{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T17:32:38Z","timestamp":1773768758474,"version":"3.50.1"},"reference-count":92,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.chb.2026.108953","type":"journal-article","created":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T08:50:40Z","timestamp":1772095840000},"page":"108953","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Engaging with cybercriminals: phases and influence strategies in ransomware negotiations"],"prefix":"10.1016","volume":"181","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3520-2142","authenticated-orcid":false,"given":"Michail","family":"Georgiou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3366-5872","authenticated-orcid":false,"given":"Ellen","family":"Giebels","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8189-2690","authenticated-orcid":false,"given":"Miriam S.D.","family":"Oostinga","sequence":"additional","affiliation":[]},{"given":"Remco","family":"Spithoven","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2026.108953_bib1","series-title":"Inventing the internet","author":"Abbate","year":"1999"},{"key":"10.1016\/j.chb.2026.108953_bib93","article-title":"Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity","author":"Ahmad","year":"2020","journal-title":"SSRN Electronic Journal"},{"key":"10.1016\/j.chb.2026.108953_bib2","article-title":"Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms","volume":"223","author":"Al-Hawawreh","year":"2023","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/3315487","article-title":"Beyond kappa: A review of interrater agreement measures","volume":"27","author":"Banerjee","year":"1999","journal-title":"Canadian Journal of Statistics"},{"key":"10.1016\/j.chb.2026.108953_bib4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102490","article-title":"Ransomware: Recent advances, analysis, challenges and future research directions","volume":"111","author":"Beaman","year":"2021","journal-title":"Computers & Security"},{"key":"10.1016\/j.chb.2026.108953_bib5","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103099","article-title":"Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model","volume":"127","author":"Bekkers","year":"2023","journal-title":"Computers & Security"},{"issue":"7","key":"10.1016\/j.chb.2026.108953_bib6","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1080\/10683160802442835","article-title":"Are you talking to me? Influencing behaviour and culture in police interviews","volume":"15","author":"Beune","year":"2009","journal-title":"Psychology, Crime and Law"},{"issue":"8","key":"10.1016\/j.chb.2026.108953_bib7","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1177\/0093854810369623","article-title":"Patterns of interaction in police interviews: The role of cultural dependency","volume":"37","author":"Beune","year":"2010","journal-title":"Criminal Justice and Behavior"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib8","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1365\/s43439-023-00106-w","article-title":"How does one negotiate with ransomware attackers?","volume":"5","author":"Boticiu","year":"2023","journal-title":"International Cybersecurity Law Review"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.5465\/amj.2007.24161853","article-title":"Sticks and Stones: Language, face, and online dispute resolution","volume":"50","author":"Brett","year":"2007","journal-title":"Academy of Management Journal"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1002\/jip.1482","article-title":"On the anatomy of social engineering attacks\u2014A literature\u2010based dissection of successful attacks","volume":"15","author":"Bull\u00e9e","year":"2017","journal-title":"Journal of Investigative Psychology and Offender Profiling"},{"key":"10.1016\/j.chb.2026.108953_bib11","series-title":"Computer: A history of the information machine","author":"Campbell-Kelly","year":"2023"},{"key":"10.1016\/j.chb.2026.108953_bib12","series-title":"Advances in intelligent systems and computing","first-page":"69","article-title":"A game-theoretical model of ransomware","author":"Caporusso","year":"2018"},{"key":"10.1016\/j.chb.2026.108953_bib13","series-title":"Time pressure in negotiation and mediation","author":"Carnevale","year":"1993"},{"issue":"6","key":"10.1016\/j.chb.2026.108953_bib94","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1093\/bjc\/azac098","article-title":"Confirm not command: examining fraudsters\u2019 use of language to compel victim compliance in their own exploitation","volume":"63","author":"Carter","year":"2023","journal-title":"The British Journal of Criminology"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib14","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyz009","article-title":"To pay or not: Game theoretic models of ransomware","volume":"5","author":"Cartwright","year":"2019","journal-title":"Journal of Cybersecurity"},{"issue":"3","key":"10.1016\/j.chb.2026.108953_bib15","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1080\/02635143.2021.1993179","article-title":"The use of intercoder reliability in qualitative interview data analysis in science education","volume":"41","author":"Cheung","year":"2021","journal-title":"Research in Science & Technological Education"},{"issue":"6","key":"10.1016\/j.chb.2026.108953_bib16","doi-asserted-by":"crossref","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","article-title":"The positive and negative implications of anonymity in internet social interactions: \u201cOn the Internet, Nobody Knows You\u2019re a Dog.\u201d","volume":"23","author":"Christopherson","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2026.108953_bib17","series-title":"Influence: Science and practice","author":"Cialdini","year":"2001"},{"key":"10.1016\/j.chb.2026.108953_bib18","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1146\/annurev.psych.55.090902.142015","article-title":"Social influence: Compliance and conformity","volume":"55","author":"Cialdini","year":"2004","journal-title":"Annual Review of Psychology"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib19","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1108\/ICS-03-2017-0013","article-title":"Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study","volume":"25","author":"Connolly","year":"2017","journal-title":"Information and Computer Security"},{"key":"10.1016\/j.chb.2026.108953_bib20","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101568","article-title":"The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures","volume":"87","author":"Connolly","year":"2019","journal-title":"Computers & Security"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib21","article-title":"An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability","volume":"6","author":"Connolly","year":"2020","journal-title":"Journal of Cybersecurity"},{"issue":"5","key":"10.1016\/j.chb.2026.108953_bib22","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1037\/0022-3514.78.5.889","article-title":"Influence of social motives on integrative negotiation: A meta-analytic review and test of two theories","volume":"78","author":"De Dreu","year":"2000","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2026.108953_bib23","first-page":"133","article-title":"Crisis bargaining in intense conflict situations","volume":"21","author":"Donohue","year":"1991","journal-title":"International Journal of Group Tensions"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib24","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1111\/j.1468-2958.1993.tb00320.x","article-title":"Relational development as negotiated order in hostage negotiation","volume":"20","author":"Donohue","year":"1993","journal-title":"Human Communication Research"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib96","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1177\/002200275700100107","article-title":"The Peaceful Settlement of Industrial and Intergroup Disputes","volume":"1","author":"Douglas","year":"1957","journal-title":"Conflict Resolution"},{"key":"10.1016\/j.chb.2026.108953_bib95","series-title":"Industrial Peacemaking","first-page":"13","article-title":"Chapter 2. Phase 1: Establishing the Negotiating Range","author":"Douglas","year":"1962"},{"issue":"3","key":"10.1016\/j.chb.2026.108953_bib25","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1177\/0022002794038003007","article-title":"Determinants of compromising behavior in negotiation: A meta-analysis","volume":"38","author":"Druckman","year":"1994","journal-title":"Journal of Conflict Resolution"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib26","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1177\/0022002701045004006","article-title":"Turning points in international negotiation: A comparative analysis","volume":"45","author":"Druckman","year":"2001","journal-title":"Journal of Conflict Resolution"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1750-4716.2010.00068.x","article-title":"Turning points in negotiation","volume":"4","author":"Druckman","year":"2011","journal-title":"Negotiation and Conflict Management Research"},{"key":"10.1016\/j.chb.2026.108953_bib28","series-title":"Conflict management and mediation","author":"Euwema","year":"2024"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib29","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1080\/23738871.2019.1586969","article-title":"Cyber negotiation: A cyber risk management approach to defend urban critical infrastructure from cyberattacks","volume":"4","author":"Falco","year":"2019","journal-title":"Journal of Cyber Policy"},{"key":"10.1016\/j.chb.2026.108953_bib30","series-title":"American Psychological Association eBooks","first-page":"495","article-title":"The psychology of negotiation and mediation","author":"Gelfand","year":"2011"},{"key":"10.1016\/j.chb.2026.108953_bib31","first-page":"145","article-title":"Be\u00efnvloeding in gijzelingsonderhandelingen: de tafel van tien. [Influencing in hostage negotiations: the table of ten]","volume":"57","author":"Giebels","year":"2002","journal-title":"Nederlands Tijdschrift voor de Psychologie [Dutch Journal of Psychology]"},{"key":"10.1016\/j.chb.2026.108953_bib32","series-title":"Crisis negotiations: A multiparty perspective","author":"Giebels","year":"2004"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib33","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1037\/lhb0000227","article-title":"The cultural dimension of uncertainty avoidance impacts police\u2013civilian interaction","volume":"41","author":"Giebels","year":"2017","journal-title":"Law and Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib34","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1037\/a0012953","article-title":"Interaction patterns in crisis negotiations: Persuasive arguments and cultural differences","volume":"94","author":"Giebels","year":"2009","journal-title":"Journal of Applied Psychology"},{"key":"10.1016\/j.chb.2026.108953_bib35","unstructured":"Giebels, E. & Taylor, P.J. (2010). Communication predictors and social influence in crisis negotiations. In R.G. Rogan & F. J. Lanceley (Eds.), Contemporary Theory, Research, and Practice of Crisis and Hostage Negotiation (pp 59-77). Hampton press."},{"key":"10.1016\/j.chb.2026.108953_bib36","doi-asserted-by":"crossref","unstructured":"Giebels, E., Ufkes, E.G., & Van Erp, K.J.M.P. (2014). Understanding high-stakes conflicts. In N. Ashkanasy, O.B., Ayoko & K.A. Jehn (Eds.), The Handbook of Research in Conflict Management (pp 66-78). Edward Elgar Publishing.","DOI":"10.4337\/9781781006948.00011"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib37","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1080\/03637759709376428","article-title":"Turning points and commitment in post\u2010divorce relationships","volume":"64","author":"Graham","year":"1997","journal-title":"Communication Monographs"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib38","doi-asserted-by":"crossref","DOI":"10.1177\/2053951717745678","article-title":"Challenges in administrative data linkage for research","volume":"4","author":"Harron","year":"2017","journal-title":"Big Data & Society"},{"issue":"3","key":"10.1016\/j.chb.2026.108953_bib39","doi-asserted-by":"crossref","DOI":"10.1098\/rsos.190023","article-title":"An economic analysis of ransomware and its welfare consequences","volume":"7","author":"Hernandez-Castro","year":"2020","journal-title":"Royal Society Open Science"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib40","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1002\/job.181","article-title":"Influence tactics and work outcomes: A meta-analysis","volume":"24","author":"Higgins","year":"2003","journal-title":"Journal of Organizational Behavior"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib41","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1080\/01639620601131065","article-title":"Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures","volume":"28","author":"Holt","year":"2007","journal-title":"Deviant Behavior"},{"key":"10.1016\/j.chb.2026.108953_bib42","series-title":"Cybercrime subcultures","first-page":"159","author":"Holt","year":"2019"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib43","doi-asserted-by":"crossref","DOI":"10.1186\/s40163-019-0097-9","article-title":"Ransomware deployment methods and analysis: Views from a predictive model and human responses","volume":"8","author":"Hull","year":"2019","journal-title":"Crime Science"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib44","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.eij.2020.05.003","article-title":"Internet of things and ransomware: Evolution, mitigation and prevention","volume":"22","author":"Humayun","year":"2020","journal-title":"Egyptian Informatics Journal"},{"issue":"8","key":"10.1016\/j.chb.2026.108953_bib45","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pmed.0020124","article-title":"Why most published research findings are false","volume":"2","author":"Ioannidis","year":"2005","journal-title":"PLoS Medicine"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib46","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1468-2885.1994.tb00081.x","article-title":"Classifying compliance gaining messages: Taxonomic disorder and strategic confusion","volume":"4","author":"Kellermann","year":"1994","journal-title":"Communication Theory"},{"key":"10.1016\/j.chb.2026.108953_bib47","article-title":"An ontology-driven framework for knowledge representation of digital extortion attacks","volume":"139","author":"Keshavarzi","year":"2022","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"10.1016\/j.chb.2026.108953_bib48","doi-asserted-by":"crossref","first-page":"1316","DOI":"10.1177\/0162243921992844","article-title":"Hacking humans? Social engineering and the construction of the \u201cDeficient user\u201d in cybersecurity discourses","volume":"46","author":"Klimburg-Witjes","year":"2021","journal-title":"Science, Technology & Human Values"},{"key":"10.1016\/j.chb.2026.108953_bib49","article-title":"Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets","volume":"140","author":"Kranenbarg","year":"2023","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib51","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1080\/01639625.2024.2352049","article-title":"Cybercriminal networks and operational dynamics of Business Email Compromise (BEC) scammers: Insights from the \u201cBlack Axe\u201d confraternity","volume":"46","author":"Lazarus","year":"2024","journal-title":"Deviant Behavior"},{"key":"10.1016\/j.chb.2026.108953_bib52","series-title":"Cybercriminal networks: Origin, growth and criminal capabilities","author":"Leukfeldt","year":"2016"},{"key":"10.1016\/j.chb.2026.108953_bib53","series-title":"Negotiation: Readings, exercises, and cases","year":"1999"},{"key":"10.1016\/j.chb.2026.108953_bib54","series-title":"Proceedings of the 17th international conference on availability, reliability and security","article-title":"Ransomware 2.0","author":"Li","year":"2020"},{"issue":"5","key":"10.1016\/j.chb.2026.108953_bib55","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1111\/j.1740-9713.2016.00960.x","article-title":"To predict and serve?","volume":"13","author":"Lum","year":"2016","journal-title":"Significance"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib56","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1080\/15332580902865144","article-title":"Introducing the Four-Phase model of hostage negotiation","volume":"9","author":"Madrigal","year":"2009","journal-title":"Journal of Police Crisis Negotiations"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib57","doi-asserted-by":"crossref","DOI":"10.13169\/statecrime.12.1.0004","article-title":"Ransomware through the lens of state crime: Conceptualizing ransomware groups as cyber proxies, pirates, and privateers","volume":"12","author":"Martin","year":"2023","journal-title":"State Crime Journal"},{"issue":"9","key":"10.1016\/j.chb.2026.108953_bib58","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1080\/01639625.2024.2419905","article-title":"Ransomware HR: Human resources practices and organizational support in the Conti Ransomware Group","volume":"46","author":"Martin","year":"2025","journal-title":"Deviant Behavior"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib59","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1177\/14773708241285671","article-title":"Examining ransomware payment decision-making among small- and medium-sized enterprises","volume":"22","author":"Matthijsse","year":"2024","journal-title":"European Journal of Criminology"},{"key":"10.1016\/j.chb.2026.108953_bib60","doi-asserted-by":"crossref","DOI":"10.1007\/s12117-023-09496-z","article-title":"Your files have been encrypted: A crime script analysis of ransomware attacks","author":"Matthijsse","year":"2023","journal-title":"Trends in Organized Crime"},{"key":"10.1016\/j.chb.2026.108953_bib61","series-title":"Crisis negotiations: Managing critical incidents and hostage situations in law enforcement and corrections","author":"McMains","year":"2001"},{"key":"10.1016\/j.chb.2026.108953_bib62","article-title":"The ransomware pricing paradox: An empirical Study of the six stages of ransomware negotiations","author":"Meurs","year":"2025","journal-title":"(TI Discussion Paper Series; No. 25-052\/VII). Tinbergen Institute"},{"key":"10.1016\/j.chb.2026.108953_bib63","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103670","article-title":"Deception in double extortion ransomware attacks: An analysis of profitability and credibility","volume":"138","author":"Meurs","year":"2024","journal-title":"Computers & Security"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib64","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1006\/obhd.1998.2814","article-title":"Long and short routes to success in electronically mediated negotiations: Group affiliations and good vibrations","volume":"77","author":"Moore","year":"1999","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib65","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1037\/0021-9010.88.1.113","article-title":"Online bargaining and interpersonal trust","volume":"88","author":"Naquin","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"10.1016\/j.chb.2026.108953_bib66","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1080\/17440572.2025.2473350","article-title":"Inside the leak: Exploring the structure of the Conti ransomware group","volume":"26","author":"Paternoster","year":"2025","journal-title":"Global Crime"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib67","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10796-010-9272-y","article-title":"Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict","volume":"13","author":"Prentice","year":"2010","journal-title":"Information Systems Frontiers"},{"key":"10.1016\/j.chb.2026.108953_bib68","series-title":"Negotiation in social conflict","author":"Pruitt","year":"1993"},{"key":"10.1016\/j.chb.2026.108953_bib70","doi-asserted-by":"crossref","first-page":"40698","DOI":"10.1109\/ACCESS.2023.3268535","article-title":"The Age of Ransomware: A survey on the evolution, taxonomy, and research directions","volume":"11","author":"Razaulla","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib71","first-page":"10","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"Richardson","year":"2017","journal-title":"International Management Review"},{"issue":"3","key":"10.1016\/j.chb.2026.108953_bib72","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1037\/0022-3514.45.3.700","article-title":"Effects of individual differences on dyadic conversational strategies","volume":"45","author":"Roger","year":"1983","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2026.108953_bib73","doi-asserted-by":"crossref","first-page":"32836","DOI":"10.1109\/ACCESS.2022.3160748","article-title":"Dynamics of targeted ransomware negotiation","volume":"10","author":"Ryan","year":"2022","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.chb.2026.108953_bib74","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1177\/1558689809334210","article-title":"On quantitizing","volume":"3","author":"Sandelowski","year":"2009","journal-title":"Journal of Mixed Methods Research"},{"key":"10.1016\/j.chb.2026.108953_bib75","series-title":"Theory and decision library. Series C, Game theory, mathematical programming and operations research","first-page":"77","article-title":"A simple game model of kidnapping","author":"Selten","year":"1988"},{"key":"10.1016\/j.chb.2026.108953_bib76","doi-asserted-by":"crossref","DOI":"10.1016\/j.jretconser.2020.102139","article-title":"Research on the influence of after-sales service quality factors on customer satisfaction","volume":"56","author":"Shokouhyar","year":"2020","journal-title":"Journal of Retailing and Consumer Services"},{"key":"10.1016\/j.chb.2026.108953_bib77","article-title":"New Ransomware Threat Group calls attack victims to ensure payments","author":"Sjouwerman","year":"2024","journal-title":"KnowBe4"},{"key":"10.1016\/j.chb.2026.108953_bib78","series-title":"The state of ransomware 2021","year":"2021"},{"key":"10.1016\/j.chb.2026.108953_bib79","series-title":"The state of ransomware 2022","year":"2022"},{"key":"10.1016\/j.chb.2026.108953_bib80","series-title":"The state of ransomware 2023","year":"2023"},{"key":"10.1016\/j.chb.2026.108953_bib81","series-title":"Verbonden risico\u2019s: Maatschappelijke veiligheid in de black box society [Connected risks: Social safety in the black box society]. Boom Criminologie","author":"Spithoven","year":"2020"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib83","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1146\/annurev.psych.093008.100458","article-title":"Negotiation","volume":"61","author":"Thompson","year":"2009","journal-title":"Annual Review of Psychology"},{"key":"10.1016\/j.chb.2026.108953_bib84","author":"Tuttle"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib85","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1177\/1477370818812016","article-title":"The hybrid victim: Re-conceptualizing high-tech cyber victimisation through actor-network theory","volume":"17","author":"van der Wagen","year":"2020","journal-title":"European Journal of Criminology"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib87","first-page":"1","article-title":"Empowering public service workers to face bystander conflict: Enhancing resources through a training intervention","volume":"90","author":"van Erp","year":"2017","journal-title":"Journal of Occupational and Organizational Psychology"},{"key":"10.1016\/j.chb.2026.108953_bib88","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.avb.2019.08.002","article-title":"Negotiating in the skies of Hong Kong: The efficacy of the Behavioral Influence Stairway Model (BISM) in suicidal crisis situations","volume":"48","author":"Vecchi","year":"2019","journal-title":"Aggression and Violent Behavior"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib89","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1177\/26338076231199793","article-title":"Reconceptualising organised (cyber)crime: The case of ransomware","volume":"57","author":"Whelan","year":"2023","journal-title":"Journal of Criminology"},{"issue":"1","key":"10.1016\/j.chb.2026.108953_bib90","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s10551-014-2367-5","article-title":"The effects of victim anonymity on unethical behavior","volume":"136","author":"Yam","year":"2016","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib91","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1177\/147737080556056","article-title":"The novelty of \u2018Cybercrime\u2019: An assessment in light of routine activity theory","volume":"2","author":"Yar","year":"2005","journal-title":"European Journal of Criminology"},{"issue":"4","key":"10.1016\/j.chb.2026.108953_bib92","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3568994","article-title":"Personality types and ransomware victimisation","volume":"4","author":"Yilmaz","year":"2023","journal-title":"Digital Threats"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563226000506?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563226000506?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T14:32:19Z","timestamp":1773757939000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563226000506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":92,"alternative-id":["S0747563226000506"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2026.108953","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Engaging with cybercriminals: phases and influence strategies in ransomware negotiations","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2026.108953","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"108953"}}