{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:06Z","timestamp":1750220106847,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,21]]},"DOI":"10.1145\/3520084.3520096","type":"proceedings-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T23:40:54Z","timestamp":1650325254000},"page":"76-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Ransomware: To Pay or Not to Pay? The results of what IT professionals recommend"],"prefix":"10.1145","author":[{"given":"Stephen","family":"Mujeye","sequence":"first","affiliation":[{"name":"Department of Technology, Illinois State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"e_1_3_2_1_2_1","volume-title":"The effective ransomware prevention technique using process monitoring on Android platform. Mobile Information Systems","author":"Song S.","year":"2016","unstructured":"Song S. , Kim B. , & Lee S. ( 2016 ). The effective ransomware prevention technique using process monitoring on Android platform. Mobile Information Systems Song S., Kim B., & Lee S. (2016). The effective ransomware prevention technique using process monitoring on Android platform. Mobile Information Systems"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.05.003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(20)30118-5"},{"key":"e_1_3_2_1_5_1","article-title":"Ransomware payments in the Bitcoin ecosystem","author":"Paquet-Clouston M.","year":"2019","unstructured":"Paquet-Clouston , M. , Haslhofer , B. , & Dupont , B. ( 2019 ). Ransomware payments in the Bitcoin ecosystem . Journal of Cybersecurity (Oxford), 5(1). https:\/\/doi.org\/10.1093\/cybsec\/tyz003 10.1093\/cybsec Paquet-Clouston, M., Haslhofer, B., & Dupont, B. (2019). Ransomware payments in the Bitcoin ecosystem. Journal of Cybersecurity (Oxford), 5(1). https:\/\/doi.org\/10.1093\/cybsec\/tyz003","journal-title":"Journal of Cybersecurity (Oxford), 5(1). https:\/\/doi.org\/10.1093\/cybsec\/tyz003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.361"},{"key":"e_1_3_2_1_7_1","volume-title":"Largest ransomware payouts of all time - stats, trends, & more. Heimdal Security Blog. Retrieved","author":"Petcu A. G.","year":"2021","unstructured":"Petcu , A. G. (2021, September 14). Largest ransomware payouts of all time - stats, trends, & more. Heimdal Security Blog. Retrieved November 4, 2021 , from https:\/\/heimdalsecurity.com\/blog\/ransomware-payouts\/ Petcu, A. G. (2021, September 14). Largest ransomware payouts of all time - stats, trends, & more. Heimdal Security Blog. Retrieved November 4, 2021, from https:\/\/heimdalsecurity.com\/blog\/ransomware-payouts\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-02-2020-0012"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2021.04.015"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz015"},{"key":"e_1_3_2_1_11_1","volume-title":"Cut- ting the gordian knot: a look under the hood of ransomware attacks. Work. Pap","author":"Kharraz A.","year":"2015","unstructured":"Kharraz , A. , Robertson , W. , Balzarotti , D. , Bilge , L. , & Kirda , E. ( 2015 ). Cut- ting the gordian knot: a look under the hood of ransomware attacks. Work. Pap . Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015). Cut- ting the gordian knot: a look under the hood of ransomware attacks. Work. Pap."},{"key":"e_1_3_2_1_12_1","volume-title":"Ransomware and Reputation.\u00a0Games,\u00a010(2), 26\u2013. https:\/\/doi.org\/10.3390\/g10020026","author":"Cartwright A.","year":"2019","unstructured":"Cartwright , A. , & Cartwright , E. ( 2019 ). Ransomware and Reputation.\u00a0Games,\u00a010(2), 26\u2013. https:\/\/doi.org\/10.3390\/g10020026 10.3390\/g10020026 Cartwright, A., & Cartwright, E. (2019). Ransomware and Reputation.\u00a0Games,\u00a010(2), 26\u2013. https:\/\/doi.org\/10.3390\/g10020026"},{"key":"e_1_3_2_1_13_1","volume-title":"Economic Analysis of Ransomware. arXiv:1703.06660v1","author":"Hernandez-Castro J.","year":"2017","unstructured":"Hernandez-Castro , J. , Cartwright , E. , & Stepanova , A. ( 2017 ) Economic Analysis of Ransomware. arXiv:1703.06660v1 Hernandez-Castro, J., Cartwright, E., & Stepanova, A. (2017)Economic Analysis of Ransomware. arXiv:1703.06660v1"},{"key":"e_1_3_2_1_14_1","volume-title":"Ransomware: Evolution, mitigation and prevention.\u00a0International Management Review,\u00a013(1), 10-21,101","author":"Richardson R.","year":"2017","unstructured":"Richardson , R. , & North , M. ( 2017 ). Ransomware: Evolution, mitigation and prevention.\u00a0International Management Review,\u00a013(1), 10-21,101 . Richardson, R., & North, M. (2017). Ransomware: Evolution, mitigation and prevention.\u00a0International Management Review,\u00a013(1), 10-21,101."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Rashid F. Y.","year":"2016","unstructured":"Rashid , F. Y. ( 2016 , March 14). 4 reasons not to pay up in a ransomware attack . Retrieved October 30, 2021, from http:\/\/www.infoworld.com\/article\/3043197\/security\/4-reasons-not-to-pay-up-in-a-ransomware-attack.html Rashid, F. Y. (2016, March 14). 4 reasons not to pay up in a ransomware attack. Retrieved October 30, 2021, from http:\/\/www.infoworld.com\/article\/3043197\/security\/4-reasons-not-to-pay-up-in-a-ransomware-attack.html"},{"key":"e_1_3_2_1_16_1","volume-title":"Department of the Treasury","author":"Ransomware U.S.","year":"2020","unstructured":"Ransomware advisory. U.S. Department of the Treasury . ( 2020 , October 19). Retrieved November 4, 2021, from https:\/\/home.treasury.gov\/policy-issues\/financial-sanctions\/recent-actions\/20201001 Ransomware advisory. U.S. Department of the Treasury. (2020, October 19). Retrieved November 4, 2021, from https:\/\/home.treasury.gov\/policy-issues\/financial-sanctions\/recent-actions\/20201001"},{"key":"e_1_3_2_1_17_1","volume-title":"New york proposal to restrict ransomware payments could drive cyber severity.\u00a0The SNL Insurance Daily","author":"Trice C.","year":"2020","unstructured":"Trice , C. ( 2020 ). New york proposal to restrict ransomware payments could drive cyber severity.\u00a0The SNL Insurance Daily Trice, C. (2020). New york proposal to restrict ransomware payments could drive cyber severity.\u00a0The SNL Insurance Daily"},{"volume-title":"A Survey of IT Professionals Perception of Ransomware","author":"Mujeye S.","key":"e_1_3_2_1_18_1","unstructured":"Mujeye , S. (2021). A Survey of IT Professionals Perception of Ransomware . International Institute for Applied Knowledge Management Mujeye, S.(2021). A Survey of IT Professionals Perception of Ransomware. International Institute for Applied Knowledge Management"},{"key":"e_1_3_2_1_19_1","volume-title":"Course hero. sophos-the-state-of-ransomware-2020-wp.pdf - THE STATE OF RANSOMWARE 2020 Results of an independent study of 5,000 IT managers across 26 countries A | Course Hero. (n.d.). Retrieved","author":"Sophos","year":"2021","unstructured":"Sophos -the-state-of-ransomware-2020-wp.pdf - the state of ransomware 2020 results of an independent study of 5,000 IT managers across 26 countries a : Course hero. sophos-the-state-of-ransomware-2020-wp.pdf - THE STATE OF RANSOMWARE 2020 Results of an independent study of 5,000 IT managers across 26 countries A | Course Hero. (n.d.). Retrieved November 5, 2021 , from https:\/\/www.coursehero.com\/file\/63450529\/sophos-the-state-of-ransomware-2020-wppdf\/ Sophos-the-state-of-ransomware-2020-wp.pdf - the state of ransomware 2020 results of an independent study of 5,000 IT managers across 26 countries a: Course hero. sophos-the-state-of-ransomware-2020-wp.pdf - THE STATE OF RANSOMWARE 2020 Results of an independent study of 5,000 IT managers across 26 countries A | Course Hero. (n.d.). Retrieved November 5, 2021, from https:\/\/www.coursehero.com\/file\/63450529\/sophos-the-state-of-ransomware-2020-wppdf\/"}],"event":{"name":"ICSIM 2022: 2022 The 5th International Conference on Software Engineering and Information Management","acronym":"ICSIM 2022","location":"Yokohama Japan"},"container-title":["2022 The 5th International Conference on Software Engineering and Information Management (ICSIM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520084.3520096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3520084.3520096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:31Z","timestamp":1750183831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520084.3520096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,21]]},"references-count":19,"alternative-id":["10.1145\/3520084.3520096","10.1145\/3520084"],"URL":"https:\/\/doi.org\/10.1145\/3520084.3520096","relation":{},"subject":[],"published":{"date-parts":[[2022,1,21]]},"assertion":[{"value":"2022-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}