Reframing The Cloud Computing Argument: Managing Inaccurate Perceptions

Reframing The Cloud Computing Argument: Managing Inaccurate Perceptions

Human rationality is quickly becoming a castaway in the study of economics and psychology. That humans make decisions irrationally is an irrefutable precept as evidenced by empirical research. What these studies have uncovered is than when it comes to dealing with the emotions that naturally arise in the decision making process, avoiding risk trumps rational decision-making. The key issue is how the issue is framed to begin with.

One of the problems with cloud computing is overcoming its name. For most people, “the cloud” does not relate to some diagraming by computer scientists to illustrate how cloud computing operates. That frame of reference is only relevant to a narrow portion of tech savvy professionals. When most people here the word, “cloud” they unconsciously begin framing a set of references like: dreamy, foggy, haziness, overcast, and overshadow. Without being aware of it, putting one’s valuable data in the cloud becomes a lot more like driving one’s children around in an exploding Pinto from the 1970s than purchasing the latest technology.

Reframing the Risk Aversion Perception

Since cloud computing is a lot less risky than its associations listed above it’s necessary to reframe the issue along more rational lines. This challenge entails a shifting from a risk aversion position to a risk taking perspective.

In Tversky and Kahneman’s, “The Framing of Decisions and the Psychology of Choice” this issue is addressed by highlighting experiments that presented participants with cases involving life or death decisions about populations. What they found was that people will chose to pursue the option they perceive is the least risky regardless of the actual facts involved. By manipulating mathematical language in two scenarios people chose risk aversive strategies rather than taking a risk to save more people based on the way the question was framed. In fact the situations were exactly the same. Those waiting to get comfortable with the idea of the cloud will be waiting a long time without the issue being reframed to a more realistic assessment.

This reality something the automobile salesman understands instinctively. After a test drive and the perception that someone is interested in the car but not ready to make a decision, they will push the customer to take the car home for the night. Known, as the, “Puppy Dog Close” the hope is that the owner will fall in love with the idea of buying the car rather than sit in the dealership and talk himself out of it by thinking about everything that can go wrong.

In the same way cloud computing professionals can reframe cloud computing from some risky data dreamscape to a more realistic position where the cloud makes financial sense and security is less an issue than those butterflies fluttering in the pit of their stomach first indicated.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…