{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:04:02Z","timestamp":1775469842560,"version":"3.50.1"},"reference-count":22,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T00:00:00Z","timestamp":1739923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Big Data"],"abstract":"<jats:p>This study examines the transformative impact of cloud computing on the integration of computer applications and information management systems to improve operational efficiency. Grounded in a robust methodological framework, the research employs experimental testing and comparative data analysis to assess the performance of an information management system within a cloud computing environment. Data was meticulously collected and analyzed, highlighting a threshold where user demand surpasses 400, leading to a stabilization in CPU utilization at an optimal level and maintaining subsystem response times consistently below 5 s. This comprehensive evaluation underscores the significant advantages of cloud computing, demonstrating its capacity to optimize the synergy between computer applications and information management. The findings not only contribute to theoretical advancements in the field but also offer actionable insights for organizations seeking to enhance efficiency through effective cloud-based solutions.<\/jats:p>","DOI":"10.3389\/fdata.2025.1508087","type":"journal-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T06:52:08Z","timestamp":1739947928000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cloud computing convergence: integrating computer applications and information management for enhanced efficiency"],"prefix":"10.3389","volume":"8","author":[{"given":"Guo","family":"Zhang","sequence":"first","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,2,19]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.5267\/j.ijdns.2022.11.009","article-title":"The role of cloud computing in supporting decision making: evidence from banking industry","volume":"7","author":"Al-Malahmeh","year":"2022","journal-title":"Int. J. Data Netw. Sci."},{"key":"B2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSDA.287114","article-title":"Introducing fog computing (FC) technology to internet of things (IoT) cloud-based anti-theft vehicles solutions","volume":"11","author":"Alreshidi","year":"2022","journal-title":"Int. J. Syst. Dyn. Appl."},{"key":"B3","volume-title":"Clouds: A Berkeley View of Cloud Computing","author":"Armbrust","year":"2009"},{"key":"B4","unstructured":"Armbrust\n              M.\n            \n            \n              Fox\n              A.\n            \n            \n              Griffith\n              R.\n            \n            \n              Joseph\n              A. D.\n            \n            \n              Katz\n              R. H.\n            \n            \n              Konwinski\n              A.\n            \n          \n          Above the Clouds: A Berkeley View of Cloud Computing. UC Berkeley Reliable Adaptive Distributed Systems Laboratory\n          \n          2009"},{"key":"B5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJITSA.307019","article-title":"A hospital information management system with habit-change features and medial analytical support for decision making","volume":"15","author":"Augustine","year":"2022","journal-title":"Int. J. Inf. Technol. Syst. Approach"},{"key":"B6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCWT.305860","article-title":"Integrated information model of an enterprise and cybersecurity management system: from data to activity","volume":"12","author":"Dotsenko","year":"2022","journal-title":"Int. J. Cyber Warfare Terror."},{"key":"B7","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1049\/sfw2.12062","article-title":"Benefits management and information technology work distribution","volume":"16","author":"Holgeid","year":"2022","journal-title":"IET Softw."},{"key":"B8","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10639-020-10304-2","article-title":"The effect of online mentoring system through professional learning community with information and communication technology via cloud computing for pre-service teachers in Thailand","volume":"26","author":"Karo","year":"2021","journal-title":"Educ. Inf. Technol."},{"key":"B9","author":"Kimball","year":"2013"},{"key":"B10","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1093\/jamia\/ocab256","article-title":"Understanding enterprise data warehouses to support clinical and translational research: enterprise information technology relationships, data governance, workforce, and cloud computing","volume":"29","author":"Knosp","year":"2022","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"B11","doi-asserted-by":"publisher","first-page":"415","DOI":"10.2298\/CSIS210211057K","article-title":"An approach for selecting countermeasures against harmful information based on uncertainty management","volume":"19","author":"Kotenko","year":"2022","journal-title":"Comput. Sci. Inf. Syst."},{"key":"B12","author":"Laudon","year":"2004"},{"key":"B13","unstructured":"Synergizing edge computing and cloud integration for enhanced efficiency in the oil and gas industry\n          \n          63\n          71\n          \n            \n              Narayana\n              S. S.\n            \n          \n          J. Comput. Eng. Technol.\n          15\n          2024"},{"key":"B14","volume-title":"Management Information Systems.","author":"O'Brien","year":"2006"},{"key":"B15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s12243-021-00868-6","article-title":"eHealthChain\u2014a blockchain-based personal health information management system","volume":"77","author":"Pawar","year":"2022","journal-title":"Ann. Telecommun."},{"key":"B16","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1177\/00187208211018880","article-title":"Dynamic communication quantification model for measuring information management during mass-casualty incident simulations","volume":"64","author":"Perry","year":"2022","journal-title":"Hum. Factors"},{"key":"B17","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.procs.2018.05.172","article-title":"Performance analysis of big data and cloud computing techniques: a survey","volume":"132","author":"Saif","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"B18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1504\/IJSHC.2021.116906","article-title":"Cloud computing adoption status in Oman (Arab) higher education: unified theory of acceptance and use of technology in education management","volume":"4","author":"Saini","year":"2021","journal-title":"Int. J. Soc. Humanist. Comput."},{"key":"B19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43681-021-00098-5","article-title":"Factoring ethics in management algorithms for municipal information-analytical systems","volume":"1","author":"Sergei","year":"2022","journal-title":"AI Ethics"},{"key":"B20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1049\/iet-net.2019.0180","article-title":"Comparative analysis of IoT based products, technology and integration of IoT with cloud computing","volume":"9","author":"Sharma","year":"2020","journal-title":"IET Netw."},{"key":"B21","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1142\/S0219622021500589","article-title":"Decision support for portfolio management by information system with black\u2013litterman model","volume":"21","author":"Stoilov","year":"2022","journal-title":"Int. J. Inf. Technol. Decis. Mak."},{"key":"B22","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/19475683.2022.2026469","article-title":"Modelling areas for sustainable forest management in a mining and human dominated landscape: a Geographical Information System (GIS)-Multi-Criteria Decision Analysis (MCDA) approach","volume":"28","author":"Takam Tiamgne","year":"2022","journal-title":"Ann. GIS"}],"container-title":["Frontiers in Big Data"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fdata.2025.1508087\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T06:52:11Z","timestamp":1739947931000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fdata.2025.1508087\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,19]]},"references-count":22,"alternative-id":["10.3389\/fdata.2025.1508087"],"URL":"https:\/\/doi.org\/10.3389\/fdata.2025.1508087","relation":{},"ISSN":["2624-909X"],"issn-type":[{"value":"2624-909X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,19]]},"article-number":"1508087"}}