Open Access

ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context


Cite

Benz, M., Chatterjee, D. (2020). Calculated risk? A cybersecurity evaluation tool for SMEs. Business Horizons, 63, 531-540.10.1016/j.bushor.2020.03.010 Search in Google Scholar

Buse, L, Siminica, M., Circiumaru, D., Marcu, N. (2005). Economic-financial analysis (Analiza economic-financiara). Bucharest: Economica Publishing House. Search in Google Scholar

Cabaj, K., Domingos, D., Kotulski, Z., Respicio, A. (2018). Cybersecurity education: Evolution of the discipline and analysis of master programs. Computer & Security, 75, 24-35.10.1016/j.cose.2018.01.015 Search in Google Scholar

Conick, H. (2017). Four things middle market companies must do to improve cybersecurity. American Marketing Association. Retrieved from: https://www.ama.org/marketing-news/four-things-middle-market-companies-must-do-to-improve-cybersecurity /. Search in Google Scholar

Dascalu, E.D., Marcu, N., Pete, S., Ulici, M-L., Dumitrascu, V. (2016). Dependent business climate. A network-based analysis. Romanian Journal of Economic Forecasting, XIX(1), 138-152. Search in Google Scholar

Dima, A.M., Meghisan-Toma, G.-M. (2018). Research on implementing education for sustainable development. Proceedings of the international conference on business excellence, 12(1), 300-310.10.2478/picbe-2018-0027 Search in Google Scholar

Griffy-Brown, C., Lazarikos, M., Chun, M. (2016). How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom., 18(1), 90-102. Search in Google Scholar

Hooper, V, McKissack, J. (2016). The emerging role of CISO. Business Horizons, 59(6), 585-591.10.1016/j.bushor.2016.07.004 Search in Google Scholar

McDuffie, EL., Piotrowski, VP. (2014). The future of cybersecurity education. Computer, 47(8), 67-69.10.1109/MC.2014.224 Search in Google Scholar

Miller, H., Griffy-Brown, C. (2018). Developing a framework and methodology for assessing cyber risk for business leaders. J. Appl. Bus. Econom., 20(3), 34-50. Search in Google Scholar

Nam, T. (2019). Understanding the gap between perceived threats to and preparedness for cybersecurity. Technology in society, 58(2019), 101-122. Search in Google Scholar

Ter, K.L. (2018). Singapore’s cybersecurity strategy. Computer Law & Security Review, 34, 924-927.10.1016/j.clsr.2018.05.001 Search in Google Scholar

eISSN:
2558-9652
Language:
English