Barriers to Technology Adoption Among Small and Medium Enterprises
DOI:
https://doi.org/10.64137/31080080/IJFEMS-V2I1P103Keywords:
Small and Medium Enterprises (SMEs), Technology adoption, Digital transformation, Financial barriers, Human capital, Organizational change, Infrastructure challenges, Data security, Access to finance, Competitiveness, Operational efficiencyAbstract
This study examines the major barriers to technology adoption among small and medium enterprises (SMEs), focusing on financial, human, organizational, and infrastructural challenges that limit digital transformation. The goal of this research is to characterize and study the factors that prevent SMEs from adopting new technologies, and to evaluate how some of these barriers have an impact on their competitiveness and performance. A mixed-methods method is used, utilizing existing literature to form an argument supplemented by data collected from SME owners and managers using a survey, which is investigated in terms of description and themes. The results indicate that high implementation costs, lack of access to finance, insufficient technical capabilities, organizations’ resistance to change, poor infrastructure, and worry about data security are the major barriers to the adoption of technology. This research suggests that to support technology use and ensure the long-term growth of SMEs in an increasingly digital business space, addressing these challenges through supportive funded government policies, raising funding accessibility, capacity building on SME training, and improving digital infrastructure is paramount.
References
[1] M. Chouki, M. Talea, C. Okar, and R. Chroqui, “Barriers to Information Technology Adoption Within Small and Medium Enterprises: A Systematic Literature Review,” International Journal of Innovation and Technology Management, vol. 17, no. 01, p. 2050007, Feb. 2020, doi: https://doi.org/10.1142/s0219877020500078.
[2] R. M. Fanelli, “Barriers to Adopting New Technologies within Rural Small and Medium Enterprises (SMEs),” Social Sciences, vol. 10, no. 11, p. 430, Nov. 2021, doi: https://doi.org/10.3390/socsci10110430.
[3] M. A. Nazir and M. A. Roomi, “Barriers to Adopting Electronic Commerce for Small and Medium-sized Enterprises in Emerging Economies,” EMAJ: Emerging Markets Journal, vol. 10, no. 2, pp. 43–55, Apr. 2021, doi: https://doi.org/10.5195/emaj.2020.203.
[4] T. Yuwono, A. Suroso, and W. Novandari, “Information and communication technology in SMEs: a systematic literature review,” Journal of innovation and entrepreneurship, vol. 13, no. 1, May 2024, doi: https://doi.org/10.1186/s13731-024-00392-6.
[5] A. Bharadwaj et al., "Digital business strategy: Toward a next generation of insights,” MIS Quarterly, vol. 37, no. 2, pp. 471–482, 2013.
[6] M. L. A. M. Bogers, R. Garud, L. D. W. Thomas, P. Tuertscher, and Y. Yoo, “Digital innovation: transforming research and practice,” Innovation, vol. 24, no. 1, pp. 1–9, Nov. 2021, doi: https://doi.org/10.1080/14479338.2021.2005465.
[7] Y.-Y. K. Chen, Y.-L. Jaw, and B.-L. Wu, “Effect of digital transformation on organisational performance of SMEs,” Internet Research, vol. 26, no. 1, pp. 186–212, Feb. 2016, doi: https://doi.org/10.1108/intr-12-2013-0265.
[8] European Commission, SME strategy for a sustainable and digital Europe, Publications Office of the European Union, 2020. [Online]. Available:https://stip.oecd.org/stip/interactive-dashboards/policy-initiatives/2023%2Fdata%2FpolicyInitiatives%2F99995726
[9] S. Kraus, S. Durst, J. J. Ferreira, P. Veiga, N. Kailer, and A. Weinmann, “Digital Transformation in Business and Management research: an Overview of the Current Status Quo,” International Journal of Information Management, vol. 63, no. 4, pp. 1–18, 2022, doi: https://doi.org/10.1016/j.ijinfomgt.2021.102466.
[10] OECD, OECD SME and entrepreneurship outlook 2019, OECD Publishing, 2019. [Online]. Available: https://www.oecd.org/en/publications/2019/05/oecd-sme-and-entrepreneurship-outlook-2019_7083aa23.html
[11] T. Ritter and C. L. Pedersen, “Digitization capability and the digitalization of business models in business-to-business firms: Past, present, and future,” Industrial Marketing Management, vol. 86, no. 0019-8501, pp. 180–190, 2020, doi: https://doi.org/10.1016/j.indmarman.2019.11.019.
[12] G. Vial, “Understanding Digital transformation: a Review and a Research Agenda,” The Journal of Strategic Information Systems, vol. 28, no. 2, pp. 118–144, 2019, doi: https://doi.org/10.1016/j.jsis.2019.01.003.
[13] B. M. Omowole, A. Q. Olufemi-Phillips, O. C. Ofodile, N. L. Eyo-Udo, and S. E. Ewim, “Barriers and drivers of digital transformation in SMEs: A conceptual analysis,” International Journal of Scholarly Research in Science and Technology, vol. 5, no. 2, pp. 019–036, Nov. 2024, doi: https://doi.org/10.56781/ijsrst.2024.5.2.0037.
[14] P. Waditwar, “Leading through the Synthetic Media Era: Platform Governance to Curb AI-Generated Fake News, Protect the Public, and Preserve Trust,” Open Journal of Leadership, vol. 14, no. 03, pp. 403–418, 2025, doi: https://doi.org/10.4236/ojl.2025.143020.
[15] S. Ben Slimane, R. Coeurderoy, and H. Mhenni, “Digital transformation of small and medium enterprises: a systematic literature review and an integrative framework,” International Studies of Management & Organization, vol. 52, no. 2, pp. 96–120, Apr. 2022, doi: https://doi.org/10.1080/00208825.2022.2072067.
[16] P. Waditwar, “Smart Procurement in the Sports Industry: A Strategic Approach for Efficiency and Performance Enhancement,” Open Journal of Business and Management, vol. 13, no. 03, pp. 1743–1761, 2025, doi: https://doi.org/10.4236/ojbm.2025.133090.
[17] V. Scuotto, M. Del Giudice, and E. G. Carayannis, “The effect of social networking sites and absorptive capacity on SMES’ innovation performance,” The Journal of Technology Transfer, vol. 42, no. 2, pp. 409–424, Nov. 2016, doi: https://doi.org/10.1007/s10961-016-9517-0.
[18] E. Autio, S. Nambisan, L. D. W. Thomas, and M. Wright, “Digital affordances, spatial affordances, and the genesis of entrepreneurial ecosystems,” Strategic Entrepreneurship Journal, vol. 12, no. 1, pp. 72–95, Jan. 2018, doi: https://doi.org/10.1002/sej.1266.
[19] A.Bayo‐Moriones, M. Billón, and F. Lera‐López, “Perceived performance effects of ICT in manufacturing SMEs,” Industrial Management & Data Systems, vol. 113, no. 1, pp. 117–135, Mar. 2013, doi: https://doi.org/10.1108/02635571311289700.
[20] P. Waditwar, “Overcoming the AI Data Eclipse: Obstacles to the Full Adoption of Artificial Intelligence in the Procurement Technology Sector,” World Journal of Advanced Research and Reviews, vol. 27, no. 3, pp. 1583–1590, Sep. 2025, doi: https://doi.org/10.30574/wjarr.2025.27.3.3296.
[21] A. Hervé, C. Schmitt, and R. Baldegger, “Digitalization, Entrepreneurial Orientation & Internationalization of Micro-, Small-, and Medium-Sized Enterprises,” Technology Innovation Management Review, vol. 10, no. 4, pp. 5–17, Apr. 2020, doi: https://doi.org/10.22215/timreview/1343.
[22] L. Li, F. Su, W. Zhang, and J.-Y. Mao, “Digital transformation by SME entrepreneurs: A capability perspective,” Information Systems Journal, vol. 28, no. 6, pp. 1129–1157, Jun. 2018, doi: https://doi.org/10.1111/isj.12153.
[23] Prajkta Waditwar, “Transforming Government Procurement through Electronic Bidding—A Case Study on the City of Somerville’s Implementation of BidExpress Infotech,” Open Journal of Leadership, vol. 14, no. 01, pp. 165–175, Jan. 2025, doi: https://doi.org/10.4236/ojl.2025.141007.
[24] A. R. Polu, D. V. K. R. Buddula, B. Narra, A. Gupta, N. Vattikonda, and H. Patchipulusu, “Evolution of AI in Software Development and Cybersecurity: Unifying Automation, Innovation, and Protection in the Digital Age,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5266517.
[25] A. A. S. Singh et al., “Predictive Modeling for Classification of SMS Spam Using NLP and ML Techniques,” International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 2, no. 4, pp. 60-69, 2021, doi: https://doi.org/10.63282/3050-9262.IJAIDSML-V2I4P107
[26] V. Maniar et al., “Review of Streaming ETL Pipelines for Data Warehousing: Tools, Techniques, and Best Practices,” International Journal of AI, BigData, Computational and Management Studies, vol. 2, no. 3, pp. 74-81, 2021.
[27] D. Rajendran et al., “Anomaly Identification in IoT-Networks Using Artificial Intelligence-Based Data-Driven Techniques in Cloud Environment,” International Journal of Emerging Trends in Computer Science and Information Technology, vol. 2, no. 2, pp. 83-91, 2021, doi: https://doi.org/10.63282/3050-9246.IJETCSIT-V2I2P110
[28] R. R. Kothamaram et al., “A Survey of Adoption Challenges and Barriers in Implementing Digital Payroll Management Systems in Across Organizations,” International Journal of Emerging Research in Engineering and Technology, vol. 2, no. 2, pp. 64-72, 2021, doi: https://doi.org/10.63282/3050-922X.IJERET-V2I2P109
[29] A. A. Singh et al., "Hybrid AI Models Combining Machine-Deep Learning for Botnet Identification,” International Journal of Humanities and Information Technology, (Special 1), pp. 30-45, 2021, doi: https://doi.org/10.21590/ijhit.spcl.01.04
[30] A. Attipalli, J. V. Mamidala, J. KURMA, S. Enokkaren, R. Kendyala, and V. BITKURI, “A Review of AI and Machine Learning Solutions for Fault Detection and Self-Healing in Cloud Services,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5741303.
[31] S. J. Enokkaren et al., “Enhancing Cloud Infrastructure Security Through AI-Powered Big Data Anomaly Detection,” International Journal of Emerging Research in Engineering and Technology, vol. 2, no. 2, pp. 43-54, 2021.
[32] R. Kendyala et al., “A Survey of Artificial Intelligence Methods in Liquidity Risk Management: Challenges and Future Directions,’ International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 2, no. 1, pp. 35-42, 2021, doi: https://doi.org/10.63282/3050-9262.IJAIDSML-V2I1P105
[33] V. Bitkuri et al., “A Survey on Hybrid and Multi-Cloud Environments: Integration Strategies, Challenges, and Future Directions,” International Journal of Computer Technology and Electronics Communication, vol. 4, no. 1, pp. 3219-3229, 2021.
[34] A. R. Polu et al., “Blockchain Technology as a Tool for Cybersecurity: Strengths, Weaknesses, and Potential Applications,” ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING, vol. 7, no. 8, pp. 167-174, 2022.
[35] A. R. N. R, T. Rajasri, R. Praveen, D. Kalla, S. P. Bendale, and N. Venu, “CAC Training - A Unified Cybersecurity Training Program for Military Staff,” 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI), pp. 569–573, Apr. 2025, doi: https://doi.org/10.1109/iccsai64074.2025.11064463.
[36] D. Rajendran, A. Arjun Singh Singh, V. Maniar, V. Tamilmani, R. R. Kothamaram, and V. D. Namburi, “Data-Driven Machine Learning-Based Prediction and Performance Analysis of Software Defects for Quality Assurance,” Universal Library of Engineering Technology, pp. 59–68, 2022, doi: https://doi.org/10.70315/uloap.ulete.2022.008.
[37] V. D. Namburi et al., “Machine Learning Algorithms for Enhancing Predictive Analytics in ERP-Enabled Online Retail Platform,” International Journal of Advance Industrial Engineering, vol. 10, no. 4, pp. 65-73, 2022.
[38] V. D. Namburi et al., “Review of Machine Learning Models for Healthcare Business Intelligence and Decision Support,” International Journal of AI, BigData, Computational and Management Studies, vol. 3, no. 3, Jun. 2022, doi: https://doi.org/10.63282/3050-9416.ijaibdcms-v3i3p110
[39] V. Tamilmani, A. A. Singh Singh, V. Maniar, R. R. Kothamaram, D. Rajendran, and V. D. Namburi, “Forecasting Financial Trends Using Time Series Based ML-DL Models for Enhanced Business Analytics,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5837143.
[40] V. Bitkuri et al., “Empowering Cloud Security with Artificial Intelligence: Detecting Threats Using Advanced Machine learning Technologies,” International Journal of AI, BigData, Computational and Management Studies, vol. 3, no. 4, 2022, doi: https://doi.org/10.63282/3050-9416.ijaibdcms-v3i4p106.
[41] A. Attipalli et al., “Towards the Efficient Management of Cloud Resource Allocation: A Framework Based on Machine Learning,” Journal of Artificial Intelligence and Big Data, vol. 2, no. 1, 2022.
[42] S. J. Enokkaren, A. Attipalli, V. Bitkuri, R. Kendyala, J. Kurma, and J. V. Mamidala, “A Deep-Review based on Predictive Machine Learning Models in Cloud Frameworks for the Performance Management,” Universal Library of Engineering Technology, pp. 43–52, 2022, doi: https://doi.org/10.70315/uloap.ulete.2022.006.
[43] J. Kurma et al., “A Review of Security, Compliance, and Governance Challenges in Cloud-Native Middleware and Enterprise Systems,” International Journal of Research and Applied Innovations, 5, no. 1, pp. 6434-6443, 2022, doi: https://doi.org/10.15662/IJRAI.2022.0501003
[44] R. Chalasani, M. S. V. Tyagadurgam, V. N. Gangineni, S. Pabbineedi, M. Penmetsa, and J. R. Bhumireddy, “Leveraging Big Datasets for Machine Learning-Based Anomaly Detection in Cybersecurity Network Traffic,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5538121.
[45] S. K. Chundru, S. R. Vangala, R. M. Polam, B. Kamarthapu, A. B. Kakani, and S. K. K. Nandiraju, “Efficient Machine Learning Approaches for Intrusion Identification of DDoS Attacks in Cloud Networks,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515262.
[46] A. Aggarwal, L. Agarwal, B. P. R. Rella, N. Nagpal, D. Kalla, and M. Sharma, “A Performance Comparison of Machine Learning Models for Rain Prediction,” Lecture Notes in Networks and Systems, pp. 319–328, Oct. 2025, doi: https://doi.org/10.1007/978-3-032-03527-1_25.
[47] V. D. Namburi et al., “Intelligent Network Traffic Identification Based on Advanced Machine Learning Approaches,” International Journal of Emerging Trends in Computer Science and Information Technology, vol. 4, no. 4, pp. 118-128, 2023, doi: https://doi.org/10.63282/3050-9246.ijetcsit-v4i4p113.
[48] D. Rajendran et al., “CNN-LSTM Hybrid Architecture for Accurate Network Intrusion Detection for Cybersecurity,” Journal Of Engineering And Computer Sciences, vol. 2, no. 11, pp. 1-13, 2023, doi: https://doi.org/10.5281/zenodo.17516985
[49] R. R. Kothamaram et al., “Exploring the Influence of ERP-Supported Business Intelligence on Customer Relationship Management Strategies,” International Journal of Technology, Management and Humanities, vol. 9, no. 4, pp. 179-191, 2023.
[50] A. A. S. S Singh et al., “Exploration of Java-Based Big Data Frameworks: Architecture, Challenges, and Opportunities,” Journal of Artificial Intelligence & Cloud Computing, vol. 2, no. 4, pp. 1-8, 2023.
[51] V. Tamilmani, V. D. Namburi, A. A. Singh Singh, V. Maniar, R. R. Kothamaram, and D. Rajendran, “Real-Time Identification of Phishing Websites Using Advanced Machine Learning Methods,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5837142.
[52] J. V. Mamidala et al., “A Survey of Blockchain-Enabled Supply Chain Processes in Small and Medium Enterprises for Transparency and Efficiency,” International Journal of Humanities and Information Technology, vol. 5, no. 4, pp. 84-95, 2023.
[53] V. Bitkuri et al., “Efficient Resource Management and Scheduling in Cloud Computing: A Survey of Methods and Emerging Challenges,” International Journal of Emerging Trends in Computer Science and Information Technology, vol. 4, no. 3, Oct. 2023, doi: https://doi.org/10.63282/3050-9246.ijetcsit-v4i3p112.
[54] J. V. Mamidala et al., “Machine Learning Models Powered by Big Data for Health Insurance Expense Forecasting,” International Research Journal of Economics and Management Studies IRJEMS, vol. 2, no. 1. 2023.doi: https://doi.org/10.56472/25835238/IRJEMS-V2I1P143
[55] Preeti Nagrath, I. Saini, M. Zeeshan, Komal, Komal, and D. Kalla, “Predicting Mental Health Disorders with Variational Autoencoders,” Lecture notes in networks and systems, pp. 38–51, Oct. 2025, doi: https://doi.org/10.1007/978-3-032-03751-0_4.
[56] M. Roshni Thanka et al., “A hybrid approach for melanoma classification using ensemble machine learning techniques with deep transfer learning,” Computer methods and programs in biomedicine update, vol. 3, pp. 100103–100103, Jan. 2023, doi: https://doi.org/10.1016/j.cmpbup.2023.100103.
[57] Prajkta Waditwar, “From Fragmentation to Focus: The Benefits of Centralizing Procurement,” International Journal of Research and Applied Innovations, vol. 06, no. 06, Nov. 2023, doi: https://doi.org/10.15662/ijrai.2023.0606006.
[58] P. Waditwar, “Agentic AI in Contract Analytics Harnessing Machine Learning for Risk Assessment and Compliance in Government Procurement Contracts,” Open Journal of Business and Management, vol. 13, no. 05, pp. 3385–3395, 2025, doi: https://doi.org/10.4236/ojbm.2025.135179.
[59] B. Narra, D. V. K. R. Buddula, H. Patchipulusu, N. Vattikonda, A. Gupta, and A. R. Polu, “The Integration of Artificial Intelligence in Software Development: Trends, Tools, and Future Prospects,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5596472.
[60] A. K. Gupta, A. Reddy Polu, B. Narra, D. V. Kumar Reddy Buddula, H. H. Sudheer Patchipulusu, and N. Vattikonda, “Leveraging Deep Learning Models for Intrusion Detection Systems for Secure Networks,” International Journal of Innovative Research in Multidisciplinary Education, vol. 03, no. 12, Dec. 2024, doi: https://doi.org/10.58806/ijirme.2024.v3i12n19.
[61] R. P. Achuthananda et al., “Evaluating machine learning approaches for personalized movie recommendations: A comprehensive analysis,” Journal of Contemporary Education Theory & Artificial Intelligence, 2024.
[62] D. Prabakar, N. Iskandarova, N. Iskandarova, D. Kalla, K. Kulimova, and D. Parmar, “Dynamic Resource Allocation in Cloud Computing Environments Using Hybrid Swarm Intelligence Algorithms,” 2025 International Conference on Networks and Cryptology (NETCRYPT), pp. 882–886, May 2025, doi: https://doi.org/10.1109/netcrypt65877.2025.11102314.
[63] A. R. Polu et al., “Analyzing The Role of Analytics in Insurance Risk Management: A Systematic Review of Process Improvement and Business Agility,” IRJEMS International Research Journal of Economics and Management Studies, vol. 2, no. 3, pp. 325-332, 2025, Doi: https://doi.org/10.56472/25835238/IRJEMS-V2I1P142
[64] V. Tamilmani et al., “A Review of Cyber Threat Detection in Software-Defined and Virtualized Networking Infrastructures,” International Journal of Technology, Management and Humanities, vol. 10, no. 4, pp. 136-146, 2024, doi: https://doi.org/10.21590/ijtmh.10.04.15


