297,345 Hits in 4.3 sec

Accounting and information support of enterprise economic security strategy formation and implementation

O.І. Oliynychuk
2015 Vìsnik Žitomirsʹkogo Deržavnogo Tehnologìčnogo Unìversitetu. Ekonomìčnì Nauki  
The article deals with accounting and information resources of enterprise economic security strategy development and realization.  ...  The accounting and information support of the enterprise economic security strategy generated by each of the accounting subsystems were identified.  ... 
doaj:a21829cd88bd4e0ba2a37c4149e70778 fatcat:uuuj3kzwjbb65n4u74n44qmfni

The Peculiarities of Creating a Set of Competitiveness Strategies within the Framework of Ensuring Economic Security of Enterprise

Petrova Iryna L., Vintsi Joe Rosvelt
2018 Bìznes Inform  
The article has identified the relationship between competitiveness and economic security of an enterprise.  ...  The paper allocates main features of creating a set of competitiveness strategies within the framework of ensuring economic security of enterprise, which include the aim, tasks, principles, and the procedure  ...  Successful competitive strategies of large Croatian and Slovenian enterprises. Management: journal of contemporary management issues. 2017. No. 1. Р. 1-112. 8. Андрушків Б. М., Кузьмін О. Є.  ... 
doaj:28eaeb1fcb8742c7b239df4b833137f9 fatcat:duqvj74dzrczfipyfrqrgzzhom

Development of a model for choosing strategies for investing in information security

Valeriy Lakhno, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, Liubov Plyska
2021 Eastern-European Journal of Enterprise Technologies  
This paper has proposed a model of the computational core for the decision support system (DSS) when investing in the projects of information security (IS) of the objects of informatization (OBI).  ...  It is due to the fact that the Cauchy formula for bilinear systems with arbitrary strategies of players, including immeasurable functions, cannot be applied in such games.  ...  Development of a model for choosing strategies for investing in information security.  ... 
doi:10.15587/1729-4061.2021.228313 fatcat:yth4y6q4lffuhix3uscpmxen64

Features of a System Approach to the Strategy of the Corporate Security System of Industrial Enterprise
Особливості системного підходу до стратегії системи корпоративного убезпечення промислового підприємства

N. M. Volosnikova, National Technical University «Kharkiv Polytechnic Institute»
2021 Bìznes Inform  
The goals of the corporate security strategy of the industrial enterprise, which should be subordinated to the general strategy of economic development, and the implementation of the management strategy  ...  The article is aimed at examining the peculiarity of a system approach to the strategy of the corporate security system of an industrial enterprise as a significant factor directed towards increasing the  ... 
doi:10.32983/2222-4459-2021-6-276-282 fatcat:23clzoar4fdfxfoibrotcme5uy

Innovation of Network Information Security Research on Network Marketing Strategy of Small and Medium Sized Enterprises in Big Data Era

2018 2018 2nd International Conference on e-Education, e-Business and Information Management (EEIM 2018)   unpublished
There is a big gap between small and medium-sized enterprises and large enterprises, and the implementation of network marketing strategy is more difficult.  ...  Therefore, under the background of big data era, this paper makes an analysis and research on the network marketing strategy of small and medium-sized enterprises, understands the importance of network  ...  Get more data information In the era of big data, the speed of information generation and update is faster, and the efficiency of information dissemination and integration is significantly improved.  ... 
doi:10.23977/eeim.2018.054 fatcat:u7z4rminmrcg7asmzmllu4wube

Study on the Evolutionary Game of Information Security Supervision in Smart Cities under Different Reward and Punishment Mechanisms

Yihang Guo, Kai Zou, Chang Liu, Yingzi Sun
2022 Discrete Dynamics in Nature and Society  
can likewise mobilize the probability that the enterprise actively chooses to strengthen information security management.  ...  At present, the information security problems of smart city show a high incidence, and it is necessary to strengthen the information security supervision of smart city.  ...  Due to the information asymmetry between enterprises and the public and the opportunistic behavior of enterprises, information security supervision is considered to be an effective intervention strategy  ... 
doi:10.1155/2022/8122630 doaj:17ea11bc141944f7aaab1e770805f026 fatcat:mrzpydm4hzbgxc7mdlalqkprq4

Development of a matrix method for the assessment of information and economic security of an industrial enterprise

Anna Melnikova, Elena Mylnikova, Irina Moskvitina, Nadezhda Nagibina, N. Akatov, K. Antipyev
2021 SHS Web of Conferences  
As a result of the work, the authors present a matrix of information and economic security of an industrial enterprise with individual development strategies for each element.  ...  The purpose of the research is to develop an scoring matrix for information and economic security of an industrial enterprise.  ...  state of information and economic security of an enterprise in order to change the development strategy in time [1] .  ... 
doi:10.1051/shsconf/202111600075 fatcat:q2arrycamnd7fiia57fkeurtxm

Would Enterprises Send Food Traceability Information to Consumers?

Wu Tianzhen, Wang Ruimei, Hu Hongwei, Song Huan
2014 Journal of Food Research  
The analytical results show that "good" enterprise need to send enough food traceability information to get themselves separated from "bad" enterprises, while enterprises which were "not that good" had  ...  <p>Food security incidents have enhanced Chinese consumers' concerns about food quality and security.  ...  Enterprises with a lower food security level would choose * , not * responding to consumers' strategy as indifference curve located above .  ... 
doi:10.5539/jfr.v4n1p105 fatcat:zsfdrnbourhwdi35rtse6unhim

Strategic Security of the Enterprise: Approaches, Features, Mechanism and Problems of Ensuring

Natalia Pasmurtseva, E.B. Dvoryadkina, E.G. Animitsa
2021 SHS Web of Conferences  
of enterprises.  ...  The aim of the study is to formulate the specifics of "strategic security" and to develop a strategic security mechanism for the enterprise in the face of the developing economic crisis.  ...  In addition, in the context of the global digitalization of the economy, the need to provide an information security strategy within the framework of the enterprise's strategic security mechanism is of  ... 
doi:10.1051/shsconf/20219303029 fatcat:ol5fbctt2zhodpgyzatgznuoui

Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight

Yi WANG, Jia-hang YUAN, Jian-ye ZHANG, Cun-bin LI
2017 DEStech Transactions on Economics Business and Management  
With the accelerate development of information, enterprises are becoming increasingly dependent on information systems, therefore, ensuring information security becomes the core work of enterprises information  ...  This paper adds the security prevention measures as the fourth aspect.  ...  But after doing research on some enterprises, we found that enterprises had already established some risk prevention strategies which could resist information security risk.  ... 
doi:10.12783/dtem/icem2017/13132 fatcat:v2bmlx5cwzdkzfqhnp7vefr77y

The Theoretical Topology and Implementation of Enterprise Social Security in the Digital Age Based on Big Data and Artificial Intelligence

Dandan Wang, Ting Lin, Hongmei Xu, Yuan Li
2022 Journal of Sensors  
Enterprise social security theory can effectively improve the scope and speed of social security.  ...  According to this background, this paper studies a topological method for enterprise social security data analysis based on data adaptive analysis strategy and strong learning data stream coprocessing.  ...  analysis strategy and use the convolution neural network algorithm to intelligently analyze the enterprise social security data information.  ... 
doi:10.1155/2022/7814886 fatcat:h7hb7k6t7jel7d3eqv5zyryqvy


Yurii Yaremko, Liliia Shykova, Larysa Syvolap
2019 Baltic Journal of Economic Studies  
The detailed description of the company's general strategies allows us to identify and implement precisely the strategy that will maximize the level of economic security of the enterprise.  ...  It is suggested to use such means as financial, human resources, legal, informational, organizational to ensure the proper level of economic security of agricultural enterprises.  ...  Legal (development of legal acts on the creation, operation of the enterprise and maintenance of its economic security). 4. Information (computers, informational products, security networks). 5.  ... 
doi:10.30525/2256-0742/2018-4-5-421-430 fatcat:2sdvhmguizgt5mrmwuxylxisyy

Research on the Data and Transaction Security of Enterprise E-Commerce Countermeasure

Yongyong Zhu
2013 International Journal of Security and Its Applications  
Security system of enterprise e-commerce based on security strategies Developing the education and training of e-commerce in enterprises to improve their security consciousness For an e-commerce enterprise  ...  During the process of information transfer, both secure and unsecure data are passing through, all kinds of risks thread e-commerce safety and enterprises take ecommerce information security more and more  ...  The e-commerce security strategy The e-commerce network devices safety security strategy The security strategy of enterprise e-commerce system level often consisted by system isolation, access control  ... 
doi:10.14257/ijsia.2013.7.6.26 fatcat:aggmir7ui5ee5nisxm3tvxec7q

A framework for an effective cybersecurity strategy implementation: Fundamental pillars identification

Hasna Elkhannoubi, Mustapha Belaissaoui
2015 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)  
information security level.  ...  However, an effective national cybersecurity strategy conforms to international standards serves to preserve organization's information assets.  ...  Remain secure when you outsource: Enterprises must check that providers adopt as a minimum the information security principles. 7.  ... 
doi:10.1109/isda.2015.7489156 dblp:conf/isda/ElkhannoubiB15 fatcat:3nzgbsgapfdyrhwgqr5acrv574

House of Security: Locale, Roles and Resources for Ensuring Information Security

Wee Horng Ang, Yang Lee, Stuart E. Madnick, Dinsha Mistree, Michael Siegel, Diane M. Strong, Richard Y. Wang, Chrisy Yao
2006 Social Science Research Network  
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information  ...  This model has eight constructs, Vulnerability, Accessibility, Confidentiality, IT Resources for Security, Financial Resources for Security, Business Strategy for Security, Security Policy and Procedures  ...  aspect for information security within the enterprise.  ... 
doi:10.2139/ssrn.926627 fatcat:27npsk4hnrdjnh3lnffe4ilqlu
« Previous Showing results 1 — 15 out of 297,345 results