{"id":3437,"date":"2021-01-30T22:17:54","date_gmt":"2021-01-30T20:17:54","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=3437"},"modified":"2021-03-11T09:41:52","modified_gmt":"2021-03-11T07:41:52","slug":"%d0%b7%d0%b0%d0%b1%d0%b5%d0%b7%d0%bf%d0%b5%d1%87%d0%b5%d0%bd%d0%bd%d1%8f-%d0%b5%d0%ba%d0%be%d0%bd%d0%be%d0%bc%d1%96%d1%87%d0%bd%d0%be%d1%97-%d0%b1%d0%b5%d0%b7%d0%bf%d0%b5%d0%ba%d0%b8-%d0%bf%d1%96","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=3437","title":{"rendered":"\u0417\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0415\u041a\u041e\u041d\u041e\u041c\u0406\u0427\u041d\u041e\u0407 \u0411\u0415\u0417\u041f\u0415\u041a\u0418 \u041f\u0406\u0414\u041f\u0420\u0418\u0404\u041c\u0421\u0422\u0412\u0410 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0412\u0418\u041a\u041e\u0420\u0418\u0421\u0422\u0410\u041d\u041d\u042f \u0426\u0418\u0424\u0420\u041e\u0412\u0418\u0425 \u0422\u0415\u0425\u041d\u041e\u041b\u041e\u0413\u0406\u0419<\/p>\n<p style=\"text-align: center;\">ENSURING ECONOMIC SECURITY OF THE ENTERPRISE BASED ON THE USE OF DIGITAL TECHNOLOGIES<\/p>\n<p><strong><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/7-19.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\"><\/a>  \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 32-35. \u041d\u043e\u043c\u0435\u0440: \u2116<\/strong><strong>4, \u0422\u043e\u043c 1, 2020 (28<\/strong><strong>4)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0411\u0410\u041a\u0410\u0419 \u0412. \u0419.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<\/p>\n<p>BAKAY V.<br \/>\nKhmelnytskyi National University<\/p>\n<p><strong>DOI<\/strong><strong>:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4-5\">https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4-5<\/a><br \/>\n<strong>\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received:<\/strong> 03.08.2020<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed :<\/strong> 28.09.2020<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0423 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u0432\u043f\u043b\u0438\u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u043d\u0430 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430. \u0412\u0438\u0441\u0432\u0456\u0442\u043b\u0435\u043d\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0438 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u0437\u2019\u044f\u0441\u043e\u0432\u0430\u043d\u043e, \u0449\u043e \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u0432\u0432\u0430\u0436\u0430\u0454\u0442\u044c\u0441\u044f \u043e\u0434\u043d\u0438\u043c \u0437 \u0433\u043e\u043b\u043e\u0432\u043d\u0438\u0445 \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0456\u0432 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0457 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438. \u0412\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u043d\u0430\u0434\u0430\u044e\u0442\u044c \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430\u043c \u0431\u0456\u043b\u044c\u0448\u043e\u0457 \u0432\u043f\u0435\u0432\u043d\u0435\u043d\u043e\u0441\u0442\u0456 \u0443 \u043f\u043b\u0430\u043d\u0443\u0432\u0430\u043d\u043d\u0456 \u0441\u0432\u043e\u0454\u0457 \u0433\u043e\u0441\u043f\u043e\u0434\u0430\u0440\u0441\u044c\u043a\u043e\u0457 \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456, \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0434\u043e\u0441\u044f\u0433\u043d\u0443\u0442\u0438 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0456\u0447\u043d\u0438\u0445 \u0446\u0456\u043b\u0435\u0439, \u0437\u0440\u043e\u0441\u0442\u0430\u043d\u043d\u044f \u0444\u0456\u043d\u0430\u043d\u0441\u043e\u0432\u043e\u0457 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0438, \u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0440\u0438\u0437\u0438\u043a\u0456\u0432, \u0430 \u0437\u0430\u0433\u0430\u043b\u043e\u043c \u0432\u0456\u0434\u0456\u0433\u0440\u0430\u044e\u0442\u044c \u0437\u043d\u0430\u0447\u043d\u0443 \u0440\u043e\u043b\u044c \u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u0456 \u0439\u043e\u0433\u043e \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438. \u041f\u043e\u0435\u0442\u0430\u043f\u043d\u043e \u0432\u0438\u0434\u0456\u043b\u0435\u043d\u043e \u0442\u0430 \u043e\u0431\u0491\u0440\u0443\u043d\u0442\u043e\u0432\u0430\u043d\u043e \u043a\u043b\u044e\u0447\u043e\u0432\u0456 \u0446\u0438\u0444\u0440\u043e\u0432\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0456\u0439 \u0431\u0435\u0437\u043f\u0435\u0446\u0456 \u043d\u0430 \u0440\u0456\u0432\u043d\u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0446\u0438\u0444\u0440\u043e\u0432\u0456\u0437\u0430\u0446\u0456\u0457 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438, \u0442\u0430\u043a\u0456 \u044f\u043a \u043a\u0440\u0430\u0434\u0456\u0436\u043a\u0430 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445, \u043f\u0440\u043e\u043c\u0438\u0441\u043b\u043e\u0432\u0435 \u0448\u043f\u0438\u0433\u0443\u043d\u0441\u0442\u0432\u043e, \u0445\u0430\u043a\u0435\u0440\u0441\u044c\u043a\u0456 \u0430\u0442\u0430\u043a\u0438, \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043d\u044f \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u0456\u0441\u0442\u044c \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u043c\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u044f\u043c\u0438 \u0456 \u043a\u043e\u043c\u043f\u0435\u0442\u0435\u043d\u0442\u043d\u0438\u043c\u0438 \u043a\u0430\u0434\u0440\u0430\u043c\u0438.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0446\u0438\u0444\u0440\u043e\u0432\u0430 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0430, \u0446\u0438\u0444\u0440\u043e\u0432\u0456 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u043e, \u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0446\u0438\u0444\u0440\u043e\u0432\u0456\u0437\u0430\u0446\u0456\u044f.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The article considers the peculiarities of the digital economy on the basis of shifting the emphasis from material resources to information resources. Data analysis, widespread use of mobile devices, the development of the Internet, the emergence of the Internet of Things, are certainly innovative elements designed to solve socio-economic problems, both at the level of individual regions and countries, and globally. As a result, companies have been exposed to more frequent and serious threats in the digital environment in recent years, which affects their economic security. Such threats can affect the company&#8217;s reputation, its financial condition, damaging competitiveness, undermining their efforts to innovate and market position. The problems of economic security are highlighted: protection of enterprise data from cyber attacks, ensuring protection of corporate data at the appropriate level in the conditions of rapid development of digital tools in the economy. Cybersecurity has been found to be one of the main elements of economic security in the digital economy. The use of digital technologies gives companies more confidence in planning their business activities, the ability to achieve strategic goals, increase financial support, risk protection, and in general play a significant role in ensuring its economic security. For the successful development of the enterprise and its information security, it is necessary to use modern technologies for processing large data sets. The key digital threats to economic security at the enterprise level in the context of digitalization of the economy, such as theft of corporate data, industrial espionage, hacker attacks, lack of digital technology and competent personnel, have been gradually identified and substantiated. The digital transformation of the enterprise opens unique opportunities to ensure its economic security through the introduction of modern technologies in business processes. This approach involves not only the installation of modern hardware or software, but also fundamental changes in approaches to management, corporate culture, external communications. As a result, the productivity of each employee and the level of customer satisfaction increase, and the company itself is gaining a reputation as a progressive and modern organization.<br \/>\n<strong>Keywords:<\/strong> economic security, digital economy, digital technologies, enterprise, threats, information security, digitalization.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Ablyazov T. On competitive potential of organization under conditions of new industrial base formation \/ T. Ablyazov, V. Asaul \/\/ SHS Web of Conferences. \u2013 2018. \u2013 Vol. 44.<\/li>\n<li>Popov E.V. Problemy ekonomichnoi bezpeky tsyfrovoho suspilstva v umovakh hlobalizatsii \/ E.V. Popov, K.A. Semiachkov \/\/ Ekonomika rehioniv. \u2013 2018. \u2013 \u2116 4. \u2013 S. 1088\u20131101.<\/li>\n<li>Ofitsiinyi sait hazety Washingtonpost [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/www.washingtonpost.com\/news\/ theswitch\/wp\/ 2014\/12\/18\/the-sony-pictures-hack-explained\/?noredirect=on&amp;utm_term=.e651fc6cd41f.<\/li>\n<li>Setevoe izdanie RIA Novosti [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/ria.ru\/20170908\/1502040513.html.<\/li>\n<li>Reitynh 100 naidorozhchykh hlobalnykh brendiv (BRANDZ Global Top 100) [Elektronnyi resurs]. \u2013 Rezhym dostupu : http:\/\/online.pubhtml5.com\/bydd\/rxhd\/#p=4.<\/li>\n<li>Zvit DBT Center \u00abTsyfrovyi vyr abo yak tsyfrova revoliutsiia reformuie promyslovist\u00bb (Digital Vortex: How Digital Disruption is Redefi ning Industries) [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/ digital-vortex-report.pdf.<\/li>\n<li>Ofitsiinyi sait kompanii HeadHunter [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/hh.ru\/search\/vacancy?text=&amp;area=\/ 1&amp;from=suggest_post.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3437"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3437"}],"version-history":[{"count":2,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3437\/revisions"}],"predecessor-version":[{"id":4300,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3437\/revisions\/4300"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}