Abstract

Abstract. The conducted theoretical and analytical study, which included acquaintance with the achievements of domestic and foreign scientists on ensuring the personnel security of banks and assessing the personnel security of the banking sector of the economy, allowed to develop oriented graphical models and corresponding reachability matrices, and served as a basis for hierarchical ordering of key threats to bank personnel security. The hierarchical ordering of threats to the personnel security of the banking sector of the economy is based on the application of the graph theory method. The models developed give an idea of the need to implement safeguards against key threats, which is important in view of resource constraints and maximizing the effectiveness of security actors. The result is averaged for most domestic banks, as each of them is influenced by the external environment and changes caused by internal processes. A mechanism for counteracting the influence of external and internal threats on the personnel security of banks has been constructed, which takes into account the current trends in the development of the banking sector. The application of system analysis and graph theory made it possible to hierarchically regulate the impact of key threats on personnel security, which became the basis for the development of a model that graphically determines the priority of developing and implementing security measures for each threat, and justifies the possibility of applying one of the options passive protection and active protection. As a result of the theoretical and analytical study, a number of key external and internal threats to personnel security of banks have been regulated and identified. By applying graph theory and mathematical modeling hierarchically ordered and determined the severity of the impact of threats on the personnel security of banks, which subsequently allowed to create a defense mechanism to counter them. Keywords: bank personnel security, bank system, threat, security, crisis situation, mechanism. JEL Classіfіcatіon D81, G21, F29, L20 Formulas: 16; fig.: 3; tabl.: 19; bibl.: 16.

Highlights

  • There is a need to generate new knowledge to more effectively meet the new challenges to humanity, ensure national security, in particular economic, which is more related to the development of the banking system in the context of increased competition in the world markets

  • The development of issues of personnel security as a component of economic security of the enterprise and banks has received a lot of attention from Ukrainian and foreign scientists, in particular: L

  • Specified threats refer to the linguistic variables that are used in solving economic problems, in particular, which relate to forecasting the state of the national economy and particular sectors of economy [1,2,3,4,5,6]

Read more

Summary

ɎɈɊɆɍȼȺɇɇə ɆɈȾȿɅȱ ȱȯɊȺɊɏȱȲ ȼɉɅɂȼɍ ɁȺȽɊɈɁ ɇȺ ɄȺȾɊɈȼɍ ȻȿɁɉȿɄɍ ȻȺɇɄȱȼ

Ⱥɧɨɬɚɰɿɹ. ɉɪɨɜɟɞɟɧɟ ɬɟɨɪɟɬɢɤɨ-ɚɧɚɥɿɬɢɱɧɟ ɞɨɫɥɿɞɠɟɧɧɹ, ɹɤɟ ɩɟɪɟɞɛɚɱɚɥɨ ɨɡɧɚɣɨɦɥɟɧɧɹ ɡ ɞɨɪɨɛɤɨɦ ɜɿɬɱɢɡɧɹɧɢɯ i ɡɚɤɨɪɞɨɧɧɢɯ ɧɚɭɤɨɜɰɿɜ ɫɬɨɫɨɜɧɨ ɡɚɛɟɡɩɟɱɟɧɧɹ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜ ɬɚ ɡɞɿɣɫɧɟɧɧɹ ɨɰɿɧɤɢ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜɫɶɤɨɝɨ ɫɟɤɬɨɪɭ ɟɤɨɧɨɦɿɤɢ, ɞɚɥɨ ɡɦɨɝɭ ɪɨɡɪɨɛɢɬɢ ɨɪɿɽɧɬɨɜɚɧɿ ɝɪɚɮɿɱɧɿ ɦɨɞɟɥɿ ɬɚ ɜɿɞɩɨɜɿɞɧɿ ʀɦ ɦɚɬɪɢɰɿ ɞɨɫɹɠɧɨɫɬɿ, ɹɤɿ ɜɿɞɨɛɪɚɠɚɸɬɶ ɡɜ’ɹɡɤɢ ɦɿɠ ɡɚɝɪɨɡɚɦɢ, ɿ ɩɨɫɥɭɝɭɜɚɥɢ ɨɫɧɨɜɨɸ ɞɥɹ ɿɽɪɚɪɯɿɱɧɨɝɨ ɜɩɨɪɹɞɤɭɜɚɧɧɹ ɤɥɸɱɨɜɢɯ ɡɚɝɪɨɡ ɞɥɹ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜ. ȱɽɪɚɪɯɿɱɧɟ ɜɩɨɪɹɞɤɭɜɚɧɧɹ ɡɚɝɪɨɡ ɤɚɞɪɨɜɿɣ ɛɟɡɩɟɰɿ ɛɚɧɤɿɜɫɶɤɨɝɨ ɫɟɤɬɨɪɭ ɟɤɨɧɨɦɿɤɢ ɡɞɿɣɫɧɟɧɨ ɧɚ ɨɫɧɨɜɿ ɡɚɫɬɨɫɭɜɚɧɧɹ ɦɟɬɨɞɭ ɬɟɨɪɿʀ ɝɪɚɮɿɜ. Ɉɪɨɜɟɞɟɧɟ ɬɟɨɪɟɬɢɤɨ-ɚɧɚɥɿɬɢɱɧɟ ɞɨɫɥɿɞɠɟɧɧɹ, ɹɤɟ ɩɟɪɟɞɛɚɱɚɥɨ ɨɡɧɚɣɨɦɥɟɧɧɹ ɡ ɞɨɪɨɛɤɨɦ ɜɿɬɱɢɡɧɹɧɢɯ i ɡɚɤɨɪɞɨɧɧɢɯ ɧɚɭɤɨɜɰɿɜ ɫɬɨɫɨɜɧɨ ɡɚɛɟɡɩɟɱɟɧɧɹ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜ ɬɚ ɡɞɿɣɫɧɟɧɧɹ ɨɰɿɧɤɢ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜɫɶɤɨɝɨ ɫɟɤɬɨɪɭ ɟɤɨɧɨɦɿɤɢ, ɞɚɥɨ ɡɦɨɝɭ ɪɨɡɪɨɛɢɬɢ ɨɪɿɽɧɬɨɜɚɧɿ ɝɪɚɮɿɱɧɿ ɦɨɞɟɥɿ ɬɚ ɜɿɞɩɨɜɿɞɧɿ ʀɦ ɦɚɬɪɢɰɿ ɞɨɫɹɠɧɨɫɬɿ, ɹɤɿ ɜɿɞɨɛɪɚɠɚɸɬɶ ɡɜ’ɹɡɤɢ ɦɿɠ ɡɚɝɪɨɡɚɦɢ, ɿ ɩɨɫɥɭɝɭɜɚɥɢ ɨɫɧɨɜɨɸ ɞɥɹ ɿɽɪɚɪɯɿɱɧɨɝɨ ɜɩɨɪɹɞɤɭɜɚɧɧɹ ɤɥɸɱɨɜɢɯ ɡɚɝɪɨɡ ɞɥɹ ɤɚɞɪɨɜɨʀ ɛɟɡɩɟɤɢ ɛɚɧɤɿɜ. Ȱɽɪɚɪɯɿɱɧɟ ɜɩɨɪɹɞɤɭɜɚɧɧɹ ɡɚɝɪɨɡ ɤɚɞɪɨɜɿɣ ɛɟɡɩɟɰɿ ɛɚɧɤɿɜɫɶɤɨɝɨ ɫɟɤɬɨɪɭ ɟɤɨɧɨɦɿɤɢ ɡɞɿɣɫɧɟɧɨ ɧɚ ɨɫɧɨɜɿ ɡɚɫɬɨɫɭɜɚɧɧɹ ɦɟɬɨɞɭ ɬɟɨɪɿʀ ɝɪɚɮɿɜ. Ɂɚɫɬɨɫɭɜɚɧɧɹ ɫɢɫɬɟɦɧɨɝɨ ɚɧɚɥɿɡɭ ɿ ɬɟɨɪɿʀ ɝɪɚɮɿɜ ɞɚɥɨ ɡɦɨɝɭ ɿɽɪɚɪɯɿɱɧɨ ɜɩɨɪɹɞɤɭɜɚɬɢ ɜɩɥɢɜ ɤɥɸɱɨɜɢɯ ɡɚɝɪɨɡ ɧɚ ɤɚɞɪɨɜɭ ɛɟɡɩɟɤɭ, ɳɨ ɫɬɚɥɨ ɩɿɞʉɪɭɧɬɹɦ ɞɥɹ ɪɨɡɪɨɛɥɟɧɧɹ ɦɨɞɟɥɿ, ɹɤɚ ɭ ɝɪɚɮɿɱɧɨɦɭ ɮɨɪɦɚɬɿ ɜɢɡɧɚɱɚɽ ɩɪɿɨɪɢɬɟɬɧɿɫɬɶ ɪɨɡɪɨɛɥɟɧɧɹ ɬɚ ɪɟɚɥɿɡɚɰɿʀ ɡɚɯɢɫɧɢɯ ɡɚɯɨɞɿɜ ɫɬɨɫɨɜɧɨ ɤɨɠɧɨʀ ɡɚɝɪɨɡɢ ɬɚ ɨɛʉɪɭɧɬɨɜɭɽ ɦɨɠɥɢɜɿɫɬɶ ɡɚɫɬɨɫɭɜɚɧɧɹ ɨɞɧɨɝɨ ɡ ɜɚɪɿɚɧɬɿɜ ɩɪɨɝɪɚɦɢ ɡɚɯɢɫɬɭ: ɚɞɚɩɬɚɰɿɣɧɨɝɨ, ɩɚɫɢɜɧɨɝɨ ɡɚɯɢɫɬɭ ɬɚ ɚɤɬɢɜɧɨɝɨ ɡɚɯɢɫɬɭ. Ɒɥɹɯɨɦ ɡɚɫɬɨɫɭɜɚɧɧɹ ɬɟɨɪɿʀ ɝɪɚɮɿɜ ɿ ɦɚɬɟɦɚɬɢɱɧɨɝɨ ɦɨɞɟɥɸɜɚɧɧɹ ɿɽɪɚɪɯɿɱɧɨ ɜɩɨɪɹɞɤɨɜɚɧɨ ɬɚ ɜɢɡɧɚɱɟɧɨ ɜɚɝɨɦɿɫɬɶ ɜɩɥɢɜɭ ɡɚɝɪɨɡ ɧɚ ɤɚɞɪɨɜɭ ɛɟɡɩɟɤɭ ɛɚɧɤɿɜ, ɳɨ ɜ ɩɨɞɚɥɶɲɨɦɭ ɞɚɥɨ ɡɦɨɝɭ ɫɬɜɨɪɢɬɢ ɡɚɯɢɫɧɢɣ ɦɟɯɚɧɿɡɦ ɞɥɹ ɩɪɨɬɢɞɿʀ ʀɦ.

Introduction
BPS threats
Dependencies ways
BPS Threat Ranking Results
Personnel security
Options for a security program in the process of BPS guaranteeing
Explanation of choice
Indicator Calculation results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call