Contents |
Authors:
Dmytro Zatonatskiy, The National Institute for Strategic Studies (Ukraine)
Pages: 294-301
Language: English
DOI: https://doi.org/10.21272/mmi.2019.1-24
Download: |
Views: |
Downloads: |
|
|
|
Abstract
In the modern world, issues of personnel security management are getting more popular and significant in order to protect companies from internal and external threats. The article analyses modern approaches and models of personnel security management in the structure of economic security. The aim of the paper is to develop recommendations for the use of modern information systems and models of personnel security management for Ukrainian enterprises of strategic importance to the national economy. It is determined that the most general and broad approach to the definition of personnel security involves not only prevention of violations of the norms and principles of confidentiality of information by the personnel but also the organization of the security of the personnel itself, therefore, there is a need for the formation of an integrated system of personnel security management at the corporate level. The author’s analysis of modern systems of personnel security management has shown the importance of researching the psychological and behavioural characteristics of employees not only in the corporate environment but also beyond its borders. It has been proved that the introduction of modern modelling techniques (in particular, the Bayesian model, the nonlinear model of the neural net with feedback, linear regression, k-mean algorithms, etc.) will contribute to the strengthening of the system in the practice of providing personal security under the influence of external and internal threats. It is recommended that domestic enterprises introduce a comprehensive and integrated personnel security system to improve the practice of psychological diagnosis and monitoring of employees’ actions, in particular, improving the systems for collecting information on employee behavioural indicators in the corporate environment and beyond. The necessity of using the modern toolkit of the technical component of information security and certification system using the international standard ISO 27001 is proved, which significantly improves personnel security management in the structure of economic security of enterprises, reduces operational risk and increases the awareness of managers and ordinary employees. It is recommended to introduce improved technical systems in those types of activities and industries that are strategic for the economic growth of Ukraine’s national economy and ensuring the country’s defence and competitiveness.
Keywords: personnel security, economic security, personnel security management, personnel security models, personnel management.
JEL Classification: J28, M50.
Cite as: Zatonatskiy, D. (2019). Innovation methods and models of personnel security management: opportunities and imperatives of use at Ukrainian enterprises . Marketing and Management of Innovations, 1, 294-301. https://doi.org/10.21272/mmi.2019.1-24
This work is licensed under a Creative Commons Attribution 4.0 International License
References
- Alahmadi, B. A., Legg, P. A., & Nurse, J. R. (2015). Using Internet Activity Profiling for Insider-threat Detection. Proceedings of the 17th International Conference on Enterprise Information Systems. Retrieved from http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220%2f0005480407090720.
- Al-Dhahri, S., Al-Sarti, M. & Abdul, A. (2017). Information Security Management System. International Journal of Computer Applications, 158(7), 29-33.
- Astakhova, L. (2015). Evaluation Assurance Levels for Human Resource Security of an Information System. Procedia Engineering, 129, 635-639.
- Chumarin, I. (2005). Work with staff in the context of the overall security of the company. HR management, 1,34–40.
- Cybercrime will Cost Businesses Over $2 Trillion by 2019. JuniperResearch.Retrieved fromhttps://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion
- Garnaut, P & Thompson, J. (2011). Review of Data Integrity Models in Multi-Level Security Environments. DSTO Defence Science and Technology Organisation.Retrieved from https://apps.dtic.mil/dtic/tr/fulltext/u2/a542134.pdf
- InfoWatch. (2017). Global research on confidential information leaks in 2017. Retrieved fromhttps://www.infowatch.ru/report2017
- Greitzer, F. L., Kangas, L. J., Noonan, C. F., Dalton, A. C., & Hohimer, R. E. (2012). Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats. 45th Hawaii International Conference on System Sciences. Retrieved from https://www.researchgate.net/publication/261527163_Identifying_At-Risk_Employees_Modeling_Psychosocial_Precursors_of _Potential_Insider_Threats
- Kyrychenko, O.A., Sidak, V.S. (2008). Problemy upravlinnia ekonomichnoiu bezpekoiu subiektiv hospodariuvannia: monohrafiia [Problems of management of economic safety of subjects of management: monograph]. Kiev: Universytet «Krok» [in Ukrainian].
- Li, T., & Li, L. (2015). Application of Computer Technology in Human Resource Management and Social Security. The Open Cybernetics & Systemics Journal, 9(1), 1892-1897.
- Minchenko, O. (2018). U Facebook vzhe 11 mln ukraintsiv [Facebook has 11 million Ukrainians]. Watcher.Retrieved from http://watcher.com.ua/2018/01/23/u-facebook-vzhe-11-mln-ukrayintsiv/
- Odun-Ayo, I., Misra, S., Omoregbe, N., Onibere, E., Bulama, Y. & Damasevicius, R. (2017). Cloud-Based Security Driven Human Resource Management System. IOS Press. Retrieved from https://www.researchgate.net/publication/319037088_Cloud-Based_Security_Driven_Human_Resource_Management_System
- Puchkova, S. I. (2013). Upravlinnia kadrovoiu bezpekoiu pidpryiemstva cherez suchasni kadrovi tekhnolohii [Management personnel security enterprise through modern HR technology]. Naukovyi visnyk Odeskoho natsionalnoho ekonomichnoho universytetu – Scientific Bulletin of the Odessa National Economic University, 26 (205),43–54 [in Ukrainian].
- Sokolowski, J. A., & Banks, C. M. (2015). Agent implementation for modeling insider threat. Proceedings of the 2015 Winter Simulation Conference. Retrieved from https://www.researchgate.net/publication/302479872_Agent_implementation_for_modeling_insider_threat
- Xiaojuan, M. (2017). Research and Implementation of Computer Data Security Management System. Procedia Engineering, 174,1371-1379.
- Zhyvko Z. B. (2013). Kontseptualni osnovy upravlinnia kadrovoiu bezpekoiu pidpryiemstva [Conceptual bases of personnel security management of the enterprise]. Zbirnyk naukovykh prats Tavriiskoho derzhavnoho ahrotekhnolohichnoho universytetu (ekonomichni nauky) – Collection of scientific works of Taurian state agrotechnological university (economic sciences), 2(1), 103-111 [in Ukrainian].
- Zope, A. R., Vidhate, A., & Harale, N. (2013). Data Mining Approach in Security Information and Event Management. International Journal of Future Computer and Communication, 2,80-84.
- Zykov, S. (2001). Towards Implementing an Enterprise Groupware-Integrated Human Resources Information System. Retrieved fromhttps://www.researchgate.net/publication/2389488_Towards_Implementing_an_Enterprise_Groupware-Integrated_Human_Resources_Information_System
|