Search results

1 – 9 of 9
Content available

Abstract

Details

Kybernetes, vol. 40 no. 5/6
Type: Research Article
ISSN: 0368-492X

Content available
Article
Publication date: 8 June 2012

Y.R. Storch Rudall

670

Abstract

Details

Kybernetes, vol. 41 no. 5/6
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
905

Abstract

Details

Kybernetes, vol. 41 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
Article
Publication date: 18 October 2011

Y.R. Storch Rudall

10

Abstract

Details

Kybernetes, vol. 40 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
Article
Publication date: 3 May 2011

Y.R. Storch‐Rudall

13

Abstract

Details

Kybernetes, vol. 40 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
88

Abstract

Details

Kybernetes, vol. 40 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
Article
Publication date: 3 August 2012

Y.R. Storch Rudall

1492

Abstract

Details

Kybernetes, vol. 41 no. 7/8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 6 January 2021

Maria-Isabel Sanchez-Segura, German-Lenin Dugarte-Peña, Antonio Amescua-Seco and Fuensanta Medina-Dominguez

Information technology/software (IT/SW) professionals use the business model canvas (BMC) to identify innovative digital solutions that improve their client’s business values…

Abstract

Purpose

Information technology/software (IT/SW) professionals use the business model canvas (BMC) to identify innovative digital solutions that improve their client’s business values. This paper aims to address the issue of considering, for a client company, the status of its intangible assets (IAs) in decision-making on the most innovative digital solution.

Design/methodology/approach

This paper provides a method (BMCIA-method) and a simulation tool (BMCIA-NetSim) to help IT/SW professionals identify and assess an organization’s IAs and their impact on the BMC of digital business.

Findings

IT/SW professionals used this approach, at 14 small and medium-sized enterprises (SMEs), to identify innovative solutions and add digital value to their businesses. They used the BMCIA to provide their clients (SME’s chief executive officer or chief operating officer) with a view of the BMC enhanced with the status of IAs. These expressed interest in the use of the BMCIA and underscore its importance for making better decisions while aligning IT and the business. A survey reveals how well the BMCIA-method performed during its use to discover the best solution to be developed at each SME.

Research limitations/implications

IAs affect the achievement of the business goal targeted using the BMC. If these are not identified, valued and properly aligned with the BMC blocks, critical information is hidden from the eyes of IT/SW professionals and their clients, preventing optimal decision-making on which is the best IT/SW solution to be implemented to add digital value to the client company.

Originality/value

This proposal is unique insofar as it outlines a simulation-based methodological and technical solution using software agents to simulate the impact of the intangible side of an organization on its business model.

Article
Publication date: 7 October 2021

Lantian Li and Bahareh Pahlevanzadeh

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and…

Abstract

Purpose

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.

Design/methodology/approach

Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.

Findings

The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.

Practical implications

The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.

Originality/value

Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.

Details

Kybernetes, vol. 51 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 9 of 9