z-logo
open-access-imgOpen Access
DENTIFICATION THE WAYS OF COUNTERACTION OF THE THREATS TO THE FINANCIAL SECURITY OF HIGH-TECH ENTERPRISES
Author(s) -
Vasil Franchuk,
Oleh Omelchuk,
Stepan Melnyk,
Mykhailo Kelman,
Oksana M Mykytyuk
Publication year - 2020
Publication title -
verslas: teorija ir praktika
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.369
H-Index - 17
eISSN - 1822-4202
pISSN - 1648-0627
DOI - 10.3846/btp.2020.11215
Subject(s) - business , order (exchange) , identification (biology) , action (physics) , risk analysis (engineering) , key (lock) , control (management) , process (computing) , adaptation (eye) , mechanism (biology) , computer security , financial sector , process management , industrial organization , finance , computer science , philosophy , botany , physics , epistemology , quantum mechanics , artificial intelligence , optics , biology , operating system
Identified key external and internal threats significantly affect the process of ensuring the financial security of the enterprise. The application of the mechanism of counteraction to the influence of external and internal threats is characterized by important. The mechanism for countering threats to the financial security of a high-tech enterprise, unlike existing ones, combines a certain essence and hierarchical ordering of the influence of key external and internal threats, involves targeted tracking of changes in the operational environment, identification of the moment of occurrence of threats, prediction of possible results of their implementation, regulating the choice of the established option actions (adaptive, active and protective), control over security, result from the application of which is the rapid adaptation to possible changes, to neutralize the negative impact of and response to threats of action in order to maintain the necessary level of financial security enterprise. The results of the study can be used in the practical activities of enterprises in the high-tech sector of the economy

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here