ECONOMIC SECURITY OF ENTERPRISES: A BIBLIOMETRIC ANALYSIS

##plugins.themes.bootstrap3.article.main##

##plugins.themes.bootstrap3.article.sidebar##

Published: May 4, 2026

  Maryna Kravchenko

  Sergii Savchenko

  Fedir Nemyrovskyi

Abstract

This study examines the economic security of business entities by conducting a systematic bibliometric analysis of academic research indexed in the Scopus database. Due to digital transformation, growing technological dependence, market volatility and heightened exposure to economic and information-related risks, economic security at the enterprise level has become an increasingly important research topic. In this context, economic security is understood to encompass not only financial stability, but also broader organisational capabilities such as information protection, risk management, resilience, and innovation-driven adaptation. The study focuses on the body of academic research devoted to the economic security of business entities. This article aims to identify the intellectual structure of this research field and its dominant thematic areas and geographical patterns of scholarly contributions. It also seeks to determine underexplored research directions relevant to contemporary enterprise security challenges. To this end, a bibliometric research design was employed. The analysis is based on a final dataset of 87 publications from 2004 to 2025. Bibliometric techniques were employed via VOSviewer and the Bibliometrix (Biblioshiny) package to analyse co-citation networks, keyword co-occurrence and thematic clusters. The results reveal a multidimensional research landscape centred on information security, risk management, financial stability and technological innovation. The findings suggest an increasing focus on resilience-oriented and integrative security frameworks, reflecting a shift away from narrowly defined protective approaches towards more comprehensive organisational models of economic security. The analysis also reveals a geographically diverse research landscape, with notable scholarly contributions emerging from Eastern Europe, East Asia, and developed economies. These patterns reflect region-specific economic, institutional and security challenges that influence research priorities and methodological approaches. At the same time, however, the bibliometric evidence highlights persistent gaps relating to crisis resilience, the governance of information security, and the integration of emerging digital technologies at enterprise level. Based on the results obtained, the study concludes that research on the economic security of business entities is still fragmented and interdisciplinary, and requires stronger integration of strategic and technological perspectives. By providing a structured overview of existing literature, the study clarifies enterprise-level economic security research and suggests directions for future academic enquiry and managerial practice.

How to Cite

Kravchenko, M., Savchenko, S., & Nemyrovskyi, F. (2026). ECONOMIC SECURITY OF ENTERPRISES: A BIBLIOMETRIC ANALYSIS. Baltic Journal of Economic Studies, 12(2), 299-312. https://doi.org/10.30525/2256-0742/2026-12-2-299-312
Article views: 24 | PDF Downloads: 14

##plugins.themes.bootstrap3.article.details##

Keywords

economic security, business entities, bibliometric analysis, risk management, resilience

References

Bhattacharjee, J., Sengupta, A., Barik, M. S., & Mazumdar, C. (2018). An Analytical study of methodologies and tools for enterprise information security risk management. In: M. Gupta, R. Sharman, J. Walp, & P. Mulgund (Eds.), Information Technology Risk Management and Compliance in Modern Organizations, 1-20. IGI Global. https://doi.org/10.4018/978-1-5225-2604-9.ch001

Bolek, V., Látecková, A., Romanová, A., & Korcek, F. (2016). Factors affecting information security focused on SME and agricultural enterprises. Agris On-Line Papers in Economics and Informatics, 8(4), 37-50. https://doi.org/10.7160/AOL.2016.080404

Burkhanov, A. U., & Tursunov, B. O. (2020). Main indicators of textile enterprises’ financial security assessment. Vlakna a Textil, 27(3), 35-40.

Bustamante, F., Fuertes, W., Diaz, P., & Toulqueridis, T. (2017). Methodology for management of information security in industrial control systems: A proof of concept aligned with enterprise objectives. Advances in Science, Technology and Engineering Systems, 2(3), 88-99. https://doi.org/10.25046/AJ020313

Cardholm, L. (2014). Identifying the business value of information security. In: T. Tsiakis, T. Kargidis, & P. Katsaros (Eds.), Approaches and Processes for Managing the Economics of Information Systems, 157-180). IGI Global. https://doi.org/10.4018/978-1-4666-4983-5.ch010

Cerin, B. (2005). Managing information security in business environment. 28th International Convention on Business Intelligence Systems, Digital Economy – 2nd e-business ALADIN, Information Systems Security, MIPRO 2005, 5.

Chaudhry, P. E., Chaudhry, S. S., Clark, K. D., & Jones, D. S. (2013). Enterprise information systems security: A case study in the banking sector. Lecture Notes in Business Information Processing, 139 LNBIP, 206-214. https://doi.org/10.1007/978-3-642-36611-6_18

Ciekanowski, Z., & Wyrębek, H. (2020). Impact of micro, small and medium-sized enterprises on economic security. Polish Journal of Management Studies, 22(1), 86-102. https://doi.org/10.17512/PJMS.2020.22.1.06

Cusack, B. (2008). Managing IT security relationships within enterprise control frameworks. In: A. Cater-Steel (Ed.), Information Technology Governance and Service Management: Frameworks and Adaptations, 191-201. IGI Global. https://doi.org/10.4018/978-1-60566-008-0.ch010

Datsenko, G., Kudyrko, O., Krupelnytska, I., Maister, L., Kopchykova, I., & Hladii, I. (2023). Application of the hierarchy analysis method to build a strategic map of the financial security of enterprises. Financial and Credit Activity: Problems of Theory and Practice, 3(50), 164-173.

Dokiienko, L. (2021). Financial security of the enterprise: An alternative approach to evaluation and management. Business, Management and Economics Engineering, 19(2), 303-336. https://doi.org/10.3846/bmee.2021.14255

Du, J. (2021). Research on enterprise information security and privacy protection in Big Data environment. 2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), Taiyuan, China, 2021, 324-327. https://doi.org/10.1109/MLBDBI54094.2021.00067

Dvorakova, L., Horak, J., Caha, Z., Machova, V., Haskova, S., Rowland, Z., & Krulicky, T. (2021). Adaptation of small and medium-sized enterprises in the service sector to the conditions of Industry 4.0 and Society 4.0: evidence from the Czech Republic. Economic Annals-XXI, 191(7), 67-87. https://doi.org/10.21003/ea.v191-06

Geffert, B., & Saif, I. (2005). Security and privacy’s role in the agile enterprise. In: The Agile Enterprise. Springer, Boston, MA. https://doi.org/10.1007/0-387-25078-6_12

Graham, M., Falkner, K., Szabo, C., & Yarom, Y. (2021). Security architecture framework for enterprises. Lecture Notes in Business Information Processing, 417, 883-904. https://doi.org/10.1007/978-3-030-75418-1_40

Grov, G., Mancini, F., & Mestl, E. M. S. (2019). Challenges for risk and security modelling in enterprise architecture. Lecture Notes in Business Information Processing, 369, 215-225. https://doi.org/10.1007/978-3-030-35151-9_14

Hallová, M., Polakovič, P., Šilerová, E., & Slováková, I. (2019). Data protection and security in SMEs under enterprise infrastructure. Agris On-Line Papers in Economics and Informatics, 11(1), 27-33. https://doi.org/10.7160/AOL.2019.110103

Harrer, J., & Wald, A. (2016). Levers of enterprise security control: a study on the use, measurement and value contribution. Journal of Management Control, 27(1), 7-32. https://doi.org/10.1007/S00187-015-0210-5

Ianioglo, A., & Polajeva, T. (2017a). Innovative component of economic security of enterprises: a case of the Republic of Moldova. Journal of Business Economics and Management, 18(6), 1228-1242. https://doi.org/10.3846/16111699.2017.1405365

Ianioglo, A., & Polajeva, T. (2017b). The essence and phases of the comprehensive system of ensuring the economic security of enterprise. International Journal of Learning and Change, 9(1), 59-74. https://doi.org/10.1504/IJLC.2017.10005203

Ivanova, T., & Shkrobot, M. (2023). Digitalization in the reverse supply chain: a bibliometric analysis. LogForum, Vol. 19(4), 683-702.

Kaušpadienė, L., Ramanauskaitė, S., & Čenys, A. (2019). Information security management framework suitability estimation for small and medium enterprise. Technological and Economic Development of Economy, 25(5), 979-997. https://doi.org/10.3846/TEDE.2019.10298

Kim, S., & Leem, C. S. (2005). Enterprise security architecture in business convergence environments. Industrial Management and Data Systems, 105(7), 919-936. https://doi.org/10.1108/02635570510616111

Kim, S., Leem, C. S., & Lee, H. J. (2005). An evaluation methodology of enterprise security management systems. International Journal of Operations and Quantitative Management, 11(4), 303-312.

Kim, Y., & Kim, B. (2021). The effective factors on continuity of corporate information security management: Based on toe framework. Information (Switzerland), 12(11). https://doi.org/10.3390/info12110446

Kryvdyk, V., Rudnichenko, Y., Havlovska, N., Matiukh, S., Harbusiuk, V., & Samborska, O. (2023). Implementation of modern management technologies in enterprise economic security. TEM Journal, 12(4), 2137-2143. https://doi.org/10.18421/tem124-24

Larno, S., Seppänen, V., & Nurmi, J. (2019). Method framework for developing enterprise architecture security principles. Complex Systems Informatics and Modeling Quarterly, 2019(20), 57-71. https://doi.org/10.7250/csimq.2019-20.03

Li, X. (2021). Decision making of optimal investment in information security for complementary enterprises based on game theory. Technology Analysis and Strategic Management, 33(7), 755-769. https://doi.org/10.1080/09537325.2020.1841158

Liu, C.-C. (2010). Using human resource functions to improve enterprise information security. International Journal of Business and Systems Research, 4(2), 117-130. https://doi.org/10.1504/IJBSR.2010.030770

Markova, I. (2022). Insurance of environmental risks in the context of the corporate security of the industrial enterprise. Ikonomicheski Izsledvania, 31(7), 142-171.

Marquez-Tejon, J., Jimenez-Partearroyo, M., & Benito-Osorio, D. (2022). Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management. Security Journal, 35(2), 600-627. https://doi.org/10.1057/s41284-021-00292-4

Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics, 182, 519-530. https://doi.org/10.1016/J.IJPE.2016.09.018

Miao, Y., & Lu, B. (2013). Information security strategies for China enterprises in overseas. International Conference on Industrial Technology, 481, 153-159.

Mishchuk, I., Pohrebniak, A., Lyshchenko, E., Skliar, N., & Tiulenieva, Y. (2021). Provision of economic security of entrepreneurship on the basis of strategic alignment considering future parameters of the business environment. International Journal of Entrepreneurship, 25(4), 1-9.

Mishchuk, I., Serdiuk, O., Bekhter, L., & Bondarenko, O. (2021). Ensuring security of economic and informational interests of mining enterprises taking into account innovative technological trends. Eastern-European Journal of Enterprise Technologies, 2(13–110), 42-54. https://doi.org/10.15587/1729-4061.2021.230308

Nabi, S. I., Al-Ghmlas, G. S., & Alghathbar, K. (2013). Enterprise information security policies, standards, and procedures: A survey of available standards and guidelines (Vols. 2–3). In: M. Gupta, J. Walp, & R. Sharman (Eds.), Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, 67-89. IGI Global. https://doi.org/10.4018/978-1-4666-0197-0.ch005

Owusu Kwateng, K., Amanor, C., & Tetteh, F. K. (2022). Enterprise risk management and information technology security in the financial sector. Information and Computer Security, 30(3), 422-451. https://doi.org/10.1108/ics-11-2020-0185

Pankova, M., Kwilinski, A., Dalevska, N., & Khobta, V. (2023). Modelling the level of the enterprise' resource security using artificial neural networks. Virtual Economics, 6(1), 71-91. https://doi.org/10.34021/ve.2023.06.01(5)

Sindhuja, P. N. (2021). The impact of information security initiatives on supply chain robustness and performance: an empirical study. Information and Computer Security, 29(2), 365-391. https://doi.org/10.1108/ICS-07-2020-0128

Pronoza, P., Kuzenko, T., & Sablina, N. (2022). Implementation of strategic tools in the process of financial security management of industrial enterprises in Ukraine. Eastern-European Journal of Enterprise Technologies, 2(13–116), 15-23. https://doi.org/10.15587/1729-4061.2022.254234

Salas-Navarro, K., Serrano-Pájaro, P., Ospina-Mateus, H., and Zamora-Musa, R. (2022). Inventory models in a sustainable supply chain: a bibliometric analysis. Sustainability, 14(10), 6003. https://doi.org/10.3390/su14106003

San Martín, L., Rodríguez, A., Caro, A., & Velásquez, I. (2022). Obtaining secure business process models from an enterprise architecture considering security requirements. Business Process Management Journal, 28(1), 150-177. https://doi.org/10.1108/bpmj-01-2021-0025

Serhiienko, O., Volosnikova, N., Yehorova, Y., Makarchuk, K., & Sokolova, N. (2023). Strategizing directions of financial aspect development in the corporate security system of an industrial enterprise. Financial and Credit Activity: Problems of Theory and Practice, 5(52), 190-207. https://doi.org/10.55643/fcaptp.5.52.2023.4105

Shih, S. C., & Wen, H. J. (2005). E-enterprise security management life cycle. Information Management and Computer Security, 13(2), 121-134. https://doi.org/10.1108/09685220510589307

Soon, J. N. P., Mahmood, A. K., Yin, C. P., Wan, W. S., Yuen, P. K., & Heng, L. E. (2014). IaaS cloud optimisation during economic turbulence for Malaysia small and medium enterprise. International Journal of Business Information Systems, 16(2), 196-208. https://doi.org/10.1504/IJBIS.2014.062838

Talbot, J., & Jakeman, M. (2009). Security Risk Management: Body of Knowledge. John Wiley and Sons. https://doi.org/10.1002/9780470494974

Tawileh, A., Hilton, J., & McIntosh, S. (2007). Managing information security in small and medium sized enterprises: A holistic approach. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_35

Tsenkov, Y. (2019). Justification of the strategy of economic security of organization in the conditions of innovation development. Journal of Security and Sustainability Issues, 8(4), 715-725. https://doi.org/10.9770/JSSI.2019.8.4(14)

Varnalii, Z., & Mekhed, A. (2022). Business entities’ financial security under digital economy. Financial and Credit Activity: Problems of Theory and Practice, 4(45), 267-275. https://doi.org/10.55643/fcaptp.4.45.2022.3813

Von Faber, E. (2009). How economy and society affect enterprise security management. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_7

Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., & Li, X. (2013). A system framework of security management in enterprise systems. Systems Research and Behavioral Science, 30(3), 287-299. https://doi.org/10.1002/SRES.2184

Wang, Q., Zong, B., Lin, Y., Li, Z., & Luo, X. (2023). The application of big data and artificial intelligence technology in enterprise information security management and risk assessment. Journal of Organizational and End User Computing, 35(1). https://doi.org/10.4018/JOEUC.326934

Williams, N. I. (2013). A strategic model for information security growth in small and medium enterprises. Proceedings of the 21st International Business Information Management Association (IBIMA), 2, 1487-1495.

Yağci, K., Akçay, S., Efendi, M., & Öztürk, H. M. (2020). Information security awareness in tourism enterprises: Case of Turkish manager opinions. In A. Akbaba & V. Altıntaş (Eds.), Industrial and Managerial Solutions for Tourism Enterprises, pp. 251-267. IGI Global. https://doi.org/10.4018/978-1-7998-3030-6.ch015

Yakushev, O., Zakharova, O., Zachosova, N., Yakusheva, O., Chernyshov, O., & Naboka, R. (2023). Assessment of financial and economic security of business innovation enterprises in hospitality and tourism. Financial and Credit Activity: Problems of Theory and Practice, 2(49), 135-147. https://doi.org/10.55643/fcaptp.2.49.2023.4010

Yan, Q. (2008). A security evaluation model and toolkit for enterprise information systems. Enterprise Information Systems, 2(3), 309-324. https://doi.org/10.1080/17517570802242893

Zadorozhnyy, Z.-M., Zhukevych, S., Portovaras, T., Rozelyuk, V., Zhuk, N., & Nazarova, I. (2023). Analysis of risks in the financial security management systm of business entities. Financial and Credit Activity: Problems of Theory and Practice, 6(53), 82-95. https://doi.org/10.55643/fcaptp.6.53.2023.4242

Zhou, X., & Weng, H. (2022). Assessing information security performance of enterprise internal financial sharing in cloud computing environment using analytic hierarchy process. International Journal of Grid and Utility Computing, 13(2-3), 256-271. https://doi.org/10.1504/ijguc.2022.10045883

Zhuravlyova, I. V., & Lelyuk, S. V. (2014). Management of enterprise financial security and its intellectual component based on creating multiagent decision support system. Actual Problems of Economics, 157(7), 163-170.

Zlotenko, O., Rudnichenko, Y., Illiashenko, O., Voynarenko, M., & Havlovska, N. (2019). Optimization of the sources structure of financing the implementation of strategic guidelines for ensuring the economic security of investment activities of an industrial enterprise. TEM Journal, 8(2), 498-506.

Zwolak, J. (2022). Verification of the Financial Security of Small and Medium-Sized Enterprises in Poland. WSEAS Transactions on Business and Economics, 19, 1230-1239. https://doi.org/10.37394/23207.2022.19.108