Indexing metadata

BUSINESS ACTIONS POSING THREAT TO NATIONAL SECURITY


 
Dublin Core PKP Metadata Items Metadata for this Document
 
1. Title Title of document BUSINESS ACTIONS POSING THREAT TO NATIONAL SECURITY
 
2. Creator Author's name, affiliation, country Violeta Vasiliauskienė; Department of Management and Law, Faculty of Business, Kauno Kolegija Higher Education Institution; Lithuania
 
2. Creator Author's name, affiliation, country Anželika Banevičienė; Department of Management and Law, Faculty of Business, Kauno Kolegija Higher Education Institution; Lithuania
 
2. Creator Author's name, affiliation, country Vykintas Stumbrys; Department of Management and Law, Faculty of Business, Kauno Kolegija Higher Education Institution; Lithuania
 
3. Subject Discipline(s)
 
3. Subject Keyword(s) economic security; national security; foreign influence; cybersecurity
 
4. Description Abstract

This paper explores how business activities can pose risks to national security, with a focus on Lithuania and the European Union. It analyzes how illicit practices, foreign ownership, and technological vulnerabilities contribute to threats in areas such as economic security, cybersecurity, and political influence. The research uses a qualitative approach, reviewing legal frameworks, national strategies, and real-world cases, including the revocation of UAB Foxpay’s license and companies with ties to Russia and Belarus. These cases show how business links to authoritarian regimes, when left unchecked, can compromise critical infrastructure and sensitive data, or influence political decision-making. Technological advancements, such as artificial intelligence, digital finance, and global supply chains, increase vulnerabilities. Cases like Huawei and Kaspersky Lab illustrate the persistent risks of espionage, while supply chain attacks show how cyber threats can spread through business networks. The misuse of technology and lack of internal controls in some companies further exacerbate these risks. At the EU level, strategies such as the Security Union Strategy, the Digital Services Act, and the Chips Act aim to strengthen resilience, protect critical sectors, and regulate foreign influence. National measures, including Lithuania’s investment screening and cybersecurity policies, complement these efforts by safeguarding strategic infrastructure and enhancing oversight. The study concludes that protecting national security in a digital and globalized economy requires a collaborative approach. Strong legal regulation must be combined with responsible business conduct. Security begins with knowing your partners and addressing indirect ties that may present risks. Ongoing legal development and consistent enforcement are essential to prevent business-related threats and maintain national stability.

 

 
5. Publisher Organizing agency, location
 
6. Contributor Sponsor(s)
 
7. Date (YYYY-MM-DD) 19.04.2025
 
8. Type Status & genre Peer-reviewed Paper
 
8. Type Type
 
9. Format File format
 
10. Identifier Universal Resource Indicator https://conferences.rta.lv/index.php/ETR/ETR2025/paper/view/7054
 
11. Source Journal/conference title; vol., no. (year) ENVIRONMENT. TECHNOLOGY. RESOURCES; Environment. Technology. Resources. 16th International Scientific and Practical Conference
 
12. Language English=en en
 
14. Coverage Geo-spatial location, chronological period, research sample (gender, age, etc.)
 
15. Rights Copyright and permissions Authors who submit to this conference agree to the following terms:
a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.