Martin Zbořil, Vlasta Svatá
Usage of cloud services instead of traditional on-premise resources is a common approach that organizations widely prefer. The COVID-19 situation, even more, highlighted the importance and advantages of cloud computing. The reason is that ‘home-office’ has become a normal and widely adopted way of working in many worldwide organizations. The homeoffice results in the requirements that the data and resources need to be available everywhere over the internet. The target of this article is to identify how the consumption of cloud services differs in the Czech Republic (referred also as ‘Czechia’), Visegrád Group where the Czech Republic is a member and in the European Union in general.Since the adoption of cloud services has an increasing trend, as was described above, the comparison will indicate whether the consumption of the Czech Republic corresponds to the consumption in the countries from Europe.
Olga Revutska, Klára Antlová
The COVID-19 pandemic has had a profound and immediate impact on humanity and organizations worldwide. Companies were confronted with a challenging business environment and the growing importance of information and communication technologies (ICT). Entities of all sizes have been exposed to the unprecedented virus-driven need to adapt their business models to rapidly changing requirements. It is already evident that the need for speed will not be temporary – digitization, globalization, automation, analytics, and other drivers of change will also accelerate. To recover and thrive in the contemporary volatile and complex world, leaders will have to quickly adapt to the market and socio-psychological alterations. Agile methodology is not a novelty. For decades, the ICT industry has been using it to improve productivity and motivation, enhance product quality, and shorten the time to market.
Marek Zanker, Vladimír Bureš, Anna Cierniak-Emerych, Martin Nehéz
Individuals and corporations alike are aware of the need for data protection. They undergo training and perform exercises where various types data-jeopardizing techniques or cyberattacks are simulated in order to increase the resilience of society and preparedness for crisis situations (National Cyber and Information Security Agency, 2019a). With the help of the General Data Protection Regulation (GDPR), the European Commission (EC) seeks to draw a line between the personal data security and the free and uncontrolled manipulation of personal data (IT Governance Privacy Team, 2020). Since its advent, the GDPR has put burden on the shoulders of various institutions which have been struggling to share data. Not surprisingly, it brought a flareup of frustration (Bovenberg et al., 2020). The intension was good, as the GDPR would ensure and balance the fragile relationship between the data protection and other regulations, such as competition law, consumer protection or intellectual property (De Hert et al., 2018).