Проводимо набір статей до публікації у науковому фаховому журналі
"Зовнішня торгівля: економіка, фінанси, право" з економічних та юридичних наук 

Cite as APA style citation
Nosova Eu., Muhuiev K., Rusinov V. Information component in the financial security mechanism of the enterprise. Zovnishnja torgivlja: ekonomika, finansy, pravo. 2021. № 3. S. 98-107. Serija. Ekonomichni nauky.

 FREE FULL TEXT (PDF)

UDC 004.056:[005.934:658.14]   DOI: https://doi.org/10.31617/zt.knute.2021(116)09
   
JEL Classification: M20, M21    
   
NOSOVA Yevheniia  

E-mail: Ця електронна адреса захищена від спам-ботів. вам потрібно увімкнути JavaScript, щоб побачити її.   
ORCID: 0000-0002-7975-0984  
Candidate of Sciences (Economics), Associate Professor, Associate Professor at the Department of Finance
Taras Shevchenko National University of Kyiv
60, Volodymyrska str., Kyiv, 01033, Ukraine
   
MUHUIEV Kyryl  
E-mail: Ця електронна адреса захищена від спам-ботів. вам потрібно увімкнути JavaScript, щоб побачити її.   
ORCID: 0000-0002-2393-2551  
Bachelor of Finance and Credit
Taras Shevchenko National University of Kyiv
60, Volodymyrska str., Kyiv, 01033, Ukraine
   
RUSINOV Volodymyr  
E-mail: Ця електронна адреса захищена від спам-ботів. вам потрібно увімкнути JavaScript, щоб побачити її.   
ORCID: 0000-0002-4362-0248  
Bachelor of Computer Engineering
Igor Sikorsky Kyiv Polytechnic Institute
37, Prosp. Peremohy, Kyiv, 03056, Ukraine

INFORMATION COMPONENT IN THE FINANCIAL
SECURITY MECHANISM OF THE ENTERPRISE

Background. The digitalization of economic activity causes a large number of risks that threaten the financial security and continuity of enterprises. For some industries, electronic commercial information is the most valuable asset, without which the company cannot continue its business.
Analysis of recent research and publications has shown that despite the availability of some scientific achievements, an important scientific and practical problem of the application of modern means of control and minimization of information risks and the potential consequences of information risks remains unresolved.
The aim of the article is to substantiate the need to form a mechanism for managing information risks for a modern enterprise.
Materials and methods. In the course of the research the methods of scientific abstraction, synthesis, generalization and systematization were used.
Results. Modern enterprises cannot operate at a competitive level without the use of IT and access to information infrastructure, which increases the need to develop an adequate information risk management system. Such a system should contain four main components of risk management, aimed at: risk identification; risk analysis; risk minimization; risk monitoring.
Thus, information security complements other components of the FS and ensures that they perform their functions through a comprehensive system of control and protection of information, which is operated by other components of financial security.
Conclusion. The impact of information security on the company’s FS should be measured through the assessment of financial risks to determine the amount of direct and indirect costs of implementing a solution in the field of financial security management of the enterprise.
The IS management mechanism ensures the functioning of the enterprise at a competitive level in the conditions of modern computerized information circulation. It is thanks to this mechanism that effective management of information resources and timely management decisions becomes possible. Without a well-established information security management mechanism, the company is vulnerable to external and internal threats, which in the long run may threaten its profitability and business continuity.

Keywords: financial security, information security, transaction risk, information risk, risk management mechanism.

REFERENCES

  1.  Kojlo, V. V. (2017). Teoretyko-metodologichni pidhody do ocinky ponjattja finansovoi' bezpeky v umovah zrostannja zagroz krai'ny [Theoretical and methodological approaches to assessing the concept of financial security in the face of growing threats to the country]. Naukovyj visnyk Hersons'kogo derzhavnogo universytetu – Scientific Bulletin of Kherson State University, (Issue 23), (part. 2), (pp. 38-42) [in Ukrainian].
  2. Lysa, O. V., & Jaroshhuk, O. V. (et al.). (2016). Finansova bezpeka sub’jektiv gospodarjuvannja v suchasnyh umovah [Financial security of business entities in modern conditions]. Ekonomichnyj analiz: zbirnyk naukovyh prac' – Economic analysis: a collection of scientific papers. Ternopil': Ekonomichna dumka. (Vol. 26), 1, 58-64 [in Ukrainian].
  3. Kysh, L. M. (2018). Finansova stijkist' kompanii' v suchasnyh umovah [Financial stability of the company in modern conditions]. Prychornomors'ki ekonomichni studii' – Black Sea Economic Studies. Odesa, 36, 75-79 [in Ukrainian].
  4. Krasnokuts'ka, N. S., & Koptjeva, G. M. (2019). Definicija ponjattja «finansova bezpeka pidpryjemstva»: osnovni pidhody ta osoblyvosti [Definition of the concept of «financial security of the enterprise»: basic approaches and features]. Biznesinform – Businessinform, 7, 14-19 [in Ukrainian].
  5. Global Survey of Confidential Information Origins. (2017). Retrieved from https://www.ec–rs.ru/novosti/utechki–konfidentsialnoy–informatsii–v–2017–godu–globalnoe–issledovanie–infowatch [in English].
  6. Ali, O., Shrestha, A., Chatfield, A., & Murray, P. (2020). Assessing information security risks in the cloud: A case study of Australian local government authorities. Government Information Quarterly, Elsevier. Retrieved from https://wroya.com [in English] https://doi.org/10.1016/j.giq.2019.101419.
  7. Veiga, A., Astakhova, L., Botha, A., Herselman, M.(2020). Defining organisational information security culture. Perspectives from academia and industry. Computers & Security. Retrieved from https://www.researchgate.net [in English] https://doi.org/10.1016/j.cose.2020.101713.
  8. Brunner M., Sauerwein C., Felderer M., & Breu R. (2020). Risk management practices in information security: Exploring the status quo in the DACH region. Computers & Security. Elsevier. Retrieved from https://arxiv.org/pdf/2003.07674.pdf [in English] https://doi.org/10.1016/j.cose.2020.101776.