Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption

Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption

Fans of the TV show Seinfeld know exactly what to expect. The effects of repeated episodes finds the viewer primed to expect laughter at Jerry’s cleverness, Kramer’s odd interpretations, George’s neuroticism, and Elaine’s adventures. The series is organized around a Peter Pan theme of a never-grow-up philosophy of life. The producers even made the finale a comedic success about the four friends being sentenced to prison. But what if they didn’t? What if the last show was presented as a tearjerker having the characters remorseful about their careless actions over the years? Of course this sudden deviation would not have computed well within the human brain as this turnabout would have went against the theme of the entire series.

The Software Schema

When a retail customer or an executive considers adopting the cloud they are breaking a mental script, known as a schema, that is nearly as difficult to imagine as crying over the Seinfeld crew’s jail sentence.

A schema is a psychological theory first proposed by the writer Jean Pigaet and later applied by Bartlett as a cognitive frame that serves as a foundation from which interpretations of events are automatically activated based on prior experience http://psychology.about.com/od/sindex/g/def_schema.htm

Cloud computing is a whole new way of thinking about how we use and store data making this strategy an affront to our mental schema of how we manage programs and data. To incorporate a new schema requires integrating new information, a difficult mental leap that requires positive experiences with new technology from the very beginning.

How Apple and Microsoft Got it Right

In a prior column I shared my adventure of buying a MacBook Air and how I had to overcome the bias of salesman to pursue a cloud solution. What happened within an hour of my purchase is a good example of how a schema works and how it can be overcome by new experiences.

After setting up my new Air I desperately needed to get Microsoft Word for Mac. At the retail outlet a panic gripped me as I realized I was buying media to insert into a slot I didn’t have on the Air. The tech told me, “I think you can download it online“. One the way home I had a sinking feeling I had made a terrible mistake and started vowing to never allow myself to be in this situation again.

This example speaks to how sensitive the customer can be at retail, how nervous the CIO can be at the corporate level, and how concerned the IT professional can feel about job security. New challenges to old schemas follow a difficult and winding path on the way to changing a person’s mind-set. When I got home the cloud was there for me and I was writing within 10 minutes. Make sure its there for the next user and another new schema will emerge, and another, and another…

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…