Cloud Computing Systems in Information Society - The European Enterprises towards Technological Advancement - Comparative Rough Set Analysis

2015 ◽  
Vol 795 ◽  
pp. 171-178
Author(s):  
Aleksandra Ptak

Cloud computing systems usage in enterprises has become very popular in recent years. On the world market there is an increasing number of cloud computing services providers with more or less complex solutions in their offer. Thanks to cloud computing services SMEs have the chance to compete with big corporations. The article presents the usage of cloud computing in the European enterprises in comparison with enterprises from the United States, the use of cloud computing solutions in enterprises of the EU countries in 2014 and prognosis on the use of cloud technologies in Eastern European countries between 2014 and 2017. The aim of the article is to present the current state of cloud systems adoption in European enterprises and to conduct the comparative analysis of the data structure based on the rough sets theory.

2021 ◽  
Author(s):  
Stefan Milosevic

The National Security Agency (NSA) revelations leaked by Edward Snowden on June 6, 2013 regarding the digital surveillance tactics of the United States government were a series of profoundly disruptive discursive events that signaled an uncomfortably cozy relationship between US technology companies and the US government for the maintenance of US national security. Leaked internal NSA slides revealed a host of domestic and foreign clandestine spying programs, including PRISM and MUSCULAR, which suggested the unscrupulous collection of data from US technology giant Google’s cloud servers and private networks, among other technology companies. Google’s cloud computing services particularly became implicated in a crisis of global proportions, as the technology giant and US technology industry writ large faced a global loss of confidence and future revenue from cloud computing customers unhappy with the implications the NSA revelations had for the security of their personal and corporate data. This paper conducts a multi-layer critical discourse analysis about the effect the NSA revelations had on US cloud computing with a specific focus on Google’s cloud computing services. By focusing on the sociopolitical and economic functions of surveillance as established within surveillance literature, this project examines how the crisis was discursively constructed in order to paint a larger picture about how popular press coverage framed the NSA revelations and the relationship of this rhetoric to the technology companies it implicates.


Author(s):  
Pedro Ramos Brandao

The challenges on traditional Computer Forensic mythology in facing with the growing adoption of Cloud Computing services and models by corporations and organizations. We analyse the results of recent research in analysis of computers’ physical memory, new methodologies and tools, and how these technologies can be applied to computer forensics in this specific context.


Author(s):  
Lavoris Martin

As technology continues to change, the landscape of the work of librarians and libraries continue to adapt and adopt innovations that support their services. Technology also continues to be an essential tool for dissemination, retrieving, storing, and accessing the resources and information. Cloud computing is an essential component employed to carry out these tasks. The concept of cloud computing has long been a tool utilized in libraries. Many libraries use OCLC to catalog and manage resources and share resources, WorldCat, and other library applications that are cloud-based services. Cloud computing services are used in the library automation process. Using cloud-based services can streamline library services, minimize cost, and the need to have designated space for servers, software, or other hardware to perform library operations. Cloud computing systems with the library consolidate, unify, and optimize library operations such as acquisitions, cataloging, circulation, discovery, and retrieval of information.


Author(s):  
Lavoris Martin

As technology continues to change, the landscape of the work of librarians and libraries continue to adapt and adopt innovations that support their services. Technology also continues to be an essential tool for dissemination, retrieving, storing, and accessing the resources and information. Cloud computing is an essential component employed to carry out these tasks. The concept of cloud computing has long been a tool utilized in libraries. Many libraries use OCLC to catalog and manage resources and share resources, WorldCat, and other library applications that are cloud-based services. Cloud computing services are used in the library automation process. Using cloud-based services can streamline library services, minimize cost, and the need to have designated space for servers, software, or other hardware to perform library operations. Cloud computing systems with the library consolidate, unify, and optimize library operations such as acquisitions, cataloging, circulation, discovery, and retrieval of information.


2018 ◽  
Vol 10 (8) ◽  
pp. 72
Author(s):  
Ludger Goeke ◽  
Nazila Gol Mohammadi ◽  
Maritta Heisel

Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration and data exchange over the Internet. Hence, users have become more concerned about security and privacy aspects. For secure provisioning of a cloud computing service, security and privacy issues must be addressed by using a risk assessment method. To perform a risk assessment, it is necessary to obtain all relevant information about the context of the considered cloud computing service. The context analysis of a cloud computing service and its underlying system is a difficult task because of the variety of different types of information that have to be considered. This context information includes (i) legal, regulatory and/or contractual requirements that are relevant for a cloud computing service (indirect stakeholders); (ii) relations to other involved cloud computing services; (iii) high-level cloud system components that support the involved cloud computing services; (iv) data that is processed by the cloud computing services; and (v) stakeholders that interact directly with the cloud computing services and/or the underlying cloud system components. We present a pattern for the contextual analysis of cloud computing services and demonstrate the instantiation of our proposed pattern with real-life application examples. Our pattern contains elements that represent the above-mentioned types of contextual information. The elements of our pattern conform to the General Data Protection Regulation. Besides the context analysis, our pattern supports the identification of high-level assets. Additionally, our proposed pattern supports the documentation of the scope and boundaries of a cloud computing service conforming to the requirements of the ISO 27005 standard (information security risk management). The results of our context analysis contribute to the transparency of the achieved security and privacy level of a cloud computing service. This transparency can increase the trust of users in a cloud computing service. We present results of the RestAssured project related to the context analysis regarding cloud computing services and their underlying cloud computing systems. The context analysis is the prerequisite to threat and control identification that are performed later in the risk management process. The focus of this paper is the use of a pattern at the time of design systematic context analysis and scope definition for risk management methods.


2015 ◽  
Vol 10 (1) ◽  
pp. 80-97 ◽  
Author(s):  
Vanessa Ratten

Purpose – The purpose of this paper is to examine the different factors affecting purchase intention of cloud computing services in Turkey and the USA. Design/methodology/approach – A research framework is developed based on social cognitive theory and the technology acceptance model. A survey questionnaire is used based on student responses in Turkey and the USA to see if there are any differences toward purchase intentions. Findings – A majority of the research hypotheses are supported in both the Turkish and USA sample indicating that there are similarities in perceived ease of use, perceived usefulness, consumer innovation and performance expectancy toward cloud computing. Research limitations/implications – The findings of this research have implications for technology companies and marketers operating in North America, Europe and Asia. Practical implications – As few studies exist on the differences between purchase intention of technological innovations in the USA and Turkey, this paper contributes to a better understanding of whether cultural differences or consumer attitudes effect adoption of emerging technologies including cloud computing services. Originality/value – This paper focusses on the emerging technological innovation of cloud computing services by examining antecedent environmental factors influencing purchase intention. In total, two different country samples are utilized to gain a better international perspective of the reasons why consumers purchase technological innovations.


2021 ◽  
Author(s):  
Stefan Milosevic

The National Security Agency (NSA) revelations leaked by Edward Snowden on June 6, 2013 regarding the digital surveillance tactics of the United States government were a series of profoundly disruptive discursive events that signaled an uncomfortably cozy relationship between US technology companies and the US government for the maintenance of US national security. Leaked internal NSA slides revealed a host of domestic and foreign clandestine spying programs, including PRISM and MUSCULAR, which suggested the unscrupulous collection of data from US technology giant Google’s cloud servers and private networks, among other technology companies. Google’s cloud computing services particularly became implicated in a crisis of global proportions, as the technology giant and US technology industry writ large faced a global loss of confidence and future revenue from cloud computing customers unhappy with the implications the NSA revelations had for the security of their personal and corporate data. This paper conducts a multi-layer critical discourse analysis about the effect the NSA revelations had on US cloud computing with a specific focus on Google’s cloud computing services. By focusing on the sociopolitical and economic functions of surveillance as established within surveillance literature, this project examines how the crisis was discursively constructed in order to paint a larger picture about how popular press coverage framed the NSA revelations and the relationship of this rhetoric to the technology companies it implicates.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document