MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Journal Article

Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning

2024
Request Book From Autostore and Choose the Collection Method
Overview
Purpose. To analyse the methodological approaches to enterprise security management with the allocation of traditional ones and those transformed to modern uncertain conditions of functioning. Methodology. The methodological basis of the study was the scientific works by domestic and foreign scholars to identify the main theoretical provisions on approaches to security management, which were further analysed for their essence and feasibility of use in specific conditions of enterprise functioning. By combining the methods of analysis, synthesis, morphological analysis, and generalisations, the authors have managed to identify traditional approaches to enterprise management and those transformed to modern conditions which are inter-integrated and complementary. Findings. A map of the integration of traditional methodological approaches of enterprise security management and those transformed to modern conditions was formed and proposed, which can be used by enterprises to find effective approaches to security management depending on the object to which the management vector is immediately directed. Originality. The authors analyse a number of approaches to enterprise security management, starting with traditional approaches and moving towards their change depending on the conditions and environment of enterprise functioning. The authors trace the layering of several approaches on the traditional ones simultaneously, which is explained by the complication of the conditions of functioning of enterprises. The importance of finding approaches to management depending on the conditions of functioning of the enterprise and the security object to which security management is focused is emphasised. Practical value. The analysis and the results obtained are of practical value in terms of the feasibility of application at enterprises regardless of their industry, in addition to the effectiveness of the proposed map of approaches, which is variably integrated, taking into account the conditions and the object of management. This will allow one to broadly cover security issues and methodically solve them using a specifically selected approach.
Publisher
State Higher Educational Institution \"National Mining University\"