Have a personal or library account? Click to login

References

  1. AFCEA International Cyber Committee. (2013). The Economics of cybersecurity.
  2. AFP (2018). How to Calculate Your Return on Security Investments. Available athttps://www.afponline.org/ideas-inspiration/topics/articles/Details/calculating-yourreturn-on-security-investments-fp-a-s-role/.
  3. Cat, J. (2017). The Unity of Science. In the Stanford Encyclopedia of Philosophy; Zalta, E.N., Ed.; Metaphysics Research Lab, Stanford University: Stanford, CA, USA.
  4. European Commission (2018). EU negotiations agree on strengthening Europe’s cybersecurity. Available at https://ec.europa.eu/commission/presscorner/detail/en/IP_18_6759.
  5. European Parliament (2020). Digital Sovereignty for Europe. Available at https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651992/EPRS_BRI(2020)651992_EN.pdf.
  6. Gaftea, V. (2013). Socio-economic major risks related to the information technology. Procedia Economics and Finance 8 (2014) 336 – 345. Available at https://reader.elsevier.com/reader/sd/pii/S2212567114000999?token=E8C820349E09A2BC955DD1125240CF8EDDA1CC56E00D5153E48C750D9A3223F5C8AA48BAF5023B48CE4BF24A8A6A3E91&originRegion=eu-west-1&originCreation=20220312184439
  7. Google Blog (2021). Why we’re committing $10 billion to advance cybersecurity. https://blog.google/technology/safety-security/why-were-committing-10-billion-toadvance-cybersecurity/.
  8. Gordon, L. et. al, (2016). Investing in Cybersecurity: Insights from the Gordon-Loeb Model. Journal of Information Security, 2016, 7, 49-59. Available at https://www.scirp.org/journal/paperinformation.aspx?paperid=64892.
  9. The Guardian (2010). Hilton settles Starwood Hotels industrial espionage case. Available at https://www.theguardian.com/business/2010/dec/23/hilton-starwood-denizen-industrialespionage.
  10. Haslam, C., et al. (2019). Accounting for the future: How will corporate business models deliver sustainability?. In Proceedings of the International Conference on Business Excellence (Vol. 13, No. 1, pp. 817-828).10.2478/picbe-2019-0072
  11. Hoinaru, R. (2017). Follow the money. The impact of the illicit financial flows home and abroad. A common European-African perspective. Romanian Journal of Economics, 44(1/53), 87-94.
  12. Hoinaru, R. & Năstase, M. (2019). A balanced approach: Brexit from political and business perspectives. Proceedings of the International Conference on Business Excellence, 13(1) 804-816. https://doi.org/10.2478/picbe-2019-0071.
  13. Kianpour, M. et al. (2021). Systemically understanding cybersecurity economics: a survey. Sustainability 2021, 13, 13677.
  14. LA Times (2010). Hilton settles with Starwood in trade secrets case. Accesible at https://www.latimes.com/archives/la-xpm-2010-dec-24-la-fi-1224-hilton-starwood-20101224-story.html.
  15. Moore, T. (2010). Introducing the economics of Cybersecurity. In International Journal fo Critical Infrastructure Protection 3(3-4):103-117.
  16. NY Times (2010). Britain Warned Businesses of Threat of Chinese Spying. Accesibil la https://www.nytimes.com/2010/02/01/world/europe/01spy.html.
  17. OSCE (2020). Preventing and combuting corruption through digitalisation and increased transparency. MC DEC / 6/ 20.
  18. The Economic Times. (2021). As economy gets more digitised, cyber threats a cause for worry. Available at https://economictimes.indiatimes.com/tech/technology/as-economy-getsmore-digitised-cyber-threats-a-cause-forworry/articleshow/85284133.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst.
  19. Trașcă, D. L. et al. (2019). Digitalization and business activity. The struggle to catch up in CEE countries. Sustainability, 11(8), 2204.
  20. Roman, A. G. et al. (2019). Disclosure style and its determinants in integrated reports. Sustainability, 11(7), 1960.10.3390/su11071960
  21. Voanews (2010). Google Attacks Highlight Growing Problem of Cyber Security Threats. Accesibile at https://www.voanews.com/a/google-attacks-highlight-growing-problem-ofcyber-security-threats-88171917/114251.html.
  22. Von Solms, R and van Niekerk, J. (2013). From information security to cyber security. Computers and Security 38:97-102. Available at https://profsandhu.com/cs6393_s19/Solms-Niekerk-2013.pdf.
Language: English
Page range: 584 - 592
Published on: Aug 8, 2022
Published by: Bucharest University of Economic Studies
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2022 Mihaela Hortensia Hojda, published by Bucharest University of Economic Studies
This work is licensed under the Creative Commons Attribution 4.0 License.