INNOVATION IN THE MANAGEMENT SYSTEM OF ECONOMIC SECURITY OF TELECOMMUNICATIONS ENTERPRISES

Authors

DOI:

https://doi.org/10.32782/city-development.2025.1-4

Keywords:

economic security, innovation and investment security, shadow economy, crimina shadow economy, unshadowing of the economy, security environment, innovation, innovative development, telecommunications enterprises, risks, protection system, financial terrorism, aggression

Abstract

The article analyzes the state of ensuring economic security during the introduction of innovations in telecommunications enterprises. The state of the telecommunications sphere of activity in Ukraine during the war is investigated. The influence of states on the support of telecommunications enterprises and their security is revealed. The attempts of state bodies and entrepreneurs to apply the concept of innovative management of telecommunications enterprises in the conditions of martial law are considered. It was noted that the enterprise management system under the conditions of a crisis should be complex, especially in a critical period for the independence of the state. In these conditions, effective operation of telecommunications enterprises, as one of the most important links of the defense sector, can only be ensured by using innovative management methods. We are also considering a system to protect the management of telecommunications enterprises under martial law. We analyze different points of view regarding the category "economic security". We study this issue in its historical sequence. The protection system is unnecessary if there are no threats. The basis of economic and subversive activities in modern conditions is the shadow economy and activity. Shadow activity as an element of economic espionage carries out the transfer of the latest telecommunication technologies, which are created on the basis of innovations, to foreign special services. A necessary condition for ensuring the security of telecommunications enterprises in the conditions of martial law is the use of the latest information and innovative technologies. Strengthening the defense sector of Ukraine's economy is one of the priorities of state policy, by identifying the main threats. One of the main threats is the shadow economy, which can work to enrich terrorist regimes. The activities of telecommunications enterprises are carried out in various security zones. The security environment at different stages of the development of socio-economic formations is formed in different ways. In the conditions of war, such segments should be distinguished without a peck environment. Before the war and in the conditions of hostilities. Under the conditions of hostilities, an important place is the division of security environment zones into the territory under occupation, the territory bordering on hostilities, and the stable territory whose zone is remote from hostilities. In the territory located in the combat zone, attention should be paid to this aspect, which practically also has weak characteristics of the security environment. Since there are objective levers for its provision. The best situation for creating a set of measures to create a security environment is the border areas with military operations, there is already a possibility of carrying out stabilization measures. The set of measures depends on the financial capacity of the state. The best conditions for conducting activities to create an effective set of actions for the formation of the infrastructure of the security environment are territories that are far from military operations. Accordingly, the formation of the economic security management system of the industry should be modeled depending on the circumstances and the impact of emerging threats. Given the need for stable operation of telecommunications enterprises in the conditions of martial law, the task of developing and implementing innovative methods of personnel management taking into account modern challenges at enterprises of the telecommunications industry is an urgent issue today. Thus, the chosen direction of scientific research is an urgent need of modern management, and the topic of the article is timely and meets its most important needs. Therefore, when considering this problem, the three issues mentioned above should be considered. Research methods: the methodological basis of the research is the dialectical method of understanding economic phenomena, the position of economic theory regarding economic security; analysis and synthesis.

References

Засанський В. В. Детінізація економіки в перехідних суспільствах: управлінський аспект: [Моногр.]. Львів : Політекс, 1998. 309 с.

Куриліна О. В., Геник О. В., Крет І. З., Процюк Т. Б. Новітні фінансові технології як інструменти протидії та запобігання відмивання доходів, отриманих злочинним шляхом, фінансування тероризму і фінансування розповсюдження зброї масового знищення. Право та науки. 2018. № 1. С. 34–38.

Куриліна О. В., Ситар Л. Й., Візняк Ю. Я. Резерви підвищення якості трудового потенціалу промислового підприємства. Право та науки. 2018. № 2. С. 21–26.

Куриліна О. В. Теоретичні основи забезпечення економічної безпеки у змішаній економіці. Забезпечення цивільної безпеки в Україні: сучасний стан та перспективи. Черкаси, 2018. С. 308–313.

Турчинов О. В. Тіньова економіка: теоретичні основи дослідження. Київ : «АртЕк», 1995. 300 с.

Попович В. М. Теорія детінізації економіки. Ірпінь, 2001. 524 с.

Попович В. М. Тіньова економіка як предмет економічної кримінології. Київ : Правові джерела, 1998. 448 с.

Кримінальний кодекс України від 05.04.2001. № 2341–ІІІ. URL: https://zakon.rada.gov.ua/laws/show/2341-14#Text

Конвенція ООН проти транснаціональної організованої злочинності від 15.11.2000. № 995_789. URL: https://zakon.rada.gov.ua/laws/show/995_789#Text

Конвенція ООН проти корупції від 18.10.2006. № 995_016. URL: https://zakon.rada.gov.ua/laws/show/995_c16#Text

Конвенція Ради Європи про відмивання, пошук, арешт та конфіскацію доходів, одержаних злочинним шляхом від 08.11.1990. №995_029. URL: https://zakon.rada.gov.ua20laws/show/995_029#Text

Про ратифікацію Конвенції Ради Європи про відмивання, пошук, арешт та конфіскацію доходів, одержаних злочинним шляхом, та про фінансування тероризму: Закон України від 17.11.2010 № 2698-VI. URL: https://zakon.rada.gov.ua/laws/show/2698-17#Text

Chapin S. Is ‘Loyalty' a Virtue? In the Trump Era, It's Complicated. / The New York Times. – November, 2017. URL: https://www.nytimes.com/2017/11/15/magazine/is-loyalty-a-virtue-in-the-trump-era-its-complicated.html

Global Trends 2030: Alternative Worlds, (a publication ofthe National Intelligence Council). December 2012. URL: https://globaltrends2030.files.wordpress.com/2012/11/global-trends-2030-november2012.pdf

National security Strategy of the United States 2017. Washington DC: White House, 2017. URL: https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

National Security Act of 1947. URL: https://www.webcitation.org/5Xi9eEYG9?url=http://www.intelligence.gov/0-natsecact_1947

I. Zelisko, O. Sosnovska, L. Oliinyk, V. Stefkivskyy, І. Manaienko Company business process optimization as an imperative of its economic security. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu ІSSN 2071-2227, E-ISSN 2223-2362, 2021. № 1, р. 145–153. URL: http://nvngu.in.ua/index.php/en/archive/on-the-issues/1858-2021/content-1-2021/5711-145

Зеліско І. М., Гордієнко О. Є., Іванов О. О. Сучасна парадигма інноваційного розвитку телекомунікаційних підприємств в умовах VUCA-світу. Економіка. Менеджмент. Бізнес. 2024. № 4(47). С. 65–72. DOI: https://doi.org/10.31673/2415-8089.2024.045460

References:

Zasansky V. V. (1998). Detinization of the economy in transitional societies: management aspect: [Monogr]. Lviv: Politex, 309 p.

Kurylina O. V., Henyk O. V., Kret I. Z., Protsiuk T. B. (2018). The latest financial technologies as tools for combating and preventing money laundering, financing of terrorism and financing of proliferation of weapons of mass destruction. Law and science. No. 1. P. 34–38.

Kurylina O. V., Sytar L. Y., Vizniak Yu. Ya. (2018) Reserves for increasing the quality of labor potential of an industrial enterprise. Law and science. No. 2. Р. 21–26.

Kurilyna O. V. (2018). Theoretical foundations of ensuring economic security in a mixed economy. Ensuring civil security in Ukraine: current state and prospects. P. 308–313.

Turchynov O. V. (1995). Shadow economy: theoretical foundations of research. Kyiv: "ArtEk", 300 p.

Popovych V. M. (2001). The theory of detinization of the economy. Irpin, 524 p.

Popovych V. M. (1998). Shadow economy as a subject of economic criminology. Kyiv: Legal sources, 448 p.

Criminal Code of Ukraine dated 04.05.2001. No. 2341–III. Available at: https://zakon.rada.gov.ua/laws/show/2341-14#Text

UN Convention against Transnational Organized Crime of 11/15/2000. No. 995_789. Available at: https://zakon.rada. gov.ua/laws/show/995_789#Text

UN Convention against Corruption dated 18.10.2006. No. 995_016. Available at: https://zakon.rada.gov.ua/laws/show/995_c16#Text

Council of Europe Convention on Laundering, Search, Seizure and Confiscation of Proceeds of Crime from November 8, 1990. #995_029. Available at: https://zakon.rada.gov.ua20laws/show/995_029#Text

On the ratification of the Council of Europe Convention on Laundering, Search, Seizure and Confiscation of Proceeds of Crime and on the Financing of Terrorism: Law of Ukraine dated 11/17/2010 No. 2698-VI. Available at: https://zakon.rada.gov.ua/laws/show/2698-17#Text

Chapin S. Is 'Loyalty' a Virtue? In the Trump Era, It's Complicated. / The New York Times. – November, 2017. Available at: https://www.nytimes.com/2017/11/15/magazine/is-loyalty-a-virtue-in-the-trump-era-its-complicated.html

Global Trends 2030: Alternative Worlds, (a publication of the National Intelligence Council). December 2012. Available at: https://globaltrends2030.files.wordpress.com/2012/11/global-trends-2030-november 2012.pdf.

National security Strategy of the United States 2017. Washington DC: White House, 2017. Available at: https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

National Security Act of 1947. Available at: https://www.webcitation.org/5Xi9eEYG9?url=http://www.intelligence.gov/0-natsecact_1947.

Zelisko, I., Sosnovska, O., Oliinyk, L. Stefkivskyy, V. Manaienko (2021). Company business process optimization as an imperative of its economic security. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. № 1, р. 145-153. Available at: http://nvngu.in.ua/index.php/en/archive/on-the-issues/1858-2021/content-1-2021/5711-145

Zelisko, I. M., Gordienko, O. Ye., Ivanov, O. O. (2024). Suchasna paradyhma innovatsiynoho rozvytku telekomunikatsiynykh pidpryyemstv v umovakh VUCA-svitu [Modern paradigm of innovative development of telecommunications enterprises in the conditions of VUCA-world]. Economics. Management. Business. No 4(47), p. 65–72. DOI: https://doi.org/10.31673/2415-8089.2024.045460

Published

2025-03-31

How to Cite

Zasansky, V., & Shavlovsky, P. (2025). INNOVATION IN THE MANAGEMENT SYSTEM OF ECONOMIC SECURITY OF TELECOMMUNICATIONS ENTERPRISES. CITY DEVELOPMENT, (1 (05), 28–34. https://doi.org/10.32782/city-development.2025.1-4

Issue

Section

Статті