IREK – AESM: Institutional Repository of Economic Knowledge: Recent submissions

  • Ţîmbaliuc, Natalia; Covaş, Lilia (SEP ASEM, 2025)
    This course notes, Culture and Ethics in Business, was designed to provide a comprehensive yet practical framework for analyzing the interaction between organizational culture, ethical conduct, and sustainable business ...
  • Covaş, Lilia; Ţimbaliuc, Natalia (SEP ASEM, 2025)
    Aceste note de curs au fost concepute ca un suport teoretic pentru studiul aprofundat al comportamentului organizațional, oferind explicații clare asupra mecanismelor și instrumentelor ce pot sprijini creșterea performanței ...
  • Andronatiev, Victor; Zgureanu, Aureliu (SEP ASEM, 2025-05)
    In modern society, computer networks are increasingly used across a wide range of activities. According to data provided by CISCO, in 2020 the number of users and devices connected to the Internet reached 50 billion. While ...
  • Ivanova, Zoya (SEP ASEM, 2025-05)
    In modern conditions, enterprises conducting online sales need to continuously apply new concepts, logic and mechanisms that are in line with the ongoing evolution of information and communication technologies and digital ...
  • Shishmanov, Krasimir; Tsanov, Emil; Tairov, Iskren (SEP ASEM, 2025-05)
    Recent studies indicate that information security plays an increasingly critical function in businesses today. Higher education is not an exemption. The growing number of safety incidents reported by higher education ...
  • Orlova, Dinara; Ohrimenco, Serghei (SEP ASEM, 2025-05)
    The article analyzes the shadow digital economy (SDE) as a modern threat to cybersecurity. The article formulates and proposes definitions of the SDE, based on the specifics of software production and the life cycle of ...
  • Bogdanova, Violeta (SEP ASEM, 2025-05)
    Cyber risk assessment in educational institutions is related to the processes of risk identification, analysis and assessment. The educational environment, as well as other sectors of the economy, is exposed to quite strong ...
  • Dorogaia, Irina; Scutari, Alexandr (SEP ASEM, 2025-05)
    Modern economic transformations increasingly necessitate the adaptation of funding mechanisms through digital integration. In the Republic of Moldova, the emergence of the crowd economy introduces alternative opportunities ...
  • Luchian, Ivan; Doncev, Traian (SEP ASEM, 2025-05)
    Cryptocurrency is a digital asset based on blockchain technology, enabling decentralized and secure digital transactions. The acquisition, trading and investment in cryptocurrencies are based on the operation of a specialized ...
  • Hîncu, Veronica (SEP ASEM, 2025-05)
    In an increasingly digital world, cybersecurity has become a fundamental concern for both individuals and organizations. This paper explores users' perceptions, knowledge, and real-world behaviors related to digital security, ...
  • Haborets, Olha; Rybalchenko, Ludmila (SEP ASEM, 2025-05)
    Phishing attacks have evolved into a major cybersecurity threat, leveraging advanced technologies and human vulnerabilities to achieve unauthorized access, data exfiltration, and financial exploitation. This article explores ...
  • Belinschi, Ghenadie (SEP ASEM, 2025-05)
    Static authentication methods are increasingly vulnerable to social engineering and phishing, especially in cloud-based document workflows. This paper presents an adaptive multi-factor authentication model that escalates ...
  • Barbăneagră, Oxana (SEP ASEM, 2025-05)
    Cybercrime is any criminal activity using information devices and/or digital networks which exploit various information vulnerabilities, involving the criminal use of technologies, identity theft, data breaches, computer ...
  • Luchian, Ivan; Gherjavca, Svetlana (SEP ASEM, 2025-05)
    Cyber insurance (also called cyber liability insurance or cybersecurity insurance) encompasses insurance products designed to cover financial losses incurred by companies as a result of cyber incidents. These assurances ...
  • Gujuman, Lucia; Toacă, Zinovia; Ursachi, Vitalie (SEP ASEM, 2025-05)
    This paper examines the implementation of ISO/IEC 27001 in software development, emphasizing the critical role of human resources in ensuring information security. Based on international standards (ISO/IEC 27000 family, ...
  • Cerbu, Olga; Țurcan, Aurelia (SEP ASEM, 2025-05)
    This paper proposes a cryptographic algorithm that uses the Fourier transform to ensure data confidentiality and security. The presented method is based on representing signals or numerical data in the frequency domain, ...
  • Ceban, Svetlana (SEP ASEM, 2025-05)
    The accelerated pace of digitalization has fundamentally transformed the way information is collected, processed, and used. This process brings significant benefits but also major vulnerabilities in the field of information ...
  • Shepeleva, Olga; Bohdanov, Oleksandr; Tkachenko, Dmytro (SEP ASEM, 2025-05)
    At present, humanity is living in a technological age, when new proposals for the development of tourism appear every day. One of these proposals is to combine tourism with one of the most relevant areas of human activity ...
  • Bazhenov, Sergey; Bazhenova, Elena; Abrosimov, Dmitry (SEP ASEM, 2025-05)
    This article examines the transformation of digital threats into instruments of geostrategy, positioning cyberspace as a critical "fifth domain" of global power competition. Through a systematic analysis of the evolution, ...
  • Țurcan, Aurelia; Cerbu, Olga (SEP ASEM, 2025-05)
    In the context of accelerated digitization and strict data protection regulations, programming can no longer be analyzed exclusively from a technical perspective, but also as a tool for legal and ethical compliance. The ...

Search DSpace

Browse

My Account