1. Adler, D. (2019). Schumpeter’s theory of creative destruction. In Engineering and Public Policy, Carnegie Mellon University College of Engineering. Retrieved on October 16, 2021, from http://www.cmu.edu/epp/irle/irle-blog-pages/schumpeters-theory-of-creative-destruction.html
2. Amoroso, E. (2006). Cyber security. Silicon Press.
3. BBVA. (2017). There's an algorithm behind the most successful companies. In BBVA. Retrieved on October 15, 2021, from https://www.bbva.com/en/theres-algorithm-successful-companies/
4. Bendovschi, A. (2015). Cyber-attacks—Trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24–31. https://doi.org/10.1016/S2212-5671(15)01077-1
5. Boloș, M.-I., Bradea, I.-A., & Delcea, C. (2019). A fuzzy logic algorithm for optimizing the investment decisions within companies. Symmetry, 11, 186. https://doi.org/10.3390/sym11020186