Share:


The development of corporate security in the context of countering threats to doing business

    Taras Shyra   Affiliation
    ; Kostiantyn Salyga Affiliation
    ; Vasyl Derii   Affiliation
    ; Igor Prykhodko   Affiliation
    ; Svitlana Shymkiv   Affiliation

Abstract

The principal purpose of the study is to determine the main parameters of corporate security development in the enterprise in the context of determining the level of impact of external and internal threats. The study uses survey methods on the main internal and external threats that may affect the corporate security of enterprises. The purpose of the practical part of our study is to determine the level of these threats to corporate security. The methodological basis of our study is the method of expert evaluation, which was conducted by interviewing people involved in the process of corporate security management of enterprises, as well as methods of the hierarchical organization using matrices of pair-wise comparisons. The major results of the study can be considered determining the hierarchy of influence of each of the threats affecting the corporate security of industrial enterprises, which will allow optimizing the security system and directing its activities to more pressing issues. Our method of the hierarchical organization of threats to corporate security does not take into account the specifics of the corporate security system of industrial enterprises in most European countries and now can be freely implemented mainly in industrial enterprises of Eastern Europe. The proposed method of assessing external and internal threats is currently optimized for the activities of industrial enterprises in Eastern Europe, including Ukraine and Poland. In the following, at an expansion of the given research, there is a possibility of introducting this methodology to the enterprises of other countries or other profiles. The relevance of this study lies in determining the level of threats that affect the corporate security of industrial enterprises. The methodology for assessing the level of influence of these threats is universal, therefore it can be used in the event of a change in the main threats, it is extremely relevant in the context of rapid globalization changes in the world.

Keyword : corporate security, parameters of the development, external and internal threats, risk, enterprise, matrix, the relationship graph

How to Cite
Shyra, T., Salyga, K., Derii, V., Prykhodko, I., & Shymkiv, S. (2021). The development of corporate security in the context of countering threats to doing business. Business: Theory and Practice, 22(1), 211-221. https://doi.org/10.3846/btp.2021.13396
Published in Issue
Jun 15, 2021
Abstract Views
695
PDF Downloads
471
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

References

Abalkin, L. (2019). Economic security: threats and their reflection. Economic Issues, 12, 4–13.

Anilovska, G. (2020). Calls to the army of competitors in the field of competition and market. Science Newsletter NLTU of Ukraine, 23(1), 177−182.

Berle, A. A., & Means, G. С. (1997). The modern corporation and private. The MacMillan Company.

Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security education: towards meeting the challenge. Security Journal, 19(3), 180–195. https://doi.org/10.1057/palgrave.sj.8350016

Briggs, R., & Edwards, C. (2006). The business of resilience: corporate security for the 21st century. Demos.

Cabric, M. (2017). From corporate security to commercial force: a business leaderʾs guide to security economics. Butterworth-Heinemann, Linacre House. https://doi.org/10.1016/B978-0-12-805149-8.00002-9

Chapple, L. (2014). Corporate governance and securities class actions. Australian Journal of Management, 39(4), 525–547. https://doi.org/10.1177/0312896213512320

Cubbage, C., & Brooks. D. J. (2013). Corporate security in the Asia-Pacific Region. CRC Press.

Frey, R., Rosler, L., & Lu, D. (2019). Corporate security prices in structural credit risk models with incomplete information. Mathematical Finance, 29(1), 84–116. https://doi.org/10.1111/mafi.12176

Gileta, I. V., Senkivsky, V. M., & Melnikov, O. V. (2012). Simulation in system analysis by binary comparison method: Computer program: registration certificate author. Rights to the work 41832 Ukraine № 42107, application 17.11.2011, publ. 02.07.2012, Bull. 27, 88.

Halibozek, E., Jones, A., & Kovacich, G. L. (2008). The corporate security professionalʾs handbook on terrorism. Elsevier.

Hardman, J. (2018). Three steps forward, two steps back: a view from corporate security practice of the moveable transactions (Scotland) bill. Edinburgh Law Review, 22(2), 266–273. https://doi.org/10.3366/elr.2018.0485

Karaim, M. M. (2016). Anti-crisis technologies in the management of economic security of the enterprise. A. M. Stangret (Ed.). Ukrainian Academy of Printing.

Knight, R., & Nurse, J. (2020). A framework for effective corporate communication after cyber security incidents. Computers & Security, 99. https://doi.org/10.1016/j.cose.2020.102036

Kotlyarevsky, Ya. V., Melnikov, O. V., Shtangret, A. M., & Ratushnyak, Yu. V. (2016). Hierarchical ordering of factors that hinder or stimulate the development of the information sphere in Ukraine. Scientific and Practical, 2(75), 39–52.

Ludbey, C. R., Brooks, D. J., & Coole, M. P. (2018). Corporate security: identifying and understanding the levels of security work in an organisation. Asian Journal of Criminology, 13, 109–128. https://doi.org/10.1007/s11417-017-9261-x

McKenzie-Skene, D. (2019). A practical guide to granting corporate security in Scotland. Edinburgh Law Review, 2, 284–285. https://doi.org/10.3366/elr.2019.0559

Nalla, M., & Morash, M. (2002). Assessing the scope of corporate security: common practices and relationships with other business functions. Security Journal, 12(1), 7–19. https://doi.org/10.1057/palgrave.sj.8340119

Roney, M. (2014). Corporate security requires an integrated approach, Forbes, 5, 58.

Shershneva, Z. E., & Oborskaya, S. V. (2020). Strategic management [a textbook]. Kyiv Publishing House.

Shtangret, A. (2019, 22 September). Corporate security: theoretically ambush a medical care in Ukraine. In Practices of approaches to creative management of economic processes: by X International science-practical conference, Vol. 1 (pp. 38–39). National Agriculture University.

Stenning, P. (2017). Corporate security in the 21st century: theory and practice in international perspective: Book Review. Policing and Society, 27(2), 248−250. https://doi.org/10.1080/10439463.2016.1266146

Sylkin, O., Kryshtanovych, M., Zachepa, A., Bilous, S., & Krasko, A. (2019a). Modeling the process of applying anti-crisis management in the system of ensuring financial security of the enterprise. Business: Theory and Practice, 20, 446–455. https://doi.org/10.3846/btp.2019.41

Sylkin, O., Krystyniak, M., Pushak, Y., Ogirko, O., & Ratushniak, Y. (2019b). Anti-crisis strategy in the system of ensuring financial security of the engineering enterprise: theoretical and practical aspects. In 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T) (pp. 256–260). Kyiv, Ukraine. https://doi.org/10.1109/PICST47496.2019.9061346

Sylkin, O., Shtangret, A., Ogirko, O., Melnikov, A. (2018). Assessing the financial security of the engineering enterprises as preconditions of application of anti-crisis management: practical aspect. Business and Economic Horizons, 14(4), 926–940. https://doi.org/10.15208/beh.2018.63

Szewczyk, S. (2012). The intra‐industry transfer of information inferred from announcements of corporate security offerings. The Journal of Finance, 47(5), 1935−1945. https://doi.org/10.1111/j.1540-6261.1992.tb04689.x

Wolf, K. D., Deitelhoff, N., & Engert, S. (2007). Corporate security responsibility: Towards a conceptual framework for a comparative research agenda. Cooperation and Conflict, 42(3), 294–320. https://doi.org/10.1177/0010836707079934

Yarochkin, V. (2020). Securitology – the science of life safety. Axis-89.

Zedner, L. (2003). Too much security. International Journal of the Sociology of Law, 31(3), 155–184. https://doi.org/10.1016/j.ijsl.2003.09.002

Zhyvko, Z. B. (2012). Economic security of the enterprise: essence, mechanism of maintenance and management [monograph]. Liga-Press.