Skip to Main Content
Keywords: Configuration analysis
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Data Technologies and Applications (2025) 59 (3): 452–471.
Published: 21 February 2025
... to experience a negative market reaction following a data breach, traditional firms did not show the same pattern. Based on the configuration analysis, six different strategies for cost control were identified, including mitigation and apology strategies for internet-based firms and indifference, fact-statement...

or Create an Account

Close Modal
Close Modal