Information Policy of the Enterprise as a Factor of Ensuring Competitiveness
Abstract
In this research, we determined that the development of objects of entrepreneurial activity can take place only on condition of equal access to external and internal resources of development. Access to resources, as well as increasing work competitiveness, is defined as the possibility of forming an enterprise environment and its independent actions. The basis of such an environment is the formation of an information-type policy that allows fully determining the opportunities for attracting development resources, as well as improving the financial stability of the enterprise in the external market. The subject of the study is the process of the information policy of the enterprise formation, as well as the factors of its formation as a separate formative value for determining whether the enterprise is competitive. The novelty of the research is the process of formation and presentation in the various information and social and economic processes of the enterprise’s information policy. The direction of further research is the integrative functions of ensuring the development of accounting and transformation of information policy into the enterprise’s capital.
References
[2]. Bicchi, F. 2014. EU Foreign Policy and the Politics of Information. The Politics of Information: The Case of the European Union 2: 211-228.
[3]. Buley, N.V., et al. 2017. Management policy promotion as element of complex of commercial organizations marketing. International Journal of Applied Business and Economic Research 15(12): 307-316.
[4]. Buley, N.V., et al. 2017. Marketing in management structure of commercial activity of enterprise. International Journal of Applied Business and Economic Research 15(12): 251-259.
[5]. Cockcroft, S., Rekker, S. 2016. The relationship between culture and information privacy policy. Electronic Markets 26(1): 55-72.
[6]. Cram, W.A., Proudfoot, J.G., D’Arcy, J. 2017. Organizational information security policies: a review and research framework. European Journal of Information Systems 26(6): 605-641.
[7]. De Sardan, J.-P.O. 2015. The Policy of Fieldwork: Data Production in Anthropology and Qualitative Approaches. Epistemology, Fieldwork, and Anthropology 1: 21-63.
[8]. Frolova, E.V. 2016. Multidisciplinary studies the concept of ‘infrastructure’. Materials of the Afanasiev Readings 2(15): 190-197.
[9]. Galbács, P. 2015. Monetary Policy in the New Classical Framework. The Theory of New Classical Macroeconomics: A Positive Critique 1: 149-219.
[10]. Gurieva, L.K., et al. 2016. Theoretical foundations of management of the organization: Development, types of structures, management methods of control. International Business Management 10(10): 5406-5416.
[11]. Gust, C., Johannsen, B.K., López-Salido, J.D. 2017. Monetary Policy, Incomplete Information, and the Zero Lower Bound. IMF Economic Review 65(1): 37-70.
[12]. Holubjaková, D., Bohdalová, M. 2018. Capturing and Analyzing Information on Fiscal Policy of EU Countries. Agile Information Business: Exploring Managerial Implications 2: 1-42.
[13]. Kim, S.-K., Oh, J. 2018. Information science techniques for investigating research areas: a case study in telecommunications policy. The Journal of Supercomputing 74(12): 6691-6718.
[14]. Koshley, D.K., Rani, S., Halder, R. 2017. Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. Information Systems Security: 13th International Conference, 68-87.
[15]. Lopes, I., Oliveira, P. 2015. Applying Action Research in the Formulation of Information Security Policies. New Contributions in Information Systems and Technologies 1: 513-522.
[16]. Mărcuț, M. 2017. Mapping the Beginning of the Information Society in the EEC/EU. Crystallizing the EU Digital Policy: An Exploration into the Digital Single Market1: 13-74.
[17]. Mishchenko, V.I., Naumenkova, S.V., Shapoval, O.A. 2016. Consumer loans securitization. Actual Problems of Economics 186(12): 311-321.
[18]. Nakade, K., Yokozawa, S. 2016. Optimization of two-stage production/inventory systems under order base stock policy with advance demand information. Journal of Industrial Engineering International 12(4): 437-458.
[19]. Niemimaa, E., Niemimaa, M. 2017. Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems 26(1): 1-20.
[20]. Niemimaa, M., Laaksonen, A.E. 2015. Enacting Information Security Policies in Practice: Three Modes of Policy Compliance. Materiality, Rules and Regulation: New Trends in Management and Organization Studies 2: 223-249.
[21]. Roy, R., Chan, N.W., Xenarios, S. 2016. Sustainability of rice production systems: an empirical evaluation to improve policy. Environment, Development and Sustainability 18(1): 257-278.
[22]. Silagadze, A. 2017. History of Georgian economic thought: Relation between the center and the region. Bulletin of the Georgian National Academy of Sciences 11(4): 138-144.
[23]. Walster, D. 2017. Information Policy and Social Media: Accept or Decline. TechTrends 61(3): 301-307.
[24]. Weinbaum, E.H. 2014. Research Use in the Policy Process: New Information to Help Meet the Demand. Using Research Evidence in Education: From the Schoolhouse Door to Capitol Hill 1: 93-97.
[25]. Workman, S., Shafran, J.S. 2015. Communications Frameworks and the Supply of Information in Policy Subsystems. Policy Paradigms in Theory and Practice: Discourses, Ideas and Anomalies in Public Policy Dynamics 2: 239-267.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.