C&C 52, 1-2 (2019)

voorkant CC51 3 4

Bekijk in de Digitale Bibliotheek

Inschrijven

INHOUD

ECONOMIC CONSIDERATONS IN THE USE OF CLOUD COMPUTING IN THE TECHNICALWHOLESALE
A. Pescholl.
3
SERVICE-ORIENTED ARCHITECTURE AND PROCESS MODELING
M. Mohammadi, M. Mukhtar
21
DYNAMIC GRID SYSTEM FOR RESPONSIVE WEB DESIGN
E. Parvanova.
37
EXAMINATION OF THE CYBER THREATS FOCUSED ON CHOISE OF ADEQUATE CYBER INTELLIGENCE METHODS
R. Trifonov, S. Manolov, G. Tsochev, G. Pavlova
45 
IMPLEMENTATION OF THE GENERAL DATA PROTECTION REGULATION IN ORGANIZATIONS BASED ON ISO STANDARDS
T. Tzolov.
 59

 

 

Je kan ook bestellen door het versturen van een e-mail naar Dit e-mailadres wordt beveiligd tegen spambots. JavaScript dient ingeschakeld te zijn om het te bekijken.   

  

C&C 52, 1-2 (2019)

voorkant CC51 3 4

Bekijk in de Digitale Bibliotheek

Inschrijven

INHOUD

ECONOMIC CONSIDERATONS IN THE USE OF CLOUD COMPUTING IN THE TECHNICALWHOLESALE
A. Pescholl.
3
SERVICE-ORIENTED ARCHITECTURE AND PROCESS MODELING
M. Mohammadi, M. Mukhtar
21
DYNAMIC GRID SYSTEM FOR RESPONSIVE WEB DESIGN
E. Parvanova.
37
EXAMINATION OF THE CYBER THREATS FOCUSED ON CHOISE OF ADEQUATE CYBER INTELLIGENCE METHODS
R. Trifonov, S. Manolov, G. Tsochev, G. Pavlova
45 
IMPLEMENTATION OF THE GENERAL DATA PROTECTION REGULATION IN ORGANIZATIONS BASED ON ISO STANDARDS
T. Tzolov.
 59

 

 

Je kan ook bestellen door het versturen van een e-mail naar Dit e-mailadres wordt beveiligd tegen spambots. JavaScript dient ingeschakeld te zijn om het te bekijken.   

 ECONOMIC CONSIDERATIONS IN THE USE OF CLOUD COMPUTING IN THE TECHNICAL WHOLESALE

Andreas Pescholl

Abstract

Cloud computing is becoming increasingly important as it is recognizable in the growing market of services in the IT infrastructure, development platforms and software sectors. For companies in the technical wholesale sector, this results in new opportunities to reorient their IT needs. The central assessment criterion here is the economic benefits that arise from the use of cloud offerings in comparison to the acquisition and operation of company-owned it.
A comprehensive assessment by the company includes both quantitative and qualitative factors, which suggests an enhanced cost-benefit analysis for cloud computing. For this reason, these contributions formulate approaches that enable a cost-effectiveness view of cloud computing in enterprise use and support the comparison to the acquisition and operation of company-owned systems. 

 

 SERVICE-ORIENTED ARCHITECTURE AND PROCESS MODELING 

Mohsen Mohammadi, Muriati Mukhtar

Abstract
Nowadays, uncertainties in business environment enforced enterprises to utilize innovative patterns for the interpretability and integration of the processes and services. Therefore, enterprises have, throughout time, shifted to IT-based business processes based on Service-oriented Architecture (SOA) to augment the agility, integration, and flexibility of IT-based applications in enterprise networks. Thus enterprises have embarked on the implementation of integrated information systems to support their business processes. To this effect, SOA, as a highly capable paradigm in IT, has been increasingly used in Business Process Management (BPM) and enterprise information systems using the Web service technologies. This has helped the attainment of required agility and flexibility for inter-organizational networks. The aim of this paper is to review the underlying concepts of SOA and to identify how SOA business process. 

 

DYNAMIC GRID SYSTEM FOR RESPONSIVE WEB DESIGN
Elena Parvanova

Abstract
Nowadays, there is a growing use of mobile access to the web. Web sites should be visible on different devices. Modern web sites use Responsive web design with various grid systems. The paper presents fluid D-grid system. It is a twelve column system based on the rule of the thirds. Column and gutter widths are set in percentages. 

 

EXAMINATION OF THE CYBER THREATS FOCUSED ON CHOISE OF ADEQUATE

CYBER INTELLIGENCE METHODS
Roumen Trifonov, Slavcho Manolov,
Georgi Tsochev, Galya Pavlova

Abstract
In order to respond adequately to the new challenges of the Cyber Threats, the expert community advice to use Artificial Intelligence methods for counteraction of Cyber Attacks. The choice of Artificial Intelligence methods best suited to counteract certain classes of threats depend on the systematization, unification and classification of the cyber-security threats and the sources of these threats. The motivation of the research is based on the belief that the new approaches to identification and analysis of the threats will be useful in choosing the appropriate application method for counteraction. The research at this stage has been completed and their outcome has served as a basis for selecting Artificial Intelligence methods for various cyber protection cases.

 

IMPLEMENTATION OF THE GENERAL DATA
PROTECTION REGULATION IN ORGANIZATIONS
BASED ON ISO STANDARDS
Tzanko Tzolov

Abstract
The implementation of GDPR within organizations should be considered in the context of achieving their business objectives. The emphasis should be on the benefits of its application and the added value to the business itself. The implementation models focus on risk-based thinking taking into account technological innovations, environmental factors, information management, supply chain management and globalization. In this article the author proposes the use of the ISO 9001:2015 standard, putting forward another idea of obtaining a methodology for GDPR implementation.