Table 1.

Previous empirical studies of ransomware attacks on organizations

AuthorsCountryMethodSampleMain findings
Choi et al. [15]USAQuantitative analysis of secondary data13 reported attacks on police departments from 2013 to 2016Online lifestyle and cybersecurity stance contribute to ransomware victimization
Zhao et al. [16]USAMixed methods case study: questionnaire and interviewsMedical students and surgeons in a hospital that experienced a SamSam ransomware attack (29 survey respondents; 8 interviewees)Students who are ‘digital natives’ were seriously stressed by lack of access to electronic resources and were not well adapted to adjust to paper-based workflows
Zhang-Kennedy et al. [17]USAMixed methods case study: questionnaire and interviewsStaff and students in a large university that experienced a ransomware attack at a critical time (150 survey respondents; 30 interviewees)It took several days to recover basic services and the after-effects on user productivity were felt for a considerable time afterward. Substantial data loss and emotional effects on staff.
Hull et al. [18]UKMixed methods: questionnaire and interviews46 questionnaire respondents and 8 interviews (university staff, students and SMEs)Universities are more likely to be attacked than SMEs; ransomware victims only had basic defences in place
Shinde et al. [19]The NetherlandsMixed methods: questionnaire and interviewsSnowball sample of 23 individuals and 2 semi-structured interviewsMost ransomware attacks use an untargeted ‘shotgun’ approach; security awareness among victims was low
Ioanid et al. [20]RomaniaQuestionnaireSurvey of 123 SMEsOrganization size and turnover is positively correlated with number of attacks; manager education is key prevention factor
Byrne and Thorpe [21]IrelandBrief interviewsThree organizations that had suffered attacksE-mail filtering software had been removed because of the overhead it was placing on IT departments; in the wake of attacks, security training and awareness programmes were ramped up.
Riglietti [22]Not statedContent analysis of discussions301 posts extracted from four online security blogsContent analysis technique can increase our understanding of security challenges within organizations
AuthorsCountryMethodSampleMain findings
Choi et al. [15]USAQuantitative analysis of secondary data13 reported attacks on police departments from 2013 to 2016Online lifestyle and cybersecurity stance contribute to ransomware victimization
Zhao et al. [16]USAMixed methods case study: questionnaire and interviewsMedical students and surgeons in a hospital that experienced a SamSam ransomware attack (29 survey respondents; 8 interviewees)Students who are ‘digital natives’ were seriously stressed by lack of access to electronic resources and were not well adapted to adjust to paper-based workflows
Zhang-Kennedy et al. [17]USAMixed methods case study: questionnaire and interviewsStaff and students in a large university that experienced a ransomware attack at a critical time (150 survey respondents; 30 interviewees)It took several days to recover basic services and the after-effects on user productivity were felt for a considerable time afterward. Substantial data loss and emotional effects on staff.
Hull et al. [18]UKMixed methods: questionnaire and interviews46 questionnaire respondents and 8 interviews (university staff, students and SMEs)Universities are more likely to be attacked than SMEs; ransomware victims only had basic defences in place
Shinde et al. [19]The NetherlandsMixed methods: questionnaire and interviewsSnowball sample of 23 individuals and 2 semi-structured interviewsMost ransomware attacks use an untargeted ‘shotgun’ approach; security awareness among victims was low
Ioanid et al. [20]RomaniaQuestionnaireSurvey of 123 SMEsOrganization size and turnover is positively correlated with number of attacks; manager education is key prevention factor
Byrne and Thorpe [21]IrelandBrief interviewsThree organizations that had suffered attacksE-mail filtering software had been removed because of the overhead it was placing on IT departments; in the wake of attacks, security training and awareness programmes were ramped up.
Riglietti [22]Not statedContent analysis of discussions301 posts extracted from four online security blogsContent analysis technique can increase our understanding of security challenges within organizations
Table 1.

Previous empirical studies of ransomware attacks on organizations

AuthorsCountryMethodSampleMain findings
Choi et al. [15]USAQuantitative analysis of secondary data13 reported attacks on police departments from 2013 to 2016Online lifestyle and cybersecurity stance contribute to ransomware victimization
Zhao et al. [16]USAMixed methods case study: questionnaire and interviewsMedical students and surgeons in a hospital that experienced a SamSam ransomware attack (29 survey respondents; 8 interviewees)Students who are ‘digital natives’ were seriously stressed by lack of access to electronic resources and were not well adapted to adjust to paper-based workflows
Zhang-Kennedy et al. [17]USAMixed methods case study: questionnaire and interviewsStaff and students in a large university that experienced a ransomware attack at a critical time (150 survey respondents; 30 interviewees)It took several days to recover basic services and the after-effects on user productivity were felt for a considerable time afterward. Substantial data loss and emotional effects on staff.
Hull et al. [18]UKMixed methods: questionnaire and interviews46 questionnaire respondents and 8 interviews (university staff, students and SMEs)Universities are more likely to be attacked than SMEs; ransomware victims only had basic defences in place
Shinde et al. [19]The NetherlandsMixed methods: questionnaire and interviewsSnowball sample of 23 individuals and 2 semi-structured interviewsMost ransomware attacks use an untargeted ‘shotgun’ approach; security awareness among victims was low
Ioanid et al. [20]RomaniaQuestionnaireSurvey of 123 SMEsOrganization size and turnover is positively correlated with number of attacks; manager education is key prevention factor
Byrne and Thorpe [21]IrelandBrief interviewsThree organizations that had suffered attacksE-mail filtering software had been removed because of the overhead it was placing on IT departments; in the wake of attacks, security training and awareness programmes were ramped up.
Riglietti [22]Not statedContent analysis of discussions301 posts extracted from four online security blogsContent analysis technique can increase our understanding of security challenges within organizations
AuthorsCountryMethodSampleMain findings
Choi et al. [15]USAQuantitative analysis of secondary data13 reported attacks on police departments from 2013 to 2016Online lifestyle and cybersecurity stance contribute to ransomware victimization
Zhao et al. [16]USAMixed methods case study: questionnaire and interviewsMedical students and surgeons in a hospital that experienced a SamSam ransomware attack (29 survey respondents; 8 interviewees)Students who are ‘digital natives’ were seriously stressed by lack of access to electronic resources and were not well adapted to adjust to paper-based workflows
Zhang-Kennedy et al. [17]USAMixed methods case study: questionnaire and interviewsStaff and students in a large university that experienced a ransomware attack at a critical time (150 survey respondents; 30 interviewees)It took several days to recover basic services and the after-effects on user productivity were felt for a considerable time afterward. Substantial data loss and emotional effects on staff.
Hull et al. [18]UKMixed methods: questionnaire and interviews46 questionnaire respondents and 8 interviews (university staff, students and SMEs)Universities are more likely to be attacked than SMEs; ransomware victims only had basic defences in place
Shinde et al. [19]The NetherlandsMixed methods: questionnaire and interviewsSnowball sample of 23 individuals and 2 semi-structured interviewsMost ransomware attacks use an untargeted ‘shotgun’ approach; security awareness among victims was low
Ioanid et al. [20]RomaniaQuestionnaireSurvey of 123 SMEsOrganization size and turnover is positively correlated with number of attacks; manager education is key prevention factor
Byrne and Thorpe [21]IrelandBrief interviewsThree organizations that had suffered attacksE-mail filtering software had been removed because of the overhead it was placing on IT departments; in the wake of attacks, security training and awareness programmes were ramped up.
Riglietti [22]Not statedContent analysis of discussions301 posts extracted from four online security blogsContent analysis technique can increase our understanding of security challenges within organizations
Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close