-
Serghei Ohrimenco, Dinara Orlova, Valeriu Cernei
COMMERCIAL SECRET MANAGEMENT IN TERMS OF SHADOW DIGITAL ECONOMY
Abstract:
The article explores trade secret protection management in the context of the shadow digital economy (SDE). The study aims to identify threats to trade secrets associated with SDE and propose effective protection methods. It emphasizes that the economic value of trade secrets lies in their confidentiality, making them vulnerable to data leaks, cyberattacks, and other risks, particularly in the digital environment.
The authors examine the nature of trade secret in terms of SDE spread. The paper presents methods of trade secret protection, including documentary, economic-organizational, and information-analytical types. Special attention is paid to the combined use of patent protection and encryption techniques.
The study concludes with key findings, highlighting the need for enhanced cybersecurity, international cooperation to combat cyber espionage, and improved organizational measures. This work significantly contributes to the understanding of commercial secret management and offers valuable recommendations for businesses operating in the digital economy.
-
Serghei Ohrimenco, Dinara Orlova, Valeriu Cernei
CYBER THREATS MODELING: AN EMPIRICAL STUDY
Abstract:
The immediacy of this study is determined by the need to fight back against the modern cyber threats that arise in the process of building a digital economy. The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics.
Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.
The article logically combines the study of the modern landscape of cybersecurity threats, the construction of an empirical model of security threats (with the allocation of a monetization block), the demonstration of the results of processing statistical data characterizing the distribution of the frequency of occurrence of specific threats.
The paper aims to build an empirical model of cyber threats based on a study of huge number of relevant literature sources and statistical data.
-
Olga Pugacheva
APPLICATION OF INFORMATION TECHNOLOGIES IN THE ECONOMY
AND EDUCATION OF THE REPUBLIC
OF BELARUS: CONDITION, PROBLEMS AND PROSPECTS
Abstract:
The article examines the level of development of the digital economy and information technologies in the Republic of Belarus from the global ratings point of view, identifies the problems of using information technologies in the country's economy and the prospects for the development of the digital economy. Regulatory and legal acts regulating the development of the digital economy and the information society in the Republic of Belarus and in the system of its higher education are considered. On this basis, the directions that presuppose the revision of traditional forms of organization of the educational process in a modern university, the change of content and teaching methods in higher education on the basis of modern information technologies are highlighted.