2023
DOI: 10.3390/socsci12050265
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Reporting on Ransomware Incidents: A Case Study

Abstract: Knowledge about ransomware is important for protecting sensitive data and for participating in public debates about suitable regulation regarding its security. However, as of now, this topic has received little to no attention in most school curricula. As such, it is desirable to analyze what citizens can learn about this topic outside of formal education, e.g., from news articles. This analysis is both relevant to analyzing the public discourse about ransomware, as well as to identify what aspects of this top… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The graphical analysis of the correspondence analysis results makes the most sense. The 2D plot of column coordinates (Figures [10][11][12][13][14] shows the percentage of total inertia explained by the corresponding eigenvalue. The horizontal axis in the 2D plane corresponds to the maximum inertia.…”
Section: Graphical Analysis Of Correspondence Analysis Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The graphical analysis of the correspondence analysis results makes the most sense. The 2D plot of column coordinates (Figures [10][11][12][13][14] shows the percentage of total inertia explained by the corresponding eigenvalue. The horizontal axis in the 2D plane corresponds to the maximum inertia.…”
Section: Graphical Analysis Of Correspondence Analysis Resultsmentioning
confidence: 99%
“…With the widespread adoption of this technology, cybercriminals use forged identities or stolen credit cards to take advantage of free offers to mine cryptocurrencies provided by cloud service providers [13]. Cybercrimes, particularly hacking and ransomware, are associated with cryptocurrencies [14][15][16]. This further complicates the investigation of such crimes, as there is currently no legislation regarding the seizure of virtual assets.…”
Section: Introductionmentioning
confidence: 99%
“…Contradictorily, the virus spreads by attaching itself to files on the host, and user interaction is required to function. Malware harms the targeted system in different ways to break the framework of IT security CIA (confidentiality, integrity, and availability) [10]. Some malware, such as keyloggers, leads to the leakage of sensitive information which compromises the confidentiality term, while worms can affect the availability of the system.…”
Section: Introductionmentioning
confidence: 99%