Abstract

The authors vision of the information security system structural model of digital process-oriented enterprise is based on analysis of existing «information security» and its components, «cyber security» and «network security» concepts. Model is based on complex causal-consequential chains character of two processual authors models: «enterprise business value creation chain» and «process management pyramid». The enterprise business value creation chain is determined as a logical sequence of digitalized technological business processes (TBP) of business value creation chain: customer/consumer engagement, production organization, goods production/services provision, goods/services sales. Herewith, «enterprise created business value» concept means the complex of two target production results: produced goods/services in terms of value for customer and sales revenue received on the seller bank account is value for the enterprise. Office automation systems (OAS) in all levels of the enterprise process management pyramid are used as an instrument for information collecting and processing and primary accounting data submitting from each technological business process in the value creation chain and analytical management data from managers personal business processes. This system is a corporate enterprise portal having an Internet connection. Herewith, «enterprise process management pyramid» concept is considered a digital organizational management structural model for the process-oriented enterprise. The structure model is a hierarchical system of managed by known PDCA (plan — do — check — act) management cycle internal and interrelated functions of each manager and lower (adjacent) level directly subordinate managers whose aim is managerial decisions production for directly subordinate executors. Concerning digitalized process-oriented enterprise management model, a vision of possible internal accidents and enterprise automated management system database hackers distortions model is created. Authors proposed «informational security of digital enterprise» concept variant is based on these two models components analysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call