European Commission (2021). <em>Commission staff working document evaluation of Recommendation of 6 May 2003 concerning the definition of micro, small and mediumsized enterprises (2003/361/EC)</em>, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://ec.europa.eu/transparency/documents-register/detail?ref=SWD(2021)279&lang=en">https://ec.europa.eu/transparency/documents-register/detail?ref=SWD(2021)279&lang=en</ext-link>.
Ionescu, R. C., Olaru M., Sargut K. (2019). Study of the Information Security Impact on the Business Continuity, in <em>Proceedings of the 34th International Business Information Management Association Conference (IBIMA), Madrid, Spain</em>, 11/13-14/2019, Pag.: 4279-4287, ISBN: 978-0-9998551-3-3, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://apps-webofknowledge-com.am.enformation.ro/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=F1Popqoibfu8upwkh1Q&page=1&doc=2">https://apps-webofknowledge-com.am.enformation.ro/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=F1Popqoibfu8upwkh1Q&page=1&doc=2</ext-link>
Ismail, U. M., Islam, S. (2020). A unified framework for cloud security transparency and audit. <em>Journal of Information Security and Applications</em>, <em>54</em>, 102594. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jisa.2020.102594" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jisa.2020.102594</a>">https://doi.org/10.1016/j.jisa.2020.102594</ext-link>
ISO (2023). <em>ISO - The circular economy: Building trust through conformity assessment</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/insights/circular-economy-building-trust">https://www.iso.org/insights/circular-economy-building-trust</ext-link>
Mandrakov, E. S., Vasiliev, V. A., Dudina, D. A. (2020). Non-conforming Products Management in a Digital Quality Management System. <em>2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS)</em>, 266–268. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ITQMIS51053.2020.9322931" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ITQMIS51053.2020.9322931</a>">https://doi.org/10.1109/ITQMIS51053.2020.9322931</ext-link>
Mejias, P. (2023). Adding value to audits of management systems. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.quality.org/article/adding-value-audits-management-systems">https://www.quality.org/article/adding-value-audits-management-systems</ext-link>
Naden, C. (2020). Words to the wise on conformity assessment. <em>ISO</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2020/05/Ref2519.html">https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2020/05/Ref2519.html</ext-link>
Naumann, M. M., Olaru, S. M., Lampe, G. S., Pitz, F. (2023). Measuring and indicating the level of information security - an analysis of current approaches. <em>Ecoforum Journal</em>, <em>12</em>(2). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.ecoforumjournal.ro/index.php/eco/article/view/1739">http://www.ecoforumjournal.ro/index.php/eco/article/view/1739</ext-link>
Qusef, A., Arafat, M., & Al-Taher, S. (2018). Organizational management role in information security management system. <em>Proceedings of the 2nd International Conference on Future Networks and Distributed Systems</em>, 1–8. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/3231053.3231064" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/3231053.3231064</a>">https://doi.org/10.1145/3231053.3231064</ext-link>
Stefanova-Stoyanova, V., & Danov, P. (2022). Comparative Analysis of Specialized Standards and Methods on Increasing the Effectiveness and Role of PDCA for Risk Control in Management Systems. <em>2022 10th International Scientific Conference on Computer Science (COMSCI)</em>, 1–4. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/COMSCI55378.2022.9912583" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/COMSCI55378.2022.9912583</a>">https://doi.org/10.1109/COMSCI55378.2022.9912583</ext-link>
Sven, L.G., Maftei, M., Surugiu, I., Bitan, G, Ionescu, R. C. (2020) Study of Information Security Management System and Business Continuity Management in the Context of the Global Crisis, <em>The 6th BASIQ International Conference on New Trends in Sustainable Business and Consumption, Messina, Italia, 2020</em>, vol. 01, pg. 942-949, ISSN 2457-483X, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www-webofscience-com.am.e-nformation.ro/wos/woscc/full-record/WOS:000630165800121">https://www-webofscience-com.am.e-nformation.ro/wos/woscc/full-record/WOS:000630165800121</ext-link>