Стратегии на образователната и научната политика

https://doi.org/10.53656/str2024-1s-7-ent

2024/1s, стр. 98 - 107

ENTERPRISE SECURITY AS AN ELEMENT OF MARKET COMPETITIVENESS

Gergana Tsankova
E-mail: g.tsankova@unwe.bg
Intellectual Property and Technological Transfer Department
Business Faculty
University of National and World Economy
Studentski district
19 December 8th St.
1700 Sofia Bulgaria

Резюме: The security of the enterprise is crucial for its competitiveness in the modern business climate. It involves the protection of assets, information, personnel, and business processes, including intellectual property. Insufficient protection can lead to the leakage of corporate information and infringement of patent rights, jeopardizing the competitiveness of the company. Focusing on security and implementing appropriate measures are essential for achieving market competitiveness and sustainability for the enterprise. The study pays attention to the complexity of defining suitable security measures for the enterprise, considering the dynamics of the environment, industry characteristics, and market presence. The aim of the research is to propose a competitiveness system focused on security, aiming to improve market position and enhance the sustainability of the enterprise. Proactively addressing threats and implementing mitigation measures are crucial for preventing uncertainty, ensuring the resilience of the enterprise, and preserving and increasing its competitiveness.

Ключови думи: security; corporate security; competitiveness; information security; physical security

Introduction

Enterprise security is an element of market competitiveness, as in the contemporary business environment, safeguarding the assets, information, personnel, and business processes of the enterprise plays a pivotal role in its successful operation and maintaining a competitive position in the market. In this context, enterprise security also encompasses the protection of intellectual property, such as patents, copyrights, trademarks, and other intellectual resources. Safeguarding these rights is of paramount importance since they represent the innovative and creative aspects of the enterprise, setting it apart from market competitors. Such measures also maintain the integrity of the enterprise and prevent unauthorized access or misuse of sensitive information, which could lead to a loss of competitive advantage and trust from customers.

In the digital era, data security and information systems are becoming increasingly significant. Breaches in information security, such as hacking attacks, data theft, or viruses, can result in financial losses, disruptions in business processes, and damage to the company’s reputation. Therefore, enterprises must invest in a corporate security system, including internal security policies and procedures, employee training, systematic testing of various systems, data encryption, network protection, and software solutions for threat detection and prevention.

The research thesis argues that deploying an adequate security system against threats and risks is crucial for the enterprise’s market competitiveness. Enhancing enterprise security leads to a reduction in risks related to the loss of key personnel, proprietary technologies, losses from theft, sabotage, internal irregularities, and other unfavorable events. This, in turn, builds trust among customers and partners, strengthens the company’s reputation, and increases its competitiveness.

The challenge in this study is related to the complexity of defining adequate security measures against threats and risks to ensure the enterprise’s competitiveness in the market. The adequacy of these measures should consider the dynamics of the environment, the industry specifics, and the market presence of the enterprise and its products and services.

Security threats to the enterprise

The concept of „security”, and specifically „corporate security“, can be broadly and inadequately defined using the term „threat“. Corporate security can be understood as a state of absence of dangers and threats to the interests of the corporation. If such threats exist, the corporation possesses the capabilities to avoid or neutralize them (Dimitrov et al. 2021, p. 103).

Threats are events, actions, or their consequences directed at impacting the values, interests, or freedom of corporate behavior and action. They are measured as a product of vulnerability potential and intention to influence. Examples of threats include political, economic, financial, and other constraints and sanctions; the coercive power of monopolies; ordinary and organized criminal activities; financial and tax administrative violations; financial and accounting fraud and abuse; money laundering; terrorism financing, and more (Dimitrov et al. 2021, p. 103).

The functions of corporate security are associated with identifying and effectively managing, at an early stage, all negative trends that could jeopardize the enterprise’s goals, sustainability, and long-term market presence. Similar to the national security sector, the corporate security system operates based on monitoring, analysis, and evaluation of identified threats and risk management, thus ensuring the continuity of work processes and coordination of all security and safety-related functions within the enterprise (Krushkov 2020, p. 25).

Security threats are identified as those with direct or indirect effects on goal performance. Security threats are those that would objectively hinder the realization of state, national, or public interest in the context of national security or business interest in a corporate sense. If these threats are not identified in a timely manner and timely action is not taken against their development, uncertainty or disruption of work processes arises, directly affecting the achievement of set goals. After a destructive event occurs, resilience and recovery inevitably require significant efforts, additional resources, and a considerable amount of time, all of which come at a high cost. Depending on the destructive event and the time required for recovery, these costs or impacts on work processes can be catastrophic. Predicting such significant destructive events, eliminating vulnerabilities on time, and creating buffers and measures to comprehensively mitigate the consequences are the tasks of the security structure. The most significant factors here are the professionalism of the security team and time.

External threats to enterprise security

Among the main external threats are: regional or national macroeconomic or social instability; incidental changes in regulatory requirements directly or indirectly affecting enterprise operations; mergers and acquisitions among competitors; consolidation of business and market share among competitors; emergence of new competitors or new products in the existing market; development and access to new technologies by competitors in the existing market; patent-protected inventions and utility models created by competitors in the existing market, and others (Krushkov 2020, p. 26).

External threats arise from the external environment for the corporation. Various subjects can be sources of such threats. External threats are most commonly associated with the actions of competitors. Customers, suppliers, the government in the form of administration, and other structures can also be considered as threats. Natural and social phenomena are another type of external threats. The most recent example of such a threat is the COVID-19 pandemic, which, in turn, triggers other processes – economic, political, and social – that unfold at the national, regional, or global level, impacting the corporate world (Dimitrov et al. 2021, p. 106).

One of the main sources of external threats to corporate interests comes from natural phenomena that often possess a force beyond human control. Their impact can be direct or indirect, depending on the nature of the business and the characteristics of the location where the event is considered. Although their occurrence may be predicted and well-known from experience at a certain point, their manifestation can be surprising, exceeding predictions and rendering the taken impact measures inapplicable.

Internal threats to enterprise security

Internal threats to corporate security are of a diverse nature. In certain cases, the negative consequences of these threats can be extremely serious, as they may go unnoticed or underestimated for an extended period. Additionally, they can easily be disguised. Another characteristic of internal threats is that, when detected in a timely manner, the corporation can react directly (for example, if it is found that an employee is leaking information, they can be dismissed and held accountable, or if a conflict arises due to poor communication between units, it can be resolved through mediation by management, improving communication). Such a possibility is lacking in the case of external threats.

Among the main internal threats are: unclear or incorrectly formulated goals, lack of centralization and/or organizational responsibility in decisionmaking; underestimation of planning, lack of specific deadlines and/or unclear responsibilities; non-implementation or non-updating of the plan due to changes in the external environment; turnover in key positions; increase in production, technological, or trade defects; inability to prevent incidents that may affect corporate reputation; unspecified and unprotected intellectual property; undefined and unprotected corporate information representing trade secrets; lack of respect for creative work as a developmental factor; ineffective corporate security system; poor leadership, and others.

The personnel engaged in various tasks remain one of the main sources of threats to corporations, regardless of the nature of their activities. This element can be seen as a sustainable source of threats, mainly focusing on behavioral aspects. Threats related to personnel are more often intentional and to a lesser extent accidental.

Building a competitiveness system from the perspective of enterprise security

Building a competitiveness system from a security perspective is a complex approach that involves various factors and strategies implemented by the enterprise to achieve and maintain its competitiveness in the market. This system involves analyzing internal and external factors that influence the enterprise’s competitiveness. The enterprise must analyze the external environment, including economic, social, political, and technological factors that may impact its competitiveness. This analysis helps understand market trends and identify opportunities and threats.

Internal factors include resources, capacity, personnel, operations management, and innovations, as mentioned earlier. External factors encompass market competition, customer needs and preferences, economic environment, legal and regulatory factors, among others. The enterprise needs to analyze its internal resources, including human resources, finances, technologies, and operational processes. This helps identify the strengths and weaknesses of the enterprise and develop strategies to build a competitive advantage.

The competitiveness system also involves developing strategies to achieve a competitive advantage. This includes defining the target market niche, differentiating products or services, optimal brand positioning, utilizing marketing and advertising strategies, developing innovations, etc. The enterprise needs to formulate strategies to position its products or services in the market, considering target audiences, differentiation from competitors, pricing policies, and implementing marketing and advertising strategies.

An essential part of the competitiveness system is continuous improvement and adaptation to changing market conditions. The enterprise must be flexible and responsive, monitor industry trends and innovations, and take measures for adaptation and improvement.

All these factors and strategies interact and complement each other within the competitiveness system. The goal is to achieve long-term competitive advantage and successfully position the enterprise in the market by meeting customer needs and preferences, reducing costs, improving quality, and implementing innovations.

The competitiveness system from the perspective of enterprise security includes measures and strategies aimed at protecting and preserving its security and integrity. This system aims to prevent potential losses, damages, or vulnerabilities that could harm the enterprise’s competitiveness. The main aspects and factors that are part of the competitiveness system from a security perspective include information security, physical security, risk management, and protection of intellectual property.

Information security

Information security is an integral part of the enterprise’s corporate competitiveness system. It pertains to the protection of the information that the enterprise operates, including data, systems, networks, and communications.

One of the key aspects of information security is safeguarding the enterprise’s confidential information. This involves measures to prevent unauthorized access to information, such as using secure passwords and authentication, access control, data encryption, and other protection techniques. The goal is to prevent potential losses or disclosure of sensitive information that could harm the enterprise’s competitiveness.

Information security also includes protection against malicious software, such as viruses, trojans, ransomware, and other types of malware. The enterprise should implement appropriate antivirus and anti-malware solutions, update its systems with the latest patches, and conduct systematic security checks and analyses to detect and prevent potential threats.

Corporate competitiveness systems should also include measures to protect data during technical issues or natural disasters. This may involve data and system backups, building disaster recovery systems, and other measures to ensure business operations’ continuity.

Data and information protection: The enterprise must build secure systems for data storage and processing. This may include using secure servers, secure network connections, and protected databases. The systems should be configured to limit data access only to authorized users.

Encrypting information is a crucial aspect of data and information protection. The enterprise should use encryption when transferring and storing data to prevent unauthorized access or data transfer.

The enterprise must establish and enforce data protection policies. This involves defining rules and procedures for data management, establishing passwords and access control to systems and information. Policies should be clear, implemented, regularly reviewed, and updated.

Employee training is essential for data and information protection. Staff should be trained in data security, understand the risks, and apply the correct data protection practices. This may include training on strong passwords, the importance of regularly updating software, and awareness of phishing attacks and other forms of social engineering attacks.

Continuous training and awareness of employees regarding information security are also crucial. The enterprise must provide training and regular updates to staff to ensure they understand the importance of information security and are familiar with best practices for information protection. This includes training on data security, the enterprise’s policies and procedures, the use of secure passwords, recognizing social engineering, preventing phishing attacks, and other forms of cyber attacks.

The enterprise must provide clear and clearly communicated policies and procedures for information security. This includes defining rules and corresponding sanctions for violations, protecting the privacy of customer and employee data, regular security checks and audits, as well as incident response and recovery.

Continuous monitoring and updating of information security systems and technologies are also crucial. The enterprise must monitor for new threats and vulnerabilities, update and patch software products, use secure network configurations and traffic filtering, and implement measures for monitoring and conducting security analyses.

Ensuring compliance with regulatory requirements for information security, such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Data Security Standards), and other regulatory frameworks, is essential. This involves building processes and controls that meet regulatory requirements, ensuring the legality and integrity of the enterprise’s information.

The competitiveness system from the perspective of enterprise security must be comprehensive and continuously improved to ensure that data and information are well-protected from external threats and internal security breaches.

Physical security

Physical security is of paramount importance for the competitiveness of an enterprise, protecting physical assets from various threats. Measures include video surveillance and activity recording, access restriction through barriers, cards, and biometric systems, secured signaling systems for warning and access control. The physical protection of equipment is carried out through the use of safes, grilles, cash boxes, and locking devices, ensuring the integrity and security of essential inventory. These measures work in conjunction with the technical and information aspects of the enterprise’s overall security system.

Physical security integrates with technical and information protection measures for the enterprise. The technical infrastructure includes installed systems such as alarms, motion detectors, and video surveillance. Integrated systems allow centralized management and interaction with the enterprise’s information systems. Employee training focuses on familiarizing them with physical security policies and procedures, the use of technical systems, and response to threats. Physical design of facilities involves the use of durable materials, appropriate planning of video surveillance, and lighting. Regular checks and analyses are conducted to assess the effectiveness and improvement of physical security systems.

Risk management

Risk management is a crucial aspect of the enterprise’s competitiveness system. The goal of risk management is to identify potential threats and risks that may affect the competitiveness of the enterprise and take appropriate measures to reduce or manage these risks.

The first step in risk management is conducting a risk analysis. This involves identifying potential threats and risks related to the competitiveness of the enterprise. These risks may be associated with the market environment, technological developments, financial factors, legislation, and other aspects.

After identifying the risks, the enterprise needs to develop and implement appropriate measures to reduce or manage these risks. This may include creating business continuity plans that outline actions and procedures to maintain the continuous operation of the enterprise in crisis situations or unexpected events.

Additionally, the enterprise should ensure backup systems and capacities are available to be used in case of necessity or damage to the primary systems. This may involve having backup servers, data copies, and disaster recovery systems.

Developing crisis plans is also an essential part of risk management. These plans outline the actions that should be taken in the event of a crisis to minimize damages and restore the normal operation of the enterprise.

All these risk management measures aim to ensure the security of the enterprise and guarantee the continuity of its competitiveness. As part of the competitiveness system, risk management helps prevent potential losses and maintain the stability and success of the enterprise in the competitive environment.

Data and information protection, including the use of secure systems and data encryption, provide protection against potential intruders and unauthorized access to sensitive information. This helps maintain the confidentiality of the enterprise’s data and avoid the possibility of theft or loss of crucial information.

Identifying and managing potential risks associated with the competitiveness of the enterprise provides an opportunity for prevention and preparation for possible crisis situations or unexpected events. Business continuity plans and crisis plans provide frameworks and actions to be taken during crisis situations to ensure minimal impact and swift recovery of normal enterprise operations.

The risk management system from the perspective of enterprise security helps create a secure and reliable foundation for its competitiveness by ensuring the protection of valuable assets, preventing losses and disruptions, and ensuring continuity in business operations. This contributes to building trust among customers and partners, which is a crucial aspect of the enterprise’s competitiveness.

Intellectual property protection

The enterprise must take measures to protect its intellectual rights by registering ownership and monitoring for infringements. This prevents illegal copies and unauthorized use of intellectual property, maintaining the uniqueness and competitive advantage of the enterprise and safeguarding it from unfair competition.

Intellectual property protection provides legal protection and ownership rights over innovations, enabling legal actions against violators. This allows the enterprise to extract economic value by licensing or selling its innovations to other market participants. Intellectual property protection also helps the enterprise safeguard its reputation and brand. Protected innovations and products ensure better quality and consistent delivery, preventing the emergence of counterfeit versions that could harm the company’s reputation. This kind of protection contributes to customers’ perception of quality and uniqueness, building more trust in the brand.

Intellectual property protection is a key element for competitiveness and the long-term sustainability of the enterprise. It creates conditions for innovation and development, which are crucial for the long-term success of the enterprise.

Conclusion

The establishment, implementation, and effective management of a competitiveness system focused on security will enhance the market position and increase the resilience of the enterprise. The primary objective is to ensure a high level of protection for all operational processes. To achieve a high level of security, it is necessary to select an effective security system model that is suitable for the specific environment and aligns with the capabilities of the organization.

Another primary goal is to safeguard the assets of the organization, including physical assets such as buildings and equipment, informational assets like data and systems, as well as the human resources of the enterprise. Implementing appropriate security measures helps prevent losses and damages to these assets.

Such a system will help prevent incidents and breaches, such as theft, breakins, sabotage, and violations of information security. This leads to a lower risk of business interruption, data loss, and negative consequences for the organization.

Ensuring the safety of operational processes and the people carrying out tasks is crucial for the successful management of any organization. Every management structure should build and maintain an integrated security system. This system is responsible for creating an environment that is secure, predictable, and resilient to achieve the goals of the enterprise.

The functions and responsibilities of security professionals are carried out through an integrated security system. The effective functioning of this system can be jeopardized by various factors, including an inappropriate response to the environment and potential threats, a lack of integration between planning, monitoring, detection, and response processes, insufficient control over the execution of security tasks, or outdated organizational and technical technologies. Therefore, systematic testing plays a vital role in security management by ensuring a high level of protection.

Enterprise security also influences its reputation and trust among clients and partners. Demonstrating commitment to security and adhering to high standards helps build trust and confidence in the organization, improving its image and competitiveness.

An appropriate security system helps the organization identify and manage potential security risks. This includes assessing and minimizing risks, developing contingency plans, and ensuring a prompt response to incidents.

REFERENCES

DIMITROV, D. and et al. 2021., Corporate Security. Sofia: Publishing Complex UNWE.

KRUSHKOV, N., 2020. Security Leadership Creativity. Sofia: Publishing Complex-UNWE.

MUELLER, D. C., 1986. Profit in the long run. Cambridge, MA: Cambridge University Press. PORTER, M., 1985. Competitive advantage: creating and sustaining superior performance. New York: The Free Press.

NENOV, T., 2008. Management of Competitiveness and Growth. Varna: „Science and Economics“, Economic University.

SHTEREV, N., 2012., Quantitative Functional Assessment of the Competitiveness of Business Organizations. Economic and Social Alternatives Journal, Issue 3, UNWE.

VELEV, M., 2004. Assessment and Analysis of Corporate Competitiveness. Sofia: Softtrade.

VLADIMIROVA, Y., 2005. Competition and Competitiveness of Companies in Trade. Gabrovo: Vasil Aprilov.

2025 година
Книжка 6
UNLOCKING THE POTENTIAL OF ESG AND AI IN HIGHER EDUCATION FINANCE: INSIGHTS FROM A STUDY ACROSS FIVE EUROPEAN COUNTRIES

Tina Vukasović, Rok Strašek, Liliya Terzieva;, Elenita Velikova, Justyna Tomala, Maria Urbaniec, Jarosław Pawlik, Michael Murg, Anita Maček

THE ROLE OF HIGHER EDUCATION FOR THE PROFESSIONAL REALIZATION OF STUDENTS – PROBLEMS AND PROSPECTS

Anny Atanasova, Viktoriya Kalaydzhieva, Radostina Yuleva-Chuchulayna, Kalina Durova-Angelova

Книжка 5
Книжка 4
ТРАНСФОРМАЦИИ НА ПАЗАРА НА ТРУДА И НУЖДАТА ОТ ОБРАЗОВАТЕЛНИ РЕФОРМИ

Ваня Иванова, Андрей Василев, Калоян Ганев, Ралица Симеонова-Ганева

Книжка 3
FORMING ENTREPRENEURIAL CULTURE THROUGH EDUCATION

Milena Filipova, Adriana Atanasova

Книжка 2s
THE STATE OF INCLUSION IN ADAPTED BASKETBALL

Stefka Djobova, Ivelina Kirilova

Книжка 2
MODEL OF PROFESSIONALLY DIRECTED TRAINING OF FUTURE ENGINEER-TEACHERS

Ivan Beloev, Valentina Vasileva, Іnna Savytska, Oksana Bulgakova, Lesia Zbaravska, Olha Chaikovska

DETERMINANTS AFFECTING ACADEMIC STAFF SATISFACTION WITH ONLINE LEARNING IN HIGHER MEDICAL EDUCATION

Miglena Tarnovska, ;, Rumyana Stoyanova, ;, Angelina Kirkova-Bogdanova;, Rositsa Dimova

Книжка 1s
AN INNOVATIVE MODEL FOR DEVELOPING DIGITAL COMPETENCES OF SOCIAL WORKERS

Lyudmila Vekova, Tanya Vazova, Penyo Georgiev, Ekaterina Uzhikanova-Kovacheva

Книжка 1
2024 година
Книжка 6s
DISRUPTIVE TECHNOLOGIES RISK MANAGEMENT

Miglena Molhova-Vladova, Ivaylo B. Ivanov

Книжка 6
AN INTEGRATIVE APPROACH TO ORGANIZING THE FORMATION OF STUDENTS’ COGNITIVE INDEPENDENCE IN CONDITIONS OF INTENSIFICATION OF LEARNING ACTIVITIES

Albina Volkotrubova, Aidai Kasymova, Zoriana Hbur, Antonina Kichuk, Svitlana Koshova, Svitlana Khodakivska

ИНОВАТИВЕН МОДЕЛ НА ПРОЕКТНО БАЗИРАНО ОБУЧЕНИЕ НА ГИМНАЗИАЛНИ УЧИТЕЛИ: ДОБРА ПРАКТИКА ОТ УниБИТ

Жоржета Назърска, Александър Каракачанов, Магдалена Гарванова, Нина Дебрюне

Книжка 5s
КОНЦЕПТУАЛНА РАМКА ЗА ИЗПОЛЗВАНЕ НА ИЗКУСТВЕНИЯ ИНТЕЛЕКТ ВЪВ ВИСШЕТО ОБРАЗОВАНИЕ

Акад. Христо Белоев, Валентина Войноховска, Ангел Смрикаров

ИЗСЛЕДВАНЕ ПРИЛОЖИМОСТТА НА БЛОКОВИ ВЕРИГИ ОТ ПЪРВО НИВО (L1) В СИСТЕМА ЗА ЕЛЕКТРОННО ОБУЧЕНИЕ

Андриан Минчев, Ваня Стойкова, Галя Шивачева, Доц Анелия Иванова

ПРЕДИЗВИКАТЕЛСТВА ПРИ ПРОМЯНА НА ПЛАТФОРМИ ЗА ДИСТАНЦИОННО ОБУЧЕНИЕ

Антон Недялков, Милена Кирова, Мирослава Бонева

APPLICATION OF ZSPACE TECHNOLOGY IN THE DISCIPLINES OF THE STEM CYCLE

Boyana Ivanova, Kamelia Shoilekova, Desislava Atanasova, Rumen Rusev

TEACHERS' ADAPTATION TO CHANGES IN AN INCREASINGLY COMPLEX WORLD THROUGH THE USE OF AI

Zhanat Nurbekova, Kanagat Baigusheva, Kalima Tuenbaeva, Bakyt Nurbekov, Tsvetomir Vassilev

АТОСЕКУНДНОТО ОБУЧЕНИЕ – МЕТАФОРА НА ДНЕШНОТО ОБРАЗОВАНИЕ

Юлия Дончева, Денис Асенов, Ангел Смрикаров, Цветомир Василев

Книжка 5
Книжка 4s
Книжка 4
MANAGERIAL ASPECTS OF COOPERATION AMONG HIGHER EDUCATION INSTITUTIONS AND THEIR STAKEHOLDERS

Olha Prokopenko, Svitlana Perova, Tokhir Rakhimov, Mykola Kunytskyi, Iryna Leshchenko

Книжка 3s
Книжка 3
Книжка 2
FORMATION OF PROFESSIONAL SKILLS OF AGRICULTURAL ENGINEERS DURING LABORATORY PRACTICE WHEN STUDYING FUNDAMENTAL SCIENCE

Ivan Beloev, Oksana Bulgakova, Oksana Zakhutska, Maria Bondar, Lesia Zbaravska

ИМИДЖ НА УНИВЕРСИТЕТА

Галя Христозова

Книжка 1s
COMPETITIVENESS AS A RESULT OF CREATIVITY AND INNOVATION

Nikolay Krushkov, Ralitza Zayakova-Krushkova

INTELLECTUAL PROPERTY AND SECURITY IN THE INTEGRATED CIRCUITS INDUSTRY

Ivan Nachev, Yuliana Tomova, Iskren Konstantinov, Marina Spasova

Книжка 1
PROBLEMS AND PERSPECTIVES FOR SOCIAL ENTREPRENEURSHIP IN HIGHER EDUCATION

Milena Filipova, Olha Prokopenko, Igor Matyushenko, Olena Khanova, Olga Shirobokova, Ardian Durmishi

2023 година
Книжка 6s
DEVELOPMENT OF A COMMON INFORMATION SYSTEM TO CREATE A DIGITAL CAREER CENTER TOGETHER WITH PARTNER HIGHER SCHOOLS

Yordanka Angelova, Rossen Radonov, Vasil Kuzmov, Stela Zhorzh Derelieva-Konstantinova

DRAFTING A DIGITAL TRANSFORMATION STRATEGY FOR PROJECT MANAGEMENT SECTOR – EMPIRICAL STUDY ON UAE

Mounir el Khatib, Shikha al Ali, Ibrahim Alharam, Ali Alhajeri, Gabriela Peneva, Jordanka Angelova, Mahmoud Shanaa

VOYAGE OF LEARNING: CRUISE SHIPS WEATHER ROUTING AND MARITIME EDUCATION

Svetlana Dimitrakieva, Dobrin Milev, Christiana Atanasova

СТРУКТУРНИ ПРОМЕНИ В ОБУЧЕНИЕТО НА МЕНИДЖЪРИ ЗА ИНДУСТРИЯ 5.0

Недко Минчев, Венета Христова, Иван Стоянов

RESEARCH OF THE INNOVATION CAPACITY OF AGRICULTURAL PRODUCERS

Siya Veleva, ; Margarita Mondeshka, Anka Tsvetanova

Книжка 6
Книжка 5s
ВИДОВЕ ТРАВМИ В ПАРАШУТИЗМА И ПРЕВЕНЦИЯТА ИМ

Капитан III ранг Георги Калинов

Книжка 5
Книжка 4s
DETERMINING THE DEGREE OF DIGITALIZATION OF A HIGHER EDUCATION INSTITUTION

Acad. Hristo Beloev, Angel Smrikarov, Valentina Voinohovska, Galina Ivanova

ОТ STEM КЪМ BEST: ДВА СТАНДАРТА, ЕДНА ЦЕЛ

Андрей Захариев, Стефан Симеонов, Таня Тодорова

Книжка 4
EFFECT OF RESILIENCE ON BURNOUT IN ONLINE LEARNING ENVIRONMENT

Radina Stoyanova, Sonya Karabeliova, Petya Pandurova, Nadezhda Zheckova, Kaloyan Mitev

Книжка 3s
INTELLIGENT ANIMAL HUSBANDRY: FARMER ATTITUDES AND A ROADMAP FOR IMPLEMENTATION

Dimitrios Petropoulos, Koutroubis Fotios, Petya Biolcheva, Evgeni Valchev

Книжка 3
STUDY OF THE DEVELOPMENT OF THE USE OF COMMUNICATIVE TECHNOLOGIES IN THE EDUCATIONAL PROCESS OF ENGINEERS TRAINING

Ivan Beloev, Valentina Vasileva, Sergii Bilan, Maria Bondar, Oksana Bulgakova, Lyubov Shymko

Книжка 2
РАЗПОЛОЖЕНИЕ НА ВИСШИТЕ УЧИЛИЩА В БЪЛГАРИЯ В КОНТЕКСТА НА ФОРМИРАНЕ НА ПАЗАРА НА ТРУДА

Цветелина Берберова-Вълчева, Камен Петров, Николай Цонков

Книжка 1
MODERNIZATION OF THE CONTENT OF THE LECTURE COURSE IN PHYSICS FOR TRAINING FUTURE AGRICULTURAL ENGINEERS

Ivan Beloev, Valentina Vasileva, Vasyl Shynkaruk, Oksana Bulgakova, Maria Bondar, Lesia Zbaravska, Sergii Slobodian

2022 година
Книжка 6
ORGANIZATION OF AN INCLUSIVE EDUCATIONAL ENVIRONMENT FOR THE STUDENTS WITH SPECIAL NEEDS

Halyna Bilavych, Nataliia Bakhmat, Tetyana Pantiuk, Mykola Pantiuk, Borys Savchuk

ДИГИТАЛИЗАЦИЯ НА ОБРАЗОВАНИЕТО В БЪЛГАРИЯ: СЪСТОЯНИЕ И ОБЩИ ТЕНДЕНЦИИ

Теодора Върбанова, Албена Вуцова, Николай Нетов

Книжка 5
ПРАВОТО НА ИЗБОР В ЖИВОТА НА ДЕЦАТА В РЕПУБЛИКА БЪЛГАРИЯ

Сийка Чавдарова-Костова, Даниела Рачева, Екатерина Томова, Росица Симеонова

Книжка 4
DIAGNOSIS AS A TOOL FOR MONITORING THE EFFECTIVENESS OF ADDICTION PREVENTION IN ADOLESCENTS

O.A. Selivanova, N.V. Bystrova, I.I. Derecha, T.S. Mamontova, O.V. Panfilova

Книжка 3
ПУБЛИЧНОТО РАЗБИРАНЕ НА НАУКАТА В МРЕЖОВИЯ СВЯТ

Светломир Здравков, Мартин Й. Иванов, Петя Климентова

Книжка 2
Книжка 1
ДИГИТАЛНАТА ИНТЕРАКЦИЯ ПРЕПОДАВАТЕЛ – СТУДЕНТ В ОНЛАЙН ОБУЧЕНИЕТО В МЕДИЦИНСКИТЕ УНИВЕРСИТЕТИ

Миглена Търновска, Румяна Стоянова, Боряна Парашкевова, Юлияна Маринова

2021 година
Книжка 6
Книжка 5
Книжка 4s
SIGNAL FOR HELP

Ina Vladova, Milena Kuleva

Книжка 4
PREMISES FOR A MULTICULTURAL APPROACH TO EDUCATION

Anzhelina Koriakina, Lyudmila Amanbaeva

Книжка 3
Книжка 2
ПЪРВА СЕДМИЦА ДИСТАНЦИОННО ОБУЧЕНИЕ В СУ „ИВАН ВАЗОВ“ В СТАРА ЗАГОРА

Тони Чехларова, Динко Цвятков, Неда Чехларова

Книжка 1
METHODOLOGY OF SAFETY AND QUALITY OF LIFE ON THE BASIS OF NOOSPHERIC EDUCATION SYSTEM FORMATION

Nataliia Bakhmat, Nataliia Ridei, Nataliia Tytova, Vladyslava Liubarets, Oksana Katsero

2020 година
Книжка 6
HIGHER EDUCATION AS A PUBLIC GOOD

Yulia Nedelcheva, Miroslav Nedelchev

Книжка 5
НАСЪРЧАВАНЕ НА СЪТРУДНИЧЕСТВОТО МЕЖДУ ВИСШИТЕ УЧИЛИЩА И БИЗНЕСА

Добринка Стоянова, Блага Маджурова, Гергана Димитрова, Стефан Райчев

Книжка 4
THE STRATEGY OF HUMAN RIGHTS STUDY IN EDUCATION

Anush Balian, Nataliya Seysebayeva, Natalia Efremova, Liliia Danylchenko

Книжка 3
Книжка 2
МИГРАЦИЯ И МИГРАЦИОННИ ПРОЦЕСИ

Веселина Р. Иванова

SOCIAL STATUS OF DISABLED PEOPLE IN RUSSIA

Elena G. Pankova, Tatiana V. Soloveva, Dinara A. Bistyaykina, Olga M. Lizina

Книжка 1
ETHNIC UPBRINGING AS A PART OF THE ETHNIC CULTURE

Sholpankulova Gulnar Kenesbekovna

2019 година
Книжка 6
EMOTIONAL COMPETENCE OF THE SOCIAL TEACHER

Kadisha K. Shalgynbayeva, Ulbosin Zh.Tuyakova

Книжка 5
Книжка 4
Книжка 3
УЧИЛИЩЕТО НА БЪДЕЩЕТО

Наталия Витанова

Книжка 2
Книжка 1
POST-GRADUATE QUALIFICATION OF TEACHERS IN INTERCULTURAL EDUCATIONAL ENVIRONMENT

Irina Koleva, Veselin Tepavicharov, Violeta Kotseva, Kremena Yordanova

ДЕЦАТА В КОНСТИТУЦИОННИТЕ НОРМИ НА БЪЛГАРИЯ

Румен Василев, Весела Марева

СЪСТОЯНИЕ НА БЪЛГАРСКОТО ОБРАЗОВАНИЕ

Анелия Любенова, Любомир Любенов

ЕДИН НОВ УЧЕБНИК

Ирина Колева

2018 година
Книжка 6
Книжка 5
A NEW AWARD FOR PROFESSOR MAIRA KABAKOVA

Irina Koleva, Editor-in-

Книжка 4
Книжка 3
BLENDED EDUCATION IN HIGHER SCHOOLS: NEW NETWORKS AND MEDIATORS

Nikolay Tsankov, Veska Gyuviyska, Milena Levunlieva

ВЗАИМОВРЪЗКАТА МЕЖДУ СПОРТА И ПРАВОТО

Ивайло Прокопов, Елица Стоянова

ХИМЕРНИТЕ ГРУПИ В УЧИЛИЩЕ

Яна Рашева-Мерджанова

Книжка 2
Книжка 1
2017 година
Книжка 6
ЗНАЧИМОСТТА НА УЧЕНЕТО: АНАЛИЗ НА ВРЪЗКИТЕ МЕЖДУ ГЛЕДНИТЕ ТОЧКИ НА УЧЕНИЦИ, РОДИТЕЛИ И УЧИТЕЛИ

Илиана Мирчева, Елена Джамбазова, Снежана Радева, Деян Велковски

Книжка 5
ОРГАНИЗАЦИОННА КУЛТУРА В УЧИЛИЩЕ

Ивайло Старибратов, Лилия Бабакова

Книжка 4
КОУЧИНГ. ОБРАЗОВАТЕЛЕН КОУЧИНГ

Наталия Витанова, Нели Митева

Книжка 3
Книжка 2
Книжка 1
ЕМПАТИЯ И РЕФЛЕКСИЯ

Нели Кънева, Кристиана Булдеева

2016 година
Книжка 6
Книжка 5
Книжка 4
Книжка 3
Книжка 2
Книжка 1
2015 година
Книжка 6
Книжка 5
Книжка 4
ПРАГМАТИЧНАТА ДИДАКТИКА

Николай Колишев

Книжка 3
Книжка 2
Книжка 1
2014 година
Книжка 6
Книжка 5
КОХЕРЕНТНОСТ НА ПОЛИТИКИ

Албена Вуцова, Лиляна Павлова

Книжка 4
USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan, Vincent Greaney, T. Scott Murray

Книжка 3
USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan, Vincent Greaney, T. Scott Murray

Книжка 2
PROFESSIONAL DEVELOPMENT OF UNIVERSITY FACULTY: А SOCIOLOGICAL ANALYSIS

Gulnar Toltaevna Balakayeva, Alken Shugaybekovich Tokmagambetov, Sapar Imangalievich Ospanov

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan, Vincent Greaney, T. Scott Murray

Книжка 1
РЕФЛЕКСИЯТА В ИНТЕГРАТИВНОТО ПОЛЕ НА МЕТОДИКАТА НА ОБУЧЕНИЕТО ПО БИОЛОГИЯ

Иса Хаджиали, Наташа Цанова, Надежда Райчева, Снежана Томова

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan, Vincent Greaney, T. Scott Murray

2013 година
Книжка 6
Книжка 5
Книжка 4
QUESTIONNAIRE DEVELOPMENT

ÎÖÅÍßÂÀÍÅÒÎ

Книжка 3
MASS MEDIA CULTURE IN KAZAKHSTAN

Aktolkyn Kulsariyeva Yerkin Massanov Indira Alibayeva

РЪКОВОДСТВО ЗА СЪСТАВЯНЕ НА ТЕСТОВЕ*

Фернандо Картрайт, Джери Мусио

РОССИЙСКАЯ СИСТЕМА ОЦЕНКИ КАЧЕСТВА ОБРАЗОВАНИЯ: ГЛАВНЫЕ УРОКИ

В. Болотов / И. Вальдман / Г. Ковалёва / М. Пинская

Книжка 2
ОЦЕНЯВАНЕ НА ГРАЖДАНСКИТЕ КОМПЕТЕНТНОСТИ НА УЧЕНИЦИТЕ: ПРЕДИЗВИКАТЕЛСТВА И ВЪЗМОЖНОСТИ

Светла Петрова Център за контрол и оценка на качеството на училищното образование

РЪКОВОДСТВО ЗА СЪСТАВЯНЕ НА ТЕСТОВЕ*

Фернандо Картрайт, Джери Мусио

Книжка 1
Уважаеми читатели,

вет, както и от международния борд за предоставените статии и студии, за да могат да бъдат идентифицирани в полето на образованието пред широката аудитория от педа- гогически специалисти във всички степени на образователната ни система. Благодаря за техния всеотдаен и безвъзмезден труд да създават и популяризират мрежа от научни съобщества по профила на списанието и да насърчават научните изследвания. Благодаря на рецензентите от национално представените висши училища, на- учни институции и

РЪКОВОДСТВО ЗА СЪСТАВЯНЕ НА ТЕСТОВЕ

Фернандо Картрайт, Джери Мусио

2012 година
Книжка 6
DEVELOPMENT OF SCIENCE IN KAZAKHSTAN IN THE PERIOD OF INDEPENDENCE

Aigerim Mynbayeva Maira Kabakova Aliya Massalimova

Книжка 5
Книжка 4
Книжка 3
СИСТЕМАТА ЗА РАЗВИТИЕ НА АКАДЕМИЧНИЯ СЪСТАВ НА РУСЕНСКИЯ УНИВЕРСИТЕТ „АНГЕЛ КЪНЧЕВ“

Христо Белоев, Ангел Смрикаров, Орлин Петров, Анелия Иванова, Галина Иванова

Книжка 2
ПРОУЧВАНЕ НА РОДИТЕЛСКОТО УЧАСТИЕ В УЧИЛИЩНИЯ ЖИВОТ В БЪЛГАРИЯ

* Този материал е изготвен въз основа на резултатите от изследването „Parental Involvement in Life of School Matters“, проведено в България в рамките на проек- та „Advancing Educational Inclusion and Quality in South East Europe“, изпълняван

ВТОРИ ФОРУМ ЗА СТРАТЕГИИ В НАУКАТА

Тошка Борисова В края на 2011 г. в София се проведе второто издание на Форум за страте- гии в науката. Основната тема бе повишаване на международната видимост и разпознаваемост на българската наука. Форумът се организира от „Elsevier“ – водеща компания за разработване и предоставяне на научни, технически и медицински информационни продукти и услуги , с подкрепата на Министер- ството на образованието, младежта и науката. След успеха на първото издание на Форума за стратегии в науката през

Книжка 1
РЕЙТИНГИ, ИНДЕКСИ, ПАРИ

Боян Захариев