This HTML5 document contains 39 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
n17https://kar.kent.ac.uk/id/eprint/92301#
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n10http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n15https://kar.kent.ac.uk/id/subject/
n19https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n3http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n11https://kar.kent.ac.uk/id/publication/
n18https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n21https://kar.kent.ac.uk/92301/
n14doi:10.1016/
owlhttp://www.w3.org/2002/07/owl#
n4https://kar.kent.ac.uk/id/document/
n16https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n6https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n8https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:92301
rdf:type
bibo:Article bibo:AcademicArticle n3:EPrint n3:ArticleEPrint
rdfs:seeAlso
n21:
owl:sameAs
n14:j.jisa.2021.102934
n3:hasAccepted
n4:3258044
n3:hasDocument
n4:3258044 n4:3258047 n4:3258048 n4:3258049 n4:3258050 n4:3258051 n4:3258226 n4:3258227 n4:3258228 n4:3258229 n4:3258230 n4:3258231
n3:hasPublished
n4:3258226
dc:hasVersion
n4:3258226 n4:3258044
dcterms:title
Investigating the Impact of Ransomware Splash Screens
wdrs:describedby
n6:export_kar_RDFN3.n3 n19:export_kar_RDFN3.n3
dcterms:date
2021-09
dcterms:creator
n8:ext-yagizyilmaz@sabanciuniv.edu n8:ext-orcun.cetin@sabanciuniv.edu n8:ext-j.c.hernandez-castro@kent.ac.uk n8:ext-b.arief@kent.ac.uk
bibo:status
n10:peerReviewed n10:published
dcterms:publisher
n18:ext-f308aad1ef8f70546c3a197f104f2ad5
bibo:abstract
Ransomware is a type of malicious software that locks out its victim from accessing functionality or data on their device, typically by encrypting files. To regain access, victims would typically need to make a ransom payment. Victims get notified that their device has been infected through a ransom note (splash screen) displayed on their device. Ransomware splash screens can be presented in many ways; the most common ones are via a text file or a graphical user interface (GUI). Splash screens may also include additional features, such as a countdown timer, as part of the ransomware operator's ploy to encourage their victims to pay. The main aim of this study was to gain valuable insights into how ransomware splash screens might affect victims' responses. Moreover, the study also investigated whether exposure to different splash screens would encourage participants to adopt good security behaviours. A controlled experiment was conducted by randomly assigning 538 participants into one of the three ransomware infection scenarios based on the splash screen type (Text-based, GUI or GUI + Timer). After watching a demonstration of a ransomware scenario, each participant was asked to complete a survey regarding their post-infection behaviour and their cybersecurity habits. The study concluded that ransomware's user interface elements do not have a notable effect on how victims would react, in terms of their willingness to pay or their reporting rates. Additionally findings included that, even though 60% of the participants would like to report a ransomware incident, they were not sure how to do this. This illustrates the lack of public awareness about cybercrime reporting. Lack of trust was the main reason why participants did not want to click on links offering cybersecurity advice after the exposure. This shows that more effective methods for encouraging cybersecurity behaviour are still needed.
dcterms:isPartOf
n11:ext-22142126 n16:repository
dcterms:subject
n15:QA
bibo:authorList
n17:authors
bibo:volume
61