ECONOMIC SECURITY OF ENTERPRISES: A BIBLIOMETRIC ANALYSIS
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Abstract
This study examines the economic security of business entities by conducting a systematic bibliometric analysis of academic research indexed in the Scopus database. Due to digital transformation, growing technological dependence, market volatility and heightened exposure to economic and information-related risks, economic security at the enterprise level has become an increasingly important research topic. In this context, economic security is understood to encompass not only financial stability, but also broader organisational capabilities such as information protection, risk management, resilience, and innovation-driven adaptation. The study focuses on the body of academic research devoted to the economic security of business entities. This article aims to identify the intellectual structure of this research field and its dominant thematic areas and geographical patterns of scholarly contributions. It also seeks to determine underexplored research directions relevant to contemporary enterprise security challenges. To this end, a bibliometric research design was employed. The analysis is based on a final dataset of 87 publications from 2004 to 2025. Bibliometric techniques were employed via VOSviewer and the Bibliometrix (Biblioshiny) package to analyse co-citation networks, keyword co-occurrence and thematic clusters. The results reveal a multidimensional research landscape centred on information security, risk management, financial stability and technological innovation. The findings suggest an increasing focus on resilience-oriented and integrative security frameworks, reflecting a shift away from narrowly defined protective approaches towards more comprehensive organisational models of economic security. The analysis also reveals a geographically diverse research landscape, with notable scholarly contributions emerging from Eastern Europe, East Asia, and developed economies. These patterns reflect region-specific economic, institutional and security challenges that influence research priorities and methodological approaches. At the same time, however, the bibliometric evidence highlights persistent gaps relating to crisis resilience, the governance of information security, and the integration of emerging digital technologies at enterprise level. Based on the results obtained, the study concludes that research on the economic security of business entities is still fragmented and interdisciplinary, and requires stronger integration of strategic and technological perspectives. By providing a structured overview of existing literature, the study clarifies enterprise-level economic security research and suggests directions for future academic enquiry and managerial practice.
How to Cite
##plugins.themes.bootstrap3.article.details##
economic security, business entities, bibliometric analysis, risk management, resilience
Bhattacharjee, J., Sengupta, A., Barik, M. S., & Mazumdar, C. (2018). An Analytical study of methodologies and tools for enterprise information security risk management. In: M. Gupta, R. Sharman, J. Walp, & P. Mulgund (Eds.), Information Technology Risk Management and Compliance in Modern Organizations, 1-20. IGI Global. https://doi.org/10.4018/978-1-5225-2604-9.ch001
Bolek, V., Látecková, A., Romanová, A., & Korcek, F. (2016). Factors affecting information security focused on SME and agricultural enterprises. Agris On-Line Papers in Economics and Informatics, 8(4), 37-50. https://doi.org/10.7160/AOL.2016.080404
Burkhanov, A. U., & Tursunov, B. O. (2020). Main indicators of textile enterprises’ financial security assessment. Vlakna a Textil, 27(3), 35-40.
Bustamante, F., Fuertes, W., Diaz, P., & Toulqueridis, T. (2017). Methodology for management of information security in industrial control systems: A proof of concept aligned with enterprise objectives. Advances in Science, Technology and Engineering Systems, 2(3), 88-99. https://doi.org/10.25046/AJ020313
Cardholm, L. (2014). Identifying the business value of information security. In: T. Tsiakis, T. Kargidis, & P. Katsaros (Eds.), Approaches and Processes for Managing the Economics of Information Systems, 157-180). IGI Global. https://doi.org/10.4018/978-1-4666-4983-5.ch010
Cerin, B. (2005). Managing information security in business environment. 28th International Convention on Business Intelligence Systems, Digital Economy – 2nd e-business ALADIN, Information Systems Security, MIPRO 2005, 5.
Chaudhry, P. E., Chaudhry, S. S., Clark, K. D., & Jones, D. S. (2013). Enterprise information systems security: A case study in the banking sector. Lecture Notes in Business Information Processing, 139 LNBIP, 206-214. https://doi.org/10.1007/978-3-642-36611-6_18
Ciekanowski, Z., & Wyrębek, H. (2020). Impact of micro, small and medium-sized enterprises on economic security. Polish Journal of Management Studies, 22(1), 86-102. https://doi.org/10.17512/PJMS.2020.22.1.06
Cusack, B. (2008). Managing IT security relationships within enterprise control frameworks. In: A. Cater-Steel (Ed.), Information Technology Governance and Service Management: Frameworks and Adaptations, 191-201. IGI Global. https://doi.org/10.4018/978-1-60566-008-0.ch010
Datsenko, G., Kudyrko, O., Krupelnytska, I., Maister, L., Kopchykova, I., & Hladii, I. (2023). Application of the hierarchy analysis method to build a strategic map of the financial security of enterprises. Financial and Credit Activity: Problems of Theory and Practice, 3(50), 164-173.
Dokiienko, L. (2021). Financial security of the enterprise: An alternative approach to evaluation and management. Business, Management and Economics Engineering, 19(2), 303-336. https://doi.org/10.3846/bmee.2021.14255
Du, J. (2021). Research on enterprise information security and privacy protection in Big Data environment. 2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), Taiyuan, China, 2021, 324-327. https://doi.org/10.1109/MLBDBI54094.2021.00067
Dvorakova, L., Horak, J., Caha, Z., Machova, V., Haskova, S., Rowland, Z., & Krulicky, T. (2021). Adaptation of small and medium-sized enterprises in the service sector to the conditions of Industry 4.0 and Society 4.0: evidence from the Czech Republic. Economic Annals-XXI, 191(7), 67-87. https://doi.org/10.21003/ea.v191-06
Geffert, B., & Saif, I. (2005). Security and privacy’s role in the agile enterprise. In: The Agile Enterprise. Springer, Boston, MA. https://doi.org/10.1007/0-387-25078-6_12
Graham, M., Falkner, K., Szabo, C., & Yarom, Y. (2021). Security architecture framework for enterprises. Lecture Notes in Business Information Processing, 417, 883-904. https://doi.org/10.1007/978-3-030-75418-1_40
Grov, G., Mancini, F., & Mestl, E. M. S. (2019). Challenges for risk and security modelling in enterprise architecture. Lecture Notes in Business Information Processing, 369, 215-225. https://doi.org/10.1007/978-3-030-35151-9_14
Hallová, M., Polakovič, P., Šilerová, E., & Slováková, I. (2019). Data protection and security in SMEs under enterprise infrastructure. Agris On-Line Papers in Economics and Informatics, 11(1), 27-33. https://doi.org/10.7160/AOL.2019.110103
Harrer, J., & Wald, A. (2016). Levers of enterprise security control: a study on the use, measurement and value contribution. Journal of Management Control, 27(1), 7-32. https://doi.org/10.1007/S00187-015-0210-5
Ianioglo, A., & Polajeva, T. (2017a). Innovative component of economic security of enterprises: a case of the Republic of Moldova. Journal of Business Economics and Management, 18(6), 1228-1242. https://doi.org/10.3846/16111699.2017.1405365
Ianioglo, A., & Polajeva, T. (2017b). The essence and phases of the comprehensive system of ensuring the economic security of enterprise. International Journal of Learning and Change, 9(1), 59-74. https://doi.org/10.1504/IJLC.2017.10005203
Ivanova, T., & Shkrobot, M. (2023). Digitalization in the reverse supply chain: a bibliometric analysis. LogForum, Vol. 19(4), 683-702.
Kaušpadienė, L., Ramanauskaitė, S., & Čenys, A. (2019). Information security management framework suitability estimation for small and medium enterprise. Technological and Economic Development of Economy, 25(5), 979-997. https://doi.org/10.3846/TEDE.2019.10298
Kim, S., & Leem, C. S. (2005). Enterprise security architecture in business convergence environments. Industrial Management and Data Systems, 105(7), 919-936. https://doi.org/10.1108/02635570510616111
Kim, S., Leem, C. S., & Lee, H. J. (2005). An evaluation methodology of enterprise security management systems. International Journal of Operations and Quantitative Management, 11(4), 303-312.
Kim, Y., & Kim, B. (2021). The effective factors on continuity of corporate information security management: Based on toe framework. Information (Switzerland), 12(11). https://doi.org/10.3390/info12110446
Kryvdyk, V., Rudnichenko, Y., Havlovska, N., Matiukh, S., Harbusiuk, V., & Samborska, O. (2023). Implementation of modern management technologies in enterprise economic security. TEM Journal, 12(4), 2137-2143. https://doi.org/10.18421/tem124-24
Larno, S., Seppänen, V., & Nurmi, J. (2019). Method framework for developing enterprise architecture security principles. Complex Systems Informatics and Modeling Quarterly, 2019(20), 57-71. https://doi.org/10.7250/csimq.2019-20.03
Li, X. (2021). Decision making of optimal investment in information security for complementary enterprises based on game theory. Technology Analysis and Strategic Management, 33(7), 755-769. https://doi.org/10.1080/09537325.2020.1841158
Liu, C.-C. (2010). Using human resource functions to improve enterprise information security. International Journal of Business and Systems Research, 4(2), 117-130. https://doi.org/10.1504/IJBSR.2010.030770
Markova, I. (2022). Insurance of environmental risks in the context of the corporate security of the industrial enterprise. Ikonomicheski Izsledvania, 31(7), 142-171.
Marquez-Tejon, J., Jimenez-Partearroyo, M., & Benito-Osorio, D. (2022). Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management. Security Journal, 35(2), 600-627. https://doi.org/10.1057/s41284-021-00292-4
Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics, 182, 519-530. https://doi.org/10.1016/J.IJPE.2016.09.018
Miao, Y., & Lu, B. (2013). Information security strategies for China enterprises in overseas. International Conference on Industrial Technology, 481, 153-159.
Mishchuk, I., Pohrebniak, A., Lyshchenko, E., Skliar, N., & Tiulenieva, Y. (2021). Provision of economic security of entrepreneurship on the basis of strategic alignment considering future parameters of the business environment. International Journal of Entrepreneurship, 25(4), 1-9.
Mishchuk, I., Serdiuk, O., Bekhter, L., & Bondarenko, O. (2021). Ensuring security of economic and informational interests of mining enterprises taking into account innovative technological trends. Eastern-European Journal of Enterprise Technologies, 2(13–110), 42-54. https://doi.org/10.15587/1729-4061.2021.230308
Nabi, S. I., Al-Ghmlas, G. S., & Alghathbar, K. (2013). Enterprise information security policies, standards, and procedures: A survey of available standards and guidelines (Vols. 2–3). In: M. Gupta, J. Walp, & R. Sharman (Eds.), Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, 67-89. IGI Global. https://doi.org/10.4018/978-1-4666-0197-0.ch005
Owusu Kwateng, K., Amanor, C., & Tetteh, F. K. (2022). Enterprise risk management and information technology security in the financial sector. Information and Computer Security, 30(3), 422-451. https://doi.org/10.1108/ics-11-2020-0185
Pankova, M., Kwilinski, A., Dalevska, N., & Khobta, V. (2023). Modelling the level of the enterprise' resource security using artificial neural networks. Virtual Economics, 6(1), 71-91. https://doi.org/10.34021/ve.2023.06.01(5)
Sindhuja, P. N. (2021). The impact of information security initiatives on supply chain robustness and performance: an empirical study. Information and Computer Security, 29(2), 365-391. https://doi.org/10.1108/ICS-07-2020-0128
Pronoza, P., Kuzenko, T., & Sablina, N. (2022). Implementation of strategic tools in the process of financial security management of industrial enterprises in Ukraine. Eastern-European Journal of Enterprise Technologies, 2(13–116), 15-23. https://doi.org/10.15587/1729-4061.2022.254234
Salas-Navarro, K., Serrano-Pájaro, P., Ospina-Mateus, H., and Zamora-Musa, R. (2022). Inventory models in a sustainable supply chain: a bibliometric analysis. Sustainability, 14(10), 6003. https://doi.org/10.3390/su14106003
San Martín, L., Rodríguez, A., Caro, A., & Velásquez, I. (2022). Obtaining secure business process models from an enterprise architecture considering security requirements. Business Process Management Journal, 28(1), 150-177. https://doi.org/10.1108/bpmj-01-2021-0025
Serhiienko, O., Volosnikova, N., Yehorova, Y., Makarchuk, K., & Sokolova, N. (2023). Strategizing directions of financial aspect development in the corporate security system of an industrial enterprise. Financial and Credit Activity: Problems of Theory and Practice, 5(52), 190-207. https://doi.org/10.55643/fcaptp.5.52.2023.4105
Shih, S. C., & Wen, H. J. (2005). E-enterprise security management life cycle. Information Management and Computer Security, 13(2), 121-134. https://doi.org/10.1108/09685220510589307
Soon, J. N. P., Mahmood, A. K., Yin, C. P., Wan, W. S., Yuen, P. K., & Heng, L. E. (2014). IaaS cloud optimisation during economic turbulence for Malaysia small and medium enterprise. International Journal of Business Information Systems, 16(2), 196-208. https://doi.org/10.1504/IJBIS.2014.062838
Talbot, J., & Jakeman, M. (2009). Security Risk Management: Body of Knowledge. John Wiley and Sons. https://doi.org/10.1002/9780470494974
Tawileh, A., Hilton, J., & McIntosh, S. (2007). Managing information security in small and medium sized enterprises: A holistic approach. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_35
Tsenkov, Y. (2019). Justification of the strategy of economic security of organization in the conditions of innovation development. Journal of Security and Sustainability Issues, 8(4), 715-725. https://doi.org/10.9770/JSSI.2019.8.4(14)
Varnalii, Z., & Mekhed, A. (2022). Business entities’ financial security under digital economy. Financial and Credit Activity: Problems of Theory and Practice, 4(45), 267-275. https://doi.org/10.55643/fcaptp.4.45.2022.3813
Von Faber, E. (2009). How economy and society affect enterprise security management. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_7
Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., & Li, X. (2013). A system framework of security management in enterprise systems. Systems Research and Behavioral Science, 30(3), 287-299. https://doi.org/10.1002/SRES.2184
Wang, Q., Zong, B., Lin, Y., Li, Z., & Luo, X. (2023). The application of big data and artificial intelligence technology in enterprise information security management and risk assessment. Journal of Organizational and End User Computing, 35(1). https://doi.org/10.4018/JOEUC.326934
Williams, N. I. (2013). A strategic model for information security growth in small and medium enterprises. Proceedings of the 21st International Business Information Management Association (IBIMA), 2, 1487-1495.
Yağci, K., Akçay, S., Efendi, M., & Öztürk, H. M. (2020). Information security awareness in tourism enterprises: Case of Turkish manager opinions. In A. Akbaba & V. Altıntaş (Eds.), Industrial and Managerial Solutions for Tourism Enterprises, pp. 251-267. IGI Global. https://doi.org/10.4018/978-1-7998-3030-6.ch015
Yakushev, O., Zakharova, O., Zachosova, N., Yakusheva, O., Chernyshov, O., & Naboka, R. (2023). Assessment of financial and economic security of business innovation enterprises in hospitality and tourism. Financial and Credit Activity: Problems of Theory and Practice, 2(49), 135-147. https://doi.org/10.55643/fcaptp.2.49.2023.4010
Yan, Q. (2008). A security evaluation model and toolkit for enterprise information systems. Enterprise Information Systems, 2(3), 309-324. https://doi.org/10.1080/17517570802242893
Zadorozhnyy, Z.-M., Zhukevych, S., Portovaras, T., Rozelyuk, V., Zhuk, N., & Nazarova, I. (2023). Analysis of risks in the financial security management systm of business entities. Financial and Credit Activity: Problems of Theory and Practice, 6(53), 82-95. https://doi.org/10.55643/fcaptp.6.53.2023.4242
Zhou, X., & Weng, H. (2022). Assessing information security performance of enterprise internal financial sharing in cloud computing environment using analytic hierarchy process. International Journal of Grid and Utility Computing, 13(2-3), 256-271. https://doi.org/10.1504/ijguc.2022.10045883
Zhuravlyova, I. V., & Lelyuk, S. V. (2014). Management of enterprise financial security and its intellectual component based on creating multiagent decision support system. Actual Problems of Economics, 157(7), 163-170.
Zlotenko, O., Rudnichenko, Y., Illiashenko, O., Voynarenko, M., & Havlovska, N. (2019). Optimization of the sources structure of financing the implementation of strategic guidelines for ensuring the economic security of investment activities of an industrial enterprise. TEM Journal, 8(2), 498-506.
Zwolak, J. (2022). Verification of the Financial Security of Small and Medium-Sized Enterprises in Poland. WSEAS Transactions on Business and Economics, 19, 1230-1239. https://doi.org/10.37394/23207.2022.19.108

This work is licensed under a Creative Commons Attribution 4.0 International License.