| Factors | References |
| Cost | [9–34] | Availability | [9, 22] | Compliance | [9] | Interoperability | [9, 27] | Performance | [10, 14, 18, 22, 26, 34–37] | QoS | [10, 14–16, 31, 34, 38–42] | Visibility | [38] | Security | [11, 20, 21, 23, 34–37, 39, 42–45] | Accuracy | [25, 38] | Attack detection | [38] | Complexity | [38] | Ease of use | [11, 12, 20, 22, 23, 26, 39] | Sustainability | [12, 13] | Shared resource | [12] | Transparency, resource access, efficiency, and reliability | [13] | Feasibility | [44, 46] | Socio-economic, coordination management and provisioning, and communication | [44] | Elasticity | [18] | Usefulness | [39] | Risk analysis | [39] | Privacy | [20, 41, 42] | Integration | [47] | Flexibility | [47] | Usefulness and incompatibility | [20] | Trust | [20, 21, 24, 42] | Usage and engagement | [22] | Adaptively | [20, 25] | Environment factors | [48] | Compatibility, wide network access, self-service, elasticity, and integration | [26] | Integration | [27] | Social and economic factors | [42] | Adequate resource | [26, 37] | Vender lock-in, security weaknesses, and lack of control | [29] | Energy consumption and queuing delay | [30] | Knowledge diffusion (KD), talent acquisition (TA), intelligence creation (IC), cloud-based virtual community, professional network (PN), collaboration platform (CP), and remote data storage (RS) | [49] | Suitability | [31] | Resource allocation | [31] | Scalability | [31] |
|
|