scholarly journals BUSINESS PROCESSES EVALUATION WITH THE SUPPORT AND ENSURING OF ENTERPRISE ECONOMIC SECURITY

10.23856/3204 ◽  
2019 ◽  
Vol 32 (1) ◽  
pp. 38-46
Author(s):  
Ievgeniia Mishchuk ◽  
Olha Serdiuk

The development potential of any enterprise is due to its economic security. Support for economic security should be implemented with the help of reliable tools for monitoring and evaluating the efficiency level of its system mechanisms. Ensuring economic security will be as stable as possible if the reference points that indicate the optimal trajectory of business processes control are able to take into account all significant influence factors. Such reference points are indicators for evaluating business operations and economic security. It is important for the indicator to have in its structure all the significant influence factors. The criteria of business processes functioning efficiency used as such reference points have been analyzed in the paper. Main universal influence factors that have to be present in the business process and economic security assessment indicator expression are identified. The definitions of a business process are analyzed, the key characteristics of the definitions are identified, and the author's vision of the essence of the concept is proposed in the light of the prospects for further research.

2021 ◽  
Vol 17 (8) ◽  
pp. 1491-1518
Author(s):  
Vilena A. YAKIMOVA ◽  
Viktor S. RADOMSKII

Subject. The article focuses on organizational and methodological issues of internal compliance control in e-commerce businesses. Objectives. We refine the design and technique of internal compliance control for e-commerce businesses. Methods. The study relies upon methods of analysis and generalization, grouping, systematization, risk-based, systems and business process approaches. Results. We devised the five-component compliance control sysem, determined its principles and functions ensuring the economic security of e-commerce businesses. We suggest conducting compliance procedures intended to mitigate IT risks and accounting for the specifics of e-commerce business processes. Conclusions and Relevance. In e-commerce, compliance control serves for identifying and monitoring compliance risks, ensuring safe operations of businesses, which is vital for people. The information system for IT risk protection was found to underlie compliance control, while control procedures can be classified into general and applied. The findings can be used to set up a reliable and effective compliance system for e-commerce businesses in order to prevent economic abuses and crime.


As the business competition gets increasingly intensified, a competitive business becomes increasingly dependent upon effective and reliable computing services empowered by integrated IT systems. Effective IT systems in an organization are remarkably delineated with the same characteristics: the right data and information can be delivered to the right user at the right place on time; the underlying IT supports can be easily adapted to the ever-changing business setting so that the first characteristic can be consistently maintained; business intelligence can be incrementally developed to facilitate business operations with the support of effective decision-making at a variety of organizational levels across the organization. IT systems can be effectively integrated through implementing business process management (BPM) – a newly emerging corporate IT concept, philosophy, and technology that help align business operations and IT supports in a competitive manner. This chapter first explores the concept of aligning business processes with IT systems. Surely, computing service processes are derived from the correlated business activities within a business unit or across business units, reflecting corporate best practices. How BPM can be well defined, modeled, and managed while integrating enterprise systems is then discussed. As the best practices evolves along with the changes in business operations for a competitive advantage, approaches to building the necessary agility in support of managing the changes of IT-driven business processes is finally discussed.


Author(s):  
I. Zelisko ◽  
O. Sosnovska ◽  
L. Oliinyk ◽  
V. Stefkivskyy ◽  
I. Manaienko

Purpose. To work out an algorithm of an entrepreneur business process optimization in order to systemize and ensure the quality of implementation of key business processes of an insurer as the condition of increasing his/her level of economic security in a turbulent business environment. Methodology. In the study there were used general scientific and specific methods of cognition, in particular: logical colligation, analysis, dialectic synthesis and grouping, induction and deduction, process approach, factor analysis, graphical visualization, economic-mathematical modelling. Findings. The necessity of business process optimization for an insurer was established as a strategically important subject of market relationship development. A logical-structural scheme of interconnection of the main business processes of an insurer is formed; the processes are gradually implemented by stages of insurance services progress, risks underwriting, reinsurance, effecting of an insurance agreement, forming and placing insurance funds and settlement of losses. The main structural elements of the insurers business process optimization were systemized. The methodical approach to the insurers business processes reengineering was proposed on the basis of the games theory just to form a new model of business processes and to increase its optimization process effectiveness. Originality. An algorithm of the insurers business process optimization was worked out, which includes the process of their planning, diagnostics, implementation of changes and monitoring just to increase the quality of key business process realization as the condition for ensuring economically safe functioning of the business entity. Practical value. The practical value is in the possibility to use them in insurance companies activities, which will ensure their sustainable functioning and development in the strategic perspective.


2020 ◽  
Vol 10 (1) ◽  
pp. 159-179
Author(s):  
Dejan Pavlović ◽  
Vilmoš Tot

Stakeholders have a dramatic impact on the corporate security organisation within a corporate system. Equity holders, managers, employees, trade unions, and other internal stakeholders exert the greatest influence on the corporate security system. As corporate security operations expand and become intertwined with different business processes, corporate security's impact on the company revenue grows higher. This paper will discuss the results of the study conducted among the staff of the NIS j.s.c. Procurement Sector. The goal of this paper is to examine how the employees, being significant internal stakeholders, perceive the role of corporate security in NIS j.s.c. in their core business practices, and to identify activities requiring improvement so as to raise the business operations security to a higher level.


Author(s):  
Hoa Khanh Dam ◽  
Aditya Ghose ◽  
Mohammad Qasim

Business processes have been widely becoming crucial assets of organisations across various industries and domains. The flexibility in dealing with changes when business processes are executed has significant impact on the success of an organisation's business operations, especially in the current ever-changing business environment. In this context, agent-based systems offer a promisingly powerful platform for business process execution. In this paper, the authors propose an agent-mediated platform for business processes with the aim to contribute to bridge the gap between business process management and agent-oriented development. They present a conceptual mapping method for a seamless transition from business process models in Business Process Modelling Notation (BPMN) to agent-oriented models in the Prometheus methodology, which is implemented using the ATLAS Transformation Language. The authors also developed an Eclipse-based plug-in which allows the designer to import BPMN models into the Eclipse-based Prometheus Design Tool.


2006 ◽  
Vol 5 (1) ◽  
pp. 15-27 ◽  
Author(s):  
Ming C. Hao ◽  
Daniel A. Keim ◽  
Umeshwar Dayal ◽  
Jörn Schneidewind

Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes of complex data. The operational data are instances of the process flow, taking different paths through the process. The goal is to use the complex information to analyze and improve operations and to optimize the process flow. In this paper, we introduce a new visualization technique, called VisImpact that turns raw operational business data into valuable information. VisImpact reduces data complexity by analyzing operational data and abstracting the most critical factors, called impact factors, which influence business operations. The analysis may identify single nodes of the business flow graph as important factors but it may also determine aggregations of nodes to be important. Moreover, the analysis may find that single nodes have certain data values associated with them which have an influence on some business metrics or resource usage parameters. The impact factors are presented as nodes in a symmetric circular graph, providing insight into core business operations and relationships. A cause-effect mechanism is built in to determine ‘good’ and ‘bad’ operational behavior and to take action accordingly. We have applied VisImpact to real-world applications, fraud analysis and service contract analysis, to show the power of VisImpact for finding relationships among the most important impact factors and for immediate identification of anomalies. The VisImpact system provides a highly interactive interface including drilldown capabilities down to transaction levels to allow multilevel views of business dynamics.


2020 ◽  
Vol 19 (1) ◽  
pp. 15-22
Author(s):  
Oleksandr Milov ◽  
Hryhorii Kots ◽  
Stanislav Milevskyi

An approach is proposed for assessing the uneven use of information resources in the organization’s business processes. Formal representations of the organization’s business processes and security systems are presented, reflecting both business operations carried out in a certain sequence and information resources that ensure the implementation of the relevant business operations, the place of information resources in the general outline of business processes is indicated. The circuits of the security system business processes of and the business processes of the main object of modeling are considered, including both business processes for managing security and business processes for ensuring security management. The assessment of the non-uniform use of information resources in a business process scheme is based on the consistent construction of an information resource incidence matrix for individual business operations, a frequency relationship matrix reflecting the sharing of information resources, and a matrix of derivatives in a discrete formulation. The proposed approach is demonstrated on a conditional example containing both the notional costs of information resources and weighting factors of the importance of business operations that reflect their criticality in the general contour of business processes. Estimates obtained as a result of applying the approach make it possible to group information resources, focusing on the frequency of their joint use in the business processes, which ultimately makes it possible to justify the choice of information resources for protection against threats from cyber intruders.


2020 ◽  
Vol 10 (513) ◽  
pp. 180-189
Author(s):  
H. M. Koptieva ◽  

A holistic understanding of the state of economic security of enterprise is ensured by the implementation of process management and assessment of security based on the maturity of business processes. Introduction of measures to improve the economic security of the enterprise on the bases of maturity of business processes allows to optimize the operational and investment activities of the enterprise and ensures its safety against the risks of inconsistent implementation of measures in accordance with the spheres of activity. The purpose of the research is to substantiate the maturity of the business processes of trade enterprise as a criterion for their economic security and on this basis the development of a system for assessing the economic security of the business processes of the enterprise. The ground for linkage of conceptions of process management and security management are the economic interests of the enterprise, which have to be protected (in terms of economic security) and implemented (in terms of process management). The attributes of maturity of business processes (safety of business process taking into account the materialization of the stakeholders’ interests, completeness of business process implementation) and the criteria for evaluation on their basis (effectiveness, efficiency, quality, completion of the management cycle) are allocated, which are taken into account for the formalization of the system of assessment of the level of economic security of the enterprise on the basis of maturity of their business processes. The developed system of indicators for assessment of business processes of trade enterprise allows to identify the level of maturity of business processes and determine on this basis the level of economic security of the enterprise. Prospects for further research in this direction are the substantiation of a scientific-methodological approach to the assessment of economic security of trade enterprise on the basis of maturity of its business processes.


2021 ◽  
Vol 8 (523) ◽  
pp. 190-196
Author(s):  
T. B. Khlevytska ◽  
◽  
O. Y. Guseva ◽  

The need to ensure the conditions of viability of enterprises through flexibility and adaptability against the modern hard-to-predict changes requires the use of modern, worldwide-recognized instruments and forms of management, the main place among which is reengineering. The expediency of this approach to managing financial-economic security is due to the fact that, on the one hand, financial-economic security is the initial prerequisite for long-term development, and on the other hand, it acts as a criterion for the efficiency of enterprise management. The article is aimed at substantiating the theoretical-methodical approach to the use of business process reengineering instruments in ensuring the financial and economic security of enterprises in accordance with its strategic orientation. The basic principles of building a system of financial-economic security are defined. On the basis of the system-structural approach, the classification of types of financial-economic security with the separation of market and interface security was carried out. The system of indicators for monitoring the level of financial-economic security is proposed to be built on the basis of sustainable development with the obligatory separation of ecological, social and directly financial-economic groups of indicators. A definition of the financial-economic security management from the position of strategic management is presented as follows: a set of the most significant decisions directed towards ensuring a programmed level of security of the enterprise. The relationship between the financial-economic security management strategy and the mechanisms of business process reengineering is demonstrated.


Author(s):  
Dhansri Sudhir Bawankule

Abstract: Blockchain is a technology that has the potential to cause big changes in our corporate environment and will have a significant influence over the next few decades. It has the potential to alter our perception of business operations and revolutionise our economy. Blockchain is a decentralised and distributed ledger system that, since it cannot be tampered with or faked, attempts to assure transparency, data security, and integrity. Only a few studies have looked at the usage of Blockchain Technology in other contexts or sectors, with the majority of current Blockchain Technology research focusing on its use for cryptocurrencies like Bitcoin. Blockchain technology is more than simply bitcoin; it may be used in government, finance and banking, accounting, and business process managementAs a result, the goal of this study is to examine and investigate the advantages and drawbacks of Blockchain Technology for current and future applications. As a consequence, a large number of published studies were thoroughly assessed and analysed based on their contributions to the Blockchain body of knowledge. Keywords: Blockchain Technology, Bitcoin, Cryptocurrency, Digital currency


Sign in / Sign up

Export Citation Format

Share Document