Abstract

Abstract.The purposeof the recent study is to substantiate the directions and develop a methodological approach to modelling the security of business processes by their main types, considering the interests of stakeholders who receive value from interaction with the business.Business as an economic system is based on the significant number of transactions that can lead to different financial, material, informational losses, as well as reputational risks due to the lack of stakeholders’ trust. To prevent these losses when creating and transferring values for stakeholders we suggested the approach to modelling the security of business processes which takes into account their main types (main, auxiliary, managerial business processes and business development processes), the results (value created) that key stakeholders get at the output of these processes, and the indicators that reflect the criteria for modelling the security of business processes — efficiency, effectiveness, and quality (customer satisfaction with the result of the process — the recipient of value). Using the fuzzy set method, a map of identification of the security status of basic, auxiliary, managerial business processes and business development processes was developed, which allows to use a wide range of characteristics of business processes and linguistic variables to describe them (from «catastrophic» state to «very good») and allows you to model options for changing the strategy of the enterprise in order to avoid the risk of imbalance of economic, social and environmental interests of its stakeholders. The proposed approach was applied to retail chains in Ukraine and provided decision-makers with useful information for a better contribution of internal control systems to creating stakeholders’ value. Keywords: business process, modelling, security of business processes, security criteria, stakeholders, interests, values. JEL Classification D46, G32, L81 Formulas: 3; fig.: 2; tabl.: 5; bibl.: 20.

Highlights

  • In terms of the institutional theory, the modern business is a certain pool of interactions that occur both with its internal and external contractors

  • Due to the fact that the satisfaction of some interests in a certain group of stakeholders can lead to a violation of the balance of other interests in other groups, there is a conflict of interest, and its opposite effect is the increase in vulnerability or decrease in the security of business processes

  • To model the security of business processes we have substantiated the criteria of effectiveness, efficiency, and quality, for all of themwe developed a system of indicators that reflect the satisfaction of stakeholders’ interests when creating and transferring value

Read more

Summary

Introduction

In terms of the institutional theory, the modern business is a certain pool of interactions that occur both with its internal and external contractors. The aim of the recent study is to substantiate the directions and develop a methodological approach to modelling the security of business processes by their main types, considering the interests of stakeholders who receive value from interaction with the business. Taking into account the composition of the evaluation subjects, universality is considered to be the main principle of developing a methodological approach, sinceit reflects the possibility of using the author's development for self-assessment and external evaluation of business processes security It distinguishes the author's development from the existing ones, which are based on a set of specific indicators and characteristics, that are used by developers in accordance with a certain model in the process of questioning employees. Indicators for identifying the state of business processes, considering the interests of stakeholders

Development business processes
Directions and programs of work with suppliers are not defined
Directions and programs of work with suppliers are not clearly determined
Measures aimed relationships are paid at establishing
Classification of indicators values
Zj r i
Name of the subset
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call