RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption

Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption

Fans of the TV show Seinfeld know exactly what to expect. The effects of repeated episodes finds the viewer primed to expect laughter at Jerry’s cleverness, Kramer’s odd interpretations, George’s neuroticism, and Elaine’s adventures. The series is organized around a Peter Pan theme of a never-grow-up philosophy of life. The producers even made the finale a comedic success about the four friends being sentenced to prison. But what if they didn’t? What if the last show was presented as a tearjerker having the characters remorseful about their careless actions over the years? Of course this sudden deviation would not have computed well within the human brain as this turnabout would have went against the theme of the entire series.

The Software Schema

When a retail customer or an executive considers adopting the cloud they are breaking a mental script, known as a schema, that is nearly as difficult to imagine as crying over the Seinfeld crew’s jail sentence.

A schema is a psychological theory first proposed by the writer Jean Pigaet and later applied by Bartlett as a cognitive frame that serves as a foundation from which interpretations of events are automatically activated based on prior experience http://psychology.about.com/od/sindex/g/def_schema.htm

Cloud computing is a whole new way of thinking about how we use and store data making this strategy an affront to our mental schema of how we manage programs and data. To incorporate a new schema requires integrating new information, a difficult mental leap that requires positive experiences with new technology from the very beginning.

How Apple and Microsoft Got it Right

In a prior column I shared my adventure of buying a MacBook Air and how I had to overcome the bias of salesman to pursue a cloud solution. What happened within an hour of my purchase is a good example of how a schema works and how it can be overcome by new experiences.

After setting up my new Air I desperately needed to get Microsoft Word for Mac. At the retail outlet a panic gripped me as I realized I was buying media to insert into a slot I didn’t have on the Air. The tech told me, “I think you can download it online“. One the way home I had a sinking feeling I had made a terrible mistake and started vowing to never allow myself to be in this situation again.

This example speaks to how sensitive the customer can be at retail, how nervous the CIO can be at the corporate level, and how concerned the IT professional can feel about job security. New challenges to old schemas follow a difficult and winding path on the way to changing a person’s mind-set. When I got home the cloud was there for me and I was writing within 10 minutes. Make sure its there for the next user and another new schema will emerge, and another, and another…

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

SYNDICATED NEWS SOURCES

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…