Comprehensive methodology for estimating information safety at enterprises of electroenergy system under the conditions of digital coherence

Authors

DOI:

https://doi.org/10.15587/1729-4061.2025.327159

Keywords:

energy enterprises, information threats, information risks, indicators of information security, digital coherence, methodology for assessing information security

Abstract

The object of this study is the process of assessing the information security of enterprises within an electric power system at the economy’s micro-level under the conditions of digital coherence.

The work solves the task to devise a comprehensive and adaptive approach to assessing information security, taking into account modern challenges associated with the integration of digital systems. The main feature is that the methodology enables to analyze the relationships between infrastructure components, taking into account digital coherence, which makes it possible to improve the accuracy of risk assessment and the effectiveness of information security management.

The devised methodology is based on eight interconnected stages, which include the integration of indicators, assessment of the interaction of system components, and monitoring changes in information security indicators in real time. This allows enterprises to respond to threats in a timely manner, minimizing risks.

A computational algorithm has been developed that monitors the dynamics of changes in information security indicators, which contributes to making timely management decisions.

The practical application of the methodology has been justified by scenarios of its integration into the work of energy industry enterprises. Testing at the power unit of the Zaporizhzhia Nuclear Power Plant confirmed its effectiveness, providing an economic effect of about USD 90 thousand. The methodology could be applied at different levels of the economy and adapted to the needs of specific enterprises, including integration into existing monitoring and management systems.

The results demonstrate the uniqueness of the proposed approach due to its complexity, adaptability, and practical significance, which makes the methodology an effective tool for assessing information security in the context of digital coherence

Author Biographies

Viktoriia Prokhorova, V. N. Karazin Kharkiv National University

Doctor of Economic Sciences, Рrofessor

Department of Economics and Management

Oleksandr Budanov, V. N. Karazin Kharkiv National University

PhD Student

Department of Economics and Management

Pavlo Budanov, V. N. Karazin Kharkiv National University

PhD, Associate Professor

Department of Physics, Electrical Engineering and Power Engineering

Krystyna Slastianykova, V. N. Karazin Kharkiv National University

Assistant

Department of Economics and Management

References

  1. Kirilchuk, S., Reutov, V., Nalivaychenko, E., Shevchenko, E., Yaroshenko, A. (2022). Ensuring the security of an automated information system in a regional innovation cluster. Transportation Research Procedia, 63, 607–617. https://doi.org/10.1016/j.trpro.2022.06.054
  2. Chang, H. H., Wong, K. H., Lee, H. C. (2022). Peer privacy protection motivation and action on social networking sites: Privacy self-efficacy and information security as moderators. Electronic Commerce Research and Applications, 54, 101176. https://doi.org/10.1016/j.elerap.2022.101176
  3. Taherdoost, H. (2022). Cybersecurity vs. Information Security. Procedia Computer Science, 215, 483–487. https://doi.org/10.1016/j.procs.2022.12.050
  4. Alraja, M. N., Butt, U. J., Abbod, M. (2023). Information security policies compliance in a global setting: An employee’s perspective. Computers & Security, 129, 103208. https://doi.org/10.1016/j.cose.2023.103208
  5. Tolah, A., Furnell, S. M., Papadaki, M. (2021). An empirical analysis of the information security culture key factors framework. Computers & Security, 108, 102354. https://doi.org/10.1016/j.cose.2021.102354
  6. Hadlington, L., Binder, J., Stanulewicz, N. (2021). Exploring role of moral disengagement and counterproductive work behaviours in information security awareness. Computers in Human Behavior, 114, 106557. https://doi.org/10.1016/j.chb.2020.106557
  7. Andersson, A., Hedström, K., Karlsson, F. (2022). “Standardizing information security – a structurational analysis.” Information & Management, 59 (3), 103623. https://doi.org/10.1016/j.im.2022.103623
  8. Kang, M., Miller, A., Jang, K., Kim, H. (2022). Firm performance and information security technology intellectual property. Technological Forecasting and Social Change, 181, 121735. https://doi.org/10.1016/j.techfore.2022.121735
  9. Antunes, M., Maximiano, M., Gomes, R. (2022). A Customizable Web Platform to Manage Standards Compliance of Information Security and Cybersecurity Auditing. Procedia Computer Science, 196, 36–43. https://doi.org/10.1016/j.procs.2021.11.070
  10. Ali, S. E. A., Lai, F.-W., Dominic, P. D. D., Brown, N. J., Lowry, P. B. B., Ali, R. F. (2021). Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Computers & Security, 110, 102451. https://doi.org/10.1016/j.cose.2021.102451
  11. Gebremeskel, B. K., Jonathan, G. M., Yalew, S. D. (2023). Information Security Challenges During Digital Transformation. Procedia Computer Science, 219, 44–51. https://doi.org/10.1016/j.procs.2023.01.262
  12. Tendikov, N., Rzayeva, L., Saoud, B., Shayea, I., Azmi, M. H., Myrzatay, A., Alnakhli, M. (2024). Security Information Event Management data acquisition and analysis methods with machine learning principles. Results in Engineering, 22, 102254. https://doi.org/10.1016/j.rineng.2024.102254
  13. Razikin, K., Soewito, B. (2022). Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egyptian Informatics Journal, 23 (3), 383–404. https://doi.org/10.1016/j.eij.2022.03.001
  14. Prokhorova, V., Protsenko, V., Bezuglaya, Y., Us, J. (2018). The optimization algorithm for the directions of influence of risk factors on the system that manages the potential of machine-building enterprises. Eastern-European Journal of Enterprise Technologies, 4 (1 (94)), 6–13. https://doi.org/10.15587/1729-4061.2018.139513
  15. Shibaeva, N., Baban, T., Prokhorova, V., Karlova, O., Girzheva, O., Krutko, M. (2019). Methodological bases of estimating the efficiency of organizational and economic mechanism of regulatory policy in agriculture. Global Journal of Environmental Science and Management, 5, 160–171. https://doi.org/10.22034/gjesm.2019.05.SI.18
  16. Babenko, V., Baksalova, O., Prokhorova, V., Dykan, V., Ovchynnikova, V., Chobitok, V. (2021). Information And Consulting Service Using In The Organization Of Personnel Management. Studies of Applied Economics, 38 (4). https://doi.org/10.25115/eea.v38i4.3999
  17. Iarmosh, O., Prokhorova, V., Shcherbyna, I., Kashaba, O., Slastianykova, K. (2021). Innovativeness of the creative economy as a component of the Ukrainian and the world sustainable development strategy. IOP Conference Series: Earth and Environmental Science, 628 (1), 012035. https://doi.org/10.1088/1755-1315/628/1/012035
  18. Budanov, P., Oliinyk, Y., Cherniuk, A., Brovko, K. (2024). Dynamic Fractal Cluster Model of Informational Space Technological Process of Power Station. Information Technology for Education, Science, and Technics, 141–155. https://doi.org/10.1007/978-3-031-71801-4_11
  19. Budanov, P., Brovko, K., Cherniuk, A., Vasyuchenko, P., Khomenko, V. (2018). Improving the reliability of information­control systems at power generation facilities based on the fractal­cluster theory. Eastern-European Journal of Enterprise Technologies, 2 (9 (92)), 4–12. https://doi.org/10.15587/1729-4061.2018.126427
  20. IAEA Annual Report 2022. IAEA. Available at: https://www.iaea.org/sites/default/files/publications/reports/2022/gc67-2.pdf
  21. IAEA Annual Report 2023. IAEA. Available at: https://www.iaea.org/sites/default/files/gc/gc68-2.pdf
  22. IAEA Year in Review 2024. IAEA. Available at: https://www.iaea.org/newscenter/news/iaea-year-in-review-2024
  23. Prokhorova, V., Budanov, M., Budanov, P., Zaitseva, A., Slastianykova, A. (2025). Devising a comprehensive methodology for estimating the economic efficiency of implementing an investment project for ensuring energy security of enterprises: organizational-economic aspect. Eastern-European Journal of Enterprise Technologies, 1 (13 (133)), 59–68. https://doi.org/10.15587/1729-4061.2025.321965
  24. Bondar-Pіdhurska, O. V., Khomenko, I. I. (2022). Scientific and Methodological Principles of Assessing the Efficiency of the Information Security Process Management of Small and Medium-Sized Businesses: Cybersecurity and Intellectual Property. The Problems of Economy, 2 (52), 108–116. https://doi.org/10.32983/2222-0712-2022-2-108-116
Comprehensive methodology for estimating information safety at enterprises of electroenergy system under the conditions of digital coherence

Downloads

Published

2025-04-22

How to Cite

Prokhorova, V., Budanov, O., Budanov, P., & Slastianykova, K. (2025). Comprehensive methodology for estimating information safety at enterprises of electroenergy system under the conditions of digital coherence. Eastern-European Journal of Enterprise Technologies, 2(13 (134), 27–37. https://doi.org/10.15587/1729-4061.2025.327159

Issue

Section

Transfer of technologies: industry, energy, nanotechnology