This HTML5 document contains 38 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n9https://kar.kent.ac.uk/id/eprint/80445#
n19doi:10.5220/
n2https://kar.kent.ac.uk/id/eprint/
n16https://kar.kent.ac.uk/80445/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n4http://purl.org/ontology/bibo/status/
n21https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n20https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n10http://eprints.org/ontology/
n5https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n17https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n7https://kar.kent.ac.uk/id/
n11https://kar.kent.ac.uk/id/document/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n8https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:80445
rdf:type
bibo:AcademicArticle bibo:Article n10:ConferenceItemEPrint n10:EPrint
rdfs:seeAlso
n16:
owl:sameAs
n19:0008956004480456
n10:hasAccepted
n11:3203929
n10:hasDocument
n11:3203929 n11:3203934 n11:3203970 n11:3203971 n11:3203972 n11:3203973 n11:3205600 n11:3205601 n11:3205602 n11:3205603 n11:3205604 n11:3205605
n10:hasPublished
n11:3205600
dc:hasVersion
n11:3205600 n11:3203929
dcterms:title
Using Eyetracker to Find Ways to Mitigate Ransomware
wdrs:describedby
n13:export_kar_RDFN3.n3 n20:export_kar_RDFN3.n3
dcterms:date
2020
dcterms:creator
n8:ext-b.arief@kent.ac.uk n8:ext-ed5cf099a8ed4b05c49e9b7c02b41081 n8:ext-2380e4f532b6aef0fd3fc9fa5dd16898 n8:ext-j.c.hernandez-castro@kent.ac.uk
bibo:status
n4:peerReviewed n4:published
dcterms:publisher
n17:ext-d4616a3cbc02e0182b497ddce19bf52c
bibo:abstract
Ransomware is a form of malware designed to prevent access to data by either locking out the victims from their system or encrypting some or all of their files until a ransom has been paid to the attacker. Victims would know that they had been hit by ransomware because a ransom demand (splash screen) would be displayed on their compromised device. This study aims to identify key user interface features of ransomware splash screens and see how these features affect victims’ likelihood to pay, and how this information may be used to create more effective countermeasures to mitigate the threat of ransomware. We devised an experiment that contained three broad types of splash screens (Text, Time-Sensitive Counter, and Other). A total of nine splash screens were shown to each participant, from which data on the participants’ eye behaviour were collected. After each splash screen, participants were also asked a set of questions that would help describe their experience and be cross-referenced with the eye tracking data to aid analysis. Our experiment collected quantitative eye tracker data and qualitative data regarding willingness to pay from 25 participants. Several key components of the splash screens such as the text, logo, images, and technical information were analysed. Comments from the participants on whether they would pay the ransom or not, and the reasons behind their decision were also recorded. We found that there is no clear indication that one type of splash screen would have a higher chance of success with regard to ransom payment. Our study revealed that there are some characteristics in splash screens that would strongly discourage some victims from paying. Further investigation will be carried out in this direction, in order to design and develop more effective countermeasures to ransomware.
dcterms:isPartOf
n7:repository
dcterms:subject
n21:QA75
bibo:authorList
n9:authors
bibo:presentedAt
n5:ext-026afa83fb1e50215d5fe0142380cf4f