• M. Ishchenko Kryvyi Rih National University
  • K. Astafieva Kryvyi Rih National University
  • V. Adamovska Kryvyi Rih National University
  • O. Bondarenko Donetsk National University of Economics and Trade named after Mykhailo Tuhan-Baranovsky
  • I. Mishchuk Kryvyi Rih National University




digitalization security, life cycle theory, information recession, expert’s assessments method, mining enterprises, business efficiency


Taking into account the current conditions of companies’ transition to remote mode of operation, it is of paramount importance to have a number of tools giving opportunity to assess the readiness of business entities to work with all the contractors remotely. Thus, it is necessary for enterprises and business entities to ensure the digitalization security. The article is devoted to the study of differences between the essence of the concepts «Information Security» and «Security of digitalization», as well as the analysis of enterprises digitalization security level. The authors proposed a method of assessing the enterprise digitalization security level from the standpoint of life cycle theory, which allows to identify signs of the «Information Recession» in its activities. The research methodology involves an integrated analysis of the main enterprise activity aspects at the different stages of its life cycle using an indicator that takes into account the depreciation of intangible assets, namely, computer security, the level of administrative costs and sales costs. Identification of the «Information Recession» conditions and determination of the digitalization security level was carried out by expert methods. Specialists on strategic development of enterprises acted as experts. Experts have eradicated such security levels of digitalization as «normal», «acceptable» and «critical». The method was tested on the materials of the Kryvyi Rih mining enterprises. The obtained results characterize the conditions for identifying the «Information Recession» in the activities of enterprises at such stages of their life cycles as «Formation», «Infancy», «Childhood», «Growth», «Stability» and «Recession». The proposed approach will allow to improve the processes of management automation and to increase the digitalization processes implementation efficiency for industrial enterprises.

Author Biographies

M. Ishchenko, Kryvyi Rih National University

Doctor of Economics, Professor

K. Astafieva, Kryvyi Rih National University

Ph. D. in Economics, Associate Professor

V. Adamovska, Kryvyi Rih National University

Ph. D. in Economics, Associate Professor

O. Bondarenko, Donetsk National University of Economics and Trade named after Mykhailo Tuhan-Baranovsky

Ph. D. in Economics, Associate Professor

I. Mishchuk, Kryvyi Rih National University

Ph. D. in Economics, Associate Professor


McGraw, G. (2006). Software Security: Building Security. Boston: Addison-Wesley Professional.

Acquisti, A., Friedman, A., & Telang, R. (2006, October, 12). Is there a cost to privacy breaches? An event study. Workshop on the Economics of Information Security. Cambridge. Retrieved from http://www.heinz.cmu.edu/~acquisti/papers/acquistifriedman-telang-privacy-breaches.pdf.

Bojanc, R., & Jerman-Blažič, B. (2012). Quantitative Model for Economic Analyses of Information Security Investment in an Enterprise Information System. Organizacija, 45, 276—288. https://doi.org/10.2478/v10051-012-0027-z.

Dubnytskyi, V. I., Naumenko, N. Yu., & Tutaieva, O. V. (2018). Aspekty otsinky ryzykiv informatsiinoi bezpeky [Aspects of information security risk assessment]. Ekonomichna ta informatsiina bezpeka: problemy ta perspektyvy — Economic and information security: problems and perspectives, Dnipro, April 27, 51—55. Dnipro: Dniprop. derzh. un-t vnutr. sprav [in Ukrainian].

Shashyna, M. V., & Volodin, V. V. (2016). Informatsiina skladova ekonomichnoi bezpeky pidpryiemstva [Information component of economic security of the enterprise]. Efektyvna ekonomika — Efficient Economy, 10. Retrieved from http://www.economy.nayka.com.ua/?op=1&z=5176 [in Ukrainian].

Hohan, A., Olaru, M., & Pirnea, I. (2015). Assessment and continuous improvement of information security based on TQM and business excellence principles. Procedia Economics and Finance, 32, 352—359. https://doi.org/10.1016/S2212-5671(15)01404-5.

Shariati, M., Bahmani, F., & Shams, F. (2011). Enterprise information security, a review of architectures and frameworks from interoperability perspective. Procedia computer science, 3, 537—543. https://doi.org/10.1016/ j.procs.2010.12.089.

Toivonen, M., & Saari, E. (2019). Human-Centered Digitalization and Services. Singapore: Springer. https://doi.org/10.1007/978-981-13-7725-9.

Khan, B., Alghathbar, K. S., Nabi, S. I., & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. African journal of business management, 5 (26), 10862—10868. https://doi.org/10.5897/AJBM11.067.

Ponemon Institute LLC. (2012). Future state of IT security. A survey of IT security executives. San Francisco: s.n., RSA Conference.

Karpunina, E. K., Konovalova, M. E., Shurchkova, J. V., Isaeva, E. A., & Abalakin, A. A. (2020). Economic Security of Businesses as the Determinant of Digital Transformation Strategy. Digital Economy: Complexity and Variety vs. Rationality, 87, 251—260. https://doi.org/10.1007/978-3-030-29586-8_30.

Open Group Standard: Open Information Security Management Maturity Model (O-ISM3). (2017). Version 2.0. Berkshire, United Kingdom: The Open Group, 130 p. Retrieved from https://www.slideshare.net/vaceituno/open-information-security-management-maturity-model.

Konkolewsky, H. (2017). Digital economy and the future of social security. Administration, 65 (4), 21—30. https://doi.org/10.1515/admin-2017-0031.

Schwab, K. (2016). The Fourth Industrial Revolution: what it means, how to respond. Founder and Executive Chairman. World Economic Forum. Retrieved from https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond.

Kibenko, O. (2019). Didzhytalizatsiia yak nova era rozvytku korporatyvnykh prav [Digitization as a new era of corporate rights development]. Sudebno-yuridicheskaya gazeta — Forensic-legal newspaper. Retrieved from https://sud.ua/ru/news/blog/145948-didzhitalizatsiya-yak-nova-era-rozvitku-korporativnogo-prava [in Ukrainian].

Digital Economy Act. (2010). Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Digital_Economy_Act_2010.

Kolomiiets, H. M., & Hlushach, Yu. S. (2017). Tsyfrova ekonomika: kontroversiinist zmistu i vplyvu na hospodarskyi rozvytok [The Digital Economy: The Controversy of Content and Impact on Economic Development]. Biznes Inform — Business Inform, 7, 137—143. Retrieved from https://www.business-inform.net/annotated-catalogue/?year=2017&astract=2017_07_0&lang=ua&stqa=21.

Hojeghan, S. B., & Esfangareh, A. N. (2011). Digital economy and tourism impacts, influences and challenges. Procedia — Social and Behavioral Sciences, Vol. 19, 1, 308—16. https://doi.org/10.1016/j.sbspro.2011.05.136.

Perederii, T. S. (2019). Strategy of digital security of enterprise as a driver digital transformation of economic Ukraine. Visnyk ekonomichnoi nauky Ukrainy — Herald of Economic Sciences of Ukraine, 2 (37), 201—204. https://doi.org/10.37405/1729-7206.2019.2(37).201-204.

Podgornaya, A. I., Grudina, S. I., & Avdonina, S. G. (2015). An Enterprise Flexible Development Model. Procedia Economics and Finance, 24, 519—522. https://doi.org/10.1016/s2212-5671(15)00621-8.

Ulesov, D. V., Murtazina, G., Safiullin, L. N., & Saipullaev, U. A. (2013). Special Aspects of Development of Business in the Knowledge-Based Economy. World Applied Sciences Journal, 27 (13), 189—192. https://doi.org/10.5829/idosi.wasj.2013.27.emf.39.

Adyzes, I. K. (2014). Upravlenie zhiznennym ciklom korporacii [Corporate lifecycle management]. (V. Kuzin, Trans.). Moscow: Mann, Ivanov and Ferber [in Russian].

Astafieva, K. O. (2013). Otsinka ekonomichnoi bezpeky pidpryiemstv iz urakhuvanniam etapiv yikh zhyttievykh tsykliv [Assessment of economic security of enterprises, taking into account the stages of their life cycles]. Extended abstract of candidate’s thesis. Kryvyi Rih [in Ukrainian].

PAT «Sukha Balka» (n. d.). Ofitsiinyi sait [Official site]. Retrieved from http://sukhabalka.com [in Ukrainian].

PAT «Kryvorizkyi zalizorudnyi kombinat» (n. d.). Ofitsiinyi sait [Official site]. Retrieved from https://www.krruda.dp.ua [in Ukrainian].

PAT «Tsentralnyi HZK» (n. d.). Ofitsiinyi sait [Official site]. Retrieved from https://cgok.metinvestholding.com/ua [in Ukrainian].

PAT «Inhuletskyi HZK» (n. d.). Ofitsiinyi sait [Official site]. Retrieved from https://ingok.metinvestholding.com/ua [in Ukrainian].

PAT «Pivnichnyi HZK» (n. d.). Ofitsiinyi sait [Official site]. Retrieved from https://sevgok.metinvestholding.com/ua [in Ukrainian].






The models and process technology of the financial information