[
Benz, M., Chatterjee, D. (2020). Calculated risk? A cybersecurity evaluation tool for SMEs. Business Horizons, 63, 531-540.10.1016/j.bushor.2020.03.010
]Search in Google Scholar
[
Buse, L, Siminica, M., Circiumaru, D., Marcu, N. (2005). Economic-financial analysis (Analiza economic-financiara). Bucharest: Economica Publishing House.
]Search in Google Scholar
[
Cabaj, K., Domingos, D., Kotulski, Z., Respicio, A. (2018). Cybersecurity education: Evolution of the discipline and analysis of master programs. Computer & Security, 75, 24-35.10.1016/j.cose.2018.01.015
]Search in Google Scholar
[
Conick, H. (2017). Four things middle market companies must do to improve cybersecurity. American Marketing Association. Retrieved from: https://www.ama.org/marketing-news/four-things-middle-market-companies-must-do-to-improve-cybersecurity /.
]Search in Google Scholar
[
Dascalu, E.D., Marcu, N., Pete, S., Ulici, M-L., Dumitrascu, V. (2016). Dependent business climate. A network-based analysis. Romanian Journal of Economic Forecasting, XIX(1), 138-152.
]Search in Google Scholar
[
Dima, A.M., Meghisan-Toma, G.-M. (2018). Research on implementing education for sustainable development. Proceedings of the international conference on business excellence, 12(1), 300-310.10.2478/picbe-2018-0027
]Search in Google Scholar
[
Griffy-Brown, C., Lazarikos, M., Chun, M. (2016). How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom., 18(1), 90-102.
]Search in Google Scholar
[
Hooper, V, McKissack, J. (2016). The emerging role of CISO. Business Horizons, 59(6), 585-591.10.1016/j.bushor.2016.07.004
]Search in Google Scholar
[
McDuffie, EL., Piotrowski, VP. (2014). The future of cybersecurity education. Computer, 47(8), 67-69.10.1109/MC.2014.224
]Search in Google Scholar
[
Miller, H., Griffy-Brown, C. (2018). Developing a framework and methodology for assessing cyber risk for business leaders. J. Appl. Bus. Econom., 20(3), 34-50.
]Search in Google Scholar
[
Nam, T. (2019). Understanding the gap between perceived threats to and preparedness for cybersecurity. Technology in society, 58(2019), 101-122.
]Search in Google Scholar
[
Ter, K.L. (2018). Singapore’s cybersecurity strategy. Computer Law & Security Review, 34, 924-927.10.1016/j.clsr.2018.05.001
]Search in Google Scholar