{"id":8371,"date":"2021-01-30T10:34:03","date_gmt":"2021-01-30T08:34:03","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=8371"},"modified":"2021-11-16T10:50:12","modified_gmt":"2021-11-16T08:50:12","slug":"teoertychni-konteksty-ta-osnovni-pidhody-do-zabezpechennya-ekonomichnoyi-bezpeky-pidpryyemstv-merezhevyh-struktur","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=8371","title":{"rendered":"\u0422\u0435\u043e\u0435\u0440\u0442\u0438\u0447\u043d\u0456 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0438 \u0442\u0430 \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u043f\u0456\u0434\u0445\u043e\u0434\u0438 \u0434\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0422\u0415\u041e\u0415\u0420\u0422\u0418\u0427\u041d\u0406 \u041a\u041e\u041d\u0422\u0415\u041a\u0421\u0422\u0418 \u0422\u0410 \u041e\u0421\u041d\u041e\u0412\u041d\u0406 \u041f\u0406\u0414\u0425\u041e\u0414\u0418 \u0414\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0415\u041a\u041e\u041d\u041e\u041c\u0406\u0427\u041d\u041e\u0407 \u0411\u0415\u0417\u041f\u0415\u041a\u0418 \u041f\u0406\u0414\u041f\u0420\u0418\u0404\u041c\u0421\u0422\u0412 \u041c\u0415\u0420\u0415\u0416\u0415\u0412\u0418\u0425 \u0421\u0422\u0420\u0423\u041a\u0422\u0423\u0420<\/p>\n<p style=\"text-align: center;\">THEORETICAL CONTEXTS AND BASIC APPROACHES TO ENSURING ECONOMIC SECURITY OF NETWORK STRUCTURES<\/p>\n<p><strong><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/11\/2020-4t3-29.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\"><\/a>   \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 170-173. \u041d\u043e\u043c\u0435\u0440: \u2116<\/strong><strong>4, \u0422\u043e\u043c 3, 2020 (28<\/strong><strong>4)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0428\u0410\u0422\u0410\u0420\u0421\u042c\u041a\u0418\u0419 \u0410. \u042f.<br \/>\n\u0417\u0430\u0445\u0456\u0434\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<\/p>\n<p>\u0410.SHATARSKYI<br \/>\nWestern Ukrainian National University<\/p>\n<p><strong>DOI<\/strong><strong>:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4(3)-31\">https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4(3)-31<\/a><br \/>\n\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received : 02.08.2020<br \/>\n\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed : 28.09.2020<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0 \u041c\u0435\u0442\u043e\u044e \u0441\u0442\u0430\u0442\u0442\u0456 \u0454 \u043e\u0431\u0491\u0440\u0443\u043d\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0441\u0443\u0442\u043d\u0456\u0441\u043d\u043e\u0457 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0444\u043e\u0440\u043c\u0443\u0432\u0430\u043d\u043d\u044f \u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u043a\u0440\u0438\u0442\u0435\u0440\u0456\u0457\u0432 \u043e\u0446\u0456\u043d\u043a\u0438 \u0457\u0457 \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0432 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u0443\u043c\u043e\u0432\u0430\u0445\u041f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u0435 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u043f\u043e\u043d\u044f\u0442\u0442\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440 \u0456\u0437 \u0432\u0438\u043e\u043a\u0440\u0435\u043c\u043b\u0435\u043d\u043d\u044f\u043c \u043f\u2019\u044f\u0442\u0438 \u043f\u043e\u0437\u0438\u0446\u0456\u0439: \u0440\u0438\u0437\u0438\u043a\u043e\u0432\u043e\u0457, \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0439\u043d\u043e\u0457, \u0440\u0435\u0441\u0443\u0440\u0441\u043d\u043e\u0457, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043f\u0440\u0430\u0432\u043e\u0432\u043e\u0457, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0457. \u041e\u0431\u0491\u0440\u0443\u043d\u0442\u043e\u0432\u0430\u043d\u043e \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u043f\u0456\u0434\u0445\u043e\u0434\u0456\u0432 \u0434\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440 \u0442\u0430 \u0434\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u0457\u0445 \u043d\u0435\u0434\u043e\u043b\u0456\u043a\u0438. \u041d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0447\u043e\u0433\u043e \u0432\u0456\u0434\u0437\u043d\u0430\u0447\u0435\u043d\u043e \u043a\u043b\u044e\u0447\u043e\u0432\u0456 \u0432\u0435\u043a\u0442\u043e\u0440\u0438 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440.<br \/>\n\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430: \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440, \u043f\u0456\u0434\u0445\u043e\u0434\u0438 \u0434\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u043f\u0456\u0434\u0445\u0456\u0434, \u043f\u0440\u043e\u0446\u0435\u0441\u043d\u0438\u0439 \u0442\u0430 \u043f\u0440\u043e\u0454\u043a\u0442\u043d\u0438\u0439 \u043f\u0456\u0434\u0445\u043e\u0434\u0438.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0Increasing the level of threats in the system of functioning of enterprises of network structures requires effective formation of the environment of economic security, identification and prevention of the main factors influencing their security. It should be borne in mind that network structures, regardless of ownership, are characterized by the presence of constant risks and threats associated with the influence of external and internal environment of their operation. Please note that the enterprises of network structures depend on the state of economic security of the country. Meanwhile, it should be noted that currently the economic security of Ukraine is under threat, as all components of economic security are in danger. Problems of own economic security arise before each network structure not only in times of crisis, but also during work in the stable economic environment, the complex of the solved tasks at the same time has essential difference.<br \/>\nThe purpose of the article is to substantiate the essential characteristics of economic security enterprises at network structures, as well as the formation of the main criteria for assessing its reliability and efficiency in modern conditions. A comprehensive study of the concept economic security at network structures with the separation of five positions: risk, organizational, resource, information and legal, as well as system. The peculiarities of the main approaches to ensuring the economic security of enterprises at network structures are substantiated and their shortcomings are proved. On the basis of which the key vectors of ensuring the economic security of enterprises at network structures are marked.<br \/>\nKeywords: security, economic security of enterprises at network structures, approaches to economic security, functional approach, process and project approaches.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Alkema, V.\u00a0H. Parametry ekonomichnoi bezpeky pidpryiemstva yak lohistychnoi systemy [Parameters of economic security of the enterprise as a logistics system]. Visnyk ekonomiky transportu i promyslovosti : zb. nauk.-prakt \u2013 Bulletin of Transport Economics and Industry: Coll. scientific-practical wash. Vyp. 29. Kharkiv. 2010. 51\u201359. [in Ukrainian].<\/li>\n<li>Andrushkiv, B.M, Vivchar, O.I., Gevko, V.L. Problemy teorii i praktyky menedzhmentu : navch.-metodych. posibn. [Problems of theory and practice of management textbook]. Ternopil: Terno-Graf LLC. 2009. 312 .<\/li>\n<li>Bondarchuk, Yu., Marushchak, A. Bezpeka biznesu: orhanizatsiino-pravovi osnovy \u2013 Business security: organizational and legal framework. K.: Vyd-vo KNT. 2008. 369. [in Ukrainian].<\/li>\n<li>Vivchar, O.\u00a0I. (2018) Upravlinnia ekonomichnoiu bezpekoiu pidpryiemstv: sotsiohumanitarni konteksty [Management of economic security of enterprises: socio-humanitarian contexts]. Ternopil, FOP Palianytsia V.\u00a0A. 515. [in Ukrainian].<\/li>\n<li>Vivchar, O. I. (2012) Osoblyvosti identyfikatsii metodiv otsinky rynkovoi vartosti biznesu pry diahnostytsi yoho ekonomichnoi bezpeky [Features of identification methods for assessing the market value of business in the diagnosis of its economic security]. Visnyk Nauka moloda \u2013 Newsletter Science is young. Issue 18. Ternopil.118\u2013122. [in Ukrainian].<\/li>\n<li>Kozachenko, H.\u00a0V., Ponomarov, V.\u00a0P., Liashenko, O.\u00a0M. Ekonomichna bezpeka pidpryiemstva: sutnist ta mekhanizm zabezpechennia : monohrafiia [Economic security of the enterprise: the essence and mechanism of provision: a monograph] K.: Libra, 2003. 280. [in Ukrainian].<\/li>\n<li>Korobchynskyi, O.L. Metodyka formuvannia systemy ekonomichnoi bezpeky pidpryiemstva. URL: http:\/\/ www. masters. donntu. edu.ua\/ 2011\/iem\/kuzenkova\/library\/statya4.htm<\/li>\n<li>Moroz, O. V. Karachyna, N. P. Shyian, A. A. (2011),Kontseptsiia ekonomichnoi bezpeky suchasnoho pidpryiemstva[The concept of economic security of the modern enterprise]. VNTU. Vinnytsia. Ukraine. 241.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[48],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/8371"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8371"}],"version-history":[{"count":5,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/8371\/revisions"}],"predecessor-version":[{"id":9331,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/8371\/revisions\/9331"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}