Bìznes Inform (Sep 2022)

The Complex System of Simulation Modeling of Assessment of the Efficiency of Financial Resource Management of an Industrial Enterprise at the Microeconomic Level

  • Manoilenko Oleksandr V.,
  • Volosnikova Nataliia M.,
  • Reshetnyak Natalia B.

DOI
https://doi.org/10.32983/2222-4459-2022-9-27-33
Journal volume & issue
Vol. 9, no. 536
pp. 27 – 33

Abstract

Read online

The purpose of the article is to examine the features of a systematic approach to the total aggregate of methods for assessing the efficiency of resource management of an industrial enterprise, which methods can be divided into threshold and non-threshold, parametric and non-parametric ones. The peculiarity of a systematic approach to the corporate security system is studied and the main stages of this approach are identified. It is specified that a systematic approach is such one in the presence of which managerial decisions aimed at a competitive direction of strategic development of corporate security be considered in the form of an interconnected and interdependent integral complex. The objectives of the corporate security strategy of an industrial enterprise are substantiated, which should be subordinated to the general strategy of economic development, and the implementation of the management of the strategy for the formation of general corporate security, carried out through decision-making. It is concluded that the mechanism of management of the corporate security system must be represented as an integral organizational-economic system, which is also an integral part in the overall structure of the mechanism of an industrial enterprise. The main tasks and components of the model of the strategy of general corporate security are identified. In addition, it is noted that mechanism should be understood as a sequence of measures that are caused by an aggregate of interdependent elements of economic, logistics, personnel, legal, resource, transactional, information, technological security, forming the state and content of processes in accordance with a certain corporate security strategy.

Keywords