Hostname: page-component-78c5997874-8bhkd Total loading time: 0 Render date: 2024-11-13T11:19:40.384Z Has data issue: false hasContentIssue false

Effect of cloud-based information systems on the agile development of industrial business process management

Published online by Cambridge University Press:  24 June 2022

Jian Wang*
Affiliation:
Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China School of Engineering, Shanwei Institute of Technology, Shanwei 516600, Guangdong, China
Yi-Peng Xu*
Affiliation:
School of Mathematical Sciences, Tiangong University, Tianjin 300387, China
Chen She
Affiliation:
School of Economics and Management, Tiangong University, Tianjin 300387, China
*
*Corresponding author. E-mail: wj@casisd.cn; Yi-Peng.Xu@outlook.com
*Corresponding author. E-mail: wj@casisd.cn; Yi-Peng.Xu@outlook.com
Rights & Permissions [Opens in a new window]

Abstract

Business process management (BPM) has been the main driver behind company optimization and operational efficiency. However, the digitization era we live in necessitates that organizations be agile and adaptable. Delivering unprecedented rates of automation-fueled agility is necessary to be a part of this digital revolution. On the other hand, BPM automation cannot be done only by concentrating on procedure space and traditional planning methodologies. With the introduction of BPM, where the deployment of BPM with cloud computing has undergone enormous development lately, cloud computing has been considered a particularly active topic of study. Cloud computing points to the provision of dependable computing environments based on improved infrastructure availability and service quality without imposing a significant cost load. This research aims to discover the relationship between technical factors, financial factors, environmental factors, security of the cloud-based information systems, and the agile development of industrial BPM (IBPM). The present study aims to fill this gap and show how partial least squares structural equation modeling (SEM) can be employed in this field. Importance–performance map analysis (IPMA) evaluated the importance and performance of factors in the SEM. IPMA enables the identification of factors with relatively low performance but relatively high importance in shaping dependent variables. The empirical findings showed that four key factors (technical, financial, environmental, and security) positively influence the agile development of IBPM.

Type
Research Article
Copyright
© The Author(s), 2022. Published by Cambridge University Press in association with the Australian and New Zealand Academy of Management

Introduction

The environment's social, political, technical, and economic transformations offer important market difficulties that firms must overcome in order to succeed (Lv, Chen, & Lv, Reference Lv, Chen and Lv2022a). This information will be progressively crucial as a foundation for service offering or deciding factor in business procedure management, planning, and control. Throughout a business model, business procedures are described as a functional and organizational-border connection of value-added activities that provide the intended client advantages. As the importance of the services (e.g., procurement, design, and decision-making, logistics and marketing) in the manufacturing value chain has gradually increased, traditional manufacturing industry has been changed and arrived into service-oriented manufacturing (Lei, Hui, Xiang, Zelin, Xu-Hui, & Evans, Reference Lei, Hui, Xiang, Zelin, Xu-Hui and Evans2021). Business process management (BPM) is a systematic technique for detecting, customizing, executing, documenting, measuring, and controlling automated and non-automated procedures (Ozdenizci Kose, Reference Ozdenizci Kose2021). BPM is a management strategy that analyzes, designs, and implements procedures throughout organizational units. It provides several tools and methodologies for defining and implementing sequences of activities that deliver value to the client to promote continuity and efficiency in organizational operations (Badakhshan, Conboy, Grisold, & vom Brocke, Reference Badakhshan, Conboy, Grisold and vom Brocke2020). Furthermore, BPM is generally defined as a topic that focuses on ‘how to effectively manage the (re)design of individual business procedures and how to establish a core BPM capacity in enterprises catering to a range of objectives and scenarios’ (Baiyere, Salmela, & Tapanainen, Reference Baiyere, Salmela and Tapanainen2020). Agile development has expanded to imply management philosophy and is increasingly being explored in company management literature. One cause might be the increased convergence of software programmers and conventional labor as a result of digitalization. In a business environment, agility refers to the capacity to adapt to alterations by leveraging market information to capitalize on profitable opportunities in uncertain markets (Vuojamo, Reference Vuojamo2019).

On the other hand, firms and institutions significantly use digital technologies to facilitate decision-making such as neural networks (Li, Xu, Chaudhuri, Yumer, Zhang, & Guibas, Reference Li, Xu, Chaudhuri, Yumer, Zhang and Guibas2017). Information technology (IT) has dramatically changed the nature of business, health sector, and industries (Vahdat, Reference Vahdat2020). Management systems, including BPM, are no exception. The fast growth of Internet-centered and distributed platforms like cloud computing, fog computing, Internet of Things (IoT), and edge computing has resulted in massive data increases (Heidari, Jabraeil Jamali, Jafari Navimipour, & Akbarpour, Reference Heidari, Jabraeil Jamali, Jafari Navimipour and Akbarpour2020; Sun, Lin, Si, Xu, Li, & Gope, Reference Sun, Lin, Si, Xu, Li and Gope2022). Cloud computing technology has been successful in business processes because it has added significant value to its scalability and flexibility (Heidari & Navimipour, Reference Heidari and Navimipour2021b). It has made BPM systems more efficient, faster, and cost-effective. Cloud-based information systems are one of the newest trends in IT. Transferring BPM to the cloud is a unique and innovative solution that can help companies save significantly. The advent of cloud computing technology has created new opportunities and challenges for companies to develop their agility. Cloud computing is a powerful solution for storing, accessing, and using data over the Internet. It enables storing large amounts of information in the clouds and provides tremendous computing capabilities for innovation in systems development. However, its potential has not yet been fully explored in various applications. Thus, the present article examines the influence of cloud-based information systems on the agile development of industrial business process management (IBPM). The objectives of this article are:

  • to the best of our knowledge, this is the first study to look into cloud-based information systems for agile development of IBPM, using a partial least squares structural equation modeling (PLS-SEM) method and an advanced technique (importance–performance map analysis [IPMA]);

  • we present a comprehensive framework for agile development of IBPM;

  • we examine the effect of technical, financial, environmental, and security factors of the cloud-based information systems on the agile development of IBPM;

  • we used IPMA in the last part of the research to evaluate the performance of critical factors influencing the key dependent variables.

In the subsequent section, the relevant literature is summarized. The study methodology by describing the statistical society, sample size determination, method, measuring tools of research credibility and reliability, and data analysis method are discussed in the third section. In the fourth section, the results are analyzed and discussed. At last, the suggestions for the upcoming study and conclusion are provided in the last section.

Literature review

The effect of neural networks, deep learning, and IT is creating a different world yet not fully understood (Lv, Guo, & Lv, Reference Lv, Guo and Lv2022b; Zheng & Yin, Reference Zheng and Yin2022). The amount and speed of economic, daily life, and community shifts are hard to estimate without understanding the technological driving forces (Jamali, Bahrami, Heidari, Allahverdizadeh, & Norouzi, Reference Jamali, Bahrami, Heidari, Allahverdizadeh and Norouzi2020). Cloud computing is an important technique for processing data and executing programs on a pay-as-you-go basis. Hence, several businesses migrate their services to cloud infrastructures (Heidari & Navimipour, Reference Heidari and Navimipour2021a). Thanks to two essential enablers, its infrastructures are expected to lead in the upcoming 5G networks (Antonopoulos, Reference Antonopoulos2020). This section contains a literature review. Initially, a review of the theoretical foundations of the study is offered. Following that, the suggested conceptual framework and research hypotheses are proven.

Related work

Okic et al. (Reference Okic, Sarrigiannis, Fattore, Xiang, Redondi, Nitto and Contreras2022) looked at how resources are shared, projected, and transferred from abstract infrastructure to on-demand computing. The optimization methodology for concurrently optimizing and controlling mobile edge computing resources for baseband processing is also taken into account. The findings revealed that the suggested approach outperforms the current design. Also, Wang, Wang, Su, and Ge (Reference Wang, Wang, Su and Ge2020) explored the fundamental process of business analytics affordances for improving cloud data security management. The data were examined utilizing an SEM based on PLS. The findings revealed a progression from analytics affordances to decision-making affordances of cloud. Furthermore, data-driven culture and IT business procedure integration had a favorable mediating influence on the interaction among business analytics affordances and cloud computing data security decision-making affordances.

Nieuwenhuis, Ehrenhard, and Prause (Reference Nieuwenhuis, Ehrenhard and Prause2018) discussed how the value network of corporate software solutions changes due to the transition from on-premise to cloud-based technologies. A literature review and 15 interviews conducted in three case studies created a general value network for cloud-based corporate software. They assessed the influence of the network's migration to cloud-based corporate software on each stakeholder. The findings revealed that the consultative partner's role is increasingly concentrated on BPM, while technical consulting remains important owing to IT security, interface definition, data migration, customization, and mobile app creation. Moreover, Sadok, Okba, Souraya, and Oueslati (Reference Sadok, Okba, Souraya and Oueslati2017) created a model for app construction in cloud computing centered on the BPM approach's description of manipulating ideas of an application area. A set of empirical tests was carried out to assess the efficacy of this proposition. Compared to the typical way in this field, a non-composite application, the findings revealed that the composite application outperforms the non-composite application in terms of reaction time-to-time with the minimum complexity.

Finally, Cocconi, Roa, and Villarreal (Reference Cocconi, Roa and Villarreal2017) presented a cloud-based platform for collaborative BPM (CBP). The platform delivers cloud services that allow on-demand production and implementation of process-aware information systems needed to execute the agreed-upon CBPs and CBPs. The findings revealed that the stated platform structure could meet the CBP management's primary functional necessities: a global perspective of message exchange, decentralization, organization autonomy, and peer-to-peer interactions.

Conceptual framework and hypotheses

In this subsection, the main concepts of the research, including the agile development of the IBPM and cloud-based information systems, are first defined. Afterward, the hypotheses and research model are presented.

Agile development of the IBPM

Multi-stage manufacturing process quality management is difficult because it requires integrating knowledge and data from several areas (data, business, and production) into a unified management paradigm. IBPM responds to this difficulty by delivering a process-driven knowledge management methodology and tool support tailored to industrial procedures' demands (Utz & Lee, Reference Utz and Lee2017). BPM is a method for increasing organizational performance through a systematic strategy. BPM refers to the management of the entire business process cycle, which includes four main stages: define, manage, execute, and control. In further detail, process management entails (Papadopoulos, Kechagias, Legga, & Tatsiopoulos, Reference Papadopoulos, Kechagias, Legga and Tatsiopoulos2018):

  • documenting the procedure to gain a better understanding of the company's workflow;

  • assigning process ownership to develop management responsibility;

  • managing the procedure to increase performance and resource utilization;

  • increasing the efficiency and quality of the procedure by enhancing and managing it.

We concentrated on the rapid growth of IBPM in this article. Because agile encourages shifting needs, determining success in an agile setting may be tricky. Nevertheless, Misra, Kumar, and Kumar (Reference Misra, Kumar and Kumar2009) suggested five criteria for determining the success of agile advancement projects, with the most crucial success factors falling into any of these categories (Zheng, Reference Zheng2012):

  • enhanced return on investment;

  • decreased delivery schedules;

  • boosted flexibility to satisfy the variable customer needs;

  • enhanced potential to satisfy the present customer needs;

  • developed business processes.

Cloud-based information systems

Networking, informatization, and intelligence have increasingly become a reality in power systems (Mou, Duan, Gao, Liu, & Li, Reference Mou, Duan, Gao, Liu and Li2022). Power systems have increasingly accomplished this using modern IT such as computation, communication, control, and sensing (Dehghani et al., Reference Dehghani, Ghiasi, Niknam, Kavousi-Fard, Shasadeghi, Ghadimi and Taghizadeh-Hesary2021; Ye, Jin, Fei, & Ghadimi, Reference Ye, Jin, Fei and Ghadimi2020). Fog computing, IoT, and cloud computing are examples of intelligent computing techniques that may be utilized to achieve intelligence. IoT is a network of interconnected gadgets. It can collect and deliver data, making human existence more structured and convenient. Besides, fog computing has evolved as a solution for operations that are sensitive to position and delay. It is a useful addition to cloud computing that allows users to provide resources and services outside of the cloud, close to their end devices (Haghi Kashani, Rahmani, & Jafari Navimipour, Reference Haghi Kashani, Rahmani and Jafari Navimipour2020). Nowadays, due to the utilization of new Internet platforms like cloud computing and emerging business models, organizations are able to establish collaborative networks for executing collaborative business processes flexibly (Cocconi & Villarreal, Reference Cocconi and Villarreal2020). Cloud computing has brought together previous technologies like grid computing, virtualization, and broadband networks, dramatically altering previous norms in terms of IT resource expansion and cost reduction. As a result, the cost of managing information systems has decreased (Bouaynaya, Lyu, & Zhang, Reference Bouaynaya, Lyu and Zhang2018). Lately, cloud computing has emerged as a promising information solution and commercial trend. Several cloud-based information systems have made their cloud-based resources easily accessible. With these cloud-based resources, anyone may construct a novel integrated application (Lin & Hsu, Reference Lin and Hsu2019). This paper focuses on four dimensions of cloud-based information systems: technical factors, financial factors, security factors, and environmental factors. Each dimension will be described in depth in the sections that follow.

Technical factors: Data confidentiality and security are the primary issues of cloud computing users, particularly in the industry, because of the unique nature of the technology (Wu, Song, Cao, Luo, & Zhang, Reference Wu, Song, Cao, Luo and Zhang2020b). For instance, clients' electronic records require a secure environment requiring additional security measures. Previous research has indicated that the complexity of information systems impacted the decision to employ technology (Zheng, Zhou, Liu, Tian, Yang, & Yin, Reference Zheng, Zhou, Liu, Tian, Yang and Yin2022). The degree to which implementing an invention is difficult is referred to as complexity. Cloud computing services must be accessible at any time and from any location, allowing subscribers and clients to use them effortlessly. Users are motivated to utilize technology when services are available. Another important aspect of the technological component is the amount of system compatibility. Cloud computing can be more effective and feasible if the technology is compatible with existing applications and systems in business centers.

Financial factors: Using cloud services means that companies can work faster on projects and implement concepts at no great cost. Companies only pay for the resources they consume. Cloud proponents often cite the concept of agility in business as a fundamental advantage. The ability to upgrade and use new services without time and effort has advantages over traditional IT systems (Deng & Zhao, Reference Deng and Zhao2022). Getting faster with new apps is easier. Using cloud-based information systems, companies can utilize rental services and provide licenses to purchase new software. On the other hand, support and transportation costs are reduced; thus, companies can save costs.

Security factors: Security is a very important global issue (Tian, Wang, Chen, Zhang, & Qin, Reference Tian, Wang, Chen, Zhang and Qin2021). Due to the security issues in the cloud-computing network, it should be possible to prevent and deal with any intrusion of user data. Therefore, systems have been provided that can automatically detect any suspicious operations along with the cloud computing network, including unauthorized entry, passing the firewall, preventing the sending of viral data, etc. This system, known as an intrusion detection and prevention system can be installed as independent software on cloud computing and other computer networks. This system can protect against any intrusion or attack on the network (Yang, Chen, Xiong, Xu, Liu, & Zhang, Reference Yang, Chen, Xiong, Xu, Liu and Zhang2021). The intrusion detection system works like an antivirus with a firewall, but an advanced type.

Environmental factors: The regulatory environment and trade partner indicators are used to define the environmental factor, which is founded on past research (Jianwen & Wakil, Reference Jianwen and Wakil2019). The legislative environment can positively or negatively impact innovation. Governments enact rules to encourage technological innovation and compel businesses to adhere to specific technological standards. Regulative constraints, such as data security rules in the healthcare and financial services industries, can be imposed by governments, making cloud less appealing. Hence, enterprises burdened by stricter regulatory requirements will be less likely to implement (Borgman, Bahli, Heier, & Schewski, Reference Borgman, Bahli, Heier and Schewski2013). Environmental factors are one of the most important things to consider while implementing new information systems. Another issue affecting the choice to employ cloud computing is reliance on the seller (Panda & Rath, Reference Panda and Rath2021). Dependence on the seller is one of the conditions in which the buyer is dependent on the seller and cannot buy the goods or services he needs from another seller. It is because the first seller forces the buyer to buy his goods or services in usually unhealthy ways. It means that national infrastructure, support mechanisms, and the ability to support systems are the important and determining factors in the use of technology.

According to the mentioned topics and studies, the research model is summarized and demonstrated in Figure 1. Research hypotheses also include:

Hypothesis 1 Technical factors of cloud-based information systems are positively associated with the agile development of IBPM.

Figure 1. Conceptual model of research.

Hypothesis 2: Financial factors of cloud-based information systems are positively associated with the agile development of IBPM.

Hypothesis 3: Security factors of cloud-based information systems are positively associated with the agile development of IBPM.

Hypothesis 4: Environmental factors of cloud-based information systems are positively associated with the agile development of IBPM.

Research methodology

The PLS-SEM approach analyzed the data. In the realm of strategic management, the PLS-SEM is growing in popularity. PLS methods with Smart PLS 3.0 and bootstrapping with 500 re-samples evaluated the suggested model (Ringle, Wende, & Becker, Reference Ringle, Wende and Becker2015). The reliability and validity of the measurement model were investigated initially. After each study construct's discriminant, the hypothesized assumptions were investigated using SmartPLS, and convergent validities were validated. PLS was selected for a variety of reasons. Initially, the sample size was modest, and PLS is better suited to small data samples. Second, when the study model has not been well tested, PLS is a better choice. Third, PLS offers the benefit of evaluating both structural and measurement models simultaneously (Wu, Rivas, & Chen, Reference Wu, Rivas and Chen2019).

Construct operationalization

The measurement items derived from well-established scales and pilot-tested are listed in Table 1. On a 7-point Likert scale, the items were evaluated.

Table 1. Scale items

Sample demographics

The firms that took part in this survey were big or medium-sized, with over 1,000 workers in China Industrial Town. Regarding age and gender, several survey participants (85.7%) were men, with a split of 35–45 years old (36.6%) and >45 years old (45.4%). Majority of the respondents (90.5%) had earned a Bachelor's or Master's degree. The firms' average age was 35 years, showing that they were well-established corporations.

Data analysis and results

PLS simultaneously evaluates the relationships between measurements and constructs and the links among various constructs. Besides, a PLS model is assessed and evaluated in two steps: the measurement model's reliability and validity and the structural model's reliability and validity. Before making inferences about the nature of construct connections, this procedure assures that the investigator obtains valid and reliable construct measurements (Jerez-Gómez, Céspedes-Lorente, & Pérez-Valls, Reference Jerez-Gómez, Céspedes-Lorente and Pérez-Valls2019). The present investigation looked at the measurement model technique for evaluating the constructs' reliability, average variance extracted (AVE), and composite reliability (CR). Table 2 indicates Cronbach's alpha (CA), CR, and average variance. Using CA and CR scores over .7 and AVE scores over .5, the data showed acceptable convergent validity. The square root of AVE for each construct is larger than the related correlations, indicating reasonable discriminant validity (Farivar, Turel, & Yuan, Reference Farivar, Turel and Yuan2017) (see Table 2). The variance inflation factor (VIF) is examined, which is available in most statistical applications. Multicollinearity is impractical to be concerned about if the VIF is 3.0 or lower (Olague, Etzkorn, Gholston, & Quattlebaum, Reference Olague, Etzkorn, Gholston and Quattlebaum2007). In prior studies, the optimal VIF threshold was considered 5.0, but new research suggests that this level is too high.

Table 2. Outcomes of confirmatory factor analysis for the measurement model

The Fornell and Larcker (Reference Fornell and Larcker1981) criteria have recently been criticized for failing to identify the lack of discriminant validity in frequent research contexts (Henseler, Ringle, & Sarstedt, Reference Henseler, Ringle and Sarstedt2015). They provide an alternate technique for assessing discriminant validity in the form of a heterotrait–monotrait (HTMT) ratio of correlations using the multitrait-multimethod matrix (Ramayah, Yeap, Ahmad, Halim, & Rahman, Reference Ramayah, Yeap, Ahmad, Halim and Rahman2017). Henseler, Ringle, and Sarstedt (Reference Henseler, Ringle and Sarstedt2015) used a Monte Carlo simulation analysis to illustrate the technique's higher performance. Consequently, we used this new recommended approach to verify discriminant validity, and the outcomes are displayed in Table 3. If the value of the HTMT is higher than this threshold (HTMT .85 (Kline, Reference Kline2011) or HTMT .90 (Gold, Malhotra, & Segars, Reference Gold, Malhotra and Segars2001)), one can conclude that there is a lack of discriminant validity. All the values passed the HTMT .90 (Gold, Malhotra, & Segars, Reference Gold, Malhotra and Segars2001) and the HTMT .85 (Kline, Reference Kline2011), as shown in Table 4, specifying that discriminant validity has been ascertained.

Table 3. Correlations with square roots of the AVE

TF, technical factors; FF, financial factors; SF, security factors; EF, environmental factors; ADIBPM, agile development of industrial business process management.

aThe square roots of AVE estimates.

Table 4. HTMT ratio of correlations

R 2 (Hair, Sarstedt, Pieper, & Ringle, Reference Hair, Sarstedt, Pieper and Ringle2012) and the goodness of fit (GoF) (Vinzi, Trinchera, & Amato, Reference Vinzi, Trinchera and Amato2010) are two critical measures. The R 2 value is .853, as illustrated in Figure 2, indicating that the model has high explanatory power. Additionally, the GoF score of .68 was higher than the .36 cut-off value for significant R 2 effect sizes. It means that when compared to the normal criterion, this score indicated that this model had a stronger estimating capability (i.e., the GoF criteria).

Figure 2. PLS algorithm (R 2 and β).

In order to supply an admissible data fit, the confirmatory factor analysis results illustrated the initial measurement model. According to Sarstedt, Ringle, and Hair (Reference Sarstedt, Ringle, Hair and Homburg2017), distance squared Euclidean (D_LS), normed fit index (NFI), root mean squared residual, root mean squared residual covariance matrix (RMS_Theta), and distance geodesic (D_G) indexes can recognize a set of model misspecifications (Dijkstra & Henseler, Reference Dijkstra and Henseler2015). Thus, based on Table 5, the hypothesized measurement model with three factors was considered appropriate for the SEM.

Table 5. Summary of the GoF indices for the measurement model

The next component to calculate prediction is the Q 2 value, often known as blindfolding (Stone, Reference Stone1974). Some authors consider this factor as an evaluation of out-of-sample predictive capacity, which it is to some extent. However, it clearly falls short of PLS prediction as a model prediction statistic. When evaluating Q 2, positive numbers are important, whereas negative ones illustrate the absence of predictive significance. Besides, Q 2 values above .25 and .50 show the PLS-SEM model's medium and wide predictive relevance (Hair, Howard, & Nitzl, Reference Hair, Howard and Nitzl2020). The predictive relevance (Q 2) value measurements for endogenous architectures are above zero (agile development of IBPM: .325), indicating that the model has appropriate predictive quality.

SEM and Smart PLS 3.2 tools were utilized to assess the psychometric characteristics of the measurement model in the present study. It also takes into account the structural model's parameters. Similarly, the bootstrapping method is used to evaluate the component-based technique for the SEM. Furthermore, in the SmartPLS, the structural model has two paths: (inner) measurement model and (outer) structure model (Ahmad, Bin Mohammad, & Nordin, Reference Ahmad, Bin Mohammad and Nordin2019). In Table 6, the SEM analysis has illustrated that green factors have a significant and positive relation to the agile development of IBPM.

Table 6. Results of hypotheses

The last step in the research was the IPMA to identify the gap between the importance and the performance levels of factors in the model. IPMA results are presented by the two-dimensional graph, where the horizontal axis defines the ‘importance’ of significant factors using a scale from 0 to 1, and the vertical axis denotes their performance using a scale from 0 to 100 (Sternad Zabukovšek, Bobek, Zabukovšek, Kalinić, & Tominc, Reference Sternad Zabukovšek, Bobek, Zabukovšek, Kalinić and Tominc2022). The graphs in Figure 3 reveal that the most critical construct was the financial factor, environmental, security, and technical factors.

Figure 3. IPMA for the endogenous variable extended use of the agile development of IBPM.

Discussion and implication

Cloud computing is critical for offering web-based business services and generally managing IBPs. This approach is a hybrid of previous principles, including virtualization, distribution, and grid computing. In this section, the results are discussed, which include the following:

Hypothesis 1: Technical factors of cloud-based information systems positively affect the agile development of IBPM. This hypothesis is confirmed with a T-value of 2.350 at a significance level of 95%. The indicators identified for this variable are as follows: flexibility, scalability, reliability, agility, maintenance, compatibility, trial ability, and complexity. Cloud computing has shown to be an enticing, high-performing multitenant platform that provides aggregator systems, business process delivery, business services, and business content in a creative environment. Thus, integrating BPM with the cloud will result in a flexible and cost-effective platform for developing new corporate applications.

Hypothesis 2: Financial factors of cloud-based information systems positively affect the agile development of IBPM. This hypothesis is confirmed with a T-value of 6.335 at a significance level of 99.9%. The indicators identified for this variable are as follows: saving money, cost flexibility, using rental services, purchasing new software licenses, support costs, and shipping costs. The advantages of online apps are combined with the power and flexibility of the BPM software ecosystem when BPM software and apps are linked to the cloud. BPM is a cloud-based software as a service that is changing how organizations approach application development and maintenance cost structure.

Hypothesis 3: The security factors of cloud-based information systems positively affect the agile development of IBPM. This hypothesis is confirmed with a T-value of 4.893 at a significance level of 99.9%. The indicators identified for this variable are as follows: trust, reputation, intrusion and misbehavior detection, privacy and confidentiality, access control, integrity, security auditing, physical protection, and recovery. Organizations can manage several business procedures at once by linking BPM systems to the cloud, so software development activities become more accessible. The use of BPM in a cloud computing context is intended to give insight into BPM's service in current businesses. Cloud-based information systems may play a critical role in offering an effective IBPM and all of the necessary resources such as dynamicity, scalability, and cost-effectiveness. These needs and additional benefits such as pay-per-use, security, availability, and flexibility were met, thanks to cloud computing.

Hypothesis 4: Environmental factors of cloud-based information systems positively affect the agile development of IBPM. This hypothesis is confirmed with a T-value of 5.429 at a significance level of 99.9%. The indicators identified for this variable are as follows: competitive pressure, the role of government, vendor reputation, national technology infrastructure, trading partner pressure, and regulatory environment. The most important issue in studies related to organizational change is the environment around the organization. The domain in which organizations are formed and changed is the environmental component of structures used to evaluate and understand the concept of the organizational environment. This research tries to identify the environmental dimensions and components affecting the agile development of IBPM and evaluate their impact on BPM. The current article indicates a desirable path by evaluating cloud-based information systems and rapid IBPM development. It makes an implicit contribution to literature and knowledge by stressing the performance of cloud-based information systems.

Conclusion, limitations, and future research

Today, business processes are the key to the success of any organization. Therefore, having a strong IBPM approach in organizations is important. Organizations have observed that managing an industrial business process is a strong investment in coping quickly with environmental changes. We live in a world that is always changing. Due to globalization, artificial intelligence, automation, and machine learning, the industry is quickly changing. Organizational units are getting more meta-tasked; work and information sharing are moving quicker than ever before. Enterprises must do more than simply cope with the changes. They must seize control of it as a chance to address market and consumer expectations. IBPM systems provide organizational agility and the possibility of optimizing business models at the management level by designing and modifying business models without the need for programing. These systems increase the speed of the organization's processes, reduce costs, increase the speed of updates, etc. Agility and stability are not incompatible. Organizational agility requires stability. Agility does not mean throwing away structures and processes that have worked hard to build and improve. Some processes and structures create stability in an agile organization while providing speed and flexibility to enable fast movement for competitive advantage. On the other hand, cloud computing is an emerging technology that uses virtual resources to access IT services in Internet technology. Besides, cloud computing is an IT service model whose computing services are based on customer service requests, independent of equipment and location. The operational models of outsourced information systems are comparable to cloud computing. Both have resource utilization, virtualization, reliability, and agility. The cloud-based information system provides a platform for all processes in the organization to be automated; thus, all routes lead to cloud-based information systems as the core of enterprise systems to increase the performance of organizations. The present article investigated the effect of cloud-based information systems on the agile development of IBPM through PLS software. The results demonstrate that all four identified variables, including technical, financial, environmental, and security factors, positively and significantly affect the agile development of IBPM.

Researchers can examine this model with a comparative approach to other companies. It is also suggested that the present study be reviewed at different time intervals, and the results are compared to previous investigations to obtain the change rate over time. In addition, researchers and experts in this field are recommended to make the results of this study more practical by conducting similar studies and increasing the generalizability of the results. Finally, considering other factors such as deep learning (Zheng et al., Reference Zheng, Tian, Yang, Liu, Ding, Tian and Yin2022) and online product ratings (Wu, Cao, Wang, Wang, Zhang, & Wu, Reference Wu, Cao, Wang, Wang, Zhang and Wu2020a) can be done in future research. There are always limitations in taking a step toward a goal; this research is no exception as a process to solve the research problem. Thus, the limitations of the present study are mentioned as follows:

  1. (1) Inherent shortcomings related to the questionnaire-based research method are recognized as the most important limitations affecting the generalizability of research results.

  2. (2) Because this study has been conducted at present, its results do not have the necessary certainty for all periods and its generalization to other periods requires careful consideration.

  3. (3) The present study considers only a limited number of information system-based factors affecting the IBPM; considering other components in this field may change the generalizability of the results.

  4. (4) Also, several problems occurred in collecting questionnaires due to sending 600 electronic questionnaires via email and refusing and ignoring the majority of users to complete the questionnaires.

  5. (5) Finally, considering other methods such as deep learning and neural network (Han & Ghadimi, Reference Han and Ghadimi2022) can be done in future research.

Acknowledgements

This work was supported by Shanwei High-Level Talent Introduction Project.

Footnotes

These authors contributed equally to this paper.

References

Ahmad, R., Bin Mohammad, H., & Nordin, S. B. (2019). Moderating effect of board characteristics in the relationship of structural capital and business performance: An evidence on Pakistan textile sector. Journal of Studies in Social Sciences and Humanities, 5(3), 8999.Google Scholar
Antonopoulos, A. (2020). Bankruptcy problem in network sharing: Fundamentals, applications and challenges. IEEE Wireless Communications, 27(4), 8187.CrossRefGoogle Scholar
Badakhshan, P., Conboy, K., Grisold, T., & vom Brocke, J. (2020). Agile business process management: A systematic literature review and an integrated framework. Business Process Management Journal, 26(6), 15051523.CrossRefGoogle Scholar
Baiyere, A., Salmela, H., & Tapanainen, T. (2020). Digital transformation and the new logics of business process management. European Journal of Information Systems, 29(3), 238259.CrossRefGoogle Scholar
Borgman, H. P., Bahli, B., Heier, H., & Schewski, F. (2013). Cloudrise: exploring cloud computing adoption and governance with the TOE framework. Paper presented at the System Sciences (HICSS), 2013 46th Hawaii International Conference on.CrossRefGoogle Scholar
Bouaynaya, W., Lyu, H., & Zhang, Z. J. (2018). Exploring risks transferred from cloud-based information systems: A quantitative and longitudinal model. Sensors, 18(10), 3488.CrossRefGoogle ScholarPubMed
Cocconi, D., Roa, J., & Villarreal, P. (2017). Cloud-based platform for collaborative business process management. Paper presented at the 2017 XLIII Latin American Computer Conference (CLEI).CrossRefGoogle Scholar
Cocconi, D., & Villarreal, P. (2020). Microservices-based Approach for a Collaborative Business Process Management Cloud Platform. Paper presented at the 2020 XLVI Latin American Computing Conference (CLEI).CrossRefGoogle Scholar
Dehghani, M., Ghiasi, M., Niknam, T., Kavousi-Fard, A., Shasadeghi, M., Ghadimi, N., & Taghizadeh-Hesary, F. (2021). Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability, 13(1), 90.CrossRefGoogle Scholar
Deng, L., & Zhao, Y. (2022). Investment lag, financially constraints and company value – Evidence from China. Emerging Markets Finance and Trade, 114. doi: 10.1080/1540496X.2021.2025047.CrossRefGoogle Scholar
Dijkstra, T. K., & Henseler, J. (2015). Consistent and asymptotically normal PLS estimators for linear structural equations. Computational Statistics & Data Analysis, 81, 1023.CrossRefGoogle Scholar
Farivar, S., Turel, O., & Yuan, Y. (2017). A trust-risk perspective on social commerce use: An examination of the biasing role of habit. Internet Research, 27(3), 586607.CrossRefGoogle Scholar
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 3950.CrossRefGoogle Scholar
Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185214.CrossRefGoogle Scholar
Haghi Kashani, M., Rahmani, A. M., & Jafari Navimipour, N. (2020). Quality of service-aware approaches in fog computing. International Journal of Communication Systems, 33(8), e4340.CrossRefGoogle Scholar
Hair, J. F. Jr, Howard, M. C., & Nitzl, C. (2020). Assessing measurement model quality in PLS-SEM using confirmatory composite analysis. Journal of Business Research, 109, 101110.CrossRefGoogle Scholar
Hair, J. F., Sarstedt, M., Pieper, T. M., & Ringle, C. M. (2012). The use of partial least squares structural equation modeling in strategic management research: A review of past practices and recommendations for future applications. Long Range Planning, 45(5–6), 320340.CrossRefGoogle Scholar
Han, E., & Ghadimi, N. (2022). Model identification of proton-exchange membrane fuel cells based on a hybrid convolutional neural network and extreme learning machine optimized by improved honey badger algorithm. Sustainable Energy Technologies and Assessments, 52, 102005.CrossRefGoogle Scholar
Heidari, A., Jabraeil Jamali, M. A., Jafari Navimipour, N., & Akbarpour, S. (2020). Internet of things offloading: Ongoing issues, opportunities, and future challenges. International Journal of Communication Systems, 33(14), e4474.CrossRefGoogle Scholar
Heidari, A., & Navimipour, N. J. (2021a). A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm. PeerJ Computer Science, 7. doi: 10.7717/peerj-cs.539.CrossRefGoogle ScholarPubMed
Heidari, A., & Navimipour, N. J. (2021b). Service discovery mechanisms in cloud computing: A comprehensive and systematic literature review. Kybernetes, 51(3), 952981.CrossRefGoogle Scholar
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115135.CrossRefGoogle Scholar
Jamali, J., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2020). Towards the internet of things. Springer. https://doi.org/10.1007/978-3-030-18468-1.CrossRefGoogle Scholar
Jerez-Gómez, P., Céspedes-Lorente, J., & Pérez-Valls, M. (2019). Do high-performance human resource practices work? The mediating role of organizational learning capability. Journal of Management & Organization, 25(2), 189210.CrossRefGoogle Scholar
Jianwen, C., & Wakil, K. (2019). A model for evaluating the vital factors affecting cloud computing adoption: Analysis of the services sector. Kybernetes, 49(10), 24752492.CrossRefGoogle Scholar
Kline, R. B. (2011). Convergence of structural equation modeling and multilevel modeling: na.Google Scholar
Lei, W., Hui, Z., Xiang, L., Zelin, Z., Xu-Hui, X., & Evans, S. (2021). Optimal remanufacturing service resource allocation for generalized growth of retired mechanical products: Maximizing matching efficiency. IEEE Access, 9, 8965589674.CrossRefGoogle Scholar
Li, J., Xu, K., Chaudhuri, S., Yumer, E., Zhang, H., & Guibas, L. (2017). Grass: Generative recursive autoencoders for shape structures. ACM Transactions on Graphics (TOG), 36(4), 114.Google Scholar
Lin, Z.-Y., & Hsu, I.-C. (2019). An intelligent cloud-based health care architecture for long-term care.CrossRefGoogle Scholar
Lv, Z., Chen, D., & Lv, H. (2022a). Smart city construction and management by digital twins and BIM big data in COVID-19 scenario. ACM Transactions on Multimidia Computing Communications and Applications. doi: 10.1145/3529395.CrossRefGoogle Scholar
Lv, Z., Guo, J., & Lv, H. (2022b). Safety Poka Yoke in zero-defect manufacturing based on digital twins. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2021.3139897.Google Scholar
Misra, S. C., Kumar, V., & Kumar, U. (2009). Identifying some important success factors in adopting agile software development practices. Journal of Systems and Software, 82(11), 18691890.CrossRefGoogle Scholar
Mou, J., Duan, P., Gao, L., Liu, X., & Li, J. (2022). An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling. Future Generation Computer Systems, 128, 521537.CrossRefGoogle Scholar
Nieuwenhuis, L. J., Ehrenhard, M. L., & Prause, L. (2018). The shift to cloud computing: The impact of disruptive technology on the enterprise software business ecosystem. Technological Forecasting and Social Change, 129, 308313.CrossRefGoogle Scholar
Okic, A., Sarrigiannis, I., Fattore, U., Xiang, B., Redondi, A. E., Nitto, E. D., … Contreras, L. M. (2022). Resource management for cost-effective cloud services enabling 6G mobile networks (pp. 399435). Springer. doi: 10.1007/978-3-030-74648-3_12.CrossRefGoogle Scholar
Olague, H. M., Etzkorn, L. H., Gholston, S., & Quattlebaum, S. (2007). Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. IEEE Transactions on Software Engineering, 33(6), 402419.CrossRefGoogle Scholar
Ozdenizci Kose, B. (2021). Business process management approach for improving agile software process and agile maturity. Journal of Software: Evolution and Process, 33(4), e2331.Google Scholar
Panda, S., & Rath, S. K. (2021). Information technology capability, knowledge management capability, and organizational agility: The role of environmental factors. Journal of Management & Organization, 27(1), 148174.CrossRefGoogle Scholar
Papadopoulos, G. A., Kechagias, E., Legga, P., & Tatsiopoulos, I. (2018). Integrating business process management with public sector. Paper presented at the Proceedings of the International Conference on Industrial Engineering and Operations Management, Paris, France.Google Scholar
Ramayah, T., Yeap, J. A., Ahmad, N. H., Halim, H. A., & Rahman, S. A. (2017). Testing a confirmatory model of Facebook usage in SmartPLS using consistent PLS. International Journal of Business and Innovation, 3(2), 114.Google Scholar
Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Boenningstedt: SmartPLS GmbH.Google Scholar
Sadok, L., Okba, K., Souraya, H., & Oueslati, W. (2017). BPM approach (business process management) by composition of applications in the cloud computing. Paper presented at the 2017 8th International Conference on Information Technology (ICIT).CrossRefGoogle Scholar
Sarstedt, M., Ringle, C. M., & Hair, J. F. (2017). Partial least squares structural equation modeling. In Homburg, C., et al. (Eds.), Handbook of Market Research (vol. 26, pp. 140). Switzerland: Springer Nature.Google Scholar
Sternad Zabukovšek, S., Bobek, S., Zabukovšek, U., Kalinić, Z., & Tominc, P. (2022). Enhancing PLS-SEM-enabled research with ANN and IPMA: Research study of enterprise resource planning (ERP) systems’ acceptance based on the technology acceptance model (TAM). Mathematics, 10(9), 1379.CrossRefGoogle Scholar
Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society: Series B (Methodological), 36(2), 111133.Google Scholar
Sun, Q., Lin, K., Si, C., Xu, Y., Li, S., & Gope, P. (2022). A secure and anonymous communicate scheme over the internet of things. ACM Transactions on Sensor Networks (TOSN), 18(3), 121.Google Scholar
Tian, H., Wang, Y., Chen, T., Zhang, L., & Qin, Y. (2021). Early-season mapping of winter crops using Sentinel-2 optical imagery. Remote Sensing, 13(19), 3822.CrossRefGoogle Scholar
Utz, W., & Lee, M. (2017). Industrial business process management using adonis towards a modular business process modelling method for zero-defect-manufacturing. Paper presented at the 2017 International Conference on Industrial Engineering, Management Science and Application (ICIMSA).CrossRefGoogle Scholar
Vahdat, S. (2020). The role of IT-based technologies on the management of human resources in the COVID-19 era. Kybernetes, 51(6), 20652088.CrossRefGoogle Scholar
Vinzi, V. E., Trinchera, L., & Amato, S. (2010). PLS path modeling: From foundations to recent developments and open issues for model assessment and improvement. In Handbook of partial least squares (pp. 4782): Springer. doi: 10.1007/978-3-540-32827-8_3.CrossRefGoogle Scholar
Vuojamo, T. (2019). Adopting agile development in business process management: A case study in an industrial company.Google Scholar
Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387394.CrossRefGoogle Scholar
Wu, Z., Cao, J., Wang, Y., Wang, Y., Zhang, L., & Wu, J. (2020a). hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE Transactions on Cybernetics, 50(4), 15951606.CrossRefGoogle ScholarPubMed
Wu, W.-Y., Rivas, A. A., & Chen, Y.-C. (2019). The role of team reflexivity as a mediator between project management skills, task familiarity, procedural justice, and product performance. Journal of Management & Organization, 25(6), 876895.CrossRefGoogle Scholar
Wu, Z., Song, A., Cao, J., Luo, J., & Zhang, L. (2020b). Efficiently translating complex SQL query to mapreduce jobflow on cloud. IEEE Transactions on Cloud Computing, 8(2), 508517.CrossRefGoogle Scholar
Yang, W., Chen, X., Xiong, Z., Xu, Z., Liu, G., & Zhang, X. (2021). A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data. Information Sciences, 570, 526544.CrossRefGoogle Scholar
Ye, H., Jin, G., Fei, W., & Ghadimi, N. (2020). High step-up interleaved dc/dc converter with high efficiency. Energy Sources, Part A: Recovery, Utilization, and Environmental Effects, 120. doi: 10.1080/15567036.2020.1716111.Google Scholar
Zheng, G. (2012). Implementing a business process management system applying Agile development methodology: A real-world case study. Rotterdam, DU: Erasmus School of Economics (unpublished).Google Scholar
Zheng, W., Tian, X., Yang, B., Liu, S., Ding, Y., Tian, J., & Yin, L. (2022). A Few shot classification methods based on multiscale relational networks. Applied Sciences, 12(8), 4059.CrossRefGoogle Scholar
Zheng, W., & Yin, L. (2022). Characterization inference based on joint-optimization of multi-layer semantics and deep fusion matching network. PeerJ Computer Science, 8, e908.CrossRefGoogle ScholarPubMed
Zheng, W., Zhou, Y., Liu, S., Tian, J., Yang, B., & Yin, L. (2022). A deep fusion matching network semantic reasoning model. Applied Sciences, 12(7), 3416.CrossRefGoogle Scholar
Figure 0

Figure 1. Conceptual model of research.

Figure 1

Table 1. Scale items

Figure 2

Table 2. Outcomes of confirmatory factor analysis for the measurement model

Figure 3

Table 3. Correlations with square roots of the AVE

Figure 4

Table 4. HTMT ratio of correlations

Figure 5

Figure 2. PLS algorithm (R2 and β).

Figure 6

Table 5. Summary of the GoF indices for the measurement model

Figure 7

Table 6. Results of hypotheses

Figure 8

Figure 3. IPMA for the endogenous variable extended use of the agile development of IBPM.