161
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Public Disclosure of Information Security Breach Incidents: Short-term Stock Market Reaction on Indian Listed Firms

ORCID Icon &

References

  • Acquisti, A., A. Friedman, and R. Telang. 2006. Is there a cost to privacy breaches? An event study. In Proceedings of the international conference on information systems. http://aisel.aisnet.org/icis2006%5Cnhttp://aisel.aisnet.org/icis2006/94.
  • Agarwalla, S. K., J. Jacob, and J. R. Varma. 2014. Four factor model in Indian equities market. Indian Institute of Management, Ahmedabad Working Paper No. 2013-09-05.
  • Ahmad, A., S. B. Maynard, and S. Park. 2014. Information security strategies: Towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing 25 (2):357–70. doi:10.1007/s10845-012-0683-0.
  • Andleeb, R., A. Hassan, and S. Farid. 2023. Predictive effect of investor sentiment on current and future returns in emerging equity markets. PLoS One 18 (5):e0281523. doi:10.1371/journal.pone.0281523.
  • Andoh-Baidoo, F. K., K. Amoako-Gyampah, and K. M. Osei-Bryson. 2010. How internet security breaches harm market value. IEEE Security & Privacy Magazine 8 (1):36–42. doi:10.1109/MSP.2010.37.
  • Anh, D. L. T., and C. Gan. 2020. The impact of the COVID-19 lockdown on stock market performance: Evidence from Vietnam. Journal of Economic Studies 48 (4):836–51. doi:10.1108/JES-06-2020-0312.
  • Arcuri, M. C., M. Brogi, and G. Gandolfi. 2014. The effect of information security breaches on stock returns: Is the cyber-crime a threat to firms? In Proceedings of the European Financial Management Meeting, Rome, Italy.
  • Arcuri, M. C., L. Gai, F. Ielasi, and E. Ventisette. 2020. Cyber attacks on hospitality sector: Stock market reaction. Journal of Hospitality & Tourism Technology 11 (2):277–90. doi:10.1108/JHTT-05-2019-0080.
  • ASSOCHAM.2015. https://www.assocham.org/newsdetail.php?.
  • Avery, A. 2021. After the disclosure: Measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations. Information & Computer Security 29 (3):500–25. doi:10.1108/ICS-10-2020-0161.
  • Aytes, K., S. Byers, and M. Santhanakrishnan. 2006. The economic impact of information security breaches: Firm value and intra-industry effects. In Proceedings of AMCIS. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1947&context=amcis2006.
  • Azimi, M., A. Agrawal. 2021. Is positive sentiment in corporate annual reports informative? Evidence from deep learning. The Review of Asset Pricing Studies 11 (4):762–805. doi:10.1093/rapstu/raab005.
  • Binder, J. 1998. The event study methodology since 1969. Review of Quantitative Finance & Accounting 11 (2):111–37. doi:10.1023/A:1008295500105.
  • Bohme, R., and T. Holz. 2006. The effect of stock spam on financial markets. SSRN Electronic Journal. doi:10.2139/ssrn.897431.
  • Bolster, P., C. H. Pantalone, and E. A. Trahan. 2010. Security breaches and firm value. Journal of Business Valuation and Economic Loss Analysis 5 (1). doi:10.2202/1932-9156.1081.
  • Bose, I., and A. C. Leung 2008. Assessment of phishing announcements on market value of firms. In 2008 International Conference on Information Technology (IEEE), Bhubaneswar, India, 304–07.
  • Bose, I., and A. C. M. Leung. 2014. Do phishing alerts impact global corporations? A firm value analysis. Decision Support Systems 64:67–78. doi:10.1016/j.dss.2014.04.006.
  • Boudoukh, J., R. Feldman, S. Kogan, and M. Richardson. 2018. Information, trading, and volatility: Evidence from firm-specific news. The Review of Financial Studies 32 (3):992–1033. doi:10.1093/rfs/hhy083.
  • Breach Level Index (BLI). 2018. https://breachlevelindex.com.
  • Burges, A., L. Epelde, and C. Garbisu. 2015. Impact of repeated single-metal and multi-metal pollution events on soil quality. Chemosphere 120:8–15. doi:10.1016/j.chemosphere.2014.05.037.
  • Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou. 2003. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11 (3):431–48. doi:10.3233/JCS-2003-11308.
  • Campbell, J. Y., A. W. Lo, and A. C. MacKinlay. 1997. The econometrics of financial markets. Princeton: Princeton University Press.
  • Cavusoglu, H., B. Mishra, and S. Raghunathan. 2004. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce 9 (1):70–104. doi:10.1080/10864415.2004.11044320.
  • CERT-In. 2022. INDIA RANSOMWARE REPORT. https://www.cert.in.org.in/PDF/RANSOMWARE_Report_2022.pdf.
  • Chan, K., G. Kleinman, and P. Lee. 2009. The impact of Sarbanes‐Oxley on internal control remediation. International Journal of Accounting & Information Management 17 (1):53–65. doi:10.1108/18347640910967735.
  • Chattopadhyay, S., and R. Dasgupta. 2015. Demographic and socioeconomic impact on risk attitudes of the Indian investors-an empirical study. Asian Economic and Financial Review 5 (4):601–23. doi:10.18488/journal.aefr/2015.5.4/102.4.601.623.
  • Chen, B., H. He, and J. Guo. 2008. Constructing maximum entropy language models for movie review subjectivity analysis. Journal of Computer Science and Technology 23 (2):231–39. doi:10.1007/s11390-008-9125-z.
  • Chen, J. V., H. C. Li, D. C. Yen, and K. V. Bata. 2012. Did it consulting firms gain when their clients were breached? Computers in Human Behavior 28 (2):456–64. doi:10.1016/j.chb.2011.10.017.
  • Choo, K. K. R. 2011. Cyber threat landscape faced by financial and insurance industry. Trends & Issues in Crime & Criminal Justice 408:1–6.
  • Comparitech. 2018. https://www.comparitech.com/blog/information-security/data-breach-share-price-2018/#NASDAQ_benchmark_validation.
  • Coombs, W. T. 2014. Ongoing crisis communication: Planning, managing, and responding: Planning, managing, and responding. Los Angeles, USA: Sage Publications.
  • The Council of Economic Advisers (CEA) Report. 2018. The economic costs of malicious cyber activity on the U.S. economy. https://www.whitehouse.gov/wpcontent/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-theU.S.Economy.pdf.
  • Das, S., A. Mukhopadhyay, and M. Anand. 2012. Stock market response to information security breach: A study using firm and attack characteristics. Journal of Information Privacy and Security 8 (4):27–55. doi:10.1080/15536548.2012.10845665.
  • Davidsen, M., and J. Krogstie. 2010. Information systems evolution over the last 15 years. In International Conference on Advanced Information Systems Engineering (pp. 296–301). Springer, Berlin, Heidelberg.
  • Dehning, B., V. J. Richardson, and T. Stratopoulos. 2003. Reviewing event studies in MIS: An application of the firm value. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003. doi:10.1109/HICSS.2003.1174633.
  • Deloitte. 2016. Cyber security: The changing role of the board and the audit committee. Deloitte Touche Tohmatsu Limited.
  • Dong, K., R. Lin, X. Yin, and Z. Xie. 2021. How does overconfidence affect information security investment and information security performance? Enterprise Information Systems 15 (4):474–91. doi:10.1080/17517575.2019.1644672.
  • Dos Santos, B. L., K. Peffers, and D. C. Mauer. 1993. The impact of information technology investment announcements on the market value of the firm. Information Systems Research 4 (1):1–23. doi:10.1287/isre.4.1.1.
  • Dutta, K., U. Venkatesh, H. G. Parsa, and V. Jauhari. 2007. Service failure and recovery strategies in the restaurant sector: An Indo‐US comparative study. International Journal of Contemporary Hospitality Management 19 (5):351–63. doi:10.1108/09596110710757526.
  • Ebrahimi, S., and K. Eshghi. 2022. A meta-analysis of the factors influencing the impact of security breach announcements on stock returns of firms. Electronic Markets 32 (4):1–24. doi:10.1007/s12525-022-00550-2.
  • The Economic Times. 2016. https://economictimes.indiatimes.com/small-biz/security-tech/security/the-worst-cyber-attacks-of-2016/articleshow/56212448.cms.
  • Engelberg, J., R. D. McLean, and J. Pontiff. 2018. Anomalies and news. The Journal of Finance 73 (5):1971–2001. doi:10.1111/jofi.12718.
  • Ettredge, M. L., and V. J. Richardson. 2003. Information transfer among internet firms: The case of hacker attacks’. Journal of Information Systems 17 (2):71–82. doi:10.2308/jis.2003.17.2.71.
  • Fama, E. F., L. Fisher, M. C. Jensen, and R. Roll. 1969. The adjustment of stock prices to new information. International economic review 10 (1):1–21. doi:10.2307/2525569.
  • Fama, E. F., and K. R. French. 1993. Common risk factors in the returns onstocks and bonds. Journal of Financial Economics 33 (1):3–56. doi:10.1016/0304-405X(93)90023-5.
  • FICCI. 2022. https://beta.ficci.in/publication.asp?spid=23775.
  • Foecking, N., M. Wang, and T. L. D. Huynh. 2021. How do investors react to the data breaches news? Empirical evidence from Facebook Inc. During the years 2016–2019. Technology in Society 67:101717. doi:10.1016/j.techsoc.2021.101717.
  • Fornell, C., S. Mithas, F. V. Morgeson III, and M. S. Krishnan. 2006. Customer satisfaction and stock prices: High returns, low risk. Journal of Marketing 70 (1):3–14. doi:10.1509/jmkg.70.1.003.qxd.
  • Galloucis, M. 1995. The psychological impact of repeated indirect exposure to trauma: An investigation of the role of perceived social support and hardiness as moderators of disruption in cognitive schemata among a sample of paramedics, Doctoral dissertation, ProQuest Information & Learning.
  • Gatzlaff, K. M., and K. A. McCullough. 2010. The effect of data breaches on shareholder wealth. Risk Management and Insurance Review 13 (1):61–83. doi:10.1111/j.1540-6296.2010.01178.x.
  • Genusa, A. 2001. Conspiracy of silence. CIO 14:92–96.
  • George, T. 2016. Cyber security oversight: Why it belongs in the board room. Vol. 2016. Security Week.
  • Ghose, A., and P. G. Ipeirotis. 2006. Designing ranking systems for consumer reviews: The impact of review subjectivity on product sales and review quality. In Proceedings of the 16th annual workshop on information technology and systems, Las Vegas, Nevada, USA, 303–10.
  • Goel, S., and H. A. Shawky. 2009. Estimating the market impact of security breach announcements on firm values. Information and Management 46 (7):404–10. doi:10.1016/j.im.2009.06.005.
  • Goode, S., H. Hoehle, V. Venkatesh, and S. A. Brown. 2017. User compensation as a data breach recovery action: An investigation of the Sony PlayStation Network breach. MIS Quarterly 41 (3):703–A16. doi:10.25300/MISQ/2017/41.3.03.
  • Gordon, L. A., M. P. Loeb, and T. Sohail. 2010. Market value of voluntary disclosures concerning information security. MIS quarterly 34 (3):567–94. doi:10.2307/25750692.
  • Gordon, L. A., M. P. Loeb, and L. Zhou. 2011. The impact of information security breaches: Has there been a downward shift in costs? Journal of Computer Security 19 (1):33–56. doi:10.3233/JCS-2009-0398.
  • Hinz, O., M. Nofer, D. Schiereck, and J. Trillig. 2015. The influence of data theft on the share prices and systematic risk of consumer electronics companies. Information & Management 52 (3):337–47. doi:10.1016/j.im.2014.12.006.
  • HIPAA Journal. 2018. https://www.hipaajournal.com/largest-healthcare-data-breaches-of-2018/
  • Hovav, A., and J. D’Arcy. 2003. The impact of denial-of-service attack announcements on the market value of firms. Risk Management and Insurance Review 6 (2):97–121. doi:10.1046/J.1098-1616.2003.026.x.
  • Hovav, A., and J. D’Arcy. 2004. The impact of virus attack announcements on the market value of firms. Information Systems Security 13 (3):32–40. doi:10.1201/1086/44530.13.3.20040701/83067.5.
  • Hovav, A., and J. D’Arcy. 2005. Capital market reaction to defective it products: The case of computer viruses. Computers & Security 24 (5):409–24. doi:10.1016/j.cose.2005.02.003.
  • Hovav, A., J. Han, and J. Kim. 2017. Market reaction to security breach announcements: Evidence from South Korea. ACM SIGMIS Database: The DATABASE for Advances in Information Systems 48 (1):11–52. doi:10.1145/3051473.3051476.
  • Hovav, A., J. Han, and S. Kim. 2010. The impact of security breach announcements on the market value of companies in South Korea. South Korea: Korea University Conference.
  • Hulme, G. V. 2015. Top executives and cybersecurity: A fickle relationship? Vol. 2016. CSO
  • Internet Security Threat Report (ISTR) Symantec. 2017. https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf.
  • Ishiguro, M., H. Tanaka, K. Matsuura, and I. Murase. 2006. The effect of information security incidents on corporate values in the Japanese stock market. In International Workshop on the Economics of Securing the Information Infrastructure (WESII). https://www.ieee-security.org/Calendar/cfps/cfp-WESII06.html.
  • Jayakumar, T. 2016. Behavioral lessons from Flipkart’s big-billion day sale. Competitiveness Review 26 (4):453–75. doi:10.1108/CR-03-2015-0019.
  • Joosten, R., and L. J. Nieuwenhuis. 2017. Analysing the impact of a DDoS attack announcement on victim stock prices’. In 25th Euromicro International Conference on Parallel Distributed and Network-based Processing (PDP), Naples, Italy, 354–62. IEEE.
  • Kamat, P., and A. S. Gautam. 2018. Recent trends in the Era of Cybercrime and the measures to control them. In Handbook of e-business security, ed. R. S. T. João Manuel, K. M. Brojo, R. Kumar, N. Zaman, and M. Khari, 243–58. Boca Raton, USA: Auerbach Publication.
  • Kannan, K., J. Rees, and S. Sridhar. 2007. Market reactions to information security breach announcements: An empirical analysis. International Journal of Electronic Commerce 12 (1):69–91. doi:10.2753/JEC1086-4415120103.
  • Kedrosky, P. 2000. Hackers prey on our insecurities. The Wall Street Journal. https://www.wsj.com/articles/SB95013541371209859.
  • Kogan, S., and V. Meursault. 2021. Corporate disclosure: Facts or opinions? SSRN Electronic Journal. doi:10.2139/ssrn.3963260.
  • Kothari, S. P., and J. B. Warner. 2006. Econometrics of event studies. In Handbook of corporate finance: Empirical corporate finance, ed. B. Espen Eckbo, 5–32. Amsterdam, Netherlands: Elsevier/North.
  • Kvochko, E., and R. Pant. 2015. Why data breaches don’t hurt stock prices. Harvard Business Review.
  • Liu, B. 2010. Sentiment analysis and subjectivity. Handbook of Natural Language Processing 2 (2010):627–66.
  • Liu, B., and L. Zhang. 2012. A survey of opinion mining and sentiment analysis. In Mining text data, ed. C. C. Aggarwal and C. Zhai, 415–63. Boston, MA: Springer.
  • Loughran, T., and B. McDonald. 2011. When is a liability not a liability? Textual analysis, dictionaries, and 10‐Ks. The Journal of Finance 66 (1):35–65. doi:10.1111/j.1540-6261.2010.01625.x.
  • Luo, X. 2007. Consumer negative voice and firm-idiosyncratic stock returns. Journal of Marketing 71 (3):75–88. doi:10.1509/jmkg.71.3.075.
  • MacKinlay, C. 1997. Event studies in economics and finance. Journal of Economic Literature 35 (1):13–39.
  • Martens, M., R. De Wolf, and L. De Marez. 2019. Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior 92:139–50. doi:10.1016/j.chb.2018.11.002.
  • Masuch, K., M. Greve, and S. Trang. 2021. What to do after a data breach? Examining apology and compensation as response strategies for health service providers. Electronic Markets 31 (4):829–48. doi:10.1007/s12525-021-00490-3.
  • McWilliams, A., and D. Siegel. 1997. Event studies in management research: Theoretical and empirical issues. Academy of Management Journal 40 (3):626–57. doi:10.2307/257056.
  • Mehta, A., G. Young, A. Wicker, S. Barber, and G. Suri. 2017. Emotion regulation choice: Differences in US and Indian populations. The International Journal of Indian Psychology 4 (2):202–19. doi:10.25215/0402.160.
  • Memdani, L., and G. Shenoy. 2019. Impact of terrorism on stock markets across the world and stock returns: An event study of taj attack in India. Journal of Financial Crime 26 (3):793–807. doi:10.1108/JFC-09-2018-0093.
  • Milne, G. R. 2003. How well do consumers protect themselves from identity theft? Journal of Consumer Affairs 37 (2):388–402. doi:10.1111/j.1745-6606.2003.tb00459.x.
  • Mishra, M., and S. Mishra. 2016. Financial risk tolerance among Indian investors: A multiple discriminant modeling of determinants. Strategic Change 25 (5):485–500. doi:10.1002/jsc.2075.
  • Moberly, N. J., and E. R. Watkins. 2008. Ruminative self-focus, negative life events, and negative affect. Behaviour Research and Therapy 46 (9):1034–39. doi:10.1016/j.brat.2008.06.004.
  • Modi, S. B., M. A. Wiles, and S. Mishra. 2015. Shareholder value implications of service failures in triads: The case of customer information security breaches. Journal of Operations Management 35 (1):21–39. doi:10.1016/j.jom.2014.10.003.
  • Morse, E. A., V. Raval, and J. R. Wingender Jr. 2011. Market price effects of data security breaches. Information Security Journal: A Global Perspective 20 (6):263–73. doi:10.1080/19393555.2011.611860.
  • Mućko, P. 2021. Sentiment analysis of CSR disclosures in annual reports of EU companies. Procedia Computer Science 192:3351–59. doi:10.1016/j.procs.2021.09.108.
  • Neuhierl, A., A. Scherbina, and B. Schlusche. 2013. Market reaction to corporate press releases. Journal of Financial and Quantitative Analysis 48 (4):1207–40. doi:10.1017/S002210901300046X.
  • Numata, S., and F. Takeda. 2010. Stock market reactions to audit failure in Japan: The case of Kanebo and ChuoAoyama. The International Journal of Accounting 45 (2):175–99. doi:10.1016/j.intacc.2010.04.004.
  • Pirounias, S., D. Mermigas, and C. Patsakis. 2014. The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. Journal of Information Security and Applications 19 (4–5):257–71. doi:10.1016/j.jisa.2014.07.001.
  • Ponemon Institute. 2015. 2015 cost of data breach study: Global analysis. Traverse City, Michigan, USA: Ponemon Institute LLC.
  • Riloff, E., S. Patwardhan, and J. Wiebe. 2006. Feature subsumption for opinion analysis. In Proceedings of the 2006 conference on empirical methods in natural language processing. https://aclanthology.org/W06-1600.pdf.
  • Rosati, P., P. Deeney, M. Cummins, L. Van der Werff, and T. Lynn. 2018. Should you disclose a data breach via Social Media? Evidence from US listed companies. In Proceedings of 51st Hawaii International Conference on System Sciences, Hilton Waikoloa Village, Hawaii, USA.
  • Rosati, P., P. Deeney, M. Cummins, L. Van der Werff, and T. Lynn. 2019. Social media and stock price reaction to data breach announcements: Evidence from US listed companies. Research in International Business and Finance 47:458–69. doi:10.1016/j.ribaf.2018.09.007.
  • Roztocki, N., and H. R. Weistroffer. 2009. Stock market reaction to information technology investments: Towards an explanatory model. In Proceedings of 17th European Conference on Information Systems, Verona.
  • Roztocki, N., and H. R. Weistroffer. 2015. Information and communication technology in transition economies: An assessment of research trends. Information Technology for Development 21 (3):330–64. doi:10.1080/02681102.2014.891498.
  • Schatz, D., and R. Bashroush. 2016. The impact of repeated data breach events on organisations’ market value. Information & Computer Security 24 (1):73–92. doi:10.1108/ICS-03-2014-0020.
  • Schlackl, F., N. Link, and H. Hoehle. 2022. Antecedents and consequences of data breaches: A systematic review. Information & Management 59 (4):103638. doi:10.1016/j.im.2022.103638.
  • Shapiro, S. S., and M. B. Wilk. 1965. An analysis of variance test for normality (complete samples). Biometrika 52 (3/4):591–611. doi:10.1093/biomet/52.3-4.591.
  • Song, Z., G. A. Wang, and W. Fan. 2017. Firm actions toward data breach incidents and firm equity value: An empirical study. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, Hawaii, USA.
  • Spanos, G., and L. Angelis. 2016. The impact of information security events to the stock market: A systematic literature review. Computers & Security 58:216–29. doi:10.1016/j.cose.2015.12.006.
  • Subramani, M., and E. Walden. 2001. The impact of e-commerce announcements on the market value of firms. Information Systems Research 12 (2):135–54. doi:10.1287/isre.12.2.135.9698.
  • Sudhir, K., J. Priester, M. Shum, D. Atkin, A. Foster, and G. Iyer, …, W. Wood. 2015. Research opportunities in emerging markets: An inter-disciplinary perspective from marketing, economics, and psychology. Customer Needs and Solutions 2 (4):264–76. doi:10.1007/s40547-015-0044-1.
  • Sun, W., M. Pan, and Q. Ye. 2011. Comparative study on objective and subjective emotional tendencies of online reviews from different sources. In 2011 International Conference on Internet Technology and Applications, Wuhan, China, 1–4. IEEE.
  • Tayaksi, C., E. Ada, Y. Kazancoglu, and M. Sagnak. 2022. The financial impacts of information systems security breaches on publicly traded companies: Reactions of different sectors. Journal of Enterprise Information Management 35 (2):650–68. doi:10.1108/JEIM-11-2020-0450.
  • Telang, R., and S. Wattal. 2007. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering 33 (8):544–57. doi:10.1109/TSE.2007.70712.
  • Tripathi, M., and A. Mukhopadhyay. 2020. Financial loss due to a data privacy breach: An empirical analysis. Journal of Organizational Computing and Electronic Commerce 30 (4):381–400. doi:10.1080/10919392.2020.1818521.
  • Tsytsarau, M., and T. Palpanas. 2012. Survey on mining subjective data on the web. Data Mining and Knowledge Discovery 24 (3):478–514. doi:10.1007/s10618-011-0238-6.
  • USA Today. 2014. https://www.usatoday.com/story/tech/2014/10/02/jp-morgan-security-breach/16590689/
  • Verizon. 2015. 2015 data breach investigations report. Verizon Enterprise Solutions.
  • Wang, T., J. R. Ulmer, and K. Kannan. 2013. The textual contents of media reports of information security breaches and profitable short-term investment opportunities. Journal of Organizational Computing and Electronic Commerce 23 (3):200–23. doi:10.1080/10919392.2013.807712.
  • Washington, K. D. 2016. The impact of data breaches on market value of firms in the E-Commerce marketplace, Doctoral dissertation, Capella University.
  • The Washington Post. 2013. https://www.washingtonpost.com/news/worldviews/wp/2013/04/23/syrian-hackers-claim-aphack-that-tipped-stock-market-by-136-billion-is-it-terrorism/.
  • Yayla, A. A., and Q. Hu. 2011. The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology 26 (1):60–77. doi:10.1057/jit.2010.4.
  • Zuo, Y. 2023. Big data and big risk: A four-factor framework for big data security and privacy. International Journal of Business Information Systems 42 (2):224–42. doi:10.1504/IJBIS.2023.128648.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.