An integrated analysis of enterprise economy security

被引:0
|
作者
Lelyk, Liubov [1 ]
Olikhovskyi, Volodymyr [1 ,2 ]
Mahas, Nataliia [1 ]
Olikhovska, Marta [1 ]
机构
[1] Interreg Acad Personnel Management, Kiev, Ukraine
[2] Lviv Polytech Natl Univ, Lvov, Ukraine
关键词
Security; Stability; Risks-management; Threats; Assessment methods; Complex analysis; Sustainable business; IMPLEMENTATION; EFFICIENCY;
D O I
10.5267/dsl.2022.2.003
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
With the complication of the business environment of commercial economic activity, competition intensifies, which threatens the bankruptcy of enterprises, the prevention of which requires quality monitoring and timely identification of crises using methods of comprehensive assessment and analysis of economic security. This research is aimed at conducting component-by-component and, as a result, integrated assessment of the state of economic security of the enterprise. Methodological research tools include analysis of the main components, causation and vector regression modeling. A resource-functional security model is developed (which consists of partial indicators and components of economic security of business) and a resource-functional approach to calculations is also applied. Using the data of the expert survey, the values of indicators of structural components of economic security of the enterprise are determined. Using the resource-functional approach, the integrated values of sub-indices and the integral values of the general level of economic security of the enterprise are calculated. According to the results of the assessment, it is established that the integrated level of economic security of the enterprise is 7.04 (sufficient level of security). However, the components of economic security identified critically low values, namely - the financial component (0.452), the information component (0.554), the institutional and legal component (0.647). The results of the study are of practical value for the development of technological schemes - algorithms for strengthening the financial, informational and institutional and legal security of the enterprise, making sound (using economic and mathematical tools) management decisions to ensure the trajectory of sustainable economic development. (c) 2022 by the authors; licensee Growing Science, Canada.
引用
下载
收藏
页码:299 / 310
页数:12
相关论文
共 50 条
  • [1] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [2] Arachne: Integrated enterprise security management
    Burnside, Matthew
    Keromytis, Angelos D.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 214 - +
  • [3] Development of an Integrated Security Framework to Enable the Control and Security of a Heterogeneous Enterprise
    Farroha, B.
    Essman, K.
    Farroha, D.
    Cohan, A.
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 103 - 108
  • [4] A novel architecture for an integrated enterprise network security system
    Thanudas B.
    Sreelal S.
    Cyril Raj V.
    Purnesh Sairam A.
    Gajmoti V.
    Joshi P.
    International Journal of Security and Networks, 2019, 14 (01): : 47 - 60
  • [5] Enterprise Security Analysis and Training Experience
    Ojamaa, Andres
    Tyugu, Enn
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 200 - 208
  • [6] Food security across the enterprise: a puzzle, problem or mess for a circular economy?
    Irani, Zahir
    Sharif, Amir M.
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2018, 31 (01) : 2 - 9
  • [7] Analysis on the Function of Enterprise Information Management in Enterprise Integrated Management
    Xiao, Pengwen
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 427 - 432
  • [8] An application of statistics in the analysis of enterprise economy growth
    Meng, L
    Zhang, QX
    Wang, HC
    PROCEEDINGS OF 2002 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2002, : 2628 - 2632
  • [9] SECURITY CONSTRAINT ANALYSIS OF COAL MINE ENTERPRISE
    Ren, Dawei
    Li, Xingdong
    Wang, Jing
    Lu, Ying
    PROCEEDINGS OF THE 38TH INTERNATIONAL CONFERENCE ON COMPUTERS AND INDUSTRIAL ENGINEERING, VOLS 1-3, 2008, : 2326 - 2330
  • [10] Security analysis of future Enterprise Business Intelligence
    Perumal, Prakash Raj
    Roy, George Gabriel Richard
    Kumar, Britto Ramesh
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 191 - +