{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:59:32Z","timestamp":1742975972760,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031156878"},{"type":"electronic","value":"9783031156885"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15688-5_11","type":"book-chapter","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:02:42Z","timestamp":1661814162000},"page":"115-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Don\u2019t be Caught Unaware: A Ransomware Primer with a Specific Focus on Africa"],"prefix":"10.1007","author":[{"given":"Joey","family":"Jansen van Vuuren","sequence":"first","affiliation":[]},{"given":"Louise","family":"Leenen","sequence":"additional","affiliation":[]},{"given":"Anna-Marie","family":"Jansen van Vuuren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"issue":"9","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479393","volume":"54","author":"T McIntosh","year":"2021","unstructured":"McIntosh, T., Kayes, A., Chen, Y.-P.P., Ng, A., Watters, P.: Ransomware mitigation in the modern era: a comprehensive review, research challenges, and future directions. ACM Comput. Surv. (CSUR) 54(9), 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"11_CR2","unstructured":"IBM Security, The definitive guide to ransomware: Readiness, response, and remediation. IBM Security. https:\/\/www.ibm.com\/downloads\/cas\/EV6NAQR4. Accessed 12 Feb 2020"},{"key":"11_CR3","unstructured":"Barak, I.: How Does Ransomware Work?. https:\/\/www.cybereason.com\/blog\/how-does-ransomware-work#:~:text=Ransomware%20is%20a%20type%20of,ransom%20payment%20to%20restore%20access. Accessed 25 Sep 2017"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Kharraz","year":"2015","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian Knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3\u201324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20550-2_1"},{"key":"11_CR5","unstructured":"Van der Walt, C., Collard, A., Grimes, R.A., Pillay, K.: Defending Against Ransomware - An Advisory by the South African Cybersecurity Hub. www.orangecyberdefense.com\/za\/contact\/. Accessed 10 May 2021"},{"key":"11_CR6","unstructured":"SecureMac, What is Doxware?. https:\/\/www.securemac.com\/blog\/what-is-doxware. Accessed 15 Jan 2020"},{"issue":"9","key":"11_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","volume":"2016","author":"R Brewer","year":"2016","unstructured":"Brewer, R.: Ransomware attacks: detection, prevention and cure. Network Security 2016(9), 5\u20139 (2016)","journal-title":"Network Security"},{"key":"11_CR8","unstructured":"COMODO, Ransomware Attacks 2021. https:\/\/enterprise.comodo.com\/blog\/recent-ransomware-attacks\/. Accessed 4 Oct 2022"},{"key":"11_CR9","unstructured":"Harvard Business Review, Ransomware Attacks Are Spiking. Is Your Company Prepared?. https:\/\/hbr.org\/2021\/05\/ransomware-attacks-are-spiking-is-your-company-prepared. Accessed 15 Jan 2021"},{"key":"11_CR10","unstructured":"Morgan, S.: Cybercrime to cost the world $10.5 trillion Annual by 2025. Cybercrime Magazine (2020)"},{"key":"11_CR11","unstructured":"The Touro College & University System, The 10 Biggest Ransomware Attacks of 2021. https:\/\/illinois.touro.edu\/news\/the-10-biggest-ransomware-attacks-of-2021.php. Accessed 25 Nov 2021"},{"key":"11_CR12","unstructured":"Macias, A., Wilkie, C.: U.S. recovers $2.3 million in bitcoin paid in the Colonial Pipeline ransom. CNBC. https:\/\/www.cnbc.com\/2021\/06\/07\/us-recovers-some-of-the-money-paid-in-the-colonial-pipeline-ransom-officials-say.html. Accessed 10 Oct 2021"},{"key":"11_CR13","unstructured":"Din, A.: Chemical Distributor Brenntag Says What Data Was Stolen During the Ransomware Attack. HEIMDAL. https:\/\/heimdalsecurity.com\/blog\/chemical-distributor-brenntag-says-what-data-was-stolen-during-the-ransomware-attack\/. Accessed 15 Sep 2021"},{"key":"11_CR14","unstructured":"Greig, J.: Acer confirms second cyberattack in 2021 after ransomware incident in March. ZDNET. https:\/\/www.zdnet.com\/article\/acer-confirms-second-cyberattack-in-2021\/. Accessed 5 Nov 2021"},{"key":"11_CR15","unstructured":"Morrison, S.: Ransomware attack hits another massive, crucial industry: Meat. Vox. https:\/\/www.vox.com\/recode\/2021\/6\/1\/22463179\/jbs-foods-ransomware-attack-meat-hackers. Accessed 15 Sep 2021"},{"key":"11_CR16","unstructured":"Osborne, C.: Updated Kaseya ransomware attack FAQ: What we know now. ZDNET. https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/. Accessed 20 Oct 2021"},{"key":"11_CR17","unstructured":"Tung, L.: Kaseya ransomware attack: 1,500 companies affected, company confirms. ZDNET. https:\/\/www.zdnet.com\/article\/kaseya-ransomware-attack-1500-companies-affected-company-confirms\/. Accessed 9 Sep 2021"},{"key":"11_CR18","unstructured":"Mehrotra, K.: NBA\u2019s Houston Rockets Face Cyber-Attack by Ransomware Group. Bloomberg. https:\/\/www.bloomberg.com\/news\/articles\/2021-04-14\/nba-s-houston-rockets-face-cyber-attack-by-ransomware-group. Accessed 15 Sep 2021"},{"key":"11_CR19","unstructured":"Goud, N.: https:\/\/www.cybersecurity-insiders.com\/babuk-ransomware-attack-on-nba-houston-rockets\/. https:\/\/www.cybersecurity-insiders.com\/babuk-ransomware-attack-on-nba-houston-rockets\/. Accessed 28 Jan 2021"},{"key":"11_CR20","unstructured":"Ikeda, S.: Ransomware Attack Reported at Insurance Giant AXA One Week After It Changes Cyber Insurance Policies in France. CPO Magazine, Rezonen Pte. Ltd. https:\/\/www.cpomagazine.com\/cyber-security\/ransomware-attack-reported-at-insurance-giant-axa-one-week-after-it-changes-cyber-insurance-policies-in-france\/. Accessed 15 Nov 2021"},{"key":"11_CR21","unstructured":"Mehrotra, K., Turton, W.: CNA Financial Paid $40 Million in Ransom After March Cyberattack. Bloomberg. https:\/\/www.bloomberg.com\/news\/articles\/2021-05-20\/cna-financial-paid-40-million-in-ransom-after-march-cyberattack. Accessed 15 Sep 2021"},{"key":"11_CR22","unstructured":"Keane, S., Gonzalez, O.: Cyberpunk 2077 developer CD Projekt hit by ransomware attack, source code leaked. Cnet. https:\/\/www.cnet.com\/tech\/computing\/cyberpunk-2077-developer-cd-projekt-hit-by-ransomware-attack-source-code-leaked\/. Accessed 15 Sep 2021"},{"key":"11_CR23","unstructured":"Hope, A.: Kia Motors America Suffers a $20 Million Suspected DoppelPaymer Ransomware Attack. CPO Magazine, Rezonen Pte. Ltd. https:\/\/www.cpomagazine.com\/cyber-security\/kia-motors-america-suffers-a-20-million-suspected-doppelpaymer-ransomware-attack\/#:~:text=Automaker%20Kia%20Motors%20America%20%28KMA%29%20suffered%20a. Accessed 15 Nov 2021"},{"key":"11_CR24","unstructured":"BUSINESSTECH, South Africa under cyber attack: Interpol reveals top threats in South Africa (2021). https:\/\/businesstech.co.za\/news\/it-services\/531990\/south-africa-under-cyber-attack-interpol-reveals-top-threats-in-south-africa\/"},{"key":"11_CR25","unstructured":"Myles, I.: Cybercriminals love South Africa -Study. MyBroadband. https:\/\/mybroadband.co.za\/news\/security\/443090-cybercriminals-love-south-africa-study.html. Accessed 9 May 2022"},{"key":"11_CR26","unstructured":"Myles, I.: South African companies getting nailed by ransomware \u2014 and they are paying up. MyBroadband. https:\/\/mybroadband.co.za\/news\/security\/443728-south-african-companies-getting-nailed-by-ransomware-and-they-are-paying-up.html?msclkid=da174ab7d07511ecadd77ffe4139712e. Accessed 9 May 2022"},{"key":"11_CR27","unstructured":"Money Expert South Africa, What-is-the-POPI-Act-a-simple-summary. https:\/\/www.moneyexpert.co.za\/broadband\/what-is-the-popi-act-a-simple-summary\/. Accessed 9 May 2022"},{"key":"11_CR28","unstructured":"Moyo, A.: Dis-Chem prescription service outage after cyber attack. ITWeb. https:\/\/www.itweb.co.za\/content\/8OKdWqDXNezqbznQ. Accessed 11 May 2022"},{"key":"11_CR29","unstructured":"ITWeb, Hornetsecurity global ransomware survey reveals the \u2018stinging\u2019 truth. https:\/\/www.itweb.co.za\/content\/kLgB17e8QnNv59N4. Accessed 10 May 2022"},{"key":"11_CR30","unstructured":"Thomas, I.: The State of Ransomware Attacks in Africa. Ironscales. https:\/\/ironscales.com\/blog\/the-state-of-ransomware-attacks-in-africa. Accessed 9 Feb 2022"},{"key":"11_CR31","unstructured":"Moyo, A.: Justice department battles to contain ransomware attack. ITWeb. https:\/\/www.itweb.co.za\/content\/DZQ58vVPOB1MzXy2. Accessed 9 Oct 2021"},{"key":"11_CR32","unstructured":"Moyo, A.: SA\u2019s govt entities under attack as space agency hit by data breach. ITWeb. https:\/\/www.itweb.co.za\/content\/6GxRKMYJy1bqb3Wj. Accessed 9 Oct 2021"},{"key":"11_CR33","unstructured":"ITWeb, Lessons from Transnet: Is your business prepared for a ransomware attack. https:\/\/www.itweb.co.za\/content\/GxwQDq1ZJQLvlPVo. Accessed 29 Sep 2021"},{"key":"11_CR34","unstructured":"Soteria, Ransomware attack hits financial services firm Curo. http:\/\/soteriacloud.co.za\/news\/financial-services-ransomware-attack-ransomware\/. Accessed 9 Feb 2022"},{"key":"11_CR35","unstructured":"Tayea, H.: Ransomware Virus Hits One of Egypt\u2019s Largest Publishing Houses. SEE-egy. https:\/\/see.news\/ransomware-virus-hits-one-of-egypts-largest-pub\/. Accessed 10 May 2021"},{"key":"11_CR36","unstructured":"Guardian, Nigeria, Ransomware hits 71% of Nigerian organisations. https:\/\/guardian.ng\/technology\/ransomware-hits-71-of-nigerian-organisations\/. Accessed 10 May 2022"},{"key":"11_CR37","unstructured":"Government Technology, 7 Steps to Help Prevent & Limit the Impact of Ransomware. https:\/\/www.govtech.com\/security\/7-steps-to-help-prevent--limit-the-impact-of-ransomware.html. Accessed 15 Aug 2020"},{"key":"11_CR38","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-030-62803-1_20","volume-title":"Human-Centric Computing in a Data-Driven Society","author":"L Leenen","year":"2020","unstructured":"Leenen, L., Jansen van Vuuren, J., Jansen van Vuuren, A.M.: Cybersecurity and cybercrime combatting culture for african police services. In: David Kreps, Taro Komukai, T V Gopal, Kaori Ishii, (ed.) Human-Centric Computing in a Data-Driven Society. IFIP Advances in Information and Communication Technology, vol. 590, pp. 248\u2013261. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62803-1_20"},{"key":"11_CR39","unstructured":"ITU, International Telecommunications Union Corporate Annual Report 2008. International Telecommunications Union. https:\/\/www.itu.int\/osg\/csd\/stratplan\/AR2008_web.pdf. Accessed 8 Nov 2008"},{"key":"11_CR40","unstructured":"ENISA, Cyber Security Culture in Organisations. European Agency for Network and Information Security (ENISA) (2017)"},{"issue":"1","key":"11_CR41","first-page":"1","volume":"25","author":"D Piper","year":"2021","unstructured":"Piper, D.: Cybersecurity and infrastructure security agency releases guidance regarding ransomware. Internet Law 25(1), 1\u201317 (2021)","journal-title":"Internet Law"},{"key":"11_CR42","unstructured":"CISA, Protecting sensitive and personal information from ransomware-caused data breaches. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA_Fact_Sheet-Protecting_Sensitive_and_Personal_Information_from_Ransomware-Caused_Data_Breaches-508C.pdf. Accessed 10 Jan 2021"},{"key":"11_CR43","unstructured":"Melnick, J.: How to Detect Ransomware. https:\/\/blog.netwrix.com\/2020\/09\/03\/how-to-detect-ransomware\/. Accessed 28 Jan 2020"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Choice and Digital by Default: Autonomy vs Digital Determination"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15688-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:08:09Z","timestamp":1661814489000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15688-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156878","9783031156885"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15688-5_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcc15.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}