Journal articles on the topic 'Component of corporate security'

To see the other types of publications on this topic, follow the link: Component of corporate security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Component of corporate security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

A. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (June 30, 2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Volosnikova, N. M. "The Methodical Principles of Controlling the Information System of Corporate Security." Business Inform 5, no. 520 (2021): 141–46. http://dx.doi.org/10.32983/2222-4459-2021-5-141-146.

Full text
Abstract:
The article is aimed at determining the consequences of the influence of the information component as a significant factor directed towards improving the economic efficiency of the corporate security system. The structure of controlling of the corporate security information system is characterized as a system of interacting components for determining the goals of strategic, tactical and operational management of the corporate security system, organization of the planned actions, regulation, control, analysis and monitoring. The general appearance of the key stages of the genesis of controlling of the corporate security information system is specified. It is concluded that thanks to the functioning of the management of the corporate security system, the fulfillment of the goal of the organization of a certain level is achieved. A variety of definitions of the concept of «controlling» is substantiated, which gives reason to take into account the controlling of the information system of corporate security as a philosophy or conception of managing the corporate security system, by which it is necessary to understand a set of opinions on determining the goals of strategic, tactical and operational management of the corporate security system, its organization and related instrumentarium. In addition, when solving an applied task, the situation of influence of the institutional environment on the system of corporate security in enterprises can be described using functional dependence. It is noted that the system of management of controlling has incoming strategic goals of the corporate security information system. The conception of corporate security information system together with strategic goals of the corporate security system itself are presented. At each level of the hierarchy of management, the controlling of the corporate security information system has a specific purpose. In this regard, there is an urgent need for further scientific and theoretical comprehension of the strategic aspects of corporate security.
APA, Harvard, Vancouver, ISO, and other styles
3

Podroiko, Ye V., and Yu M. Lysetskyi. "Network technologies: evolution and peculiarities. Mathematical machines and systems." Mathematical machines and systems 2 (2020): 14–29. http://dx.doi.org/10.34121/1028-9763-2020-2-14-29.

Full text
Abstract:
Today corporate network is seen as a complex system and traditionally provides the set of interacting essential components, such as: Main Site – a network of head office; Remote Site (Branch) – networks of remote office; WAN – global network uniting networks of the offices; LAN – a local network; WAN Edge – a point of connection to WAN. Internet Edge – a point of connection to the Internet; Data Cen-ter – corporate centre of data processing. Some sources also regard Service Block as a component, which is a separate segment of the network with specific services. Every component of corporate network fea-tures contains individual set of technologies, each having its history of origination and development. The paper offers short review of basic technologies which form the history of development of corporate network, as well as their evolution from a set of separated network technologies to a unified multi-service network infrastructure. This unified infrastructure is inextricably linked with a global network of Internet which is both a service and a carrier for majority of modern corporate networks. The paper de-scribes origination and development of Internet, local and global networks, Wi-Fi networks and software defined networks. Corporate network has been through a long evolution from co-existence of separated technologies to modern unified intellectual network infrastructure with high security and reliable man-agement. Due to fast-moving development of information technologies the corporate networks have dynamically transformed in several directions: network functions virtualization (NFV – Network Func-tions Virtualization); utilization of SDN solutions; automation of management processes; analytics; se-curity; cloud services. In the course of such a transformation the corporate network turned into unified, flexible, application oriented infrastructure with high reliability, easily modified and expanded function-ality, single management center, unified security policies, fast and detailed analysis of internal network processes.
APA, Harvard, Vancouver, ISO, and other styles
4

Mihus, I., L. Akimova, О. Akimov, S. Laptev, O. Zakharov, and N. Gaman. "INFLUENCE OF CORPORATE GOVERNANCE RATINGS ON ASSESSMENT OF NON-FINANCIAL THREATS TO ECONOMIC SECURITY OF JOINT STOCK COMPANIES." Financial and credit activity problems of theory and practice 6, no. 41 (January 10, 2022): 223–37. http://dx.doi.org/10.18371/fcaptp.v6i41.251442.

Full text
Abstract:
Abstract. In modern conditions of transformation and globalization of economic processes, rapid development of information and science-intensive technologies, each company seeks to ensure effective management of its activities and achieve a higher level of competitiveness. The level of quality of corporate governance influences the formation of the rating of enterprises and plays an important role in making decisions about investing in the company. At the same time, ensuring financial security is the most urgent task of society, the state, enterprises and organizations of all forms of ownership, entrepreneurs, and every citizen. In this regard, the practical implementation of recommendations to maintain financial security at the appropriate level will contribute to the completion of market transformations in the financial and credit sphere of the country, increase the level of financial security of enterprises, increase human security. It is corporate-type enterprises, namely joint-stock companies and limited liability companies, that are the main types of business structures that ensure the development of a market economy. Therefore, it is advisable to pay attention to the features of ensuring and assessing the quality of corporate governance of enterprises aimed at implementing the model of long-term sustainable development. The purpose of the article is to establish the impact of corporate governance ratings on the assessment of non-financial threats to the economic security of joint stock companies. In the article In the article the systematization of corporate governance indicators by criteria is carried out; the main components of the S&P corporate governance rating methodology, the CORE rating, the main components of the RID-Expert RA corporate governance rating methodology, the main components of the corporate governance methodology of the Crichton-Miller and Warman methodology, the main components of the Corporate Governance rating rating Credit Rating Agency; the advantages and disadvantages of methods of compiling corporate governance ratings are highlighted. Keywords: rating, corporate governance, economic security, joint-stock company, threats, assessment. JEL Classification E44, G30, K22 Formulas: 2; fig.: 5; tabl.: 0; bibl.: 36.
APA, Harvard, Vancouver, ISO, and other styles
5

Ribeiro Ramos, О., Ye Myronenko, I. Britchenko, O. Zhuk, and V. Patlachuk. "ECONOMIC SECURITY AS AN ELEMENT OF CORPORATE MANAGEMENT." Financial and credit activity problems of theory and practice 1, no. 42 (March 31, 2022): 304–12. http://dx.doi.org/10.55643/fcaptp.1.42.2022.3698.

Full text
Abstract:
Abstract. The purpose of this study is to develop mechanisms to ensure the economic security of enterprises on the basis of identifying qualitative new patterns of its development, which are associated with digital transformation. The work uses methods of generalization, comparison, analysis and synthesis — to understand the essence and components of economic security; a graphic method — to visualize the conceptual model and mechanism for ensuring the economic security of the enterprise in conditions of digitalization; monographic methods — for in-depth research of the tasks set; abstract-logical methods for theoretical generalization of research results and formulation of conclusions and proposals. The mechanism for ensuring the economic security of enterprises on the basis of identifying qualitative new patterns of its development, the action of which allows to ensure the necessary level of economic security of the enterprise is suggested. The practical significance of the research lies in the development of methods for assessing the economic security of enterprises based on the calculation of relevant local indicators and a set of indicators that characterize various aspects of economic security (production, human resources, finance, environment, digitalization), which allows to develop timely measures to improve economic security in relevant areas. The originality lies in the justification of the structure of the functional components of the economic security of the enterprise and the justification of the need to calculate its level on the basis of the integral index in order to develop measures to improve it. The results of the study can be used for the formation of an effective system of economic security of the enterprise. Keywords: security, economic security, management, mechanism, enterprise, system, indicators of economic security. JEL Classification D02, M21 Formulas: 3; fig.: 2; tabl.: 3; bibl.: 17.
APA, Harvard, Vancouver, ISO, and other styles
6

Volosnikova, N. M. "Features of a System Approach to the Strategy of the Corporate Security System of Industrial Enterprise." Business Inform 6, no. 521 (2021): 276–82. http://dx.doi.org/10.32983/2222-4459-2021-6-276-282.

Full text
Abstract:
The article is aimed at examining the peculiarity of a system approach to the strategy of the corporate security system of an industrial enterprise as a significant factor directed towards increasing the economic efficiency of the general system. The peculiarity of the system approach to the strategy of corporate security system is examined and the main stages of its (approach) development are disclosed. It is noted that a system approach can be called the approach, in the presence of which management decisions directed towards the competitive direction of strategic development of corporate security are considered in the form of an interrelated and interdependent holistic complex. The goals of the corporate security strategy of the industrial enterprise, which should be subordinated to the general strategy of economic development, and the implementation of the management strategy for the formation of general corporate security, carried out through decision-making, are substantiated. It is concluded that the mechanism of management of the corporate security system must be realized as an integral organizational and economic system, which is an integral part in the overall structure of the mechanism of an industrial enterprise. The main tasks and components of the general corporate security strategy model are identified. In addition, it is noted that the mechanism should be understood as a sequence of measures that are caused by a set of interdependent elements of economic, logistical, personnel, legal, resource, transactional, informational, technological security that form the state and content of processes in accordance with the defined corporate security strategy.
APA, Harvard, Vancouver, ISO, and other styles
7

Kharlamov, A. V., and E. D. Tershukov. "Ensuring the Economic Security of Economic Entities Through the Development of the Corporate Business Environment." Economics and Management 27, no. 7 (September 1, 2021): 530–36. http://dx.doi.org/10.35854/1998-1627-2021-7-530-536.

Full text
Abstract:
Aim. The presented study aims to examine conceptual provisions for the formation and development of the corporate business environment to substantiate its increasing impact on the tools and methods used in solving management problems associated with ensuring the economic security of economic entities.Tasks. The authors determine the relationship and mutual influence between the corporate business environment and the management process aimed at ensuring economic security; identify the most significant components of the corporate business environment, focusing on corporate culture and commercial confidentiality; characterize the directions of government influence on the improvement of the corporate business environment to enhance the economic security and competitiveness of domestic economic entities in the national and global markets.Methods. This study analyzes scientific approaches to understanding the essence and content of the corporate business environment as well as its impact on the economic security of economic entities. The results of the analysis indicate the increasing influence of economic security on the engagement of economic entities in the formation of an effective corporate business environment.Results. The authors propose to modify the process of ensuring a high level of economic security so as to reflect the integrated interests of a wide range of economic entities related to each other both directly and indirectly. They also determine directions for the government’s stimulating influence on the improvement of the corporate business environment and the economic security of economic entities.Conclusions. The conducted study of economic security and the corporate business environment indicates a stable, direct, and inverse relationship between them. This makes it possible to formulate conceptual proposals for improving management in the field of the development of economic entities and increasing their efficiency based on economic security.
APA, Harvard, Vancouver, ISO, and other styles
8

Krylov, Alexander. "Information policy of state corporations." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 6 (June 1, 2020): 83–87. http://dx.doi.org/10.33920/pol-01-2006-10.

Full text
Abstract:
This article discusses the general principles of the implementation of the information policy and the particular principles on the basis of which the information policy is implemented in PJSC FGC UES. The authors also studied corporate policy objectives and highlighted information security as a component of the information policy.
APA, Harvard, Vancouver, ISO, and other styles
9

Jansen van Vuuren, Joey, Marthie Grobler, and Jannie Zaaiman. "Cyber Security Awareness as Critical Driver to National Security." International Journal of Cyber Warfare and Terrorism 2, no. 1 (January 2012): 27–38. http://dx.doi.org/10.4018/ijcwt.2012010103.

Full text
Abstract:
In South Africa, cybersecurity has been identified as a critical component contributing to National Security. More rural communities are becoming integrated into the global village due to increased hardware and software corporate donations, the proliferation of mobile Internet devices and government programmes aimed at bridging the digital divide through major broadband expansion projects. The authors’ research shows that many of the new Internet users are not aptly trained to protect themselves against online threats, leaving them vulnerable to online exploits and inherently exposing the national system to potential international cyber attacks. This article works toward the identification of any correlation between the economic development and mobile use propensity of Internet users with regard to National Security. Internet penetration statistics are used in correlation with the economic development and exposure to technological advances of South Africans to classify participants in the surveys used into three groups: urban netizens, semi-rural netizens and rural netizens. South African citizens from areas within the Gauteng, Limpopo and Mpumalanga provinces participated in this study. Separate from these criteria, the availability of and access to the Internet via mobile phones is also taken into consideration. The article uses the results from the surveys to identify direct and indirect links between the factors in question.
APA, Harvard, Vancouver, ISO, and other styles
10

Liyanaarachchi, Gajendra. "Online privacy as an integral component of strategy: allaying customer fears and building loyalty." Journal of Business Strategy 41, no. 5 (May 18, 2020): 47–56. http://dx.doi.org/10.1108/jbs-09-2019-0183.

Full text
Abstract:
Purpose This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation. Design/methodology/approach The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach. Findings The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service. Originality/value This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles
11

Demianchuk, Vitalii, and Pavlo Bortsevych. "COMPARATIVE LEGAL ASPECTS OF ENSURING THE ECONOMIC SECURITY OF COMPANIES IN RESOLVING CORPORATE CONFLICTS IN UKRAINE AND THE UNITED STATES." Baltic Journal of Economic Studies 5, no. 1 (March 22, 2019): 54. http://dx.doi.org/10.30525/2256-0742/2019-5-1-54-58.

Full text
Abstract:
The aim of the article is to reveal the legal nature of corporate conflicts and ways to overcome them in Ukraine and the United States. The subject of the study is corporate conflicts caused by the corporate relations that arise between the owners of corporate rights, as well as the relationship between the owners of corporate rights and management bodies of the company. Methodology. The study is based on general scientific and specialscientific methods and techniques of scientific knowledge. The logical semantic method enabled to determine the content of the concepts of “corporate conflict” and “greenmail”. The comparative legal method enabled to compare the doctrinal approaches to this issue. The same method enabled to analyse US law regarding the subject matter. The normative dogmatic method enabled to interpret the content of legal regulations of domestic and foreign legislation that regulate the issue of corporate conflicts and ways to overcome them. The system-structural method enabled to analyse objective and subjective causes of corporate conflicts. Methods of analysis and synthesis enabled to distinguish features of corporate blackmail as the cause of corporate conflicts. The method of legal modelling enabled to develop proposals regarding greenmail prevention in Ukraine. Practical implications. Studies on the issue of greenmail in the US helped to develop recommendations for prevention of greenmail in Ukraine, as well as to identify issues requiring further consideration and research. Relevance/originality. The concepts of “corporate conflict” and “greenmail” are defined. The objective and subjective causes of the occurrence of corporate conflicts, the reasons for their occurrence, as well as the subjective component of the parties to the corporate conflict are analysed. The absence of the legal definition of the concept of greenmail and the effective mechanism of its prevention is stated, therefore, appropriate recommendations to prevent its occurrence are formulated.
APA, Harvard, Vancouver, ISO, and other styles
12

Saáry, Réka, Ágnes Csiszárik-Kocsir, and János Varga. "Examination of the Consumers’ Expectations Regarding Company’s Contribution to Ontological Security." Sustainability 13, no. 17 (September 6, 2021): 9987. http://dx.doi.org/10.3390/su13179987.

Full text
Abstract:
Security is considered a basic human need, according to Maslow’s hierarchy; however, it is hard to define exactly what the term means. Globalization, the digital environment, bring new dimensions and increasingly diverse interpretations of security to life. These new approaches, while reducing the consistency of the concept, allow an understanding of individual attitudes towards security. In recent years, several researchers have analyzed the psychological dimension of security at a personal level and ontological security in relation to citizens, residents, employees and students; however, based on a review of research history, there is still a scientific gap with regard to the perspective of customers and consumers. Accepting the fact that market actors are increasingly taking their share of creating a secure environment, in our empirical study we focus on corporate involvement and contribution through an examination of consumers’ perceptions of security. Corporate security is originally a field supporting the smooth operation of the organization, but nowadays it has become an important element of corporate strategy and also a factor of competitiveness. Keeping that in mind, our objective is to get a picture of how consumers judge the contribution of companies to the general sense of security in Hungary, what security-related tasks they expect from the corporate actors, and how they feel about a company’s security-related performance. In our study, we develop the ontological security model of consumers, into which we integrate—next to the individual socio-psychological features and the macro-environmental elements—the dimension of the assessment of corporate performance, the possible components of which are analyzed during the quantitative primary research.
APA, Harvard, Vancouver, ISO, and other styles
13

Kryukov, Dmitry, and Raimonds Strauss. "Information security governance as key performance indicator for financial institutions." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (January 1, 2009): 161–67. http://dx.doi.org/10.2478/v10143-009-0014-x.

Full text
Abstract:
Information security governance as key performance indicator for financial institutions Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of existing situation in key performance indicator domain for financial institutions. The overview of stakeholder groups interested in financial institution performance management is provided. In the same way as corporate governance is treated as financial and operational performance reflecting and influencing factor, information security governance as a component of corporate governance, according to authors' opinion, should be treated as key performance indicator for financial institutions. In the paper the most indicative financial performance indicators as well as their calculation methods are defined for financial institutions. The paper contains overview of information security assessment models and researches in this field. Authors have chosen information security maturity model to use in testing hypothesis. The paper contains description of calculation methodology for financial performance indicators and information security maturity indicators. The hypothesis has been proved performing analysis of correlation between calculated financial performance indicators and information security governance model indicators for chosen Latvian financial institutions.
APA, Harvard, Vancouver, ISO, and other styles
14

Prokopenko, Olha, Maksym Slatvinskyi, Nataliia Biloshkurska, Mykola Biloshkurskyi, and Vitaliy Omelyanenko. "Methodology of national investment and innovation security analytics." Problems and Perspectives in Management 17, no. 1 (April 3, 2019): 380–94. http://dx.doi.org/10.21511/ppm.17(1).2019.33.

Full text
Abstract:
The main problem of the research is development of a conceptual framework for investment and innovation security, as well as the methodological approach to its assessment, which will allow monitoring and identifying the threats and achieving the desired security state of the national economy. It has been proved that investment and innovation security is a multi-level phenomenon, consisting of the following levels: global, national, corporate and household ones. Investment and innovation security is determined by three components, such as state security at the external and internal markets, security of enterprises (corporations) and individual households, which requires their balancing. The methodical approach to the integrated assessment of the investment and innovation security level is developed, which involves the development of integral index as the geometric mean of 3 sub-indices, which include single indices under the national, corporate and household level. The results of this methodological approach approbation allowed us to form preconditions for finding ways of growth, forecasting trends and building scenarios for strengthening the investment and economic security of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
15

Zatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.

Full text
Abstract:
This paper considers the insider threats in the companies from different sectors and various methods of their assessment. The problem of information leakage is becoming increasingly important for companies in all areas of economic activity. The problem of insider threats is becoming increasingly important, as the company may incur losses not only due to the leakage of information about its inventions, but also through lawsuits in case of theft of personal information of the customers, contractors and more. This means that in order to gain access to the international markets, Ukrainian companies must have an appropriate level of protection not only of the company’s confidential information, but also of the data on customers, contractors, etc. The objective of the article is to analyze the existing methodological approaches to the assessment of insider threats in the enterprise as a component of personnel and economic security. We came to the conclusion that different industries have different vulnerabilities to insider threats and different approaches to insider threat management. It was determined that information leaks are a serious threat to the company’s economic and personnel security. It was discovered that firms have achieved significant improvements and developed effective procedures for counteracting external threats, however, protection against insider attacks remains rather low. In the course of the research, the concept of an insider attacker was defined, the types of insider threats were established, and the main actions of the personnel prior to the insider attack were outlined. It was proved that the degree of insider threat is determined by the type of activity of the company and the liquidity of information that may be leaked. Most leaks are observed in high-tech companies and medical institutions, while the most liquid is the information of banks, financial institutions, industrial and commercial companies.
APA, Harvard, Vancouver, ISO, and other styles
16

Levkovets, N. P. "Integrated assessment of corporate security of a motor transport enterprise." Izvestiya MGTU MAMI 7, no. 4-1 (February 20, 2013): 306–12. http://dx.doi.org/10.17816/2074-0530-68310.

Full text
Abstract:
The article reveals the essence of company’s security. There is developed a comprehensive methodology for assessing the economic security of a motor transport enterprise taking into account the major functional components of safety and recommendations on increasing the level of economic safety of the motor company and calculations are also made.
APA, Harvard, Vancouver, ISO, and other styles
17

Rudenko, Inna, Alina Kolesnyk, Tetiana Bolotova, Oleg Bogoyavlenskiy, Olha Halkina, Viktoriia Pustova, and Denis Darmostuk. "Methodological approach to mutually agreed corporate image management and economic security of enterprise." ScienceRise, no. 2 (April 30, 2021): 53–58. http://dx.doi.org/10.21303/2313-8416.2021.001790.

Full text
Abstract:
The object of research: corporate image and enterprise economic security. Investigated problem: methodical approach to mutually agreed management of enterprise’s image and its economic security. The main scientific results: theoretical analysis of the opinions, which are presented in the scientific literature of enterprise economic security functional components and the mechanism of their formation, is carried out. The functional components of economic security related to the internal and external aspects of enterprise are studied in detail, and their close relationship with image components is determined. The stages of enterprise image management are schematically shown with taking into account the compliance of image economic security components levels. The area of practical use of the research results: the need to adhere to certain sequence of actions aimed at forming a positive image and managing it in enterprises is emphasized. It is advisable to use an approach to the formation of corporate image with taking into account the targeted influence of management entities on the business environment. Technological innovation: the enterprise economic security structure in the context of modern tendencies is proposed, the complex of measures which are recommended to be applied for enterprise image maintenance is determined. Scope of application for technological innovation: practical activity of Ukrainian enterprises is in interconnection with other business environment participants.
APA, Harvard, Vancouver, ISO, and other styles
18

Bezdelov, A. D., and E. V. Loginova. "Managing Cyber-Security of in-Bank Ecosystem in Conditions of Digitalization." Vestnik of the Plekhanov Russian University of Economics 17, no. 6 (December 4, 2020): 198–207. http://dx.doi.org/10.21686/2413-2829-2020-6-198-207.

Full text
Abstract:
Information technologies (IT) play a key role in corporate infrastructure. They provide unprecedented economic development of enterprises in our era. IT systems help economize resources and give an opportunity to peep in the essence of corporate transactions. Finance service market develops energetically due to digital economy shaping. Digital technologies have penetrated all spheres of life and the level of innovation technology equipment keeps on growing at the expense of mobile technologies. The system of in-company finance control is included n the structure of management functioning as an obligatory element of the current mechanism of management. The development of programs of in-bank control is a necessary component of work of any finance and credit organization according to international and national legislation. The article describes the structure of unique in-bank mechanism of control, oriented to preventing legalization of criminal incomes and raining personnel for services of internal bank control. The article analyzes in-bank programs aimed at its organization and grounds functional responsibilities of employees in divisions of internal control integrated in the system of monitoring and managing bank risks. The role of questionnaires differentiated by clients’ types is assessed, with the help of which the bank can identify its clients. Programs of training employees of internal control divisions are structured.
APA, Harvard, Vancouver, ISO, and other styles
19

Budnyk, L., I. Blazhei, and O. Ronska. "Internal audit in the enterprise economic security management: important aspects." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 77–84. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.077.

Full text
Abstract:
Effective management of the enterprise financial and economic activities is based primarily on the application of a set of relevant and reliable data concerning its financial status, provided by internal audit procedures. The factors arising interest in internal audit, such as: streamlining business processes; the need to obtain independent and objective information on the state of affairs; ensuring the economic security of the company are identified in this paper. In order to substantiate the tasks of internal audit for ensuring the economic security of the enterprise, the main sources of threats and objects of protection investigated in the process of internal audit are defined. It is substantiated that one of the important tendencies in the development of internal audit is the increase of its level from the tester of control procedures to the analyst of the most important risks. The functions of internal audit in ensuring the security of the company are analyzed. They include: assessment of the economic security system as a whole and providing information to the board of directors and senior management; participation in the implementation of the enterprise security process procedures. A new and important direction for internal audit development – audit of corporate culture is defined. The main tasks of internal audit in this area are to assess how effective measures are provided in the company for the purposeful formation of corporate culture; how the existing level of corporate culture is assessed. Recommendations for the organization of internal audit are given, the following three main approaches are highlighted: creation of own internal audit service; use of services of outsourcing companies; co-sourcing – the division of functions for internal audit in the company between its own service and the involvement of external experts in solving certain tasks. It is proved that the need to introduce internal audit meets the requirements of economic security of the enterprise, information and management needs of economic entities, the specific facts of the internal audit. It is substantiated that internal audit is an integral part of quality control of enterprise management processes and a component of general audit, organized in the interests of owners and regulated by regulations on compliance with the established order of economic activity, property protection and economic security.
APA, Harvard, Vancouver, ISO, and other styles
20

Budnyk, L., I. Blazhei, and O. Ronska. "Internal audit in the enterprise economic security management: important aspects." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 77–84. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.077.

Full text
Abstract:
Effective management of the enterprise financial and economic activities is based primarily on the application of a set of relevant and reliable data concerning its financial status, provided by internal audit procedures. The factors arising interest in internal audit, such as: streamlining business processes; the need to obtain independent and objective information on the state of affairs; ensuring the economic security of the company are identified in this paper. In order to substantiate the tasks of internal audit for ensuring the economic security of the enterprise, the main sources of threats and objects of protection investigated in the process of internal audit are defined. It is substantiated that one of the important tendencies in the development of internal audit is the increase of its level from the tester of control procedures to the analyst of the most important risks. The functions of internal audit in ensuring the security of the company are analyzed. They include: assessment of the economic security system as a whole and providing information to the board of directors and senior management; participation in the implementation of the enterprise security process procedures. A new and important direction for internal audit development – audit of corporate culture is defined. The main tasks of internal audit in this area are to assess how effective measures are provided in the company for the purposeful formation of corporate culture; how the existing level of corporate culture is assessed. Recommendations for the organization of internal audit are given, the following three main approaches are highlighted: creation of own internal audit service; use of services of outsourcing companies; co-sourcing – the division of functions for internal audit in the company between its own service and the involvement of external experts in solving certain tasks. It is proved that the need to introduce internal audit meets the requirements of economic security of the enterprise, information and management needs of economic entities, the specific facts of the internal audit. It is substantiated that internal audit is an integral part of quality control of enterprise management processes and a component of general audit, organized in the interests of owners and regulated by regulations on compliance with the established order of economic activity, property protection and economic security.
APA, Harvard, Vancouver, ISO, and other styles
21

Vivchar, Oksana, and Oksana Redkva. "Analysis of indicators impact on economic security of enterprises in the context of socio-humanitarian components." Economics, ecology, socium 2, no. 3 (November 14, 2018): 65–74. http://dx.doi.org/10.31520/2616-7107/2018.2.3-7.

Full text
Abstract:
Introduction. The level of economic security of enterprises is characterized by many indicators. The assessment of the state of economic security of enterprises is carried out through a system of criteria and indicators. The criterion of enterprises economic security is a measure of the state of the entity in terms of compliance with the established indicators of its activity with pre-established indicators reflecting the essence of economic security. Therefore, the problem of analyzing indicators of enterprises economic security and developing measures to improve their economic component in the context of the socio-humanitarian component. Aim and tasks. Justification of the need to develop measures to improve the assessment of economic security of enterprises based on the impact of indicators in the context of the socio-humanitarian component. On the basis of this goal, the question arises of solving such problems as: the possibility of developing a unified conceptual approach and tools for assessing the impact of indicators on the organization's economic security; developing measures to improve the economic component of enterprises in the context of the socio-humanitarian component. Results. For the analysis of the economic security state, indicators were chosen that characterize economic security in different spheres of enterprise activity according to the recommendations. For each indicator a matrix of values with the enterprises and indicators of values by years was formed. The analysis uses a multidimensional logit model, a case of binary selection. The model does not take into account group effects, that is, there is no analysis of fixed effects. In order to avoid cross-effects, when not only the variable itself influences the likelihood of a crisis, but the public crisis begins to affect the behavior of the variable, two groups of models are built: for the first group of regressions from the sample, all observations after the first year of crises are excluded; for the second group of regressions all data were used except for the crisis years after the first year of the crisis. Conclusions. Based on the analysis of the investigated indicators and the determination of t the parameters of enterprises economic security in addition to economic methods, administrative and socio-psychological means can be used. They include methods of influencing individual workers, groups of employees or the collective as a whole to form a corporate culture that will help achieve the goals of this enterprise, will reduce the impact of socio-humanitarian factors of economic security on the enterprise. These methods include: training staff rules of safe behavior; work with managers, whose behavior serves as a reference for the company's staff; development of a program of work with new employees and its implementation; formation and adjustment of traditions of the enterprise; regulation of interpersonal and intergroup relations; moral encouragement; social planning; other methods. Quick methods for certain enterprises were also proposed to improve the economic component of their operation.
APA, Harvard, Vancouver, ISO, and other styles
22

Oksana, KONDRATIUK, and STOIANENKO Iryna. "ECONOMIC RISKS OF THE ENTERPRISE: POST-COVID TRANSFORMATION." Herald of Kyiv National University of Trade and Economics 138, no. 4 (September 10, 2021): 4–18. http://dx.doi.org/10.31617/visnik.knute.2021(138)01.

Full text
Abstract:
Background.Development of the economy in the context of globalization, on the one hand, promotes new opportunities for the production of new goods and services, and on the other hand, increases existing threats and causes new ones, so it has a negative impact on economic security. Most threats to the economic security of an enterprise cannot be pre­dicted, and unpredictedthreatsare risks. The current situation requires companies to im­prove and optimize continuouslythe process of risk management and policy making. The aim of the paper is justification of the need for risk management policy as acomponent of the economic security of an enterprise. Materials and methods. Current regulations of Ukraine, publications of domestic and foreign scientists on the research topic, statistical materials and Internet sourcesare the information base of the research. Methods of generalization, analysis and synthesis, comparison, scientific abstraction and systematization were used to achieve the main aim of the paper. Results. The COVID-19 pandemichas had impact on the enterprisesactivities. The risk structure can be determined bysuchareas asstaff, processes,profit, profitability and partnerships.Risk management allows the company to ensure necessary development, increase competitiveness and economic security. An important component of the deve-lopment of risk management in the enterprise is the development of appropriate policies that allow to form an adequate understanding of the processes of each participant in the system, ensure strict compliance with established rules and compliance with mandatory procedures in risk management.At present, risk management is becoming a way to survive in a difficult economic situation, which will allow the company to ensure necessary deve­lopment, increase competitiveness and economic security. An important component ofrisk managementdevelopment of the enterprise ismaking of appropriate policies that allow to form an adequate understanding of the processes of each participant in the system, ensure strict compliance with established rules and compliance with compulsory procedures in risk management. Conclusion. Risk management process should become an integral part of corporate culturefor any company. Developed and implemented risk management policy should ensure full responsibility of its employees for understanding, assessing, established risk appe­tite and applying appropriate methods to reduce negative impact of risks on current and future business activities and economic security of the enterprise. Or any company, the risk management process should become an integral part of corporate culture, and the developed and implemented risk management policy should ensure full responsibility of all its employees for understanding, assessing, established risk appetite and applying appropriate methods to reduce the negative impact of risks on cur­rent and future business activities and economic security of the enterprise. Keywords: risk, uncertainty, enterprise, entrepreneurial risk, risk management, economic security, risk management policy.
APA, Harvard, Vancouver, ISO, and other styles
23

Walkowski, Michał, Maciej Krakowiak, Jacek Oko, and Sławomir Sujecki. "Efficient Algorithm for Providing Live Vulnerability Assessment in Corporate Network Environment." Applied Sciences 10, no. 21 (November 9, 2020): 7926. http://dx.doi.org/10.3390/app10217926.

Full text
Abstract:
The time gap between public announcement of a vulnerability—its detection and reporting to stakeholders—is an important factor for cybersecurity of corporate networks. A large delay preceding an elimination of a critical vulnerability presents a significant risk to the network security and increases the probability of a sustained damage. Thus, accelerating the process of vulnerability identification and prioritization helps to red the probability of a successful cyberattack. This work introduces a flexible system that collects information about all known vulnerabilities present in the system, gathers data from organizational inventory database, and finally integrates and processes all collected information. Thanks to application of parallel processing and non relational databases, the results of this process are available subject to a negligible delay. The subsequent vulnerability prioritization is performed automatically on the basis of the calculated CVSS 2.0 and 3.1 scores for all scanned assets. The environmental CVSS vector component is evaluated accurately thanks to the fact that the environmental data is imported directly from the organizational inventory database.
APA, Harvard, Vancouver, ISO, and other styles
24

Sherkat, Mohammadhosssein, Mona Jami Pour, and Amir Manian. "Toward an Integrated Framework of Corporate Knowledge Portals Vulnerabilities: Resolving KM Security Challenges." Journal of Information & Knowledge Management 19, no. 03 (July 22, 2020): 2050017. http://dx.doi.org/10.1142/s0219649220500173.

Full text
Abstract:
Recently, knowledge management (KM) has been considered as a strategic weapon in a competitive environment. Corporate knowledge portals are one of the popular KM mechanisms for managing organisational knowledge and implementing knowledge management systems (KMSs) which use the communication networks. Since these portals are one of the main sources of organisational knowledge, their security becomes more essential. Despite the importance of the knowledge portal security, there are few studies to identify and evaluate the vulnerabilities of knowledge portals. The main purpose of this study is to offer an integrated framework to recognise, categorise and prioritise the key knowledge portal vulnerabilities based on the ITU-TX-805 architecture in order to enhance the security of KMSs. To identify the knowledge portal vulnerabilities, related studies were reviewed and then using the survey method, the main categories and related items were weighted by KM experts. The results proposed a new framework for identifying and prioritising knowledge portal vulnerabilities by using ITU-TX-805 architecture. The framework contains three main categories of vulnerabilities such as network components, network activities, and network security dimensions. In KM initiatives implementation, knowledge sharing along with knowledge protection must be considered. The proposed framework identifies and prioritizes the main vulnerabilities of knowledge portals which must be considered to make secure knowledge sources. It can assist knowledge manager officers (CKOs) to identify vulnerabilities, strengthen the security of knowledge portals, and protect knowledge assets.
APA, Harvard, Vancouver, ISO, and other styles
25

Joshua, Segun, Daniel Gberevbie, and Kester Onor. "Building Security through Insecurity: The Nigerian Military and Counter-Violence Campaigns in the Fourth Republic." Armed Forces & Society 47, no. 1 (July 21, 2020): 177–200. http://dx.doi.org/10.1177/0095327x20934005.

Full text
Abstract:
Since independence on October 1, 1960, Nigeria has been a victim, at one time or the other, of intra-ethnic, inter-ethnic, religious, and communal conflicts which have undermined the human security of her citizens. Nigeria’s corporate existence had also been threatened by 3 years (1967–1970) civil war which impacted negatively on the well-being of its people. In addition, the inability of the Nigerian Police to cope with the magnitude of the surge of violence in recent years has brought about the idea of involving the military, a core component of traditional security apparatus to deal with internal insecurity. This article is anchored on human security paradigm with reliance on secondary data to analyze the operations of the Nigerian Military in counterviolence campaigns between 1999 and 2017. This article points out that the involvement of the military in internal security has worsened the problem of insecurity due to the military’s unprofessional approach and, at times, deliberate targeting the civilian populace which it is supposed to protect. It, therefore, recommends among others, the need for the Federal Government of Nigeria to urgently review the role of the armed forces in addressing internal security situations in a way that will bring about respect for the rule of engagement in internal security operations and adherence to global best practices.
APA, Harvard, Vancouver, ISO, and other styles
26

Pârţachi, Ion, and Eugeniu Gârlă. "Economic Insecurity as Systemic Risk." Annals of the Alexandru Ioan Cuza University - Economics 62, s1 (October 1, 2015): 29–36. http://dx.doi.org/10.1515/aicue-2015-0034.

Full text
Abstract:
Abstract Difficulties related to the problem of evaluating the economic security / insecurity, including the threshold of economic security / insecurity, namely the impossibility of giving an analytical description of a criterion entirely made up of a set of indicators describing the degree of economic security / insecurity, makes more and more researchers, including the authors, to seek indirect ways of finding solutions, for example considering systemic risk., as a measure of evaluation. Thus, starting from a new approach, and given the specific components of systemic risk to financial stability: the banking sector, corporate sector, public sector, volume of credits, economic activity index the threshold vector of economic security / insecurity can be developed. The study shows that systemic risk can be used to measure the threshold of economic security /insecurity.
APA, Harvard, Vancouver, ISO, and other styles
27

Kucherenko, D. S. "Preconditions for the formation of the company's information security system." Quality. Innovation. Education, no. 2 (2021): 93–101. http://dx.doi.org/10.31145/1999-513x-2021-2-93-101.

Full text
Abstract:
The article discusses the problems of managing the information security of the enterprise in a changing business climate. The description, shortcomings and advantages of the existing asS TP security system are given. The specifics of the company's procedural and technological security capabilities have been revealed. The enterprise's IT infrastructure has been identified in the information security and cyber defense format, consisting of three components: the servers of applications that deliver business applications; database servers that contain business data and system administration channels to manage and monitor infrastructure that need to work together as a coherent and coordinated system. Structured architecture, uniting corporate cybersecurity in 11 functional areas covering the technical and operational breadth of enterprise cybersecurity. These functional areas are highlighted on the basis of their relative independence from each other and because they are well consistent with the way staff, experience and responsibilities are shared in the enterprise. This corporate cybersecurity architecture format provides the basis for managing the capabilities that the enterprise provides the tools of audit, forensics, detection, and preventive control. This structure provides consistent management of security capabilities and helps prioritize their deployment, maintenance, and updates over time. It also ensures strict accountability and good alignment of strategy, staff, budget and technology to meet the organization's security needs. The structure is designed to be flexible and scalable regardless of the size of the enterprise. It provides an expandable mechanism for adjusting cyber defense over time in response to changing cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
28

Tsaruk, Vasyl. "COMPARATIVE ANALYSIS OF UNDERSTANDING TRANSPARENCY IN CORPORATE GOVERNANCE AND ACCOUNTING." Economic discourse, no. 4 (December 2019): 153–59. http://dx.doi.org/10.36742/2410-0919-2019-4-16.

Full text
Abstract:
Introduction. Improving the corporate governance system in modern conditions presupposes ensuring its transparency, which will contribute to increasing the effectiveness of decisions made both by the management of corporate structures and by external stakeholders. It is necessary to determine the components of this category to ensure a high level of corporate transparency, which will form further ways to improve it, in particular, by developing a system of accounting and analytical support for corporate governance. Methods. The author uses dialectical and systematic approaches to study the features and differences of corporate governance and accounting systems; abstract and logical method – for theoretical generalizations and substantiation of ways of improving accounting for corporate needs of enterprises. Results. The absence of a common understanding of the concept of corporate transparency has been determined. Three main options for understanding the importance of transparency in corporate governance and accounting have been identified. The features of understanding of transparency in corporate governance in the context of the stakeholder approach have been revealed. The features of ensuring corporate transparency in the context of the existence of the problem of economic security and confidentiality of information have been highlighted. Information transparency in the corporate structure is defined as a system of relationships and interactions between its stakeholders, which is that the entities generating and disseminating information provide all other interested parties with the necessary information for the management decisions and their further implementation in the necessary form. Discussion. Research prospects consist in certain components of the concept of transparency in corporate governance, used by researchers to substantiate its essence (openness, understandability, quality). Keywords: corporate governance, transparency, accounting principles, quality characteristics of useful financial information.
APA, Harvard, Vancouver, ISO, and other styles
29

Mahdi, Ahmed Samir. "Saudi neomercantilism in the oil price war." Review of Economics and Political Science 5, no. 1 (January 13, 2020): 2–20. http://dx.doi.org/10.1108/reps-10-2019-0134.

Full text
Abstract:
Purpose The so-called “oil price war” of 2014-2016 took place between several main global oil producers; OPEC (led by Saudi Arabia), Russia and the newcomer; American tight oil or fracking oil. These oil producers were competing against each other over market shares in the global oil market, by maintaining their high oil production rates, even if this led to a decline in oil prices and a reduction in revenues from oil sales. As energy politics need more coverage in International Political Economy (IPE) theory, this paper aims to argue that Saudi Arabia's policies during the oil price war of 2014-2016 reflected a policy of neomercantilism, which is the IPE equivalent of the school of realism in International Relations (IR). Design/methodology/approach This paper tests for neomercantilism by testing three of its main definitional components. The first definitional component is that the state, as the political authority, intervenes in the economic decisions. The second component is the primacy of the state interests over business corporate profits, or the primacy of political and security considerations over short-term economic and corporate profit considerations. The third is the zero-sum or relative gains nature of dealings between states. Afterwards, this paper tests for neomercantilism in the Saudi policy by examining how each of these definitional components is reflected in the Saudi policy during the oil price war. Findings As energy politics need more coverage in International Political Economy (IPE) theory, this paper argues that Saudi Arabia's policies during the oil price war of 2014-2016 reflected a policy of neomercantilism, which is the IPE equivalent of the school of realism in International Relations (IR). Originality/value As energy politics need more coverage in International Political Economy (IPE) theory, this paper argues that Saudi Arabia's policies during the oil price war of 2014-2016 reflected a policy of neomercantilism, which is the IPE equivalent of the school of realism in International Relations (IR).
APA, Harvard, Vancouver, ISO, and other styles
30

Tkachenko, Volodymyr, Iryna Tkachenko, and Polina Puzyrova. "Fundamentals of financial and economic security management of Ukrainian enterprises." Research Papers in Economics and Finance 4, no. 2 (2020): 41–51. http://dx.doi.org/10.18559/ref.2020.2.4.

Full text
Abstract:
The financial and economic security of an enterprise is a complex system that includes a certain set of internal characteri-stics aimed to ensure the efficiency of corporate resources use in each direction of activity. The basis of the development of a complex system of financial and economic security of an enterprise should be a defined concept. Each enterprise is a system that includes different, interconnected components, which in order to ensure proper degree of protection against possible negative impacts should be considered comprehensively. The content and structure of the financial and economic security system depend on the specifics and nature of the activity of the enterprise, its potential, the markets that it ope-rates, as well as its management. The financial and economic security system of an enterprise must be comprehensive and independent from similar systems of economic entities.
APA, Harvard, Vancouver, ISO, and other styles
31

Hutsaliuk, O. M., and Iu A. Bondar. "Safety Management of Aviation Transport in the Context of Sustainable Development of the National Economy." Management of Economy: Theory and Practice. Chumachenko’s Annals, no. 2020 (2020): 82–94. http://dx.doi.org/10.37405/2221-1187.2020.82-94.

Full text
Abstract:
The article discusses the impact of a wide range of technical, natural, human and economic hazards on the aviation industry. The safety of aviation as a whole is characterized as an important component of the general concept of national security, as well as a component of the system for ensuring personal safety, public safety and security in air transport from external and internal threats. It is noted that maintaining an acceptable level of safety of national aviation, the development of theoretical foundations for the safety of aviation transport management is of current and practical importance for the sustainable development of not only a separate transport infrastructure, but also the national and global economy. The article investigates «security» and methods of its management, «activity security policy», which is aimed at countering threats, restoring activities in order to protect corporate interests, preserving the integrity of processes or a system based on the assimilation and development of a safety culture. At the same time, in the studies, these types of threats include individual elements that can be used in almost any air transport. In particular, the importance of external threats and destabilizing factors and threats is highlighted. A structured approach to safety management is indicated at the global, regional and national levels, including: the required organizational structures, areas of responsibility, policies and procedures. The characteristics of the main goals of the safety management of the aviation transport enterprise are considered, the ideal goals and potential ones are highlighted, and also touched the degree of reach of such goals. Determined that the objectives of enterprise safety management, as well as the objectives of enterprise management as a whole, must meet a set of requirements, the obligation to comply with which is the key to the success of such management. Information on the ICAO Civil Aviation Security Strategy has been processed, which is considered the most effective tool to ensure an acceptable level of security in global civil aviation. According to which the implementation of the aviation safety management system is regulated at three hierarchical levels – global, regional and national, and the aviation safety management system represents an orderly approach to management.
APA, Harvard, Vancouver, ISO, and other styles
32

Shrestha, Sulochana, Sujita Thapa, Laxmi Mangrati, Patima Devkota, Rekha Rai, and Kabita Adhikari. "Quality of work life (QWL) situation in the Nepalese corporate sector." Quest Journal of Management and Social Sciences 1, no. 1 (October 18, 2019): 119–45. http://dx.doi.org/10.3126/qjmss.v1i1.25977.

Full text
Abstract:
Background: Existing literature on QWL and CG supports that effective compliance of CG is dependent on how the institution is nourished with the spirit of QWL and CG maintains relationship between the company’s man­agement, board of directors, shareholders, employees, and auditors and stakeholders. Moreover, QWL consider different components like autono­my of work, compensation and rewards, job satisfaction and job security, quality of work life, relation and co-operation, training and development, work environment. Objectives: The main purpose of this paper was to investigate the factors, dimensions and policy implications to foster quality of work life (QWL) situation in organizations, especially in the Nepalese corporate sector. Methods: Fully based on qualitative desk review and analyses. Results: This paper has attempted to establish relationship between the determinants of QWL situation and corporate governance (CG) from a positivists’ perspective. In the present Nepalese context, several challeng­ing factors, such as, employee attitude, working environment, opportuni­ties, nature of work, stress, job challenges, development and career poten­tial are affecting QWL attainment. Conclusions: QWL promotes adequate and fair compensation, safe and healthy working condition, opportunity to use and develop human capabil­ities, opportunity to growth and security, social integration, constitution­alism, social relevance of work life; work and total life span of the people. Implications: Robust QWL standardization, monitoring and evaluation be in place to govern all corporate entities in a meaningful manner.
APA, Harvard, Vancouver, ISO, and other styles
33

Gorodianska, L. V., and L. V. Tsiukalo. "INFORMATION SECURITY OF SMALL BUSINESSES IN THE CONTEXT OF DIGITALIZATION." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 70 (2021): 105–14. http://dx.doi.org/10.17721/2519-481x/2021/70-11.

Full text
Abstract:
The article defines and analyzes the characteristic features of modern society digitalization, in particular the digital economy. It is noted that progress in the digital technology environment requires the application of information security measures, primarily in the financial and economic activities of small businesses. The interpretation of the definitions «information security» and «economic security» has been clarified. Attention is drawn to a conscious understanding of the interaction between people and technology during the digital transformation of the economy in such a way that the latest technologies must adapt to people, and not vice versa. It is emphasized that such an understanding can come only in the process of training and acquiring appropriate professional competencies, especially among small businesses. The types of small businesses information that are subject to protection and components of economic security are determined. Proposals have been formed for the creation of a comprehensive security program, which should include an action plan aimed at protecting the functioning of the enterprise's information system from external and internal influences, and a set of measures designed to protect the confidentiality, availability, and integrity of data from internal and external, malicious and accidental threats. Information security of small businesses in the context of digitalization should be based on the following positions: the management of the enterprise should regularly train all employees in the principles of Information Security, data protection and protect physical data carriers from cyber attacks; the corporate network should be segmented, and access to it – controlled; partnership with service providers from the point of view of information security should be equivalent; remote access to the corporate network of the enterprise, which is now becoming more widespread, should be as secure as possible and comply with information security standards. A promising area of further research is the development of a set of measures at the state level, which includes streamlining the simplified tax system, promoting the development of innovative entrepreneurship, cluster organization of small businesses, the formation of a modern information infrastructure to support entrepreneurship, the formation of a favorable business climate.
APA, Harvard, Vancouver, ISO, and other styles
34

Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Stanislaw A. Rajba. "Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model." Applied Sciences 11, no. 23 (November 25, 2021): 11175. http://dx.doi.org/10.3390/app112311175.

Full text
Abstract:
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the paper enhanced the Clements–Hoffman model, determined the integral security metric and, on this basis, developed a technique for evaluating the security of relational databases. The essence of improving the Clements–Hoffmann model is to expand it by including a set of object vulnerabilities. Vulnerability is considered as a separate objectively existing category. This makes it possible to evaluate both the likelihood of an unwanted incident and the database security as a whole more adequately. The technique for evaluating the main components of the security barriers and the database security as a whole, proposed by the authors, is based on the theory of fuzzy sets and risk. As an integral metric of database security, the reciprocal of the total residual risk is used, the constituent components of which are presented in the form of certain linguistic variables. In accordance with the developed technique, the authors presented the results of a quantitative evaluation of the effectiveness of the protection of databases built on the basis of the schema with the universal basis of relations and designed in accordance with the traditional technology of relational databases.
APA, Harvard, Vancouver, ISO, and other styles
35

Santos, Marcelo, and Antoine Faure. "Affordance is Power: Contradictions Between Communicational and Technical Dimensions of WhatsApp’s End-to-End Encryption." Social Media + Society 4, no. 3 (July 2018): 205630511879587. http://dx.doi.org/10.1177/2056305118795876.

Full text
Abstract:
WhatsApp’s implementation of end-to-end encryption has been celebrated by many. Intriguingly, though, the invisible affordance was made visible with an individual message to each conversation. In this research, we “properly scrutinize” the roll-out of the affordance in historical perspective inspired by the “platform biography” approach, critically comparing corporate and media documentation with an analysis of the attributes and affordances that refer to the realm of privacy and security with focus on the end-to-end encryption. After pointing the contradictions with evidences found, we conclude that the implementation should be interpreted neither as a plain idealistic saga for user privacy and security by the App’s founders nor as simply a market-oriented approach—though both are clearly components of the company’s motives—but as a strategic move inserted in a: (1) Public Relations guerrilla strategy from WhatsApp Inc. facing national States and respective intelligence agencies or law enforcement institutions, in which context the development and implementation of affordances reveals a (2) power move by corporate digital media to avoid political conflict against vigilante state power and therefore the App’s subsistent vulnerabilities in terms of privacy and security should be read as (3) a tradeoff between commercial massiveness at the expense of technological utopia.
APA, Harvard, Vancouver, ISO, and other styles
36

IEFIMOVA, GANNA, SVITLANA MARUSHCHAK, and OLEKSIY PASHCHENKO. "PLANNING THE MARITIME COMPANY’S DEVELOPMENT ON THE BASIS OF ITS ECONOMIC SECURITY LEVEL." Economic innovations 23, no. 2(79) (June 20, 2021): 76–86. http://dx.doi.org/10.31520/ei.2021.23.2(79).76-86.

Full text
Abstract:
Topicality. An important condition for ensuring the development of the maritime complex companies is the formation of an effective strategy. The dynamism and uncertainty of the environment in which companies operate, necessitate taking into account the level of their economic security when making decisions about the choice of development strategy.Aim and tasks. The purpose of the article is to develop guidelines for choosing a strategy for the development of a maritime company based on an assessment of its economic security.Research results. The system approach to management of the company’s economic safety is considered. The content of strategic planning for the maritime company development and its correlation with the level of economic security are determined. Qualitative parameters of the corporate resources use in combination with the organizational and functional structure and relationships of structural units, as well as some quantitative guidelines for ensuring the functional components and the level of economic security of companies in general. To identify four strategic areas of the company’s economic security management in the field of maritime management is proposed. The mechanism of the maritime complex companies’ economic security management, its elements, the scheme of their action and interaction are determined to implement the chosen strategy. The priorities for choosing the strategy of the company’s development depending on the level of economic security are specified. The use of a scenario approach for economic security planning based on monitoring the risks and threats of the current activities of the maritime companies is proposed.Conclusion. The proposed approach allows characterizing the conditions of maritime management by the level of safety and on the basis of this information to determine the priority areas of strategic planning of the company’s economic security. Under the conditions of efficient use of corporate resources at company, favourable conditions will be created for achieving business goals, timely detection and maximum mitigation of various dangers and threats in conditions of competition and economic risk, and thus – will ensure the functioning and further development of the maritime complex.
APA, Harvard, Vancouver, ISO, and other styles
37

Buinytska, Oksana P. "СТРУКТУРНО-ФУНКЦІЙНА МОДЕЛЬ ІНФОРМАЦІЙНО-ОСВІТНЬОГО СЕРЕДОВИЩА УНІВЕРСИТЕТУ." Information Technologies and Learning Tools 69, no. 1 (February 25, 2019): 268. http://dx.doi.org/10.33407/itlt.v69i1.2313.

Full text
Abstract:
One of the ways to solve the problem of preparing competitive graduates of the University is to create an effective information and educational environment. At the present stage, such an environment should include the means of realization of educational, scientific and management activities; support environment for collective and individual communication; objects of educational activity and interaction; training platforms and security tools. Taking into account the requirements for ensuring not only the functioning but also the system development of the university, the general principles of management and the principles of the development of educational systems as the guiding principles of designing the information and education environment we are guided by the principles: system approach; modular structuring of information and data; modifications, addition and permanent updates; adequacy; providing the necessary and sufficient information; sharing data. A prerequisite for the creation of the university's information and educational environment is the availability of electronic content, technologies and the electronic communication of all participants in the educational process. Modeling a qualitative and effective information and educational environment is possible only with the development of all its components - managerial, content, organizational, technological. To the managerial component, we include educational policy, management standards and electronic control that perform planning, organizational, motivational and controlling functions. The semantic component includes scientific, educational, controlling and information and methodological resources that are aimed at providing cognitive, creative and value functions. Organizational component contains, respectively, the organizational structure, normative base, corporate standards and performs the integration, systematization and information functions. In the technological component, we allocate centralized and decentralized services, which are aimed at implementation of modeling, productive and instrumental functions. An example of designing such a model is an effective information and educational environment aimed at training competitive specialists at the Borys Grinchenko Kyiv University.
APA, Harvard, Vancouver, ISO, and other styles
38

Rudenko, I. V., T. M. Bolotova, and T. V. Kulynych. "The Diagnostics of Economic Security as an Instrument for Ensuring Efficient Image Management of Enterprise." Business Inform 1, no. 516 (2021): 297–302. http://dx.doi.org/10.32983/2222-4459-2021-1-297-302.

Full text
Abstract:
The article is aimed at developing methodical approaches to efficient management of the enterprise’s image in connection with the state of its economic security. It was concluded that the issue of the impact of the image on the economic security of enterprise today is paid insufficient attention. It is proved that in the conditions of unstable economic situation in Ukraine, the process of efficient management of the enterprise’s image should be based on the diagnosis of its economic security. A theoretical analysis of opinions in the scientific literature on the functional components of economic security of enterprise and the mechanism of their formation is carried out. The expediency of using the approach to the formation of the corporate image, taking into account the targeted impact of management entities on the participants of the business environment, is accentuated. A structure of economic security of enterprise in the context of modern tendencies is proposed. The functional components of economic security related to both the internal and the external aspects of the enterprise’s activity are studied in detail and their close relationship with the components of the image is determined. During the research, the lack of unity in the methodology of diagnostics of economic security of enterprise was proved. A methodical approach to mutually coordinated management of the image and economic security of enterprise is developed, which is based on the results of diagnostics of economic security levels and assessment of the real level of the enterprise’s image. It is emphasized the need to adhere to a certain sequence of actions directed towards forming a positive image of enterprise and managing it. Schematically depicted are the stages of managing the image of enterprise, taking into account the compliance of the levels of components of economic security of the image. A complex of measures is defined that are recommended to be used to maintain the image of enterprise: personnel, marketing, client and production-economic.
APA, Harvard, Vancouver, ISO, and other styles
39

Tkachenko, Tetiana, Kateryna Kozak, Hanna Sytnyk, Iryna Vysochyn, and Olga Andrus. "Methodological support of the efficiency diagnosis of the economic security system of industrial enterprises in competitive environment." LAPLAGE EM REVISTA 7, no. 3B (September 23, 2021): 460–69. http://dx.doi.org/10.24115/s2446-6220202173b1572p.460-469.

Full text
Abstract:
The article proposes a classification of methodological approaches to the diagnosis of the economic security of enterprises according to the principles of consistency and strategic levels of government. The authors formalize the methods at the general, structural, factorial and unit levels. The general methods include indicator, functional-resource and economic-mathematical. Structural methods are distinguished by the direction of the economic security system, which allow to formalize corporate, motivational, financial and investment-profitable approaches. The factor group of methods is also formalized, in which the diagnostics of innovative influence, competitive status, market threats and normative-legal influence is distinguished. The largest group include methods of unit diagnostics, among which are methods of analysis of bankruptcy, personnel and intellectual, technical and technological, social, environmental, information and other components.
APA, Harvard, Vancouver, ISO, and other styles
40

Sulistyowati, Diah, Fitri Handayani, and Yohan Suryanto. "Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS." JOIV : International Journal on Informatics Visualization 4, no. 4 (December 18, 2020): 225. http://dx.doi.org/10.30630/joiv.4.4.482.

Full text
Abstract:
Data or Information security in today's digital era is crucial in every organization that needs to pay attention. Management of organizational information is one of the components in realizing Good Corporate Governance. The measure of an adequate level of protection is an indicator of the cybersecurity awareness aspects of an organization's business processes in the short, medium, and long term, especially in the field that deals with information and communication technology (ICT). To make this happen, it requires a security standard that is appropriate and follows its needs to help organizations know the maturity level of cybersecurity in protecting its information security. The ABC organization is one of the Government agencies that manage the critical infrastructure and Indonesian digital economies. The organization has currently implemented several international security standards through its planning, implementation, evaluation document, and ICT activities. However, based on the national information security readiness assessment, information security management readiness results are still not optimal. In this study, an analysis of the NIST, ISO 27002, COBIT, and PCI DSS security standards has been carried out, which are ABC organizational security standards in managing ICT by assigned tasks and functions. Furthermore, the analysis result is used as materials for drafting a cybersecurity maturity framework through the four standard approaches that have become the basis for ICT management. The proposed concept of twenty-one integrated cybersecurity categories is expected to be a capital in measure ICT management performance in ABC organizations.
APA, Harvard, Vancouver, ISO, and other styles
41

Bondar, Iuliia, and Tatiana Doroshenko. "ЕКОНОМІЧНА БЕЗПЕКА ПІДПРИЄМСТВА ЯК ФАКТОР ЗАБЕЗПЕЧЕННЯ ЕФЕКТИВНОСТІ ЗОВНІШНЬОЕКОНОМІЧНОЇ ДІЯЛЬНОСТІ." Development of Management and Entrepreneurship Methods on Transport (ONMU) 78, no. 1 (2022): 70–82. http://dx.doi.org/10.31375/2226-1915-2022-1-70-82.

Full text
Abstract:
The article proves that the importance of foreign economic activity for domestic enterprises and the need to ensure their economic security determine the urgency of the transition to security-oriented management of foreign economic activity. The essence of the concept of «economic security» is analyzed and it is determined that it is a rather broad concept that should be considered as a process of more efficient use of its production and economic resources and entrepreneurial capabilities. set goals and objectives in accordance with his chosen development stra-tegy. The level of economic security of the enterprise is studied and it is determined that it depends on how effectively its management and specialists will be able to avoid possible threats and eliminate the harmful effects of certain negative components of the external and internal environment. It is determined that the purpose of economic security of the enterprise is to guarantee its stable and most efficient operation in the present and high potential for future development. The mechanism of economic security management, which depends on the scope of the enterprise, providing corporate resources and opportunities to implement basic measures to maintain its proper level as a whole and its main structural elements, as well as the mechanism of economic security of foreign economic activity is an effective element of economic security. The list of tools (models) for ensu-ring the economic security of foreign economic activity, which relate to the mechanism of economic security management of foreign economic activity of the enterprise. The place of economic security of entrepreneurship in the security system of the national economy is determined.It should be noted that the universal tools to ensure a high level of economic security of the enterprise include: organizational and managerial measures, technical support, control and systematic monitoring of indicators of its individual structural elements and economic security of the enterprise as a whole. Keywords: enterprise management, economic security, foreign economic activity, instruments of the mechanism of economic security, models.
APA, Harvard, Vancouver, ISO, and other styles
42

Volovyk, V. "INFORMATION AND LEGAL BASES OF PREPARATION OF CITIZENS FOR MILITARY SERVICE." Visnyk Taras Shevchenko National University of Kyiv. Military-Special Sciences, no. 3 (47) (2021): 46–48. http://dx.doi.org/10.17721/1728-2217.2021.47.46-48.

Full text
Abstract:
The purpose of the article is to determine the essence and elements of information and legal training for military service. The article substantiates that in order to ensure a high level of development of information security and information culture of servicemen, it is necessary to form in them sufficient knowledge, skills and abilities to ensure personal and corporate information security. Attention is focused on the importance of the use of the information space by military personnel for more effective performance of their service and combat missions. The implementation of the tasks defined above is possible provided that the preparation of civilians for military service includes components of training and practicing skills necessary for the effective implementation of the information component of their future professional activities. Information activity is considered, in which a soldier participates, in a structural aspect. Three blocks of the studied phenomenon are highlighted: firstly, this is a block of information and legal knowledge, which should include the most important provisions of the legislation of Ukraine on access to public information, protection of personal data, protection of state secrets, as well as the peculiarities of working with information requests from citizens and the basics of electronic workflow. Secondly, this is an information security block, which consists of three main elements: information security of an individual, information security of the Armed Forces of Ukraine and information security of the state. Thirdly, this is a block of information hygiene, which includes the development of skills and abilities to maintain the psychological balance of a serviceman in situations of aggressive communicative influences, the ability to understand the purpose of disseminating information, to highlight false information, the purpose of which is to achieve military and non-military goals of the enemy. The article establishes that the system of information and legal training for military service should include the formation of relevant knowledge, abilities, skills and personal qualities. This can be achieved through the introduction of special courses in the system of military lyceums, as well as the introduction of a system of disciplines on the basis of higher military educational institutions and military educational subdivisions of higher educational institutions, providing for the acquisition of basic information and legal knowledge, skills and abilities. In addition, approaches to the formation of professional standards for all military registration specialties, educational and professional programs and curricula should be revised by including in them the relevant competencies in the field of information security, information hygiene and information legislation, each of which is of indisputable importance for the formation of personality. a modern serviceman as an educated, knowledgeable and information literate person who can use all the possibilities of the information space for the effective fulfillment of his service and combat missions.
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Yizhou (Joe). "Programmatic Dreams: Technographic Inquiry into Censorship of Chinese Chatbots." Social Media + Society 4, no. 4 (October 2018): 205630511880878. http://dx.doi.org/10.1177/2056305118808780.

Full text
Abstract:
This project explores the recent censorship of two Chinese artificial intelligence (AI) chatbots on Tencent’s popular WeChat messaging platform. Specifically, I am advancing a technographic approach in ways that give agency to bots as not just computing units but as interlocutors and informants. I seek to understand these chatbots through their intended design—by chatting with them. I argue that this methodological inquiry of chatbots can potentially points to fissures and deficiencies within the Chinese censorship machine that allows for spaces of subversion. AI chatbot development China presents a rich site of study because it embodies the extremes of surveillance and censorship. This is all the more important as China have elevated disruptive technologies like AI and big data as critical part of state security and a key component to fulfilling the “Chinese Dream of National Rejuvenation.” Whether it is the implementation of a national “social credit” system or the ubiquitous use facial recognition systems, much of Western fears about data security and state control have been already realized in China. Yet, this also implies China is at the frontlines of potential points of resistance and fissures against the party–state–corporate machine. In doing so, I not only seek to raise questions dealing with the limits of our humanity in the light of our AI-driven futures but also present methodological concerns related to human–machine interfacing in conceptualizing new modes of resistance.
APA, Harvard, Vancouver, ISO, and other styles
44

Ingale, Abhishek, Mansi Vispute, Saurabh Sonawane, Hema Guthula, and Prof Dr Rajiv Iyer. "Hawk Eye Unmanned Aerial Vehicle for Monitoring." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 83–87. http://dx.doi.org/10.22214/ijraset.2022.42082.

Full text
Abstract:
Abstract: Quadcopters are drones also known as unmannedaerial vehicles that can be controlled remotely. Quadcoptershave uses in various fields. The Components required in building the quadcopter are its frame, Pixhawk flight controller, brushless DC motors, propellers, High Definition (HD) camera, Global Positioning System (GPS), telemetry module. Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. These kinds of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their operations. The spectrum of applications where drones are used for Security purposes include scouting and reporting emergencies, monitoring accidents and crimes, surveillance of a certain landscape area, operating in highly busy and pedestrians as well as their tracking from up in the sky, and so on. The project will serve as a bridge to connect actual happening in areasthat cannot be navigated easily by security personnel of corporate institution as the Drone will be used to hover and record the actual happening as it transmit to a ground station which records and analyses the events as they stream in, Also, due its capability of flying over different altitudes the drone can generally be used on areas with rugged terrains or over water bodies for a time dependent on its power capacity. Keywords: drone, flood, Pixhawk, quadcopter, rescue,surveillance, image processing.
APA, Harvard, Vancouver, ISO, and other styles
45

Hacioglu, Umit, and Gul Sevgilioglu. "The evolving role of automated systems and its cyber-security issue for global business operations in Industry 4.0." International Journal of Business Ecosystem and Strategy (2687-2293) 1, no. 1 (July 18, 2019): 01–11. http://dx.doi.org/10.36096/ijbes.v1i1.105.

Full text
Abstract:
Nowadays, effective business performance depends on digital competitive factors and its ability to transform corporate capabilities in the light of digitalization. In this study, the evolving role of automated systems for global business operations in the era of Industry 4.0 has been assessed from a theoretical perspective with a practical approach. It is aimed to demonstrate the role of high technologies in an effective supply chain management system with new technological components and cyber-security issues of automated vehicles in SCM. This study highlights that developments in Artificial Neural Networks, Image Processing, Multi-Purpose Decision-Making, Blurred Linguistic Variables, and automated systems increase the performance of the supply chain management system and boost business performance. It is also shown that the evolving role of the automated system requires capital investments on Research and Development efforts
APA, Harvard, Vancouver, ISO, and other styles
46

L, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.

Full text
Abstract:
Industrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process plants. Legacy SCADA systems are working in isolated networks and using proprietary communication protocols which made them less exposed to cyber threats. In recent times, these ICS systems have been connected to Internet and corporate networks for data sharing and remote monitoring. They are also using open protocols and operating systems. This leads to vulnerabilities of the system to cyberattacks. Cybersecurity threats are more prevalent than ever in ICS systems. These attacks may be external or internal. Modbus is a widely deployed communication protocol for SCADA communications. There is no security in design of Modbus protocol, and it is vulnerable to numerous cyberattacks. In this paper, we worked for False Command Injection attack, False Access Injection attack, and replay attacks on Modbus protocol. Initially, a real-time SCADA testbed was set up, and we envisaged the impact of these attacks on Modbus protocol data using the testbed. In this work, we used local area network (LAN) environment only for simulating the attacks. We assumed that the attacks penetrated the LAN network. We proposed and developed (a) a method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and (b) a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC). Numbers of attacks were simulated and the performance of the method was measured using attack block rate (ABR). It blocked 97% of malicious Modbus transactions or attacks to reach the PLC. It protects SCADA systems from attackers, which is a core component of industrial control systems. The solution enhanced the security of SCADA systems with Modbus protocol.
APA, Harvard, Vancouver, ISO, and other styles
47

Akbasheva, A. A., I. S. Dzakhmisheva, and Y. V. Masalova. "Formation of the mechanism of ensuring economic security of the agricultural enterprise." Proceedings of the Voronezh State University of Engineering Technologies 82, no. 4 (January 20, 2021): 297–306. http://dx.doi.org/10.20914/2310-1202-2020-4-297-306.

Full text
Abstract:
The scientific article proposes a mechanism for ensuring the economic security of an agricultural enterprise, which contributes to the improvement of the financial position of an economic entity in the existing one. The current system of the process of ensuring economic security is a guarantee for the stable development of an economic entity, therefore the developed mechanism is in demand and a necessary condition for the development of an agricultural enterprise. The mechanism for ensuring the economic security of an enterprise is formed through a system of management activities in financial relations by using certain principles, financial levers, tools, methods of legal and information research, which allows achieving the main goals of the enterprise. Among the main components of the mechanism for ensuring economic security, eight main stages of the entire mechanism are proposed. The scope and specificity of the enterprise's business is formed taking into account the property status and financial interests of the enterprise: growth in the market value of the enterprise and maximization of profits; sufficiency of fixed and working capital; availability of the required volume of investment resources; optimization of payments to the budget, etc. ensuring the economic security of the enterprise plays a significant role in its functioning as a whole. The implementation of an effective mechanism for the economic security of an enterprise requires proper attention from managers to the level of integration into the global information space, the economic interests of the company, the level of expenditure of corporate resources and a clear organization of activities. The mechanism of the process of ensuring economic security is based on a systemic combination of certain tools, methods, means and information and analytical process of ensuring, created on the basis of objectively existing principles of the process of ensuring economic security, as well as those that are formulated by the subjects of managing the economic security of an enterprise to achieve and protect it. financial interests.
APA, Harvard, Vancouver, ISO, and other styles
48

Бортник, С. М. "The System for Improving the State Financial Control." Law and Safety 73, no. 2 (June 21, 2019): 25–30. http://dx.doi.org/10.32631/pb.2019.2.03.

Full text
Abstract:
It has been substantiated that the role, tasks and scale of the state financial control are directly related to the concept of national and economic security of Ukraine, and the specific attitude towards this control is due to the fact that it is carried out in the plane of interweaving of state, regional, corporate and individual interests. It has been noted that the state financial control covers not only the process of the formation of the revenue part of the budgets, but also their expenditure component, since the state should implement it during the realization of government programs, financing current and capital expenditures, providing local budgets with additional resources from the State Budget, etc. Due to the formalization of certain stages of the system of the state financial control, identification of the main threats to the financial and budgetary system and motivation to avoid tax payments, the definition of the factors of ensuring national security was further developed in the article. To improve the existing control procedures, the author has offered the list of factors for increasing the efficiency of control in the financial and economic sphere, which can facilitate the organization of the state financial control in general. The author has determined the directions for improving the forms and methods of the state financial control, namely: increase of the number of joint inspections of controlling agencies, including cross-checks (counter-checks); carrying out repeated inspections of subjects that made concealment and abuse in large amounts; usage of indirect methods of calculating the subject’s base.
APA, Harvard, Vancouver, ISO, and other styles
49

Blagorazumov, A. K., I. G. Kirpichev, and D. V. Petrov. "Isolation of corporate local area networks using server virtualization." Civil Aviation High Technologies 22, no. 6 (December 26, 2019): 100–111. http://dx.doi.org/10.26467/2079-0619-2019-22-6-100-111.

Full text
Abstract:
Secure enterprises have Local Area Networks (LANs) that store and process sensitive data that should not be accessed from outside. At the same time, no modern enterprise can successfully function without a LAN which provides the Internet access for the computers of the sales department, technical support service and E-mail server. In order to ensure information security, these two network segments are usually physically isolated from each other by means of exception of any cable interconnections. Enterprises with high demands for server uptime use server virtualization, which requires connecting physical servers to disk storage of virtual server image files. When highly reliable servers are needed only in one of two independent corporate network segments, the cost of creating such a server cluster is reasonable and fast paying off. But when a company encounters the need to place a small but highly reliable server into another network segment, the following problem arises: only server cluster with expensive components can provide the required reliability, but to solve the tasks assigned to the new server, the cluster computing capacity would be too high, and deploying of a cluster would be extremely costly and economically unjustified. On the other hand, the required computing capacity for a new server would be taken from the existing server cluster by creating a new virtual server without any expenses. However, in such case it is necessary to ensure isolation of the new virtual server from the network segment the physical hosts servers are connected to. The article examines the methods of configuring the LAN that allow to isolate virtual and physical servers at the network level. The authors also consider the episode when it is necessary to transfer files between the two computers located in the LAN segments isolated from each other and gives the appropriate solution.
APA, Harvard, Vancouver, ISO, and other styles
50

Momot, Tetiana, Olena Filonych, Antonina Kosiak, and Olena Lobach. "BALANCED SCORECARD OF SAFETY-ORIENTED MANAGEMENT FOR THE CONSTRUCTION INDUSTRY ENTERPRISES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 54–62. http://dx.doi.org/10.30837/itssi.2021.16.054.

Full text
Abstract:
The article is devoted to the study of the theoretical and methodological foundations for the development of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry. The subject of the research is a set of theoretical, methodological and practical aspects to ensure the formation of the balanced scorecard development to ensure safe-oriented management of enterprises in the construction industry. The purpose of the article is to develop theoretical and methodological provisions and substantiate practical recommendations for the formation of a model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry, taking into account the interests of all groups of stakeholders. Objectives of the work: to analyze modern trends in the development of enterprises in the construction industry in Ukraine; to generalize approaches to the definition of the concept of safety-oriented management; explore and organize the elements of safety-oriented management; to develop a model of a balanced scorecard for ensuring safe-oriented management in the corporate security system of enterprises in the construction industry. In the course of the study, the following methods were used: abstract-logical analysis, theoretical generalization and systematization, system analysis. The paper analyzes the dynamics of the development of enterprises in the construction industry in Ukraine in the context of the introduction of quarantine measures related to COVID-19. Factors constraining construction activities have been identified, which include financial constraints, insufficient demand, labor shortage, and weather conditions. Approaches to the definition of security-oriented management have been generalized and the definition of security-oriented management in the corporate security system has been improved. The elements of safety-oriented management are systematized with the specification of such components as risk assessment, development and implementation of security policy, definition of requirements, establishment of control and monitoring of the external and internal environment. A model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry has been developed. Conclusions. In the course of the study, the expediency of forming a balanced system of indicators for ensuring safe-oriented management of enterprises in the construction industry was substantiated, taking into account the dynamics of the performance of construction work during 2019-2021. The elements of the system of safe-oriented management are presented in detail and the expediency of the formation of a balanced system of indicators for ensuring the safe-oriented management of enterprises in the construction industry is substantiated. The sequence of the formation of a balanced scorecard for ensuring safety-oriented management is detailed with the specification of a scorecard for assessing strategic goals for the components of a balanced scorecard: finance, customers, internal business processes, training and development.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography