{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:05Z","timestamp":1767340145280,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030114060"},{"type":"electronic","value":"9783030114077"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11407-7_11","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T20:33:57Z","timestamp":1548362037000},"page":"149-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Preventing and Mitigating Ransomware"],"prefix":"10.1007","author":[{"given":"Zandile","family":"Manjezi","sequence":"first","affiliation":[]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-Rimy","year":"2018","unstructured":"Al-Rimy, B.A.S., Maarof, M.A., Mohd Shaid, S.Z.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144\u2013166 (2018). \n                  https:\/\/doi.org\/10.1016\/j.cose.2018.01.001","journal-title":"Comput. Secur."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.28945\/3707","volume":"14","author":"A Ali","year":"2017","unstructured":"Ali, A.: Ransomware: a research and a personal case study of dealing with this nasty Malware. J. Issues Inform. Sci. Inf. Technol. 14, 87\u201399 (2017). \n                  http:\/\/www.informingscience.org\/Publications\/3707","journal-title":"J. Issues Inform. Sci. Inf. Technol."},{"issue":"2","key":"11_CR3","first-page":"65","volume":"31","author":"J Allen","year":"2017","unstructured":"Allen, J.: Surviving ransomware. Am. J. Fam. Law 31(2), 65\u201368 (2017)","journal-title":"Am. J. Fam. Law"},{"issue":"4","key":"11_CR4","first-page":"26","volume":"37","author":"CM Alstin van","year":"2016","unstructured":"van Alstin, C.M.: Ransomware: it\u2019s as scary as it sounds. Health Manag. Technol. 37(4), 26\u201327 (2016)","journal-title":"Health Manag. Technol."},{"issue":"9","key":"11_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","volume":"2016","author":"R Brewer","year":"2016","unstructured":"Brewer, R.: Ransomware attacks: detection, prevention and cure. Netw. Secur. 2016(9), 5\u20139 (2016). \n                  https:\/\/doi.org\/10.1016\/S1353-4858(16)30086-1","journal-title":"Netw. Secur."},{"issue":"6","key":"11_CR6","first-page":"39","volume":"36","author":"ML Brody","year":"2017","unstructured":"Brody, M.L.: Protecting yourself from ransomware and should you become a victim, here\u2019s how to recover. Podiatry Manag. 36(6), 39\u201340 (2017)","journal-title":"Podiatry Manag."},{"issue":"6","key":"11_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2016.1600110NM","volume":"30","author":"K Cabaj","year":"2016","unstructured":"Cabaj, K., Mazurczyk, W.: Using software-defined networking for ransomware mitigation: the case of CryptoWall. IEEE Netw. 30(6), 14\u201320 (2016). \n                  https:\/\/doi.org\/10.1109\/MNET.2016.1600110NM","journal-title":"IEEE Netw."},{"issue":"5","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIFS.2017.2787905","volume":"13","author":"J Chen","year":"2018","unstructured":"Chen, J., et al.: Uncovering the face of Android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 13(5), 1289\u20131300 (2018). \n                  https:\/\/doi.org\/10.1109\/TIFS.2017.2787905\n                  \n                . \n                  http:\/\/ieeexplore.ieee.org","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"11_CR9","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s10207-017-0398-5","volume":"17","author":"Aniello Cimitile","year":"2017","unstructured":"Cimitile, A., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Talos: no more ransomware victims with formal methods. Int. J. Inf. Secur. (2017). \n                  https:\/\/doi.org\/10.1007\/s10207-017-0398-5","journal-title":"International Journal of Information Security"},{"issue":"10","key":"11_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1353-4858(16)30097-6","volume":"2016","author":"T Erridge","year":"2016","unstructured":"Erridge, T.: Ransomware: threat and response. Netw. Secur. 2016(10), 17\u201319 (2016). \n                  https:\/\/doi.org\/10.1016\/S1353-4858(16)30097-6","journal-title":"Netw. Secur."},{"issue":"4","key":"11_CR11","first-page":"70","volume":"43","author":"R Goldsborough","year":"2016","unstructured":"Goldsborough, R.: Protecting yourself from ransomware. Teacher Librarian 43(4), 70\u201371 (2016)","journal-title":"Teacher Librarian"},{"issue":"1","key":"11_CR12","first-page":"61","volume":"45","author":"R Goldsborough","year":"2017","unstructured":"Goldsborough, R.: The increasing threat of ransomware. Teacher Librarian 45(1), 61 (2017)","journal-title":"Teacher Librarian"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.cose.2017.11.019","volume":"73","author":"JA G\u00f3mez-Hern\u00e1ndez","year":"2018","unstructured":"G\u00f3mez-Hern\u00e1ndez, J.A., \u00c1lvarez-Gonz\u00e1lez, L., Garc\u00eda-Teodoro, P.: R-Locker: thwarting ransomware action through a honeyfile-based approach. Comput. Secur. 73, 389\u2013398 (2018). \n                  https:\/\/doi.org\/10.1016\/j.cose.2017.11.019","journal-title":"Comput. Secur."},{"issue":"8","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1353-4858(16)30072-1","volume":"2016","author":"S Gordon","year":"2016","unstructured":"Gordon, S.: Ransomware menace grows as new threats emerge. Netw. Secur. 2016(8), 1\u20132 (2016). \n                  https:\/\/doi.org\/10.1016\/S1353-4858(16)30072-1","journal-title":"Netw. Secur."},{"issue":"3","key":"11_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/S1353-4858(17)30030-2","volume":"2017","author":"A Green","year":"2017","unstructured":"Green, A.: Ransomware and the GDPR. Netw. Secur. 2017(3), 18\u201319 (2017). \n                  https:\/\/doi.org\/10.1016\/S1353-4858(17)30030-2","journal-title":"Netw. Secur."},{"issue":"4","key":"11_CR16","first-page":"57","volume":"6","author":"J Jones","year":"2017","unstructured":"Jones, J., Shashidhar, N.: Ransomware analysis and defense WannaCry and the Win32 environment. Int. J. Inf. Secur. Sci. 6(4), 57\u201369 (2017)","journal-title":"Int. J. Inf. Secur. Sci."},{"issue":"73","key":"11_CR17","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.1007\/s11227-016-1825-5","volume":"2017","author":"JK Lee","year":"2017","unstructured":"Lee, J.K., Moon, S.Y., Park, J.H.: CloudRPS: a cloud analysisbased enhancedransomware prevention system. J. Supercomput. 2017(73), 3065\u20133084 (2017). \n                  https:\/\/doi.org\/10.1007\/s11227-016-1825-5","journal-title":"J. Supercomput."},{"key":"11_CR18","unstructured":"Lee, S.y.: Guarding against ransomware. Internal Auditor 74(4), 13 (2017)"},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1080\/10658980701576412","volume":"16","author":"Xin Luo","year":"2007","unstructured":"Luo, X., Liao, Q.: Awareness education as the key to ransomware prevention. 16(4), 195\u2013202 (2007). \n                  https:\/\/doi.org\/10.1080\/10658980701576412","journal-title":"Information Systems Security"},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1353-4858(16)30031-9","volume":"2016","author":"S Mansfield-Devine","year":"2016","unstructured":"Mansfield-Devine, S.: Hospitals become major target for ransomware. Netw. Secur. 2016(4), 1\u20132 (2016). \n                  https:\/\/doi.org\/10.1016\/S1353-4858(16)30031-9","journal-title":"Netw. Secur."},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2016.08.072","volume":"94","author":"Monika","year":"2016","unstructured":"Monika, Zavarsky, P., Lindskog, D.: Experimental analysis of ransomware on windows and android platforms: evolution and characterization. In: Shakshuki, E. (ed.) The 2nd International Workshop on Future Information Security, Privacy & Forensics for Complex Systems, pp. 465\u2013472. Procedia Computer Science, Edmonton (2016). \n                  https:\/\/doi.org\/10.1016\/j.procs.2016.08.072","journal-title":"Procedia Computer Science"},{"issue":"11\u201312","key":"11_CR22","first-page":"37","volume":"13","author":"J Pope","year":"2016","unstructured":"Pope, J.: Ransomware: minimizing the risks. Innov. Clin. Neurosci. 13(11\u201312), 37\u201340 (2016)","journal-title":"Innov. Clin. Neurosci."},{"issue":"1","key":"11_CR23","first-page":"10","volume":"13","author":"R Richardson","year":"2017","unstructured":"Richardson, R., North, M.: Ransomware: evolution, mitigation and prevention. Int. Manag. Rev. 13(1), 10\u201321 (2017)","journal-title":"Int. Manag. Rev."},{"issue":"6","key":"11_CR24","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MPOT.2017.2737201","volume":"36","author":"N Scaife","year":"2017","unstructured":"Scaife, N., Traynor, P., Butler, K.: Making sense of the ransomware mess (and planning a sensible path forward). IEEE Potentials 36(6), 28\u201331 (2017). \n                  https:\/\/doi.org\/10.1109\/MPOT.2017.2737201","journal-title":"IEEE Potentials"},{"issue":"4","key":"11_CR25","first-page":"36","volume":"30","author":"J Sheffield","year":"2017","unstructured":"Sheffield, J.: Pirates of the PHI: identifying and responding to a ransomware attack according to HIPAA best practices. Benefits Law J. 30(4), 36\u201354 (2017)","journal-title":"Benefits Law J."},{"key":"11_CR26","unstructured":"Solander, A.C., Forman, A.S., Glasser, N.M.: Ransomware-give me back my files! Empl. Relat. Law J. 42(2), 53\u201355 (2016)"},{"issue":"6","key":"11_CR27","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.cose.2006.07.005","volume":"25","author":"R Solms von","year":"2006","unstructured":"von Solms, R., von Solms, S.H.: Information security governance: a model based on the direct-control cycle. Comput. Secur. 25(6), 408\u2013412 (2006). \n                  https:\/\/doi.org\/10.1016\/j.cose.2006.07.005","journal-title":"Comput. Secur."},{"issue":"11","key":"11_CR28","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1361-3723(17)30081-7","volume":"2017","author":"CR Srinivasan","year":"2017","unstructured":"Srinivasan, C.R.: Hobby hackers to billion-dollar industry: the evolution of ransomware. Comput. Fraud Secur. 2017(11), 7\u20139 (2017). \n                  https:\/\/doi.org\/10.1016\/S1361-3723(17)30081-7","journal-title":"Comput. Fraud Secur."},{"key":"11_CR29","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), xiii\u2013xxiii (2002). \n                  http:\/\/www.misq.org\/misreview\/announce.html"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.comnet.2017.09.003","volume":"129","author":"Ibrar Yaqoob","year":"2017","unstructured":"Yaqoob, I., Ahmed, E., ur Rehman, M.H., Ahmed, A.I.A., Al-Garadi, M.A., Imran, M., Guizani, M.: The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Netw. 129(Part 2), 444\u2013458 (2017). \n                  https:\/\/doi.org\/10.1016\/j.comnet.2017.09.003","journal-title":"Computer Networks"},{"issue":"9","key":"11_CR31","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1587\/transinf.2017EDL8052","volume":"100","author":"J Yun","year":"2017","unstructured":"Yun, J., Hur, J., Shin, Y., Koo, D.: CLDSafe: an efficient file backup system in cloud storage against ransomware. IEICE Trans. Inf. Syst. 100(9), 2228\u20132231 (2017). \n                  https:\/\/doi.org\/10.1587\/transinf.2017EDL8052","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"1","key":"11_CR32","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.icte.2017.12.007","volume":"4","author":"A Zimba","year":"2018","unstructured":"Zimba, A., Wang, Z., Chen, H.: Multi-stage crypto ransomware attacks: a new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express 4(1), 14\u201318 (2018). \n                  https:\/\/doi.org\/10.1016\/j.icte.2017.12.007","journal-title":"ICT Express"}],"container-title":["Communications in Computer and Information Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11407-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:56:17Z","timestamp":1558396577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11407-7_11"}},"subtitle":["A Systematic Literature Review"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030114060","9783030114077"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11407-7_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Information Security Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pretoria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"issa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.infosecsa.co.za\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}