Abstract

The article identifies threats to the economic security of the region, which arise as a result of the introduction of information technologies in the economic activity and management of enterprises and organizations (use of pirated software; targeted virus attacks; spyware in the face of aggravated Russian-Ukrainian confrontation; development of electronic business and expansion of the territorial boundaries of regional markets). It is proved that the features of the formation and development of the IT sector in the region also fill with new content the concept of threats to the economic security of the region (simplified taxation system; increasing the shadow economy of the regional economy; social differentiation of society; low demand for IT products in the domestic market; human capital and education; intellectual migration; the lion's share of foreign direct investment in total investment in the IT sector; foreign economic activity). In order to prevent a fall in the level of economic security in the region, it is proposed to continuously monitor the identified threats from certain sources and identify new ones. The conceptual bases for building a mechanism to ensure the economic security of the region are considered and its constituent elements are defined. It covers the economic, organizational, administrative, regulatory, institutional, social tools, methods and levers of security formation. Established the most important guidelines for its operation - safety indicators and their threshold values. The mechanism operates at the strategic (elimination of contradictions or their localization or weakening), tactical (eliminating the very threats or preventing their influence) and operational (eliminating the consequences of threats) levels. The implementation of the proposed mechanism, which performs protective, regulatory, preventive, innovative and social functions, will create the basis for a secure information and technological development of the regional economy and reduce the territorial differentiation of regions in terms of information and technological threats.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.