo, P.; Wong, S.; Phan, K.; Lim, E. Malaysia SME ICT During Economic Turbulence. In Proceedings of the International Conference on Information & Computer Network, Singapore, 29–31 December 2012; pp. 67–71. [Google Scholar]
  35. Soon, N.P.; Yin, C.; Wan, W.; Nazmudeen, M. Energizing ICT Infrastructure for Malaysia SME during Economic Turbulence. In Proceedings of the Student Conference on Research and Development, Cyberjaya, Malaysia, 19–20 December 2011; IEEE Explore: Berlin, Germany, 2011; pp. 322–328. [Google Scholar]
  36. JosephNg, P.S.; Eaw, H.C. Making financial sense from EaaS for “MSE” during economic uncertainty. Adv. Intell. Syst. Comput. 2021, 1, 976–989. [Google Scholar]
  37. JosephNg, P. Economic Turbulence and EaaS Grid Computing. Preprints 2021, 2021090329. [Google Scholar] [CrossRef]
  38. JosephNg, P.S. EaaS Infrastructure Disruptor for “MSE”. Int. J. Bus. Inf. Syst. 2019, 30, 373–385. [Google Scholar] [CrossRef]
  39. JosephNg, P.S. EaaS Optimization: Available yet hidden information technology infrastructure inside Medium Size Enterprise. J. Technol. Forecast. Soc. Change 2018, 132, 165–173. [Google Scholar] [CrossRef]
  40. Soon, J.P.; Moy, K.C. Beyond barebone cloud infrastructure services: Stumbling competitiveness during economic turbulence. J. Sci. Technol. 2016, 24, 101–121. [Google Scholar]
  41. Soon, J.N.P.; Wan, W.S.; Yuean, P.K.; Heng, L.J. Barebone Cloud IaaS: Revitalisation Disruptive Technology. Int. J. Bus. Inf. Syst. 2015, 18, 107–126. [Google Scholar] [CrossRef]
  42. Joseph, N.P.S.; Mahmood, A.K.; Choo, P.Y.; Wong, S.W.; Phan, K.Y.; Lim, E.H. IaaS Cloud Optimization during Economic Turbulence for Malaysia Small and Medium Enterprise. Int. J. Bus. Inf. Syst. 2014, 16, 196–208. [Google Scholar]
  43. Joseph, N.P.S.; Mahmood, A.K.; Choo, P.Y.; Wong, S.W.; Phan, K.Y.; Lim, E.H. Battles in volatile information and communication technology landscape: The Malaysia small and medium enterprise case. Int. J. Bus. Inf. Syst. 2013, 13, 217–234. [Google Scholar] [CrossRef]
  44. Joseph, N.P.S.; Kang, C.M.; Mahmood, A.K.; Choo, P.Y.; Wong, S.W.; Phan, K.Y.; Lim, E.H. Exostructure Services for Infrastructure Resources Optimization. J. Telecommun. Electron. Comput. Eng. 2016, 8, 65–69. [Google Scholar]
  45. Joseph, N.P.S.; Choo, P.; Wong, S.; Phan, K.; Lim, E. Hibernating ICT Infrastructure During Rainy Days. J. Emerg. Trends Comput. Inf. Sci. 2012, 3, 112–116. [Google Scholar]
  46. Yuriev, A.; Dahmen, M.; Paillé, P.; Boiral, O.; Guillaumie, L. Pro-environmental behaviours through the lens of the theory of planned behaviour: A scoping review. Resour. Conserv. Recycl. 2020, 155, 104660. [Google Scholar] [CrossRef]
  47. Kamal, S.A.; Shafiq, M.; Kakria, P. Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM). Technol. Soc. 2020, 60, 101212. [Google Scholar] [CrossRef]
  48. Basco, R.; Hair, J.F.; Ringle, C.M.; Sarstedt, M. Advancing family business research through modelling nonlinear relationships: Comparing PLS-SEM and multiple regression. J. Fam. Bus. Strategy 2021, 13, 1–16. [Google Scholar] [CrossRef]
  49. Khan, Z.H. Exploring Strategies that IT Leaders Use to Adopt Cloud Computing. Ph.D. Thesis, Walden University, Minneapolis, MN, USA, 2016. [Google Scholar]
  50. Bergmann, M.; Brück, C.; Knauer, T.; Schwering, A. Digitization of the budgeting process: Determinants of the use of business analytics and its effect on satisfaction with the budgeting process. J. Manag. Control 2020, 31, 25–54. [Google Scholar] [CrossRef] [Green Version]
  51. Anwar, N.; Masrek, M.N.; Sani, M.K.J.; Mohamad, A.N. The proof of concept on the determinants of strategic utilization of information systems. Int. Inf. Inst. 2016, 19, 27–55. [Google Scholar]
  52. Asad, M.; Sharif, M.N.M.; Alekam, J.M. Moderating effect of entrepreneurial networking on the relationship between access to finance and performance of micro and small enterprises. Paradig. Res. J. 2016, 10, 1–13. [Google Scholar] [CrossRef]
  53. Veiga, A.D. A cybersecurity culture research philosophy and approach to developing a valid and reliable measuring instrument. In Proceedings of the SAI Computing Conference 2016, London, UK, 13–15 July 2016. [Google Scholar]
  54. Kante, M.; Chepken, C.; Oboko, R. Effects of Farmers’ Peer Influence on the Use of ICT-based Farm, Input Information in Developing Countries: A Case in Sikasso, Mali. J. Digit. Media Interact. 2018, 1, 99–116. [Google Scholar]
  55. Flowers, E.; Freeman, P.; Flowers, E.P.; Freeman, P.; Gladwell, V.F. A cross-sectional study examining predictors of visit frequency to local green space and the impact this has on physical. BMC 2016, 16, 420. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  56. Tsai, H.; LaRose, R. Broadband Internet adoption and utilization in the inner city: A comparison of competing theories. Comput. Hum. Behav. 2015, 51, 344–355. [Google Scholar] [CrossRef]
  57. da Silveira, B.; Vasconcellos, E.; Guedes, L.V.; Guedes, L.F.A.; Costa, R.M. Technology Road Mapping: A methodological proposition to refine Delphi results. Technol. Forecast. Soc. Chang. 2018, 126, 194–206. [Google Scholar]
  58. Wang, I.K.; Seidle, R. The degree of technological innovation: A demand heterogeneity perspective. Technol. Forecast. Soc. Change 2017, 125, 166–177. [Google Scholar] [CrossRef]
  59. Udo, E.N.; Akwukwuma, V.V.N. Software adaptability metrics model using ordinary logistic regression. J. Softw. 2019, 14, 116–128. [Google Scholar]
  60. Ho, K.L.P.; Nguyen, C.N.; Adhikari, R.; Miles, M.P.; Bonney, L. Exploring market orientation, innovation and financial performance in agricultural value chains in emerging economies. J. Innov. Knowl. 2018, 3, 154–163. [Google Scholar] [CrossRef]
Figure 1. Investigation Concept.
Figure 1. Investigation Concept.
Asi 06 00011 g001
Figure 2. Proposed Conceptual Framework.
Figure 2. Proposed Conceptual Framework.
Asi 06 00011 g002
Figure 3. EaaS Architecture Using BOINC.
Figure 3. EaaS Architecture Using BOINC.
Asi 06 00011 g003
Figure 5. EaaS Adaptable Localize Virtualization Conceptual.
Figure 5. EaaS Adaptable Localize Virtualization Conceptual.
Asi 06 00011 g005
Figure 6. Optimized Grid Connectivity Using BOINC.
Figure 6. Optimized Grid Connectivity Using BOINC.
Asi 06 00011 g006
Table 1. Research Methodology Summary.
Table 1. Research Methodology Summary.
Asi 06 00011 i001Asi 06 00011 i002Asi 06 00011 i003Asi 06 00011 i004Asi 06 00011 i005
Research DimensionPhenomena Explanatory Sequential Dimension
Research Design
  • Dual Session Random Survey
  • Personal Interview
  • Focus Group Discussion—Technical Level
  • Focus Group Discussion—Strategic Level
Data Collection
  • End users—Managerial level
  • Across peninsular Malaysia
  • 228 respondents
  • End users—Top management level
  • Central Malaysia
  • 10 respondents
  • Consultants, vendors & end-users
  • Central Malaysia
  • 10 respondents
  • Industry Association
  • Central Malaysia
  • 10 respondents
Research Methods
  • Convenient sampling using available organization hosting final year industrial training students
  • Convenient sampling who are willing to participate and share information
  • Convenient sampling who are willing to participate and share information
  • Convenient sampling who are willing to participate and share information
Data AnalysisSpearman Correlation Quantitative Exploration Qualitative Reasoning Explanation Delphi Inductive ConclusionQualitative Reasoning Explanation
Table 2. Convergent Validity and Construct Reliability.
Table 2. Convergent Validity and Construct Reliability.
Latent ConstructLoadingsStandard DeviationRhoA (ρA)Composite ReliabilityAverage Variance Extracted (AVE)
Resource0.9330.3840.9290.9540.875
0.944
0.928
Maintenance0.8930.3890.9170.9430.846
0.923
0.943
Budget0.9280.3970.9070.9410.841
0.927
0.895
Turbulence0.9230.3950.9100.9420.844
0.922
0.910
Virtualization Usefulness0.9280.3770.9210.9480.857
0.923
0.927
Virtualization Ease of Use0.9030.3970.9080.9410.841
0.941
0.906
Virtualization Adoption Intention0.8920.3850.9140.9440.849
0.933
0.937
Table 3. Hetero-Trait-Mono-Trait (HTMT.90).
Table 3. Hetero-Trait-Mono-Trait (HTMT.90).
Latent ConstructVAIVUVEURMBT
VAIx
VU0.642x
VEU0.6540.678x
R0.6010.6650.541x
M0.6420.6500.5700.622x
B0.6520.6730.6490.6380.662x
T0.6830.6220.6230.6170.5130.592x
Notes: VAI—Virtualization Adoption Intention; VU—Virtualization Usefulness; VEU—Virtualization Ease of Use; R—Resources; M—Maintenance; B—Budget; T—Turbulence.
Table 4. Ordinal Regression Case Processing Summary.
Table 4. Ordinal Regression Case Processing Summary.
%
Eco Uncertainty—Q12a
(Dependent Variable)
Least_Critical0.5
Slightly_Less_Critical12.2
Neutral25.6
Slighly_Critical27.0
Most_Critical34.7
Budgeted Cost—Q6a
(Independent Variable)
Least_Critical1.8
Slightly_Less_Critical2.3
Neutral17.1
Slighly_Critical33.8
Most_Critical45.0
Maintenance—Q10b
(Independent Variable)
Least_Critical1.3
Slightly_Less_Critical1.4
Neutral8.1
Slighly_Critical45.5
Most_Critical43.7
Prod Knowledge—Q8c
(Independent Variable)
Least_Critical33.6
Slightly_Less_Critical28.3
Neutral22.1
Slighly_Critical10.2
Most_Critical1.8
Complex Infrastructure—Q4c
(Independent Variable)
Least_Critical0.9
Slightly_Less_Critical5.0
Neutral9.0
Slighly_Critical25.7
Most_Critical59.5
Table 5. Independent Variable Bivariate Spearman Correlation.
Table 5. Independent Variable Bivariate Spearman Correlation.
Budgeted CostComplex InfrastructureMaintenanceProd Knowledge
Spearman rhoBudgeted Cost (Q6a)Correlation Coefficient1.0000.2430.8380.218
Sig (2-tailed) −0.0010.001−0.002
Complex Infrastructure (Q10b)Correlation Coefficient0.2431.0000.2210.0209
Sig (2-tailed)−0.001 0.0010.001
Maintenance (Q8c)Correlation Coefficient0.8380.2211.000−0.243
Sig (2-tailed)0.0010.001 0.001
Prod Knowledge (Q4c)Correlation Coefficient0.2180.2090.2431.000
Sig (2-tailed)−0.0020.0010.001
Table 6. Finding Data Analysis Summary.
Table 6. Finding Data Analysis Summary.
Managerial Survey
Findings Summary
Top Management Interview
Findings Summary
Expert Focus Group
Findings Summary
A1. Continuous spending on IT infrastructure investment currently.B1. Current business economic turbulence has limited impact on IT investment decision due to it medium and long-term deliverables. C1. Current economic turbulence is a seasonal factor that may be beyond the work scope of the budgeting process.
A2. Current investment for IT infrastructure is based on the pressure from having what competitor have. B2. Sufficient technologies to fulfil operational requirements.C2. IT infrastructure is a medium and long-term planning where contribution may be experienced during or after the economic turbulence.
A3. Technology features focuses on day to day electronic business. B3. Existing IT infrastructures investments is to provide the platform to differentiate the market player.C3. Technology edge service is a major differentiation in technology product competition.
A4. Managements felt that their enterprise has over-invested on ICT. B4. Slow migration to virtual due to security and capacity concerns on shared services. C4. IaaS high baseline charges forcing impractical utility model for lower range users.
A5. A technology feature is highly dynamic and evolving.B5. Perceived IT infrastructures are nowadays considered as a Utility Tool for day-to-day operational support. C5. Current market saturation is forcing competitive pricing war to attract customers.
A6. Lack of existing internal IT expertise to implement technology solution.B6. Focus primarily on core operation like client service and manufacturing flow.C6. Technology resource is now available from outsourcing.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

JosephNg, P.S. Innovative Usage of Grid Solutions with a Technology Behavior Model in a Medium-Size Enterprise. Appl. Syst. Innov. 2023, 6, 11. https://doi.org/10.3390/asi6010011

AMA Style

JosephNg PS. Innovative Usage of Grid Solutions with a Technology Behavior Model in a Medium-Size Enterprise. Applied System Innovation. 2023; 6(1):11. https://doi.org/10.3390/asi6010011

Chicago/Turabian Style

JosephNg, Poh Soon. 2023. "Innovative Usage of Grid Solutions with a Technology Behavior Model in a Medium-Size Enterprise" Applied System Innovation 6, no. 1: 11. https://doi.org/10.3390/asi6010011

Article Metrics

Back to TopTop