{"id":13826,"date":"2020-07-20T10:03:24","date_gmt":"2020-07-20T07:03:24","guid":{"rendered":"https:\/\/modecon.mnau.edu.ua\/?p=13826"},"modified":"2020-07-21T10:50:08","modified_gmt":"2020-07-21T07:50:08","slug":"external-and-internal-marketing-of","status":"publish","type":"post","link":"https:\/\/modecon.mnau.edu.ua\/en\/external-and-internal-marketing-of\/","title":{"rendered":"Budnyk, L. & Blazhei, I. External and Internal Marketing of the Information Security Company"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text]<\/p>\n\n\n\n
JEL Classification<\/strong>: M10; M12; M15; M31
\n<\/span><\/td>\n
DOI<\/b>: https:\/\/doi.org\/10.31521\/modecon.V21(2020)-03<\/a><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/vc_column_text][vc_column_text]<\/p>\n

Budnyk Liudmyla<\/strong>, PhD (Economics), Associate Professor of the Department of Security, Law Enforcement and Financial Investigations, Ternopil National Economic University, Ternopil, Ukraine<\/p>\n

ORCID ID<\/strong>: 0000-0002-1393-9354<\/a>
\ne-mail<\/strong>:
lydabydnik@gmail.com<\/a><\/p>\n

Blazhei Iryna<\/strong>, PhD (Economics), Lecturer of the Department of International Economic Relations, Ternopil National Economic University, Ternopil, Ukraine<\/p>\n

ORCID ID<\/strong>: 0000-0002-0649-4991<\/a>
\ne-mail<\/strong>:
i.blazhey@gmail.com<\/a><\/p>\n

External and Internal Marketing of the Information Security Company<\/h2>\n

 <\/p>\n

Abstract. Introduction. <\/strong>Security issues are increasingly becoming the focus of top management. The relevance of this topic is that the security of commercial and financial information, the loss of which leads to financial and reputational risks, is becoming more significant. An information security strategy should be closely integrated into the overall corporate business program. Thus, the number of potential clients of the information security companies continues to grow steadily.<\/p>\n

Purpose. <\/strong>The purpose of this article is to identify the most effective tools for external and internal marketing in order to strengthen the competitive position of the information security company.<\/p>\n

Results. <\/strong>As a result of the research, the most common information security problems faced by enterprises were considered, and on this basis the company’s marketing strategies for information security were highlighted. The most effective tools of external marketing, taking into account the specifics of the enterprise, are proposed, which allows to increase consumer awareness of the proposed product or service, as well as to improve the level of competitiveness. The principles of internal marketing are highlighted, using which the company will be able to achieve its marketing goals in a shorter period of time, compared with the classical marketing strategy. The importance of using internal marketing to establish a positive corporate image of the information security company, as well as to create a system of employee motivation, has been proved.<\/p>\n

Conclusions. <\/strong>In the management of the information security company, it is important to take into account its specifics, because the offerd products are not well known, and their importance for consumers is not heavily advertised. The use of external and internal marketing will allow the information security company to achieve market goals faster, increase its recognition and, most importantly, explain the value of information security for effective business management.<\/p>\n

Keywords: <\/strong>consumer behavior; external marketing; information security; internal marketing; management; marketing strategy; human resources management.<\/p>\n

References:<\/strong><\/p>\n

    \n
  1. Surmiak, A. (2019). Should we Maintain or Break Confidentiality? The Choices Made by Social Researchers in the Context of Law Violation and Harm. Journal of Academic Ethics<\/em>. doi: https:\/\/doi.org\/10.1007\/s10805-019-09336-2.<\/li>\n
  2. Reddy, A. & Aswath, L. (2016). Understanding Copyright Laws: Infringement, Protection and Exceptions. International Journal of Research in Library Science,<\/em> 2 (1), 48-53.<\/li>\n
  3. Torsen, M. & Anderson, J. (2010). Intellectual property and the safeguarding of traditional cultures. Legal Issues and Practical Options for Museums, Libraries and Archives. World Intellectual Property Organization (WIPO), 126 p. Retrieved from https:\/\/www.wipo.int\/edocs\/pubdocs\/en\/tk\/1023\/wipo_pub_1023.pdf.<\/li>\n
  4. Root, A. (2020). Cyber security marketing tactics that actually work. SevenAtoms. Retrieved from https:\/\/www.sevenatoms.com\/blog\/cyber-security-marketing-tactics-that-actually-works.<\/li>\n
  5. Datta, H., Fouber, B. & van Heerde, H (2015). The impact of free-trial acquisition on customer usage, retention, and lifetime value. Journal of Marketing Research, <\/em>LII, 217-234.<\/li>\n
  6. Insights (2017). How to Create a Marketing Strategy for Information Technology Services. Retrieved from https:\/\/www.ironpaper.com\/webintel\/articles\/marketing-strategy-information-technology\/<\/li>\n
  7. Bohnenberger, M. C., Schmidt, S., Damacena, C. & Francisco, J. (2019). Internal marketing: a model for implementation and development. Dimensi\u00f3n Empresarial<\/em>, 17(1), 7-22. doi: http:\/\/dx.doi.org\/10.15665\/dem.v17i1.1657.<\/li>\n
  8. Akbari, M., Chajnani, M.H. & Aletaha, S. H. (2019). Internal Marketing and the Internal Customers’ Citizenship Behavior in Higher Education. International Journal of Schooling<\/em>, 1(3), 15-28. doi: http:\/\/dx.doi.org\/22034\/ijsc.2019.202676.1018.<\/li>\n
  9. Mohanty, A & Mishra. B. (2019). Internal marketing mix and employee satisfaction in service industry \u2013 a literature review. International Journal of Business Marketing and Managemen, <\/em>4 (7), 5-16.<\/li>\n
  10. Raziq, A. & Maulabakhsh, R. (2015). Impact of working environment on job satisfaction. Economics and Finance<\/em>, 23, 717-725.<\/li>\n<\/ol>\n

    [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Received:<\/strong> 09 April 2020<\/p>\n

    \"budnyk.pdf\"<\/div>
    budnyk.pdf<\/div><\/div>
    <\/div>
    <\/div>
    Size: <\/span>0.40 Mb<\/span><\/div>
    Download Now!<\/a><\/span>448<\/span> Downloads<\/span><\/span><\/div><\/div>
    <\/div>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n\n\n\n\n
    \n

    How to quote this article?<\/p>\n<\/td>\n<\/tr>\n

    Budnyk, L. & Blazhei, I. (2020). External and Internal Marketing of the Information Security Company. Modern Economics<\/em>, 21(2020), 19-23. DOI: https:\/\/doi.org\/10.31521\/modecon.V21(2020)-03.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

    [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<< Back to contents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n

    <\/div>\n

    <\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"

    [vc_row][vc_column][vc_column_text] JEL Classification: M10; M12; M15; M31 DOI: https:\/\/doi.org\/10.31521\/modecon.V21(2020)-03 [\/vc_column_text][vc_column_text] Budnyk Liudmyla, PhD (Economics), Associate Professor of the Department of Security, Law Enforcement and Financial Investigations, Ternopil National Economic University, Ternopil, Ukraine ORCID ID: 0000-0002-1393-9354 e-mail: lydabydnik@gmail.com Blazhei Iryna, PhD (Economics), Lecturer of the Department of International Economic Relations, Ternopil National Economic University, Ternopil, Ukraine
    Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":13475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[134],"tags":[133],"class_list":["post-13826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-21-2020","tag-21-2020"],"_links":{"self":[{"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/posts\/13826"}],"collection":[{"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/comments?post=13826"}],"version-history":[{"count":0,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/posts\/13826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/media\/13475"}],"wp:attachment":[{"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/media?parent=13826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/categories?post=13826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/modecon.mnau.edu.ua\/en\/wp-json\/wp\/v2\/tags?post=13826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}