ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CLASSIFICATION OF THREATS TO ECONOMIC SECURITY OF BUSINESS ENTITIES

Journal: LAW AND INNOVATIONS (Vol.1, No. 11)

Publication Date:

Authors : ;

Page : 59-66

Keywords : economic security of a business entity; the business entity; the economic environment; the system of economic security of the enterprise security; strategy of the enterprise;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Problem setting. The article is devoted to the analysis and study of threats to economic security of business entities. There is analyzed the main sources of threats, their classification and the separation of certain groups, nature of development and the most basic of existence. The basic ways to overcome, minimize or avoid threats to the economic security of a business entity for the field of detection. Analisis of resent researches and publications. The study of this question dealt with such scholars as Vnukova N. M., Miller A. A., Reverchuk N. And., Chistokletov L. G., L. et Pasnik Target of research. The purpose of this study is the most important classification parameters. Article’s main body. There are many ways of classification of threats to economic security of business entities, but in our opinion the most successful, in addition to their division into external and internal, is a classification in the area of identification, according to this parameter, the classification can be given to the following groups of threats: political; economic; social. Arguing that the classification of threats to economic security of a business entity for sphere detection with simultaneous division into external and internal, is the most successful from the point of view of management of the reaction. It should be noted that such an approach is the basis of conducting PESTLE analysis is used to assess the external environment to the enterprises operating within the particular market, and includes the political (P ? policy), economic (E ? economic), social (S ? social), technology (T ? technology), legal (L ? legislative) and environmental (E ? ecology) components. But PESTLE-analysis does not give a structured opportunity to look at the problem of threats to the internal environment, giving a similar function partially SWOT analysis, and partly analysis 5 competitive forces by porter. Conclusions and prospects for the development. Thus, it can be seen that the aggregate of the means of overcoming the threats to the economic security of a business entity is striking in its variety, which comes from the specifics of each particular company. In other words, there is no unified tools to overcome the threats, because the initial conditions and the resources available to do this, each company is different, as different qualifications of management that affects the efficiency of detection, and the possibility of their prevention. Also variously-sized enterprises are able to have different impacts on threats to economic security. We are talking about using some enterprises such threats as an instrument of aggressive competitive struggle against other companies or purposefully or indirectly. For example, large corporations often lobby for their economic interests in the highest echelons of state government is encouraging public bodies to make decisions that will have negative consequences for competitors. But such cases are often isolated, so their appearance is likely to generate the corresponding consolidated response of market participants. The lack of the possibility of developing a unified tools for overcoming the threats to the economic security of the enterprise can be compensated for by a common methodological approach to overcoming them, minimize or even avoid the consequences. This methodology involves the creation of a management algorithm, the use of which is possible on all enterprises without exception. He builds a similar algorithm for the identification of environmental factor as a threat to the system of economic security. This algorithm will be the set of distinct procedures, each of which mosoblpharmatsia specific for each enterprise activities. But the commonality of such procedures is possible for all companies, as it relates to the sphere of managerial influence.

Last modified: 2016-03-01 22:18:13