This article explores the main aspects of the cloud computing paradigm in Ukraine. The authors identify the main problems of the cloud computing market in Ukraine and options for their solutions by implementing an innovative concept of the public cloud platform. The athors of the article have researched the cloud computing market in Ukraine, the role of the state in developing the abovementioned market and building innovative public cloud platform as a centralised data center which will enable the state to provide all public services and innovative services. The main idea of the concept of building an innovation public platform is the creation of a hybrid cloud which will integrate suppliers and consumers of information products and services, investors in the IT sector and mechanisms for sharing and protecting of information. The study shows that the concept of cloud computing is not only technological innovation in IT, but also a way to create new business models, when small manufacturers of IT products, including in the regions, have an opportunity to quickly offer the market their services and realise their business ideas. Public support for cloud computing, along with investments in young companies throughout the country, will quickly create an ecosystem of innovative productions. The implementation of the concept of a state-owned innovative cloud platform is a legitimate step towards the development of the ICT industry and an innovative economy in Ukraine.
The aim of the work is a systematic analysis of logical, structural connections between different threats to sociocybernetic security. We include in the consideration a wide range of different components, different understandings of social security: security of technical systems, security of cyberspace, security of cyber-physical systems and so on. Everything is almost not studied and not studied in general. An important aspect of state capacity is analyzed in the work with the help of the constructed mathematical model: the problem of threats to social security. Depending on the condition (stable or unstable), there is a system that is characterized by a numerical integrated indicator (number of patients, number of those who passed the test, number of occupied beds in the hospital), social security in a broad and narrow sense, can to be considered and considered as being in a state of threat or protected. Hundreds of thousands of different methods and tools have been built over the millennia, but in modern conditions none is ready. Actually, the situation with СOVID-19 showed it. The flexibility of mind and a combination of different methods is the only key to modelling different processes, including security-related processes. In addition, it should be noted that IT tools are not always universal. In modelling these processes, the balance of knowledge in the field of economics, politics, IT, cybersecurity, etc. is important. It is also important to understand that the initial stages of creating algorithms for the protection of the socio-cybernetic system should be considered in the usual senseunderstanding of social security. To do this, it is necessary to establish links between different processes of subsystems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.