ENHANCING THE EFFICIENCY OF BUSINESS PROCESSES THROUGH THE APPLICATION OF CLOUD TECHNOLOGIES: SECURITY ASPECT
Abstract
The purpose of the study is to characterize the security features of enhancing the efficiency of business processes through the application of cloud technologies. It has been proven that the essence of cloud technologies in the improvement of enterprise business processes lies in their ability to provide scalable, flexible, and efficient computing resources over the Internet. It is determined that the global expansion of business requires the presence of a reliable infrastructure capable of supporting operations in various locations and time zones. Cloud technologies facilitate seamless access to data and collaboration between geographically dispersed teams, ensuring that all participants have up-to-date information and tools at their disposal, regardless of their physical location. The main security effect of applying cloud technologies in an enterprise has been identified. Cloud technologies fundamentally change the way companies access and manage IT resources, transitioning from traditional on-premises systems to services hosted on remote servers. This transition offers a multitude of advantages that directly impact the core operations and strategic initiatives of the enterprise, enhancing overall productivity, innovation, and market responsiveness. At the core of cloud technologies is the provision of on-demand access to computing resources such as servers, storage, databases, networking, software, and analytics. This on-demand model allows enterprises to easily scale their IT infrastructure depending on current needs, avoiding the initial costs and complexity of owning and maintaining physical servers and data centers. The security effect provided by cloud technologies is multifaceted and includes advanced defense mechanisms, operational resilience, and compliance with regulatory standards, which collectively contribute to creating a more secure and robust business environment
References
Hassaan, M. (2022). Security issues in cloud computing: A study. Review of Computer Engineering Studies, Vol. 9, No. 4, pp. 145–149. [in English]
Bondarenko, A.F., Zakharkina, L.S., Syhyda, L.O., Saher, L.Y. (2020). The economic and marketing attractiveness of countries: Measurement and positioning in terms of economic security. International Journal of Sustainable Development and Planning, Vol. 15, No. 4, pp. 439–449 [in English]
Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 1: 7–18. [in English]
Bilan, Y., Lyeonov, S., Lyulyov, O., Pimonenko, T. (2019). Brand management and macroeconomic stability of the country. Polish Journal of Management Studies, 19(2): 61–74. [in English]
Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1): 1–11. [in English]
Kolisnychenko, T., Sefikhanova, K., Kapral, O., Karpenko, V., Sylkin, O. (2023). Development of an algorithm for Internet marketing strategy implementation: A case study in the EU hotel and restaurant sector. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, pp. 1549–1556 [in English]
Fátima, F., Gonçalves, A., Sandrina, T. (2021). Information technology adoption on digital marketing: A literature review. Informatics. 8(4): 74. [in English]
Wang, C., Wang, Q., Ren, K., Lou, W.J. (2009). Ensuring Data Storage Security in Cloud Computing. In Proceedings of the 17thInternational Workshop on Quality of Point of view, 1–9. [in English]
Gadde, S., Rao, G.S., Veesam, V.S., Yarlagadda, M., Patibandla, R.S.M.L. (2023). Secure data sharing in cloud computing: A comprehensive survey of two-factor authentication and cryptographic solutions. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, pp. 1467–1477 [in English]
Shanmugam, G., Rajendran, D., Thanarajan, T., Murugaraj, S.S., Rajendran, S. (2023). Artificial intelligence as a catalyst in digital marketing: Enhancing profitability and market potential. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, pp. 1627–1636 [in English]
This work is licensed under a Creative Commons Attribution 4.0 International License.