2023
DOI: 10.1016/j.cose.2023.103099
|View full text |Cite
|
Sign up to set email alerts
|

Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…Organizations equipped with resilient backup systems and recovery protocols can potentially negate the financial incentives for attackers to prolong the attack duration. Additionally, this correlation highlights the economic motivations behind ransomware attacks [72]. Attackers aim to maximize their financial gains by prolonging the disruption, leading to increased pressure on victims to comply with their demands.…”
Section: MImentioning
confidence: 91%
See 3 more Smart Citations
“…Organizations equipped with resilient backup systems and recovery protocols can potentially negate the financial incentives for attackers to prolong the attack duration. Additionally, this correlation highlights the economic motivations behind ransomware attacks [72]. Attackers aim to maximize their financial gains by prolonging the disruption, leading to increased pressure on victims to comply with their demands.…”
Section: MImentioning
confidence: 91%
“…Consequently, this unpredictability necessitates a more dynamic and adaptive approach to ransomware defense and response. For cybersecurity practitioners and organizations, this implies a need for comprehensive risk assessments and scenario planning rather than relying on fixed protocols [71], [72]. Understanding that ransomware attackers might adjust their demands according to the perceived value or potential damages underscores the need for robust backup and recovery mechanisms, cybersecurity hygiene practices, and proactive security measures.…”
Section: A Limitations and Future Research Directionsmentioning
confidence: 99%
See 2 more Smart Citations
“…While most businesses fall under small and medium enterprises (Osborn, 2015), many SMEs face constraints regarding cybersecurity resources and tools, often failing to implement proactive security measures (Bekkers et al, 2023). Consequently, this vulnerability makes SMEs attractive targets for hackers (Hayes & Bodhani, 2013).…”
Section: Cybersecurity In Small and Medium Enterprises/public Sectormentioning
confidence: 99%