PROVIDING THE CORPORATE SECURITY STRATEGY IN THE MANAGEMENT SYSTEM OF THE ENTERPRISE

Three basic variants of the strategy for ensuring corporate security of an industrial enterprise (“survival”, “stabilization” and “support”) are proposed, the choice of one of which is associated with the results of assessing the level of corporate security. By applying the hierarchy analysis method for one of the studied enterprises, threats were identified that can have the most significant impact on the implementation of the basic strategy, therefore, they require the use of appropriate tactical countermeasures and make it possible to achieve strategic goals. Article theoretically generalizes and resolves the scientific and practical problem, which consists in developing the theoretical and methodological foundations for ensuring corporate security in the context of countering external and internal threats. In the process of research, methods of expert evaluation were used, as well as hierarchical ordering methodologies together with the use of a matrix of pairwise comparisons. It is substantiated that in conditions of high dynamics of changes in the environment of enterprise functioning, there is a need to predict changes in the influence of threats (strengthening, unchanged, weakening), combined into the groups “internal” and “external”. The calculations carried out provided the formation of the necessary information basis for planning and implementing tactical protective measures based on the increased influence in the conditions of the functioning of enterprises in Eastern Europe, these are precisely internal threats. The value of this study lies in the fact that such a system for assessing external and internal threats that affect the corporate security of industrial enterprises will allow to quickly and efficiently form a system to counter the impact of these threats.


Introduction
The problem of ensuring the security of an enterprise has become especially acute in the last two decades, to the greatest extent caused by transformational changes in the world and national economies and the formation of a sector of non-state-owned enterprises. The owner, and not only government agencies, should take care of the formation of safe conditions for the functioning and development of a certain business entity, requires the development of an appropriate scientific justification based on the actual conditions of doing business in a particular country (Calder, 2016).
The priority of forming the methodological basis for ensuring corporate security of enterprises today is production process and sales of products to identify unused opportunities with a subsequent increase in the efficiency of using available corporate resources; formation of the necessary information basis for making tactical and strategic decisions by managers of all levels, taking into account the security aspect, including based on the results of business intelligence; protection of the information field of the enterprise, in particular, trade secrets; ensuring physical protection of the corporation's property and preventing and suppressing internal conflicts between groups of employees; work with job applicants and corporation personnel to improve the motivation system and efficient use of the personal potential of each employee; protection of corporate rights of participants; prevention and elimination of contradictions between the interests of managers and shareholders, etc (Mukherjee, 2019).
Summarizing, it is advisable to emphasize once again that ensuring the sustainable development of enterprises in conditions of high unpredictable changes in the operating environment is possible only if due attention is paid to the problem of security, in particular corporate security.
The importance of ensuring corporate security is becoming a priority not only for joint-stock companies, but also for other forms of entrepreneurial activity, in accordance with generally accepted world practice, can be attributed to corporations, and this, as already noted above, limited liability companies, additional liability companies and production cooperatives. The basis of this thesis is that in these enterprises there are internal conflicts between participants and managers, between individual participants and groups of workers, the enterprise and local authorities and society, etc., which are traditionally not considered in the process of ensuring economic security (Sadok et al., 2020).
The existing practice of ensuring corporate security is focused on solving current problems, that is, identifying losses of the financial and economic activities of the enterprise and property losses with the aim of eliminating them and preventing them in the future. In fact, this is a solution to the most complex current problems, it does not contribute to the formation of safe conditions in the medium and long term (Frey et al., 2019).
Stabilization of the functioning of industrial enterprises requires the development and application of a corporate security strategy that would be closely linked to the economic development strategy of the enterprise and formulate a clear plan for the implementation of protective measures with an appropriate allocation of resource and organizational support (Sitdikova & Starodumova, 2019) The formation of a corporate security system is a lengthy process with the phased implementation of procedures related to the transformation of the existing organizational structure and the redistribution of resource support. The functioning of the corporate security system requires clarity in the actions of security entities, in particular in the development and implementation of protective measures (Semenyutina, 2018).
Our goal is to identify the main approaches to the selection and implementation of a flexible strategy for ensuring corporate security of industrial enterprises.
The basis for the proposed concept of a strategy for ensuring corporate security of an enterprise is the base term strategy. In the field of management, the term strategy began to be used only in the 1920s. At the first stages, it was only a resource management strategy, with a subsequent reorientation to the timely formation of conditions for a quick response to a possible change in the influence of the external environment (Hardman, 2018).

Literature review
Scientists paid a lot of attention to ensuring the safety of enterprises, in particular Abalkin (2019), Anilovska (2020), , Shtangret (2019) and others. Theoretical research has shown that the issue of assessing threats to corporate attention is not given due attention. In some publications, the authors are limited to a list of possible threats, without highlighting the level of their impact (Berle & Means, 1997).
The search and selection of the optimal strategy for corporate security and the development of its culture can be found in various scientific materials of scientists. Someone (Szczepanska-Woszczyna, 2018;Schatz & Bashroush, 2018;Kryshtanovych et al., 2020) seek to combine a general development strategy with corporate culture. However, our study, even in the context of a general development strategy, suggests a conceptual approach contributes to the achievement of strategic goals by improving the flexibility of the process of implementing the basic strategy through the timely application of tactical protective measures. Others (Badr et al., 2011;Orlyk, 2016) are looking at new opportunities to integrate existing corporate security strategies into business processes. However, our research justifies the need to pay attention to the process of implementing a certain strategy, which is determined by the configuration of the influence of the main internal and external threats and requires the timely implementation of corrective tactical measures.
The analysis revealed the presence of excellent points of view on the essence of the strategy (Shyra, 2019). For the needs of this study, it is advisable to focus only on some of them, which in the future will form the basis for the interpretation of the concept of a corporate security strategy for an enterprise. The first approach defines strategy as a means of achieving goals. The foundations of this approach were laid back by Chandler (1962), who presented the strategy as defining the main long-term goals and objectives of the enterprise, determining the course of action and the allocation of resources needed to achieve them.
According to the second approach, a strategy is an established sequence of actions. Such a point of view, for example, was held by Karlof (1989), in whose exchange strategy "a generalized model of the actions necessary to achieve the goals by coordinating and allocating company resources". A third approach links strategies to decision making. This approach is clearly traced in the scientific legacy of Ansoff (2005), who defines the strategy as one of several sets of rules for making decisions about the behavior of an organization in conditions of incomplete information about the future development of the enterprise. Also, mention should be made (Ansoff et al., 2019) of research into the use of weak signals in the field of strategic management. Our study covers more the impact of threats on the sphere of strategic management.
We can distinguish a certain integrated approach, which not only combines the individual elements of other approaches, but significantly expands the scope of the strategy, taking into account the internal parameters of the functioning of the enterprise, changing the external environment, contributes to the interests of participants in economic relations.
So, Tulenkov (2019) defines a strategy as a set of norms, guidelines, directions, areas, methods and rules of activity that establish the growth and high competitiveness of an organization, which strengthen the position in the market and increase the ability to survive in a competitive environment. Ludbey et al. (2018) in their work studied the features of the level structure of corporate security, while an important element of their research was the study of the role of the human factor in these processes.
Summarizing, it can be argued that the synthesis of these approaches forms an idea of strategy as a model that, being tied to the actual conditions of the enterprise, ensures the achievement of goals by implementing a certain clearly justified sequence of actions. A scientific search revealed that the issue of corporate security was not given due attention.

Research model
It is advisable to emphasize that the strategy is not considered in the field of corporate security, because today the actions of security entities are focused on eliminating the consequences of the negative impact of internal and external threats, stabilizing the situation, protecting property and preserving the business in the short term. Despite this, it is advisable to identify key methodological foundations for developing a corporate security strategy for an enterprise (Sylkin et al., 2018): The corporate security strategy should be utilized with the enterprise development strategy. Coordination consists in taking into account the strategy for the development of security aspects, and the strategy for ensuring corporate security should include measures to create a safe environment for the development of the enterprise; The corporate security strategy should be based on the actual level of corporate security, the availability of resource and organizational support that can be used to develop and implement protective measures; The corporate security strategy should be flexible. Change of strategy is carried out according to the results of assessment of the impact of key external and internal threats; To solve the problem of the lack of reliable information on changes in the functioning environment in the long term, it is advisable to use forecasts.
Thus, the corporate security strategy for the enterprise can be interpreted as a tool for creating safe conditions for implementing the enterprise development strategy; it implies the achievement of corporate interests through the fulfillment of tasks within the enterprise corporate security system, taking into account the actual level of corporate security and possible changes in the impact of key internal and external threats. We detail the essence of the proposed definition. In accordance with the actual level of corporate security (the calculated value of the integral indicator), three options are proposed for the strategy of ensuring corporate security of an industrial enterprise (Table 1). The survival strategy is used in conditions of economic crisis, instability, high inflation, or when goods are in a saturation stage and consists in trying to adapt to difficult market conditions and the current situation. This strategy is resorted to when the financial and economic indicators of the enterprise enter into a steady downward trend, when the very existence of the enterprise is threatened for various reasons.
The stabilization strategy is used by enterprises that already occupy a strong position in the market, that is, in conditions of stable sales volumes and income received, and is carried out in order to maintain the existing state for as long as possible. This strategy is used as a basic corporate strategy by enterprises located in industries with stable technology, and the owners and managers are generally satisfied with the state of their enterprise.
The supporting strategy is used by the enterprise if it has achieved its safety targets and it seeks to maintain the already existing level of achievements.
Unstable business conditions require concentration not only on the choice of a specific strategy, but also on ensuring its implementation .
The conditions for doing business for most industrial enterprises can be considered not only difficult, but are more associated with a quick and unpredictable change in the operating environment. To implement the enterprise development strategy, safe conditions are necessary, the achievement of which requires the development and application of a corporate security strategy. The basis for choosing one of the possible strategy options is the results of corporate security assessment with subsequent adjustment due to the systematic identification and hierarchical ordering of key external and internal threats. Therefore, our study is aimed at creating a conceptual approach to developing tactics of actions of security entities, as the basis for maintaining the implementation of the strategy, based on the available resource and organizational support for corporate security of an industrial enterprise.
To solve the problem before us, we applied the hierarchy analysis method (Saati, 2019), which is also used to solve economic problems. This method is conveniently used to construct possible future scenarios and make managerial decisions (Zgurovsky & Pankratova, 2020).
The specialists involved in the assessment alternately pairwise select the selected objects among themselves. A feature of the applied method is that objects whose behavior does not have accurate numerical estimates are compared. With this comparison, the least important object is a unit, and the more important object consists of such units. In other words, pairwise comparisons make it possible to obtain more accurate characteristics of objects (their weights) in contrast to a simple definition of what is more important and what is less important for a number of compared objects.
By systematizing the opinions of experts on external and internal threats that affect the corporate security of industrial enterprises, we highlighted the main ones (Table 2). We now turn to the direct determination of the strategy for ensuring corporate security of the enterprise and the determination of the necessary tactical measures for its implementation in accordance with the changing influence of the main internal and external threats. It is necessary to solve the problem in accordance with the hierarchy (Figure 1). All presented external and internal threats can increase or decrease in different periods of time and due to changes in conditions. Depending on whether they are Figure 1. Modeling the implementation of the corporate security strategy for an industrial enterprise by hierarchically streamlining changes in the impact of key threats (developed by the author) strengthened or weakened, the enterprise, according to our study, must make a decision on the implementation of certain measures, in Figure 1 corresponds to the vector of arrows presented by the measures. ET (+) represents external threat amplification. IT (+) represents threat amplification. BT (+/-) provides for strengthening or weakening basic threats. ET (-) represents external threat mitigation. IT (-) means weakening internal threats.
The pinnacle of this model is the goal -"Implementation of a corporate security strategy for an enterprise". The second level of this hierarchy is formed by cases of changes in the impact of threats to corporate security of industrial enterprises (criteria). At the third level are threats, described in more detail above, most significantly affect the actual level of corporate security, and their change requires attention in terms of the possibility of achieving strategic goals. To illustrate the presentation of the results, we have chosen industrial enterprises in Eastern Europe, in particular Ukraine and Poland. The specialists (experts) involved in the assessment consistently pairwise compare the significance of changes in the impact of threats to corporate security of an industrial enterprise. Comparison of changes in the impact of threats with each other occurs on the following scale (Table 4): One object is vastly superior to another 9 One object absolutely dominates the other Table 5 compare the changes in the influence of the threat "reduction in the welfare of the population and the purchasing power of consumers" on ensuring the corporate security of an industrial enterprise (first ET (+) with IT (+), then ET (+) with BT, then ET (+) with ET(-) etc.). In the process of summarizing the opinions of specialists (experts), the person making the decision, the Table 5 is filled.  Filling in the Table 5 is as follows: for two objects, they are compared with each other, depending on their importance and the degree of influence on the situation under consideration, to have the value of the corresponding element of Table 1 on the scale of relative importance of objects of comparison. Table 5. Diagonal elements of the table are equal to one. The lower part of the table is filled with the opposite values. If there are minor differences between the weights of objects, you can also use the paired numbers 2, 4, 6 and 8 and their inverse values.
The results obtained are processed using a computer program (listing, which we will provide additionally, if necessary). In this case, in Table 6 we see the significance of the influence of the change in the influence of the threat "decrease in the well-being of the population and the purchasing power of consumers" on ensuring the corporate security of an industrial enterprise, where w i is the change in the influence of threats, and S j is their weight calculated using the computer program discussed above.

Results and discussion
The first step is to evaluate alternative scenarios. The specialists involved in the assessment need to make comparisons, where n is the number of criteria at one level. In our case, five cases of changes in the impact of threats to corporate security of industrial enterprises, respectively, it is necessary to conduct 10 comparisons of different pairs of these changes. For the study, 10 leading industrial enterprises of Eastern Europe were taken from such countries as the Czech Republic, Poland and Ukraine. The reason for choosing enterprises in these particular countries is that, in general terms, their specifics of functioning and the conditions for running the economy are similar. In addition, over the years, the enterprises of these countries have formed strong working relationships with each other, which allowed them to form strong channels for exchange of experience. Since the determination of the indicators we study is a subjective process, their research is a difficult process, therefore, the fact that enterprises in these countries easily got in touch and were interested in further adaptation of the results obtained was another reason for the selection of enterprises in these countries. Data collection from these enterprises was carried out remotely, taking into account the existing unstable epidemic situation. The management of the enterprises asked not to indicate the data of the institutions participating in the study. Further active application of the proposed methodology was carried out in the practice of the functioning of an operating industrial enterprise with branches both in Poland and in Ukraine.
When constructing a matrix of paired comparisons of cases of changes in the impact of threats to corporate security of industrial enterprises, they were compared in pairs with respect to the common goal -the implementation of the strategy for ensuring corporate security of the enterprise ( Table 3). The sums of the elements of the columns of the pairwise threat comparison matrix are shown in Table 6. The next step in our study will be to calculate the level of inconsistency of the matrix of pairwise comparisons. The calculations were carried out correctly, since the value of the largest eigenvalue k max , the mismatch coefficient, CI and the inconsistency level, CR are within normal limits ( Table 7).
The second step is to compare alternative scenarios. Since the hierarchy contains eight main threats and five options for changing influence, it is necessary to draw ( -1) , 2 where m -is the number of alternatives, that is, 140 options for the development of the situation must be compared. Development options (alternative development scenarios) are compared for each of the criteria. In this case, there is only one level of criteria, so there is a pairwise comparison of alternatives for each of the eight criteria. The calculations were performed using a specific computer program of hierarchical ordering (Table 8, 11,14,17,20) The main goal of the proposed program is to conduct simulation (computer) modeling in systems analysis by binary comparisons.
Once we have formed a matrix of paired comparisons of threats to corporate security in the case of modeling the increase in the impact of external threats, the next step will be to calculate the sum of the elements of this matrix, which can be used to determine the level of inconsistency of the matrix of pairwise comparisons (Table 9-10). In the same way the investigated indicators for internal threats are calculated (Table 11). After the formation of the matrix of paired comparisons of threats to corporate security in the case of simulating the increased impact of internal threats, the next step is to calculate the sum of the elements of this matrix, which can be used to determine the level of inconsistency of the matrix of paired comparisons (Table  12-14).  After we have built a matrix of paired comparisons of threats to corporate security in the case of modelling the constant impact of internal and external threats, the next step is to calculate the sum of the elements of this matrix, which can be used to determine a target indicator such as the level of inconsistency of the paired comparison matrix (Table 15-22).  In the same way as such indicators were calculated above, we calculated the level of inconsistency of the matrix of pairwise comparisons The last indicator that we will calculate will be the level the inconsistency level of the matrix of pairwise comparisons of corporate security threats while mitigating the impact of threats. The calculations were carried out correctly, since the value of the largest eigenvalue k max , the consistency coefficient, CI and the level of disruption, CR for each of the matrices (Table 8, 11,14,17,20) are within normal limits (Table 10, 13,16,19,22).
The third step is a synthesis of priorities. The degree of influence of a certain threat on the implementation of the selected strategy for ensuring corporate security of the enterprise (synthesis of priorities) Ui is established by the formula: In accordance, we have the following system of equations for calculating priority values for all scenarios: U 1 = w 1 × u 11 + w 2 × u 21 + w 3 × u 31 + w 4 × u 41 + w 5 × u 51 ; U 2 = w 1 × u 12 + w 2 × u 22 + w 3 × u 32 + w 4 × u 42 + w 5 × u 52 ; U 3 = w 1 × u 13 + w 2 × u 23 + w 3 × u 33 + w 4 × u 43 + w 5 × u 53 ; U 4 = w 1 × u 14 + w 2 × u 24 + w 3 × u 34 + w 4 × u 44 + w 5 × u 54 ; (1) U 5 = w 1 × u 15 + w 2 × u 25 + w 3 × u 35 + w 4 × u 45 + w 5 × u 5 ; U 6 = w 1 × u 16 + w 2 × u 26 + w 3 × u 36 + w 4 × u 46 + w 5 × u 56 ; U 7 = w 1 × u 17 + w 2 × u 27 + w 3 × u 37 + w 4 × u 47 + w 5 × u 57 ; Substituting the corresponding values from Table 3 , 9, 12, 15, 18, 21 in the system of equations (1)  Interpretation of calculation results. The results obtained allow us to argue that in the conditions of the enterprise in Eastern Europe under consideration, the current level of security is low and is characterized by increased influence of external and internal threats, it requires the use of a survival strategy, which consists in adapting to the conditions of doing business, focusing security on the preservation of property, protection of corporate interests, more efficient use of corporate resources, support for the viability of the enterprise. Along with determining the general direction in the chosen version of the strategy, more important is the development of tactical measures that are required to achieve the task. In accordance with the calculations, tactical measures should be aimed at countering or adapting to the impact of threats for which Ui was maximum, and this: U 1 -CC -corporate conflicts between shareholders and managers, majorities and minority shareholders; U 6 -PI -political instability and complex transformation processes in the economy.
Accordingly, in determining the basic strategy, security actors should be focused on the implementation of tactical protective measures for the primary counteraction/adaptation to the action of each individual threat in the form of a possible change in their influence.
As a result, a conceptual approach to the selection and implementation of a strategy for ensuring corporate security of industrial enterprises was formulated, which consists in using the method of analysis of hierarchies to establish, according to the actual level of corporate security, the basic version of the strategy with subsequent adjustment of the implementation process in accordance with changes in the influence of external and internal threats, provides maximum flexibility in the implementation of protective measures to achieve strategic goals. The results obtained are certainly valuable, because they can significantly narrow the range of tasks of security actors in the implementation of a certain strategy, in particular by prioritizing a significantly limited range of threats.

Conclusions
By applying the method of hierarchy analysis for one of the studied enterprises in Eastern Europe, threats were identified that could have the most significant impact on the implementation of the basic strategy, therefore they require the use of appropriate tactical measures to counter and make it possible to achieve strategic goals. It is proved that in conditions of high dynamism of changes in the environment of the enterprise's functioning, there is a need to predict changes in the impact of threats (strengthening, without changes, weakening), combined into groups of "internal" and "external".
It turned out that at present, the security actors in industrial enterprises are focused on eliminating the consequences of the negative impact of internal and external threats, stabilizing the situation, protecting property and preserving the business in the short term. The necessity of developing a flexible corporate security strategy is substantiated. The application of the proposed conceptual approach to the selection and implementation of a strategy for ensuring the corporate security of industrial enterprises allows you to quickly respond to changes in the impact of major internal and external threats to adjust the implementation of the basic strategy, and helps increase the effectiveness of the implementation of protective measures.
In the future, such a system for assessing external and internal threats that affect the corporate security of industrial enterprises, will quickly and effectively form a system to counter the impact of these threats.