Acessibilidade / Reportar erro

THE SOCIAL REPRESENTATION OF CLOUD COMPUTING ACCORDING TO BRAZILIAN INFORMATION TECHNOLOGY PROFESSIONALS

ABSTRACT

This study seeks to identify the social representation of Cloud Computing as perceived by Brazilian Information Technology (IT) professionals. Using accessibility criteria, 221 IT professionals were chosen as respondents to an online questionnaire. Using Social Representation Theory (SRT), the techniques of free evocation of words, the Vergès' framework, and implicative, lexical, and content analysis were performed. Analyzing the social representation of cloud computing yielded associated words such as cloud, storage, availability, Internet, virtualization, and security, implying that Brazilian IT professionals have a primarily operational, rather than strategic, approach to cloud computing. This paradigm is based on issues related to the safety and availability of cloud data, and the results match other scientific literature on this subject. The theoretical contribution of this research lies in the use of SRT. The integrated use of implicative, lexical, and content analyses may be used for a better examination of constructs in the future.

KEYWORDS
Cloud computing; social representation theory; word evocation technique; Information Technology infrastructure management; information security

RESUMO

Este estudo busca identificar a representação social sobre Cloud Computing, pela percepção dos profissionais brasileiros de Tecnologia da Informação (TI). Os dados empíricos foram coletados por meio de questionários on-line respondidos por uma amostra por acessibilidade de 221 profissionais de TI e analisados por meio da Teoria da Representação Social (TRS), operacionalizada pelas técnicas de evocação livres de palavras e do quadro de quatro casas de Vergès, bem como pelas análises implicativa, léxica e de conteúdo. Como resultado, identificou-se que o núcleo central da representação social associada ao Cloud Computing é composto pelas palavras: nuvem, armazenamento, disponibilidade, internet, virtualização e segurança. Assim, conclui-se que os profissionais de TI no Brasil têm uma visão mais operacional do que estratégica do Cloud Computing. Essa visão funcional, congruente com parte da literatura científica sobre o tema, fundamenta-se basicamente em aspectos relacionados à segurança, armazenamento e disponibilidade dos dados armazenados no Cloud Computing, faltando uma percepção do valor estratégico do Cloud Computing, baseada na viabilização de novos modelos de negócio. Finalmente, este artigo traz uma contribuição metodológica original ao usar a TRS - por meio da aplicação conjunta das análises implicativa, léxica e de conteúdo - na definição de um constructo específico.

PALAVRAS-CHAVE
Cloud Computing; Teoria da Representação Social; evocação de palavras; gestão da infraestrutura de Tecnologia da Informação; segurança da informação

RESUMEN

Este estudio busca identificar la representación social sobre Cloud Computing, por la percepción de los profesionales brasileños de Tecnología de la Información (TI). Se recolectaron datos mediante cuestionarios online con una muestra por accesibilidad de 221 profesionales de TI y se analizaron usando la Teoría de las Representaciones Sociales (TRS), con la técnica de recuperación libres de palabras y análisis implicados, léxicos y de contenido. Se identificó que el núcleo de la representación social asociada al Cloud Computing está compuesto por las expresiones: Nube de almacenamiento, Disponibilidad, Internet, Virtualización y Seguridad. Se concluyó que la percepción sobre Cloud Computing es más operacional que estratégica, y se alinea con parte da la literatura científica, basándose en la seguridad y la disponibilidad de los datos almacenados en el Cloud Computing. La contribución teórica original del estudio está asociada con el uso de la TRS mediante la aplicación conjunta de los análisis implicados, léxicos y de contenido para definición de constructos.

PALABRAS CLAVE
Cloud Computing; Teoría de la Representación Social; evocación de palabras; gestión de la infraestruc tura de Tecnología de la Información; seguridad de la información

INTRODUCTION

Information Technology (IT) is considered a basic utility service like any other such as water, electricity, gas, and telephone (Buyya, Yeo, Venugopal, Broberg, & Brandic, 2009Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616. doi:10.1016/j.future.2008.12.001
https://doi.org/10.1016/j.future.2008.12...
). One of the computational paradigms that meets this vision, Cloud Computing, transforms IT into a basic utility service with an adequate infrastructure for users to access applications and data from anywhere (Buyya et al., 2009Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616. doi:10.1016/j.future.2008.12.001
https://doi.org/10.1016/j.future.2008.12...
). Cloud computing spending is expected to reach $500 billion by 2020, which indicates the relevance of cloud computing to the IT industry in the coming years (International Data Corporation - IDC, 2016International Data Corporation. (2016). Cloud's impact is far reaching. Recuperado de http://www.idc.com/promo/thirdplatform/fourpillars/cloud
http://www.idc.com/promo/thirdplatform/f...
).

The technical issues associated with the use of Cloud Computing have been widely addressed in the literature, mostly in the studies of Armbrust et al. (2010)Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. ... Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM, 53(4), 50-58. doi:10.1145/1721654.1721672
https://doi.org/10.1145/1721654.1721672...
, Brian et al. (2012)Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing. SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
http://www.satw.ch/organisation/organe/t...
, Buyya et al. (2009)Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616. doi:10.1016/j.future.2008.12.001
https://doi.org/10.1016/j.future.2008.12...
, Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50., Marston, Li, Bandyopadhyay, Zhang, and Ghalsasi (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
and Verdi, Rothenberg, Pasquini, and Magalhães (2010)Verdi, F. L., Rothenberg, C. E., Pasquini, R., & Magalhães, M. (2010). Novas arquiteturas de data center para Cloud Computing. XXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Gramado, RS.. Some studies have also revealed how Cloud Computing has been strategically adopted by companies to build business models (Wirtz, Mory & Piehler, 2014Wirtz, B. W., Mory, L., & Piehler, R. (2014). Web 2.0 and digital business models. In Handbook of strategic e-business management (pp. 751-766). Springer Berlin Heidelberg.). However, no studies were found to investigate, through the Social Representation Theory (SRT) (Bayramusta & Nasir, 2016Bayramusta, M., & Nasir, V. A. (2016). A fad or future of IT?: A comprehensive literature review on the Cloud Computing research. International Journal of Information Management, 36(4), 635-644. doi:10.1016/j.ijinfomgt.2016.04.006
https://doi.org/10.1016/j.ijinfomgt.2016...
; Wang, Liang, Jia, Ge, Xue, & Wang, 2016Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., & Wang, Z. (2016). Cloud Computing research in the IS discipline: A citation/co-citation analysis. Decision Support Systems, 86, 35-47. doi:10.1016/j.dss.2016.03.006
https://doi.org/10.1016/j.dss.2016.03.00...
), the perception of IT professionals toward the concept of Cloud Computing.

Thus, in line with Joia (2017)Joia, L. A. (2017). A teoria da representação social e a definição de constructos na área de administração da informação. VI EnADI. Curitiba, PR., who considered SRT an efficient approach for understanding constructs in the area of Information Management, this article seeks to identify the perception of Brazilian IT professionals toward the concept of Cloud Computing and compare the results with those found in the current literature.

With this introduction, the rest of the article is structured as follows. In the next section, the theoretical framework addressing the concepts of SRT and Cloud Computing are presented. Subsequently, the methodological procedures used are described, followed by the results, which are discussed based on the theoretical framework used. Finally, the conclusions are presented, covering the academic and management contributions, followed by the limitations of the study.

THEORETICAL FRAMEWORK

Cloud computing

One of the most wide-ranging studies on Cloud Computing has been conducted by the National Institute for Standards in Technology (NIST) in the United States, which addresses the subject in a highly technical manner. They state that this computational paradigm is composed of (a) five essential characteristics: self-service on demand, broad network access, resource pool, rapid elasticity, and measurable services; (b) three service models: software as a service, platform as a service, and infrastructure as a service; and (c) four implementation models: private cloud, community cloud, public cloud, and hybrid cloud (Mell & Grance, 2011Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50.).

According to Brian et al. (2012)Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing. SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
http://www.satw.ch/organisation/organe/t...
, one of the essential characteristics of the Cloud Computing model, or the "resource pool," as coined by Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50., is that it can be obtained only through technologies such as virtualization and multitenancy. These technologies allow providers to deliver computing resources, simultaneously or otherwise, based on the demand and needs of multiple consumers.

Since Cloud Computing makes data available remotely, and thus is out of the owner's control, it is inevitable that it causes issues related to information security. According to Dikaiakos, Katsaros, Mehra, Pallis, & Vakali (2009)Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud Computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5)., all responsibility for the protection of the user, his privacy, and the integrity of the information stored by him on the cloud belongs to the contracted service provider. Wei et al. (2014)Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in Cloud Computing. Information Sciences, 258, 371-386. doi:10.1016/j.ins.2013.04.028
https://doi.org/10.1016/j.ins.2013.04.02...
agree with this statement and believe that security and privacy management are the main challenges associated with the implementation of Cloud Computing in organizations. Younis and Kifayat (2013)Younis, Y. A., & Kifayat, K. (2013). Secure Cloud Computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610., in turn, identify data integrity, availability and confidentiality, security threats, and attacks as the most important factors considered by IT users when it comes to Cloud Computing.

Although most concepts regarding Cloud Computing are focused on its technological aspects (Armbrust et al., 2010Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. ... Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM, 53(4), 50-58. doi:10.1145/1721654.1721672
https://doi.org/10.1145/1721654.1721672...
; Mell & Grance, 2011Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50.), there are other concepts such as Marston et al. (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
, considered by Madhavaiah and Bashir (2012)Madhavaiah, C., & Bashir, I. (2012). Defining Cloud Computing in business perspective: a review of research. Metamorphosis, 11(2), 50-65. offer the most comprehensive explanation of Cloud Computing:

Cloud Computing is an information technology service model where computing services (both hardware and software) are delivered on-demand to customers over a network in a self-service fashion, independent of device and location. The resources required to provide the requisite quality-of-service levels are shared, dynamically scalable, rapidly provisioned, virtualized and released with minimal service provider interaction. Users pay for the service as an operating expense without incurring any significant initial capital expenditure, with the cloud services employing a metering system that divides the computing resource in appropriate blocks (Marston et al., 2011Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
, p. 2).

Thus, for Marston et al. (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
, by using Cloud Computing, IT expenses in organizations would get converted from a capital expense (Capex) to an operating expense (OPEX). Armbrust et al. (2010)Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. ... Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM, 53(4), 50-58. doi:10.1145/1721654.1721672
https://doi.org/10.1145/1721654.1721672...
and Brian et al. (2012)Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing. SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
http://www.satw.ch/organisation/organe/t...
believe that it would be more appropriate to consider Cloud Computing within the pay as you go (PAYG) or pay-per-use models.

Social representation theory (SRT)

The SRT was developed in the 1960s in France by Serge Moscovici to explain how common sense is formed, organized, grounded, and propagated in different human groups. According to Moscovici (1979Moscovici, S. (1979). Psychologie des minorités actives, Paris, Presses Universitaires de France. Version espaflola (1981): Psicología de las misnorias activas. Ediciones Morata. Google Scholar., 1988)Moscovici, S. (1988). Notes towards a description of social representations. European Journal of Social Psychology, 18(3), 211- 250. doi:10.1002/ejsp.2420180303
https://doi.org/10.1002/ejsp.2420180303...
, social representations are constructed with the aim of understanding, locating, and adjusting in the world. Jodelet (2001)Jodelet, D. (2001). Representações sociais: Um domínio em expansão. In D. Jodelet (Org.), As representações sociais (pp. 17-44). Rio de Janeiro, RJ: EdUERJ. corroborates this understanding, believing that social representations are important in everyday life, because there is always a need to know how a person or object is related to the world around them. Thus, "social representations are a form of knowledge socially constructed and shared with a practical objective, and that contributes to the construction of a common reality to a social set" (Jodelet, 2001Jodelet, D. (2001). Representações sociais: Um domínio em expansão. In D. Jodelet (Org.), As representações sociais (pp. 17-44). Rio de Janeiro, RJ: EdUERJ., p. 22).

It should be noted that the literature on social representations is focused on the human being and his or her relations with society. It cannot be otherwise since SRT comes from psychoanalysis. However, in the context of this study, social representation is applied to a service model, a computational paradigm called Cloud Computing, and not to an individual. Jodelet (1993)Jodelet, D. (1993). Representações sociais: Um domínio em expansão. Recuperado de http://portaladm.estacio.br/media/3432753/jodelet-drs-um-dominio-em-expansao.pdf
http://portaladm.estacio.br/media/343275...
confirms the possibility of applying the concept of social representation to this paradigm, since social representation corresponds to an act of thinking by which a subject relates to an object. This can be a person, a thing, a material, a psychic or social event, a natural phenomenon, an idea, or a theory.

It is interesting to note that the use of the concept of social representation in the field of Information Systems (IS) is not something new (Gal & Berente, 2008Gal, U., & Berente, N. (2008). A social representations perspective on information systems implementation: Rethinking the concept of "frames". Information Technology & People, 21(2), 133-154. doi:10.1108/09593840810881051
https://doi.org/10.1108/0959384081088105...
; Jung, Pawlowski & Wiley-Patton, 2009Jung, Y., Pawlowski, S. D., & Wiley-Patton, S. (2009). Conducting social cognition research in IS: A methodology for eliciting and analyzing social representations. Communications of the Association for Information Systems, 24, 598-614. doi:10.17705/1cais.02435
https://doi.org/10.17705/1cais.02435...
; Kaganer & Vaast, 2010Kaganer, E. A., & Vaast, E. (2010, September). Responding to the (almost) unknown: Social representations and corporate policies of social media. 31st ICIS. Saint Louis, USA.; Vaast & Walsham, 2005Vaast, E., & Walsham, G. (2005). Representations and actions: The transformation of work practices with IT use. Information and Organization, 15(1), 65-89. doi:10.1016/j.infoandorg.2004.10.001
https://doi.org/10.1016/j.infoandorg.200...
), especially for understanding certain attitudes of users as well as for defining constructs in IS (Joia, 2017Joia, L. A. (2017). A teoria da representação social e a definição de constructos na área de administração da informação. VI EnADI. Curitiba, PR.). On these lines, the studies of Cunha, Coelho, and Pozzebon (2014)Cunha, M. A. V. C., Coelho, T. R., & Pozzebon, M. (2014). Internet e participação: O caso do orçamento participativo digital de Belo Horizonte. RAE-Revista de Administração de Empresas, 54(3), 296-308. doi:10.1590/S0034-759020140305
https://doi.org/10.1590/S0034-7590201403...
are noteworthy in that investigate the reason for the change in users' behavior over the years in relation to digital public participation in the definition of the budget of Belo Horizonte (Minas Gerais) and that of Teodoro, Przeybilovicz, and Cunha (2014)Teodoro, A. N., Przeybilovicz, É., & Cunha, M. A. (2014). Governança de tecnologia da informação: Uma investigação sobre a representação do conceito. Revista de Administração, 49(2), 237-321. doi:10.5700/rausp1148
https://doi.org/10.5700/rausp1148...
, which investigate how IT governance was perceived by the technicians involved in its implementation. Vaast (2007)Vaast, E. (2007). Danger is in the eye of the beholders: Social representations of information systems security in healthcare. The Journal of Strategic Information Systems, 16(2), 130-152. doi:10.1016/j.jsis.2007.05.003
https://doi.org/10.1016/j.jsis.2007.05.0...
goes further by investigating, using SRT, how professionals of a hospital recognize and represent the aspects associated with IS safety.

According to Vergara and Ferreira (2005)Vergara, S. C., & Ferreira, V. C. P. (2005). A representação social de ONGs segundo formadores de opinião do município do Rio de Janeiro. Revista de Administração Pública, 39(5), 1137-1159., in SRT, it is necessary to identify the most important part of the social representation, the core. The core defines specific consensual aspects within a group regarding the social representation of an object (Menin, 2007Menin, M. D. S. (2007). O aspecto normativo das representações sociais: Comparando concepções. Revista de Educação Pública, 16(30), 121-135.). Thus, the core of a social representation is formed by values about which, in general, the subject is not aware, or by values that are not made explicit, but that guide the subject's action and behavior. It represents the immutable essence of social representation, is stable and resistant to change, and thereby ensures the maintenance of social representation. Therefore, in a specific historical and cultural context, the core is decisive in defining the sense that a given object assumes for a group (Vergara & Ferreira, 2005Vergara, S. C., & Ferreira, V. C. P. (2005). A representação social de ONGs segundo formadores de opinião do município do Rio de Janeiro. Revista de Administração Pública, 39(5), 1137-1159.).

According to Abric (1998Abric, J. C. (1998). A abordagem estrutural das representações sociais. In O. D. Moreira (Org.), Estudos interdisciplinares de representação social (pp. 27-38). Goiânia, GO: AB., 2003)Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès., there is a more flexible peripheral system around the core. This system accommodates the direct contextual contradictions, supports the heterogeneity of the group, and gets the different perceptions of its members to allow for the adaptation of social representation to the immediate, without affecting the core (Mazzotti, 2001Mazzotti, T. B. (2001). Representações sociais de problemas ambientais: Uma contribuição à educação brasileira. In A. P. Moreira (Org.), Representações sociais: Teoria e prática (pp. 86-123). João Pessoa, PB: UFPB.; Vergara & Ferreira, 2005Vergara, S. C., & Ferreira, V. C. P. (2005). A representação social de ONGs segundo formadores de opinião do município do Rio de Janeiro. Revista de Administração Pública, 39(5), 1137-1159.). Thus, the peripheral system is less stable than the core, playing the role of individual modulation, without putting at risk the role of the core (Menin, 2007Menin, M. D. S. (2007). O aspecto normativo das representações sociais: Comparando concepções. Revista de Educação Pública, 16(30), 121-135.).

According to Mazzotti (2001)Mazzotti, T. B. (2001). Representações sociais de problemas ambientais: Uma contribuição à educação brasileira. In A. P. Moreira (Org.), Representações sociais: Teoria e prática (pp. 86-123). João Pessoa, PB: UFPB., a transformation in the core generates a new social representation. Correia and Joia (2014)Correia, J. C. P., & Joia, L. A. (2014). CIO competencies: A social representation analysis. Proceeedings of the Twentieth Americas Conference on Information Systems. Savannah, USA., in turn, state that, as the core is composed of highly important elements for social representation, its change or absence would disrupt this representation or give it a new meaning.

METHODOLOGICAL PROCEDURES

The methodology proposed in this study is based on the principles of qualitative and quantitative research. Thus, data were collected using the word evocation technique, treated using the four quadrants technique proposed by Jean-Claude Abric, and analyzed using implicit and content analysis (Abric, 1998Abric, J. C. (1998). A abordagem estrutural das representações sociais. In O. D. Moreira (Org.), Estudos interdisciplinares de representação social (pp. 27-38). Goiânia, GO: AB.; Vergara & Ferreira, 2005Vergara, S. C., & Ferreira, V. C. P. (2005). A representação social de ONGs segundo formadores de opinião do município do Rio de Janeiro. Revista de Administração Pública, 39(5), 1137-1159.; Vergès, 2003Vergès, P. (2003). EVOC - Ensemble de programmes permettant l'analyse des évocations: Manuel Version 15 octobre 2003. Aix-en-Provence, France: Laboratoire Méditerranéen de Sociologie (LAMES).).

The field research used a non-probability sample, that is, it was based on accessibility (Vergara, 2005Vergara, S. C. (2005). Métodos de pesquisa em administração. São Paulo, SP: Atlas.). An online questionnaire was sent by email during April 2014 to professionals who were effectively working, or had previously worked, in the IT field. This was done to reduce the possibility of an erroneous representation of Cloud Computing.

Different techniques were used to identify social representation, such as the word association technique. Free word association, used in this article, refers to respondents evoking and expressing words when a given word or an inductive expression is presented to them, either verbally or in writing (Vergara, 2005Vergara, S. C. (2005). Métodos de pesquisa em administração. São Paulo, SP: Atlas.). Thus, in this study, the participants were asked to express five words or expressions that they evoked instantly when they came heard or saw the term "Cloud Computing."

Following word association, complementary closed and open questions were presented in a complementary questionnaire. This questionnaire was used for content analysis, which in turn, served to support the understanding of the core and the statistical data of the sample.

To analyze the evoked words, the data treatment model of Pierre Vergès and the four quadrants technique were used. This technique consists of four quadrants that carry essential information for the analysis of social representation, through which the evoked words are separated (Abric, 1998Abric, J. C. (1998). A abordagem estrutural das representações sociais. In O. D. Moreira (Org.), Estudos interdisciplinares de representação social (pp. 27-38). Goiânia, GO: AB.; Vergès, 2003Vergès, P. (2003). EVOC - Ensemble de programmes permettant l'analyse des évocations: Manuel Version 15 octobre 2003. Aix-en-Provence, France: Laboratoire Méditerranéen de Sociologie (LAMES).). To this end, the EVOC 2005 software was used. According to Abric (2003)Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès. and Pereira (2006)Pereira, M. A. (2006). O medo no contexto organizacional (Dissertação de mestrado, Fundação Getulio Vargas, Rio de Janeiro, RJ)., as summarized in Exhibit 1, using the four quadrants technique of Vergès shows that the recall frequency or quantitative information surpasses that of recall order or qualitative information.

Exhibit 1
Descriptive summary of the four Vergès quadrants

According to Joia (2017)Joia, L. A. (2017). A teoria da representação social e a definição de constructos na área de administração da informação. VI EnADI. Curitiba, PR., the average evokes frequency (AEF) measures the average evokes frequency of a given word and is calculated by the total evokes of a given word over the total number of distinct words. The average evokes order (AEO) is obtained by the mean evokes of words, considering the order in which they were evoked - first, second, third, fourth, and fifth places. The AEO mean is obtained by dividing the sum of all AEOs by the total number of distinct words. Figure 1 summarizes the distribution of the AEF and AEO values in the framework of the four quadrants of Vergès

Figure 1
The Vergès quadrants

Thus, to find the core of social representation, according to the framework of the four houses of Vergès, these steps must be followed i) organization of the evoked words; ii) calculation of word frequency through EVOC; iii) calculation of the mean order of evocation of words through EVOC; iv) creation of reference points (average), so that evoked words are properly disposed within the frame of four quadrants of Vergès, that is, calculate AEF and AEO using EVOC, and v) make an individual comparison between the values associated with the words and the values of AEO and AEF, using EVOC, thereby creating the Vergès framework for Cloud Computing (Abric, 2003Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès.; Correia & Joia, 2014Correia, J. C. P., & Joia, L. A. (2014). CIO competencies: A social representation analysis. Proceeedings of the Twentieth Americas Conference on Information Systems. Savannah, USA.).

In this study, we sought words that would enable the completion of Exhibit 1, with special attention to the words in the upper left quadrant, known as the core, and to those in the lower right quadrant or second periphery (Abric, 2003Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès.; Pereira, 2006Pereira, M. A. (2006). O medo no contexto organizacional (Dissertação de mestrado, Fundação Getulio Vargas, Rio de Janeiro, RJ).), also known as the peripheral system (Vergara, 2005Vergara, S. C. (2005). Métodos de pesquisa em administração. São Paulo, SP: Atlas.). In Tura (1997)Tura, L. F. R. (1997). Os jovens e a prevenção da AIDS no Rio de Janeiro. Rio de Janeiro, RJ: Universidade Federal do Rio de Janeiro., the lower left quadrant (contrast zone) and the upper right quadrant (first periphery) allow a less direct interpretation of social representation, since they represent cognitions that are distant from that of the core (Abric, 2003Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès.; Pereira, 2006Pereira, M. A. (2006). O medo no contexto organizacional (Dissertação de mestrado, Fundação Getulio Vargas, Rio de Janeiro, RJ).), and, therefore, they were not used in the study.

An implicative analysis was then performed to identify the relationship among words that are part of the social representation of Cloud Computing (Gras & Almouloud, 2002Gras, R., & Almouloud, S. A. (2002). A implicação estatística usada como ferramenta em um exemplo de análise de dados multidimensionais. Recuperado de http://math.unipa.it/~grim/asi/asi_03_saddo_gras.pdf
http://math.unipa.it/~grim/asi/asi_03_sa...
). According to Pereira (1997)Pereira, C. (1997). A análise de dados nas representações sociais. Análise Psicológica, 1(15), 49-62. and Gras and Almouloud (2002)Gras, R., & Almouloud, S. A. (2002). A implicação estatística usada como ferramenta em um exemplo de análise de dados multidimensionais. Recuperado de http://math.unipa.it/~grim/asi/asi_03_saddo_gras.pdf
http://math.unipa.it/~grim/asi/asi_03_sa...
, the implicative analysis enables the confirmatory analysis of the core and the peripheral systems of social representation under study, defining the structural model of the components of social representation that were found. Thus, we obtained the groups formed by the evoked words with the highest implication indices with other evoked words to understand how these groupings and the words, individually, are formed and related to each other (Pereira, 1997Pereira, C. (1997). A análise de dados nas representações sociais. Análise Psicológica, 1(15), 49-62.).

To perform the implicative analysis, we used the CHIC software, which, according to Sarubbi et al. (2013)Sarubbi, V. J., Reis, A. O. A., Bertolino, M. M., Neto, & Rolim, M. L., Neto. (2013). Tecnologias computacionais para o auxílio em pesquisa qualitativa: Software EVOC. São Paulo, SP: Schoba., aims to provide a quality index of the associations among the elements of the core, representing them graphically.

Finally, the data were analyzed using the lexical and content analysis techniques, as proposed by Freitas and Janissek (2000)Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos. Porto Alegre, RS: Sphinx-Sagra (Distrib.).. Lexicon analysis enabled content analysis, which sought to identify what was written about Cloud Computing based on the responses to complementary questionnaires, seeking indicators that would allow inferring knowledge on the conditions of production/reception of these messages (Vergara, 2005Vergara, S. C. (2005). Métodos de pesquisa em administração. São Paulo, SP: Atlas.). Thus, the elements of the Vergès quadrant, obtained via lexical analysis, will serve as the basis for the categorization of the content analyzed in the open questions to generate a list with the final categories, as proposed by Freitas and Janissek (2000)Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos. Porto Alegre, RS: Sphinx-Sagra (Distrib.). and summarized in Figure 2.

Figure 2
Data analysis plan

Finally, the flow from the empirical research to data analysis is summarized in Figure 3.

Figure 3
Research Flow

RESULTS

Sample analysis

Using an online questionnaire, 291 responses were obtained, of which 221 (76%) were used, which is a sufficient sample size for obtaining a satisfactory result (Moscarola, 1990Moscarola, J. (1990). Enquêtes et analyse de données avec le sphinx. Vuibert.). Seventy questionnaires (24%) were excluded for containing blank answers because they were completed by professionals who did not work in the IT area or they contained incomprehensible words and/or those out of the context of the research. Exhibit 2 summarizes the general characteristics of the respondents.

Exhibit 2
Summary of sample characteristics

Identification of the central nucleus and peripheral system

Before the core and peripheral system are generated, three parameters must be set. The first of is the minimum frequency that each evoked word must have to be considered by the software when calculating MRO. To this end, we used the frequency value that represents the mean of the evoked words, that is, 17.

Of the 1,091 evoked words, the EVOC software identified 213 different words, of which 15 words (7%) met the criterion of having a evokes frequency equal to or higher than 17, with an MRO of 2.99. Thus, the second parameter used by the software to generate the core and peripheral system was obtained - the mean order of evoked words, which was 2.90 - rounded off from 2.99 to 2.90, aiming at a greater rigidity in the analysis (Vèrges, 2003Vergès, P. (2003). EVOC - Ensemble de programmes permettant l'analyse des évocations: Manuel Version 15 octobre 2003. Aix-en-Provence, France: Laboratoire Méditerranéen de Sociologie (LAMES).).

Finally, the central evokes value of the 15 words that comprise the social representation of Cloud Computing was found to be 35.2 (mean) or 26 (median). The median (third variable) was used as it is the best measure of the mean number of evokes, considering that the evokes frequency is not evenly distributed (Sarubbi, Reis, Bertolino & Rolim, 2013Sarubbi, V. J., Reis, A. O. A., Bertolino, M. M., Neto, & Rolim, M. L., Neto. (2013). Tecnologias computacionais para o auxílio em pesquisa qualitativa: Software EVOC. São Paulo, SP: Schoba.). Thus, the third and last parameter was obtained, generating the Vergès' framework of four quadrants presented in Exhibit 3.

Exhibit 3
Distribution of words according to the framework of four houses of Vergès

Implication analysis

To understand how the association occurs among the words that are part of the social representation of Cloud Computing, an implicative analysis was performed (Gras & Almouloud, 2002Gras, R., & Almouloud, S. A. (2002). A implicação estatística usada como ferramenta em um exemplo de análise de dados multidimensionais. Recuperado de http://math.unipa.it/~grim/asi/asi_03_saddo_gras.pdf
http://math.unipa.it/~grim/asi/asi_03_sa...
; Pereira, 1997Pereira, C. (1997). A análise de dados nas representações sociais. Análise Psicológica, 1(15), 49-62.).

According to Pereira (1997)Pereira, C. (1997). A análise de dados nas representações sociais. Análise Psicológica, 1(15), 49-62., through the implicative analysis, the possible weaknesses of the investigative technique used in this study are eliminated, since, in the evocation of words, it is often not clear what distinguishes representation from what is exclusive to language. Thus, by analyzing the association between the words that make up the social representation of Cloud Computing, we sought to strengthen the investigative method used by associating the words unconsciously evoked by respondents. This enabled the construction of implication graphs that can be analyzed and compared with the elements of the social representation generated by the EVOC software. The relational analysis of the words may even suggest changes in the core identified by the EVOC software. Thus, by using the CHIC software version 4.1, we constructed the implication graph presented in Figure 2.

Thus, two large associations were identified - circulated in Figure 4 - and named associations A and B for having words with the highest confidence indexes individually. Association A is formed by a core group comprising the words scalability => cost => availability => safety <= mobility. The core group categories are surrounded by the words flexibility and ease. Association B is formed by a core group comprising the words data => storage => cloud <= network. The core group is surrounded by the words security, internet, virtualization, sharing, and accessibility.

Figure 4
Implication graph

It is observed that association A is related to the characteristics of Cloud Computing, that is, those that mainly express the features considered important as well as the aspects related to the economic benefits provided by this type of system. Conversely, association B mainly expresses aspects related to the application and use of Cloud Computing, including those related to connectivity between user and system, as well as the conceptual aspects of the computational paradigm under study.

From the analysis of the associations, it can be observed that the word security, from a relational point of view, is fundamental for the social representation of Cloud Computing, since, once deleted, it completely disarticulates this representation. Thus, the word "security" is the common link between the two associations, that is, it is the link between various elements that comprise the core of the social representation of Cloud Computing. Thus, based on this analysis, it is concluded that the word "security," although not included before, should be included in the core of the social representation of Cloud Computing.

Lexical and content analysis

The lexical and content analysis techniques are used in a sequential, recurrent, and complementary manner for categorizing research data (Freitas & Janissek, 2000Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos. Porto Alegre, RS: Sphinx-Sagra (Distrib.).). According to Freitas and Janissek (2000)Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos. Porto Alegre, RS: Sphinx-Sagra (Distrib.)., lexical analysis "consists of moving from text analysis to lexical analysis (the set of all the words found in the statements or answers)" (p. 29). Conversely, according to these authors, content analysis "consists of an in-depth reading of each of the answers, and by codifying each one, one gets an idea about the whole" (Freitas & Janissek, 2000Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos. Porto Alegre, RS: Sphinx-Sagra (Distrib.)., p. 29).

Thus, the elements of the Vergès quadrant, obtained using lexical analysis, were used as the basis for categorizing open questions contents, generating a list of categories. This categorization identifies the dimensions to be tested, in this case, the core of the social representation of Cloud Computing.

One hundred eight-nine complementary questionnaires (85.5%) were considered in all from 221 respondents who answered two questions that sought to identify the definition and characteristics of Cloud Computing. Exhibit 4 summarizes the categories associated with the elements that comprise the social representation associated with Cloud Computing.

Exhibit 4
Inferred categories - central nucleus

DISCUSSION

By using the four quadrants technique of Vergès (Exhibit 3), it is observed that the social representation of Cloud Computing from the perspective of Brazilian IT professionals comprises the following elements at its core: cloud, storage, availability, internet, and virtualization.

Exhibit 5
Final Social Representation of Cloud Computing

However, according to Figure 2 and by using implication analysis, other words in addition to those identified in the core were considered relevant from a relational point of view: scalability, cost, mobility, network, and security. The word "security" was fundamental for the stability of the social representation of Cloud Computing, with characteristics that suggest its positioning as part of the core, because its removal would disrupt the social representation identified. Its inclusion in the core could, therefore, be explained not from the perspective of the evokes order, but from the perspective of relationality and frequency.

Ryan (2013)Ryan, M. D. (2013). Cloud Computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268. doi:10.1016/j.jss.2012.12.025
https://doi.org/10.1016/j.jss.2012.12.02...
and Younis and Kifayat (2013)Younis, Y. A., & Kifayat, K. (2013). Secure Cloud Computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610. state that security is, today, the dimension that most applies to the concept of Cloud Computing, since, if not achieved, it impairs its full use, even considering the various benefits that this computational paradigm brings to the user and the organization. In line with this, we observed how respondents' placed importance on this dimension, through the content analysis performed.

Some considerations can be made regarding the words included in the core. The word "cloud" was the most evoked, totaling almost a third of the evoked words considering the elements of the core. However, it is only a translation of the word "cloud." According to Correia and Joia (2014)Correia, J. C. P., & Joia, L. A. (2014). CIO competencies: A social representation analysis. Proceeedings of the Twentieth Americas Conference on Information Systems. Savannah, USA., it is common for respondents to evokes the inductive word itself or similar expressions when using the word association technique. It is worth mentioning that, in the implication analysis, the term "cloud" was also indicated as part of the core, from a relational point of view.

Two other words, "availability" and "storage," also stand out for their large number of evokes, totaling together more than a third of all the evoked words, considering the elements of the core. Thus, IT professionals understand Cloud Computing as a large storage center for data, programs, solutions, systems, or applications that have high availability, that is, they cannot fail. The implication analysis, despite placing these words in distinct association groups A and B, also suggests that both words are part of the core because they are strongly implicated with other words comprising social representation, with a value above 85.

The interpretation of the word "storage" follows from Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50. and Marston et al. (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
, who consider information a commodity with remote storage within a shared structure of computational resources. Similarly, Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50. and Ryan (2013)Ryan, M. D. (2013). Cloud Computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268. doi:10.1016/j.jss.2012.12.025
https://doi.org/10.1016/j.jss.2012.12.02...
state that Cloud Computing is based on the idea of storing data and programs remotely within a central shared structure of computing resources accessed from anywhere and from any device.

Although the word "data" does not appear as an element of the core, its presence, both in the implicit and in the content analysis, indicates its function within the social representation. After content analysis, we understand that the word "data" is more frequently associated with the word "storage" and then, in a lesser frequency, with the word "processing." Thus, Cloud Computing continues to be recognized by IT professionals as just a data storage system or a data repository, dating back to an early stage of its use.

The word "availability" refers to service availability, uninterrupted, online, 24 hours a day, and 7 days a week. According to the content analysis, this expression includes not only system availability and remote computing resources per se, but also data network (Internet) availability, which links the user and the elements of Cloud Computing (servers, storages). Thus, it is similar to what was presented as one of the main features of Cloud Computing according to Younis and Kifayat (2013)Younis, Y. A., & Kifayat, K. (2013). Secure Cloud Computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610., Brian et al. (2012)Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing. SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
http://www.satw.ch/organisation/organe/t...
, and Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50.: service provision through a high-performance connection, always available.

The presence of the words "internet" and "virtualization" reveals that the understanding of IT users is that Cloud Computing is a service available remotely through the internet, using virtualization as a tool for emulation of these services, without the need for proprietary infrastructure. Through content analysis, we observed that the word "Internet" is always mentioned as the means by which the user connects remotely to the cloud computing resources. Therefore, the Internet is seen as the enabler of connectivity between the user and the Cloud Computing resources. It is even possible to combine the word Internet with the word "network," which appears as an element of the peripheral systems. Marston et al. (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
had already stated that virtualization is the key technological aspect that enables the full use of Cloud Computing, because it enables the use of computing resources by individual or multiple consumers, which simulates infinite and automatic provisioning of computing capacity on demand (Armbrust et al., 2010Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. ... Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM, 53(4), 50-58. doi:10.1145/1721654.1721672
https://doi.org/10.1145/1721654.1721672...
; Brian et al., 2012Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing. SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
http://www.satw.ch/organisation/organe/t...
; Mell & Grance, 2011Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50.).

The peripheral system of the social representation of Cloud Computing, from the analysis of Exhibit 3, consists of the following words: sharing, scalability, ease of use, and network. The presence of the word "sharing", as an element of the core, has two interpretations derived from the content analysis. The first, more evident, refers to the ability to share configurable computational resources through modern cloud computing platforms (Marston et al., 2011Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
; Mell & Grance, 2011Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50.). The second refers to the perception that Cloud Computing is not only a remote, Internet-accessible, and individual-use data storage service, but also a means of promoting data and information sharing among individuals.

The word "scalability," in turn, refers to the ability of Cloud Computing to resize virtualized computing resources on demand, increasing the number of processing nodes (Verdi et al., 2010Verdi, F. L., Rothenberg, C. E., Pasquini, R., & Magalhães, M. (2010). Novas arquiteturas de data center para Cloud Computing. XXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Gramado, RS.). Scalability should be transparent to the user, without the need to know data location and how data can be accessed, ensuring the level of service quality contracted by the user (Marston et al., 2011Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
).

Finally, the word "ease of use", according to the content analysis, represents the ability of Cloud Computing users to use, implement, hire, or manage remote computing resources simply and practically and with minimal effort. Mell and Grance (2011)Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing. National Institute of Standards and Technology, 53(6), 50. state that Cloud Computing is a model in which computing resources can be quickly provisioned and released, with minimal management effort or interaction with the service provider.

Thus, after using the word association technique, implication analysis, and content analysis, we suggest a reorganization of the core and the peripheral system of the social representation of Cloud Computing as shown in Exhibit 5.

CONCLUSIONS

Based on the results obtained, especially considering the central nucleus, it may be concluded that the perception of Brazilian IT professionals toward Cloud Computing - in agreement with a part of the scientific literature on this concept - is focused on its operational and functional aspects, especially on the availability, storage, and security dimensions. Thus, Brazilian IT professionals lack understanding about the strategic value of Cloud Computing, as proposed by Wirtz et al. (2014)Wirtz, B. W., Mory, L., & Piehler, R. (2014). Web 2.0 and digital business models. In Handbook of strategic e-business management (pp. 751-766). Springer Berlin Heidelberg., and of the new business models provided by this new paradigm, as suggested by Marston et al. (2011)Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
https://doi.org/10.1016/j.dss.2010.12.00...
.

Thus, from the elements of the core of the social representation of Cloud Computing, it was possible to generate a new definition of this computational paradigm. Thus, Cloud Computing is a business model based on its consideration in IT as a data storage service, comprising a pool of remote computing resources, which are accessible to users via the Internet and which use virtualization. Computational resources need to be fully available, that is, uninterrupted, secure, and risk-free regarding user data.

Management contributions

The first management contribution of this study - from the identification of the social representation of Cloud Computing according to IT professionals - is that it allows IT executives to share the best practices to be adopted for the correct use of this computational paradigm, with their internal and external customers, besides allowing them realize the stage in which their organization is situated in relation to this paradigm.

The second contribution of this study is that it reinforces the need for executives to focus on the development of Cloud Computing solutions based on security, availability, and storage. Since this study shows that the social representation of cloud computing by the respondents is highly focused on the risks associated with data security, as well as on data storage and availability, there is a need to invest hugely in effective and secure solutions with high availability.

The last contribution of this study is that it suggests how future Brazilian IT executives will have to align Cloud Computing to new business models and business strategies.

Academic contributions

This study opens room for an academic discussion on the use of implication analysis to confirm the core of social representation. We believe that this study makes an important methodological contribution since it uses implication analysis to show how the words that are part of the central and peripheral system are in dialogue with each other, strengthening social representation. Using implication analysis, this study attempts to change the position of one element - security - from the peripheral system to the core.

Furthermore, this study explains how the core and the peripheral system of a social representation can be identified using the EVOC and CHIC software.

Finally, the concomitant use of the four quadrants technique of Vergès, implication analysis, and content/lexical analysis leads to greater consistency in the results obtained, which is a methodological contribution of this study.

STUDY LIMITATIONS

An important limitation of this study refers to the organization of words - one of the steps used by the EVOC software to build the framework of four quadrants technique. No matter how many rules have been previously established by the referenced studies, mistakes can occur. Likewise, inference errors may have occurred when categorizing words, which was mitigated by including implication, content, and lexical analysis. A second limitation refers to the non-probability sample, which makes the conclusion of the study statistically less generalizable for Brazil. Despite these limitations, we hope to have contributed to a better conceptual definition of the Cloud Computing paradigm with this study.

  • Translated version

REFERÊNCIAS

  • Abric, J. C. (1998). A abordagem estrutural das representações sociais. In O. D. Moreira (Org.), Estudos interdisciplinares de representação social (pp. 27-38). Goiânia, GO: AB.
  • Abric, J. C. (2003). La recherche du noyau central et de la zone muette des représentations sociales. In J. C. Abric (Org.), Méthodes d'étude des représentations sociales (pp. 60-80). Erès.
  • Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. ... Zaharia, M. (2010). A view of Cloud Computing. Communications of the ACM, 53(4), 50-58. doi:10.1145/1721654.1721672
    » https://doi.org/10.1145/1721654.1721672
  • Bayramusta, M., & Nasir, V. A. (2016). A fad or future of IT?: A comprehensive literature review on the Cloud Computing research. International Journal of Information Management, 36(4), 635-644. doi:10.1016/j.ijinfomgt.2016.04.006
    » https://doi.org/10.1016/j.ijinfomgt.2016.04.006
  • Brian, O., Brunschwiler, T., Christ, H., Dill, H., Falsafi, B., Fischer, M.,Zollinger, M. (2012). White Paper Cloud Computing SATW, Swiss Academy of Engineering Sciences. Recuperado de http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
    » http://www.satw.ch/organisation/organe/tpf/tpf_ict/box_feeder/2013-02-06_SATW_White_Paper_Cloud_Computing_EN.pdf
  • Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616. doi:10.1016/j.future.2008.12.001
    » https://doi.org/10.1016/j.future.2008.12.001
  • Correia, J. C. P., & Joia, L. A. (2014). CIO competencies: A social representation analysis. Proceeedings of the Twentieth Americas Conference on Information Systems Savannah, USA.
  • Cunha, M. A. V. C., Coelho, T. R., & Pozzebon, M. (2014). Internet e participação: O caso do orçamento participativo digital de Belo Horizonte. RAE-Revista de Administração de Empresas, 54(3), 296-308. doi:10.1590/S0034-759020140305
    » https://doi.org/10.1590/S0034-759020140305
  • Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud Computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5).
  • Freitas, H., & Janissek, R. (2000). Análise léxica e análise de conteúdo: Técnicas complementares, sequências e recorrentes para análise de dados qualitativos Porto Alegre, RS: Sphinx-Sagra (Distrib.).
  • Gal, U., & Berente, N. (2008). A social representations perspective on information systems implementation: Rethinking the concept of "frames". Information Technology & People, 21(2), 133-154. doi:10.1108/09593840810881051
    » https://doi.org/10.1108/09593840810881051
  • Gras, R., & Almouloud, S. A. (2002). A implicação estatística usada como ferramenta em um exemplo de análise de dados multidimensionais. Recuperado de http://math.unipa.it/~grim/asi/asi_03_saddo_gras.pdf
    » http://math.unipa.it/~grim/asi/asi_03_saddo_gras.pdf
  • International Data Corporation. (2016). Cloud's impact is far reaching. Recuperado de http://www.idc.com/promo/thirdplatform/fourpillars/cloud
    » http://www.idc.com/promo/thirdplatform/fourpillars/cloud
  • Jodelet, D. (1993). Representações sociais: Um domínio em expansão. Recuperado de http://portaladm.estacio.br/media/3432753/jodelet-drs-um-dominio-em-expansao.pdf
    » http://portaladm.estacio.br/media/3432753/jodelet-drs-um-dominio-em-expansao.pdf
  • Jodelet, D. (2001). Representações sociais: Um domínio em expansão. In D. Jodelet (Org.), As representações sociais (pp. 17-44). Rio de Janeiro, RJ: EdUERJ.
  • Joia, L. A. (2017). A teoria da representação social e a definição de constructos na área de administração da informação. VI EnADI Curitiba, PR.
  • Jung, Y., Pawlowski, S. D., & Wiley-Patton, S. (2009). Conducting social cognition research in IS: A methodology for eliciting and analyzing social representations. Communications of the Association for Information Systems, 24, 598-614. doi:10.17705/1cais.02435
    » https://doi.org/10.17705/1cais.02435
  • Kaganer, E. A., & Vaast, E. (2010, September). Responding to the (almost) unknown: Social representations and corporate policies of social media. 31st ICIS Saint Louis, USA.
  • Madhavaiah, C., & Bashir, I. (2012). Defining Cloud Computing in business perspective: a review of research. Metamorphosis, 11(2), 50-65.
  • Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing: The business perspective. Decision Support Systems, 51(1), 176-189. doi:10.1016/j.dss.2010.12.006
    » https://doi.org/10.1016/j.dss.2010.12.006
  • Mazzotti, T. B. (2001). Representações sociais de problemas ambientais: Uma contribuição à educação brasileira. In A. P. Moreira (Org.), Representações sociais: Teoria e prática (pp. 86-123). João Pessoa, PB: UFPB.
  • Mell, P., & Grance, T. (2011). The NIST definition of Cloud Computing National Institute of Standards and Technology, 53(6), 50.
  • Menin, M. D. S. (2007). O aspecto normativo das representações sociais: Comparando concepções. Revista de Educação Pública, 16(30), 121-135.
  • Moscarola, J. (1990). Enquêtes et analyse de données avec le sphinx. Vuibert.
  • Moscovici, S. (1979). Psychologie des minorités actives, Paris, Presses Universitaires de France. Version espaflola (1981): Psicología de las misnorias activas. Ediciones Morata. Google Scholar.
  • Moscovici, S. (1988). Notes towards a description of social representations. European Journal of Social Psychology, 18(3), 211- 250. doi:10.1002/ejsp.2420180303
    » https://doi.org/10.1002/ejsp.2420180303
  • Pereira, C. (1997). A análise de dados nas representações sociais. Análise Psicológica, 1(15), 49-62.
  • Pereira, M. A. (2006). O medo no contexto organizacional (Dissertação de mestrado, Fundação Getulio Vargas, Rio de Janeiro, RJ).
  • Ryan, M. D. (2013). Cloud Computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268. doi:10.1016/j.jss.2012.12.025
    » https://doi.org/10.1016/j.jss.2012.12.025
  • Sarubbi, V. J., Reis, A. O. A., Bertolino, M. M., Neto, & Rolim, M. L., Neto. (2013). Tecnologias computacionais para o auxílio em pesquisa qualitativa: Software EVOC São Paulo, SP: Schoba.
  • Teodoro, A. N., Przeybilovicz, É., & Cunha, M. A. (2014). Governança de tecnologia da informação: Uma investigação sobre a representação do conceito. Revista de Administração, 49(2), 237-321. doi:10.5700/rausp1148
    » https://doi.org/10.5700/rausp1148
  • Tura, L. F. R. (1997). Os jovens e a prevenção da AIDS no Rio de Janeiro Rio de Janeiro, RJ: Universidade Federal do Rio de Janeiro.
  • Vaast, E. (2007). Danger is in the eye of the beholders: Social representations of information systems security in healthcare. The Journal of Strategic Information Systems, 16(2), 130-152. doi:10.1016/j.jsis.2007.05.003
    » https://doi.org/10.1016/j.jsis.2007.05.003
  • Vaast, E., & Walsham, G. (2005). Representations and actions: The transformation of work practices with IT use. Information and Organization, 15(1), 65-89. doi:10.1016/j.infoandorg.2004.10.001
    » https://doi.org/10.1016/j.infoandorg.2004.10.001
  • Verdi, F. L., Rothenberg, C. E., Pasquini, R., & Magalhães, M. (2010). Novas arquiteturas de data center para Cloud Computing. XXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos Gramado, RS.
  • Vergara, S. C. (2005). Métodos de pesquisa em administração São Paulo, SP: Atlas.
  • Vergara, S. C., & Ferreira, V. C. P. (2005). A representação social de ONGs segundo formadores de opinião do município do Rio de Janeiro. Revista de Administração Pública, 39(5), 1137-1159.
  • Vergès, P. (2003). EVOC - Ensemble de programmes permettant l'analyse des évocations: Manuel Version 15 octobre 2003 Aix-en-Provence, France: Laboratoire Méditerranéen de Sociologie (LAMES).
  • Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., & Wang, Z. (2016). Cloud Computing research in the IS discipline: A citation/co-citation analysis. Decision Support Systems, 86, 35-47. doi:10.1016/j.dss.2016.03.006
    » https://doi.org/10.1016/j.dss.2016.03.006
  • Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in Cloud Computing. Information Sciences, 258, 371-386. doi:10.1016/j.ins.2013.04.028
    » https://doi.org/10.1016/j.ins.2013.04.028
  • Wirtz, B. W., Mory, L., & Piehler, R. (2014). Web 2.0 and digital business models. In Handbook of strategic e-business management (pp. 751-766). Springer Berlin Heidelberg.
  • Younis, Y. A., & Kifayat, K. (2013). Secure Cloud Computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610.

Edited by

Evaluated by the double-blind review system. Scientific Editor: Maria Alexandra Cunha

Publication Dates

  • Publication in this collection
    Jan-Feb 2019

History

  • Received
    27 Oct 2016
  • Accepted
    26 Oct 2017
Fundação Getulio Vargas, Escola de Administração de Empresas de S.Paulo Av 9 de Julho, 2029, 01313-902 S. Paulo - SP Brasil, Tel.: (55 11) 3799-7999, Fax: (55 11) 3799-7871 - São Paulo - SP - Brazil
E-mail: rae@fgv.br