{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:48:20Z","timestamp":1764240500793,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481508","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"151-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Replicating a Study of Ransomware in Germany"],"prefix":"10.1145","author":[{"given":"Anna-Marie","family":"Ortloff","sequence":"first","affiliation":[{"name":"University of Bonn, Germany"}]},{"given":"Maike","family":"Vossen","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"given":"Christian","family":"Tiefenau","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"e_1_3_2_1_3_1","volume-title":"Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PloS one 12, 3","author":"Alsaleh Mansour","year":"2017","unstructured":"Mansour Alsaleh , Noura Alomar , and Abdulrahman Alarifi . 2017. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PloS one 12, 3 ( 2017 ). https:\/\/doi.org\/10.1371\/journal.pone.0173284 10.1371\/journal.pone.0173284 Mansour Alsaleh, Noura Alomar, and Abdulrahman Alarifi. 2017. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PloS one 12, 3 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0173284"},{"volume-title":"Research in Attacks","author":"Andronio Nicol\u00f3","key":"e_1_3_2_1_4_1","unstructured":"Nicol\u00f3 Andronio , Stefano Zanero , and Federico Maggi . 2015. HelDroid: Dissecting and Detecting Mobile Ransomware . In Research in Attacks , Intrusions, and Defenses, Herbert Bos, Fabian Monrose, and Gregory Blanc(Eds.). Springer International Publishing , Cham , 382\u2013404. Nicol\u00f3 Andronio, Stefano Zanero, and Federico Maggi. 2015. HelDroid: Dissecting and Detecting Mobile Ransomware. In Research in Attacks, Intrusions, and Defenses, Herbert Bos, Fabian Monrose, and Gregory Blanc(Eds.). Springer International Publishing, Cham, 382\u2013404."},{"key":"e_1_3_2_1_5_1","unstructured":"Earl\u00a0R Babbie and Lucia Benaquisto. 2009. Fundamentals of social research. Cengage Learning.  Earl\u00a0R Babbie and Lucia Benaquisto. 2009. Fundamentals of social research. Cengage Learning."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the International Conference on Cyber Security for Sustainable Society. 118\u2013131","author":"Bada Maria","year":"2015","unstructured":"Maria Bada , Angela Sasse , and Jason Nurse . 2015 . Cyber Security Awareness Campaigns: Why do they fail to change behaviour? . In Proceedings of the International Conference on Cyber Security for Sustainable Society. 118\u2013131 . Maria Bada, Angela Sasse, and Jason Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?. In Proceedings of the International Conference on Cyber Security for Sustainable Society. 118\u2013131."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376213"},{"key":"e_1_3_2_1_8_1","unstructured":"Bloomberg. 2021. Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom. https:\/\/www.bloomberg.com\/news\/articles\/2021-05-13\/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom. Accessed: 2021-05-21.  Bloomberg. 2021. Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom. https:\/\/www.bloomberg.com\/news\/articles\/2021-05-13\/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom. Accessed: 2021-05-21."},{"key":"e_1_3_2_1_9_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik [n.d.]. Ransomware: Bedrohungslage Pr\u00e4vention & Reaktion. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.html. Accessed: 2021-01-21.  Bundesamt f\u00fcr Sicherheit in der Informationstechnik [n.d.]. Ransomware: Bedrohungslage Pr\u00e4vention & Reaktion. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.html. Accessed: 2021-01-21."},{"key":"e_1_3_2_1_10_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik 2019. Schadhafte SPAM-Mails im Namen mehrerer Bundesbeh\u00f6rden. https:\/\/www.bsi.bund.de\/DE\/Presse\/Pressemitteilungen\/Presse2019\/Spam-Bundesbehoerden_181219.html. Accessed: 2021-01-21 Published on 2019-12-18.  Bundesamt f\u00fcr Sicherheit in der Informationstechnik 2019. Schadhafte SPAM-Mails im Namen mehrerer Bundesbeh\u00f6rden. https:\/\/www.bsi.bund.de\/DE\/Presse\/Pressemitteilungen\/Presse2019\/Spam-Bundesbehoerden_181219.html. Accessed: 2021-01-21 Published on 2019-12-18."},{"key":"e_1_3_2_1_11_1","unstructured":"Bundeskriminalamt 2019. Bundeslagebild Cybercrime 2018. https:\/\/www.bka.de\/SharedDocs\/Downloads\/DE\/Publikationen\/JahresberichteUndLagebilder\/Cybercrime\/cybercrimeBundeslagebild2018.html. Accessed: 2021-01-21.  Bundeskriminalamt 2019. Bundeslagebild Cybercrime 2018. https:\/\/www.bka.de\/SharedDocs\/Downloads\/DE\/Publikationen\/JahresberichteUndLagebilder\/Cybercrime\/cybercrimeBundeslagebild2018.html. Accessed: 2021-01-21."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS\u201919)","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse , Julia Sch\u00e4fer , and Matthew Smith . 2019 . Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice . In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS\u201919) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/busse Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS\u201919). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/busse"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129704"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.485"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1428652"},{"volume-title":"IT Sicherheit: Konzepte - Verfahren- Protokolle (10 ed.). De Gruyter Studium","author":"Eckert Claudia","key":"e_1_3_2_1_17_1","unstructured":"Claudia Eckert . 1965. IT Sicherheit: Konzepte - Verfahren- Protokolle (10 ed.). De Gruyter Studium , Berlin . Claudia Eckert. 1965. IT Sicherheit: Konzepte - Verfahren- Protokolle (10 ed.). De Gruyter Studium, Berlin."},{"key":"e_1_3_2_1_18_1","volume-title":"Attitudes towards Cyber Security.464a Wave EB87.4","author":"European Commission","year":"2017","unstructured":"European Commission . 2017. Europeans \u2019 Attitudes towards Cyber Security.464a Wave EB87.4 ( 2017 ). European Commission. 2017. Europeans\u2019 Attitudes towards Cyber Security.464a Wave EB87.4 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/iot1020030"},{"volume-title":"Discovering Statistics Using R","author":"Field Andy","key":"e_1_3_2_1_20_1","unstructured":"Andy Field , Jeremy Miles , and Zo\u00eb Field . 2012. Discovering Statistics Using R . Sage Publications . Andy Field, Jeremy Miles, and Zo\u00eb Field. 2012. Discovering Statistics Using R. Sage Publications."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(17)30089-1","article-title":"The ABC of ransomware protection","volume":"2017","author":"Furnell Steven","year":"2017","unstructured":"Steven Furnell and David Emm . 2017 . The ABC of ransomware protection . Computer Fraud & Security 2017 , 10 (2017), 5 \u2013 11 . https:\/\/doi.org\/10.1016\/S1361-3723(17)30089-1 10.1016\/S1361-3723(17)30089-1 Steven Furnell and David Emm. 2017. The ABC of ransomware protection. Computer Fraud & Security 2017, 10 (2017), 5 \u2013 11. https:\/\/doi.org\/10.1016\/S1361-3723(17)30089-1","journal-title":"Computer Fraud & Security"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.06.003"},{"key":"e_1_3_2_1_23_1","unstructured":"Kaspersky Security Bulletin. 2019. Story of the year 2019: Cities under ransomware siege. https:\/\/securelist.com\/story-of-the-year-2019-cities-under-ransomware-siege\/95456\/. Accessed: 2021-01-21.  Kaspersky Security Bulletin. 2019. Story of the year 2019: Cities under ransomware siege. https:\/\/securelist.com\/story-of-the-year-2019-cities-under-ransomware-siege\/95456\/. Accessed: 2021-01-21."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 25th USENIX Security Symposium. 757\u2013772","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz , Sajjad Arshad , Collin Mulliner , William Robertson , and Engin Kirda . 2016 . UNVEIL: A large-scale, automated approach to detecting ransomware . In Proceedings of the 25th USENIX Security Symposium. 757\u2013772 . Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A large-scale, automated approach to detecting ransomware. In Proceedings of the 25th USENIX Security Symposium. 757\u2013772."},{"volume-title":"Detection of Intrusions and Malware","author":"Kharraz Amin","key":"e_1_3_2_1_25_1","unstructured":"Amin Kharraz , William Robertson , Davide Balzarotti , Leyla Bilge , and Engin Kirda . 2015. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks . In Detection of Intrusions and Malware , and Vulnerability Assessment, Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.). Springer International Publishing , Cham , 3\u201324. Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda. 2015. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment, Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.). Springer International Publishing, Cham, 3\u201324."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23526"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0216-6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LOCS.2019.2918091"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999412"},{"volume-title":"Preventing and Mitigating Ransomware","author":"Manjezi Zandile","key":"e_1_3_2_1_30_1","unstructured":"Zandile Manjezi and Reinhardt\u00a0 A. Botha . 2019. Preventing and Mitigating Ransomware . In Information Security, Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, and Jan Eloff (Eds.). Springer International Publishing , Cham , 149\u2013162. Zandile Manjezi and Reinhardt\u00a0A. Botha. 2019. Preventing and Mitigating Ransomware. In Information Security, Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, and Jan Eloff (Eds.). Springer International Publishing, Cham, 149\u2013162."},{"key":"e_1_3_2_1_31_1","volume-title":"Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By","author":"Morgan Steve","year":"2021","unstructured":"Steve Morgan . 2019. Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021 . https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/. Accessed: 2021-01-21. Steve Morgan. 2019. Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021. https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/. Accessed: 2021-01-21."},{"key":"e_1_3_2_1_32_1","volume-title":"Mayee Corpin, Orla Cox, Paul Wood, and Scott Wallace.","author":"O\u2019Gorman Brigid","year":"2019","unstructured":"Brigid O\u2019Gorman , Candid Wueest , Dick O\u2019Brien , Gillian Cleary , Hon Lau , John-Paul Power , Mayee Corpin, Orla Cox, Paul Wood, and Scott Wallace. 2019 . ISTR Internet Security Threat Report. Technical Report. Symantec . 61 pages. https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en Brigid O\u2019Gorman, Candid Wueest, Dick O\u2019Brien, Gillian Cleary, Hon Lau, John-Paul Power, Mayee Corpin, Orla Cox, Paul Wood, and Scott Wallace. 2019. ISTR Internet Security Threat Report. Technical Report. Symantec. 61 pages. https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en"},{"key":"e_1_3_2_1_33_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2020","unstructured":"R Core Team . 2020 . R: A Language and Environment for Statistical Computing . R Foundation for Statistical Computing , Vienna, Austria . https:\/\/www.R-project.org\/ R Core Team. 2020. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00059"},{"key":"e_1_3_2_1_35_1","article-title":"New Phone, Who Dis? Modeling Millennials\u2019 Backup Behavior","volume":"13","author":"Redmiles M.","year":"2018","unstructured":"Elissa\u00a0 M. Redmiles and Eszter Hargittai . 2018 . New Phone, Who Dis? Modeling Millennials\u2019 Backup Behavior . ACM Trans. Web 13 , 1, Article 4 (Dec. 2018), 14\u00a0pages. https:\/\/doi.org\/10.1145\/3208105 10.1145\/3208105 Elissa\u00a0M. Redmiles and Eszter Hargittai. 2018. New Phone, Who Dis? Modeling Millennials\u2019 Backup Behavior. ACM Trans. Web 13, 1, Article 4 (Dec. 2018), 14\u00a0pages. https:\/\/doi.org\/10.1145\/3208105","journal-title":"ACM Trans. Web"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243740"},{"key":"e_1_3_2_1_38_1","first-page":"10","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"Richardson Ronny","year":"2017","unstructured":"Ronny Richardson and Max\u00a0 M North . 2017 . Ransomware: Evolution, mitigation and prevention . International Management Review 13 , 1 (2017), 10 . Ronny Richardson and Max\u00a0M North. 2017. Ransomware: Evolution, mitigation and prevention. International Management Review 13, 1 (2017), 10.","journal-title":"International Management Review"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 12th European Conference on Information Warfare and Security, Rauno Kuusisto and Erkki Kurkinen (Eds.)","author":"Sample Charmaine","year":"2013","unstructured":"Charmaine Sample . 2013 . Applicability of cultural markers in computer network attack attribution . In Proceedings of the 12th European Conference on Information Warfare and Security, Rauno Kuusisto and Erkki Kurkinen (Eds.) . University of Jyvaskyla, Finland, 361\u2013369. Charmaine Sample. 2013. Applicability of cultural markers in computer network attack attribution. In Proceedings of the 12th European Conference on Information Warfare and Security, Rauno Kuusisto and Erkki Kurkinen (Eds.). University of Jyvaskyla, Finland, 361\u2013369."},{"key":"e_1_3_2_1_40_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Simoiu Camelia","year":"2019","unstructured":"Camelia Simoiu , Joseph Bonneau , Christopher Gates , and Sharad Goel . 2019 . \u201d I was told to buy a software or lose my computer. I ignored it\u201d: A study of ransomware . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/simoiu Camelia Simoiu, Joseph Bonneau, Christopher Gates, and Sharad Goel. 2019. \u201dI was told to buy a software or lose my computer. I ignored it\u201d: A study of ransomware. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/simoiu"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949030"},{"volume-title":"Internet Security Threat Report","year":"2017","key":"e_1_3_2_1_42_1","unstructured":"Symantec. 2017. Internet Security Threat Report Vol. 22 . https:\/\/docs.broadcom.com\/doc\/istr-22- 2017 -en. Accessed : 2021-01-21. Symantec. 2017. Internet Security Threat Report Vol.22. https:\/\/docs.broadcom.com\/doc\/istr-22-2017-en. Accessed: 2021-01-21."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","acronym":"EuroUSEC '21","location":"Karlsruhe Germany"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":44,"alternative-id":["10.1145\/3481357.3481508","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481508","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}