[
AFCEA International Cyber Committee. (2013). The Economics of cybersecurity.
]Search in Google Scholar
[
AFP (2018). How to Calculate Your Return on Security Investments. Available athttps://www.afponline.org/ideas-inspiration/topics/articles/Details/calculating-yourreturn-on-security-investments-fp-a-s-role/.
]Search in Google Scholar
[
Cat, J. (2017). The Unity of Science. In the Stanford Encyclopedia of Philosophy; Zalta, E.N., Ed.; Metaphysics Research Lab, Stanford University: Stanford, CA, USA.
]Search in Google Scholar
[
European Commission (2018). EU negotiations agree on strengthening Europe’s cybersecurity. Available at https://ec.europa.eu/commission/presscorner/detail/en/IP_18_6759.
]Search in Google Scholar
[
European Parliament (2020). Digital Sovereignty for Europe. Available at https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651992/EPRS_BRI(2020)651992_EN.pdf.
]Search in Google Scholar
[
Gaftea, V. (2013). Socio-economic major risks related to the information technology. Procedia Economics and Finance 8 (2014) 336 – 345. Available at https://reader.elsevier.com/reader/sd/pii/S2212567114000999?token=E8C820349E09A2BC955DD1125240CF8EDDA1CC56E00D5153E48C750D9A3223F5C8AA48BAF5023B48CE4BF24A8A6A3E91&originRegion=eu-west-1&originCreation=20220312184439
]Search in Google Scholar
[
Google Blog (2021). Why we’re committing $10 billion to advance cybersecurity. https://blog.google/technology/safety-security/why-were-committing-10-billion-toadvance-cybersecurity/.
]Search in Google Scholar
[
Gordon, L. et. al, (2016). Investing in Cybersecurity: Insights from the Gordon-Loeb Model. Journal of Information Security, 2016, 7, 49-59. Available at https://www.scirp.org/journal/paperinformation.aspx?paperid=64892.
]Search in Google Scholar
[
The Guardian (2010). Hilton settles Starwood Hotels industrial espionage case. Available at https://www.theguardian.com/business/2010/dec/23/hilton-starwood-denizen-industrialespionage.
]Search in Google Scholar
[
Haslam, C., et al. (2019). Accounting for the future: How will corporate business models deliver sustainability?. In Proceedings of the International Conference on Business Excellence (Vol. 13, No. 1, pp. 817-828).10.2478/picbe-2019-0072
]Search in Google Scholar
[
Hoinaru, R. (2017). Follow the money. The impact of the illicit financial flows home and abroad. A common European-African perspective. Romanian Journal of Economics, 44(1/53), 87-94.
]Search in Google Scholar
[
Hoinaru, R. & Năstase, M. (2019). A balanced approach: Brexit from political and business perspectives. Proceedings of the International Conference on Business Excellence, 13(1) 804-816. https://doi.org/10.2478/picbe-2019-0071.
]Search in Google Scholar
[
Kianpour, M. et al. (2021). Systemically understanding cybersecurity economics: a survey. Sustainability 2021, 13, 13677.
]Search in Google Scholar
[
LA Times (2010). Hilton settles with Starwood in trade secrets case. Accesible at https://www.latimes.com/archives/la-xpm-2010-dec-24-la-fi-1224-hilton-starwood-20101224-story.html.
]Search in Google Scholar
[
Moore, T. (2010). Introducing the economics of Cybersecurity. In International Journal fo Critical Infrastructure Protection 3(3-4):103-117.
]Search in Google Scholar
[
NY Times (2010). Britain Warned Businesses of Threat of Chinese Spying. Accesibil la https://www.nytimes.com/2010/02/01/world/europe/01spy.html.
]Search in Google Scholar
[
OSCE (2020). Preventing and combuting corruption through digitalisation and increased transparency. MC DEC / 6/ 20.
]Search in Google Scholar
[
The Economic Times. (2021). As economy gets more digitised, cyber threats a cause for worry. Available at https://economictimes.indiatimes.com/tech/technology/as-economy-getsmore-digitised-cyber-threats-a-cause-forworry/articleshow/85284133.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst.
]Search in Google Scholar
[
Trașcă, D. L. et al. (2019). Digitalization and business activity. The struggle to catch up in CEE countries. Sustainability, 11(8), 2204.
]Search in Google Scholar
[
Roman, A. G. et al. (2019). Disclosure style and its determinants in integrated reports. Sustainability, 11(7), 1960.10.3390/su11071960
]Search in Google Scholar
[
Voanews (2010). Google Attacks Highlight Growing Problem of Cyber Security Threats. Accesibile at https://www.voanews.com/a/google-attacks-highlight-growing-problem-ofcyber-security-threats-88171917/114251.html.
]Search in Google Scholar
[
Von Solms, R and van Niekerk, J. (2013). From information security to cyber security. Computers and Security 38:97-102. Available at https://profsandhu.com/cs6393_s19/Solms-Niekerk-2013.pdf.
]Search in Google Scholar