Issue №
4/2025
Information Technology and Security
1 COMPARATIVE ANALYSIS OF APPROACHES TO BUILDING IOS APPLICATIONS IN B2C AND B2B ENVIRONMENTS: UX, ARCHITECTURE, AND PERFORMANCE METRICS
Nuzhdin D.
Abstract : The article presents a comparative analysis of approaches to designing iOS applications in the B2C and B2B segments. It examines the formation of user experience aspects, application architecture, and performance metrics. The influence of business model differences on the choice of architectural patterns, development tools, and analytical methods is analyzed. It is emphasized that B2C applications are focused on flexibility, visual expressiveness, and update speed, while B2B solutions require deep integration with corporate systems. The article also highlights the role of multi-module architecture and analytical services (Amplitude, DataDog, Firebase) in ensuring scalability and responsiveness. The study concludes that the development of mobile products requires a context-driven selection of technological and organizational solutions.
Keywords: iOS, mobile applications, mobile development, B2C, B2B, user experience, application architecture, performance metrics.
2 ENSURING INFORMATION SECURITY RESILIENCE UNDER DYNAMIC DIGITAL TRANSFORMATION PROCESSES
Ríos S.
Abstract : The article examines approaches to ensuring information security resilience under dynamic digital transformation processes. The study analyzes key technical, organizational, and governance factors influencing the ability of information systems to withstand, adapt to, and recover from security incidents in continuously evolving digital environments. Particular attention is paid to architectural adaptability, adaptive security monitoring, organizational maturity, and resilience-oriented governance mechanisms. The article proposes a maturity-based perspective on information security resilience, demonstrating how security practices evolve from reactive controls toward integrated and adaptive models. It is shown that coordinated application of resilience strategies enables organizations to maintain security effectiveness while supporting continuous digital transformation and innovation.
Keywords: information security resilience, digital transformation, adaptive security, security governance, resilience maturity, cybersecurity, risk management.
3 ENHANCING OCR PERFORMANCE WITH PARALLEL COMPUTING AND GPU ACCELERATION IN JAVA-BASED DOCUMENT PROCESSING
Maksimov V.
Abstract : Optical Character Recognition (OCR) is a critical component of modern document processing systems, particularly in tasks requiring large-scale extraction of structured data from unstructured or semi-structured sources. Despite the high accuracy of cloud-based OCR services, their use is constrained by data privacy concerns, dependency on external providers, and elevated operational costs. This study explores ways to improve the performance of local OCR systems developed in Java through the use of multithreading and GPU acceleration. Parallel data processing is supported by the Java Concurrency API, while offloading to GPUs is supported with JCuda and TornadoVM built in. Experimental evaluation on a typical document collection demonstrated up to a 10.83 × speedup over the single-threaded baseline with recognition quality maintained.
Keywords: Optical Character Recognition (OCR), Java, Parallel Computing, GPU acceleration, document processing, high-performance computing.
4 GOVERNANCE AND COMPLIANCE CHALLENGES IN SECURING MULTI-PLATFORM INFORMATION ENVIRONMENTS
Radu A.
Abstract : The article examines governance and compliance challenges associated with securing multi-platform information environments. The study analyzes structural and organizational factors that complicate security governance in heterogeneous digital ecosystems integrating on-premises systems, cloud platforms, and third-party services. Particular attention is paid to compliance risks arising from regulatory fragmentation, inconsistent access governance, and limited oversight of external platforms. The article explores integrated governance frameworks and coordination mechanisms aimed at aligning security policies, compliance controls, and operational practices across platforms. It is demonstrated that layered governance models and clear prioritization of governance domains enhance regulatory consistency and security resilience. The findings emphasize the importance of centralized policy coordination, continuous compliance monitoring, and adaptive governance mechanisms in ensuring sustainable security management in complex multi-platform information environments.
Keywords: information security governance, regulatory compliance, multi-platform environments, access governance, third-party risk, governance frameworks, cybersecurity.
5 DEVELOPMENT OF INTELLIGENT NO-CODE PLATFORMS FOR BUSINESS PROCESS AUTOMATION
Hrebeniuk O.
Abstract : The article examines the concept of intelligent no-code platforms as a modern tool for business process automation in the context of digital transformation. The main architectural principles of designing such platforms are analyzed, including a microservice model, event-driven integration, the use of containerization, and infrastructure as code. The importance of reproducible CI/CD pipelines and built-in information security mechanisms for ensuring industrial reliability and operational manageability is emphasized. Practical approaches to data management and integration with corporate information systems are considered. Industry-specific examples of implementing intelligent no-code solutions in financial and analytical systems, logistics, and corporate information environments are presented. It is concluded that the use of such platforms is most appropriate for standardized and semi-formalized processes.
Keywords: no-code platforms, business process automation, intelligent systems, digital transformation, microservice architecture, CI/CD, information security.
6 ADAPTIVE CYBERSECURITY ARCHITECTURES FOR HETEROGENEOUS DIGITAL INFRASTRUCTURES
Zharkov P.
Abstract : This article examines adaptive cybersecurity architectures designed for heterogeneous digital infrastructures that combine on-premises systems, cloud platforms, edge environments, legacy solutions, and third-party services. The study analyzes how infrastructure heterogeneity affects security risk distribution, functional balance of cybersecurity mechanisms, and architectural governance models. Particular attention is given to adaptive capability profiles, hierarchical organization of security functions, and the relationship between incident dynamics and architectural maturity. The findings demonstrate that effective cybersecurity in heterogeneous environments depends on balanced and continuously evolving architectures rather than static security controls. Adaptive cybersecurity architectures are shown to enhance resilience, coordination, and response effectiveness under conditions of increasing infrastructural complexity and threat variability.
Keywords: adaptive cybersecurity, heterogeneous infrastructures, cybersecurity architecture, security governance, incident dynamics, digital resilience.
7 RISK-ORIENTED MANAGEMENT OF INFORMATION SECURITY IN DISTRIBUTED INFORMATION SYSTEMS
Levent A.
Abstract : This article analyzes risk-oriented management of information security in distributed information systems characterized by architectural heterogeneity and dynamic threat conditions. The study examines key risk categories, quantitative risk assessment models, dynamic risk re-evaluation mechanisms, and threshold-based response strategies. Particular attention is given to risk prioritization criteria and the allocation of security controls based on assessed risk levels. The findings demonstrate that risk-oriented management enhances decision-making consistency, improves resource allocation efficiency, and strengthens the resilience of distributed information systems under conditions of increasing complexity and uncertainty.
Keywords: information security management, risk-oriented approach, distributed information systems, risk assessment, dynamic risk management, cybersecurity resilience.
8 SECURITY IMPLICATIONS OF CROSS-DOMAIN DATA INTEGRATION IN CORPORATE INFORMATION SYSTEMS
Marek T.
Abstract : This article analyzes the security implications of cross-domain data integration in corporate information systems operating across heterogeneous technological and organizational environments. The study examines how integration across internal systems, cloud platforms, and external partner domains amplifies security risks through policy inconsistencies, trust misalignment, and uneven governance maturity. Quantitative risk assessment models, policy consistency evaluation, and visual analytical techniques are applied to identify dominant risk drivers and high-risk integration scenarios. The findings demonstrate that cross-domain data integration requires risk-oriented security management approaches that combine technical controls with governance alignment. The study highlights the importance of policy harmonization, differentiated security mechanisms, and continuous risk monitoring to maintain a resilient security posture in integrated corporate information systems.
Keywords: cross-domain data integration, information security, corporate information systems, security risk management, policy consistency, cybersecurity governance.
9 INTELLIGENT THREAT DETECTION MODELS BASED ON BEHAVIORAL ANALYSIS OF INFORMATION SYSTEMS USERS
Kirsanova M.
Abstract : The article examines intelligent threat detection models based on behavioral analysis of information systems users. The study analyzes conceptual foundations of behavior-centric security approaches, key categories of behavioral features, and intelligent analytical models applied for detecting anomalous and malicious user activity. Particular attention is paid to statistical, machine learning–based, and hybrid detection models, as well as to their operational characteristics and limitations. The article emphasizes the importance of multidimensional evaluation metrics that combine detection accuracy, false positive control, detection latency, and scalability considerations. It is demonstrated that hybrid behavioral detection architectures provide the most balanced performance in corporate information systems by integrating adaptive learning mechanisms with interpretable behavioral baselines. The results of the study may be applied in the design and deployment of security monitoring systems for large-scale and distributed information infrastructures.
Keywords: behavioral analysis, threat detection models, information system security, user behavior analytics, anomaly detection, machine learning, cybersecurity.
10 THE IMPACT OF DIGITAL PLATFORMS ON THE TRANSFORMATION OF USER EXPERIENCE IN THE BANKING SECTOR
Kovalevskyi K.
Abstract : The article examines the processes of user experience transformation in the banking sector under the influence of digital platforms. The evolution of digital service channels and the transition from isolated interface solutions to a platform-based model of customer interaction are analyzed. It is emphasized that key user experience characteristics – usability, performance, and personalization – are shaped not only at the design level but also through architectural decisions, scalability, and the resilience of engineering infrastructure. Particular attention is given to the role of digital platforms in changing user behavioral patterns, increasing self-service adoption, and fostering trust in digital banking services. Based on industry case studies, the article demonstrates that user experience represents a measurable outcome of technological maturity and a strategic factor of bank competitiveness in the digital economy.
Keywords: digital platforms, digital solution development, banking sector, user experience, digital transformation, finance, customer trust.