{"id":"https://openalex.org/W2990764609","doi":"https://doi.org/10.1109/bigdata47090.2019.9006298","title":"Volenti non fit injuria: Ransomware and its Victims","display_name":"Volenti non fit injuria: Ransomware and its Victims","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W2990764609","doi":"https://doi.org/10.1109/bigdata47090.2019.9006298","mag":"2990764609"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9006298","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1911.08364","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013030358","display_name":"Amir Atapour\u2013Abarghouei","orcid":"https://orcid.org/0000-0002-4242-4579"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Amir Atapour-Abarghouei","raw_affiliation_strings":["School of Computing,, Newcastle University, Newcastle, UK","Newcastle University,School of Computing,Newcastle,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing,, Newcastle University, Newcastle, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"Newcastle University,School of Computing,Newcastle,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075279338","display_name":"Stephen Bonner","orcid":"https://orcid.org/0000-0001-6008-358X"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stephen Bonner","raw_affiliation_strings":["School of Computing,, Newcastle University, Newcastle, UK","Newcastle University,School of Computing,Newcastle,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing,, Newcastle University, Newcastle, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"Newcastle University,School of Computing,Newcastle,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078307880","display_name":"A. Stephen McGough","orcid":"https://orcid.org/0000-0001-5626-0934"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andrew Stephen McGough","raw_affiliation_strings":["School of Computing,, Newcastle University, Newcastle, UK","Newcastle University"],"affiliations":[{"raw_affiliation_string":"School of Computing,, Newcastle University, Newcastle, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"Newcastle University","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013030358"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":0.16418009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47004354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"4701","last_page":"4707"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9098557233810425},{"id":"https://openalex.org/keywords/ransom","display_name":"Ransom","score":0.8490020036697388},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7719371914863586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7240213751792908},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6048924922943115},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5812461972236633},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5635982155799866},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5246586799621582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46438726782798767},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4591161608695984},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4246307611465454},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.416698157787323},{"id":"https://openalex.org/keywords/payment-system","display_name":"Payment system","score":0.4105919599533081},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13933014869689941},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12085524201393127},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.12076681852340698},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10881513357162476},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09290581941604614}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9098557233810425},{"id":"https://openalex.org/C2781426709","wikidata":"https://www.wikidata.org/wiki/Q1414572","display_name":"Ransom","level":2,"score":0.8490020036697388},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7719371914863586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7240213751792908},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6048924922943115},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5812461972236633},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5635982155799866},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5246586799621582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46438726782798767},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4591161608695984},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4246307611465454},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.416698157787323},{"id":"https://openalex.org/C2776983043","wikidata":"https://www.wikidata.org/wiki/Q986008","display_name":"Payment system","level":3,"score":0.4105919599533081},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13933014869689941},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12085524201393127},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.12076681852340698},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10881513357162476},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09290581941604614},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9006298","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1911.08364","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1911.08364","pdf_url":"https://arxiv.org/pdf/1911.08364","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2990764609","is_oa":true,"landing_page_url":"https://arxiv.org/abs/1911.08364","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:durham-repository.worktribe.com:1138922","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1138922","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"},{"id":"doi:10.48550/arxiv.1911.08364","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1911.08364","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1911.08364","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1911.08364","pdf_url":"https://arxiv.org/pdf/1911.08364","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3037747109","display_name":null,"funder_award_id":"EP/P011772/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3688699135","display_name":null,"funder_award_id":"EP/M020576/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5985745339","display_name":null,"funder_award_id":"EP/P01187X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7904777936","display_name":null,"funder_award_id":"EP/R007209/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W966766927","https://openalex.org/W1531782611","https://openalex.org/W1597482600","https://openalex.org/W1686810756","https://openalex.org/W1775772884","https://openalex.org/W1910686388","https://openalex.org/W1970867218","https://openalex.org/W1996716108","https://openalex.org/W2045649205","https://openalex.org/W2061989622","https://openalex.org/W2064327548","https://openalex.org/W2119359024","https://openalex.org/W2153579005","https://openalex.org/W2177710037","https://openalex.org/W2245015425","https://openalex.org/W2258082031","https://openalex.org/W2410611410","https://openalex.org/W2463535935","https://openalex.org/W2481159763","https://openalex.org/W2502426438","https://openalex.org/W2513529237","https://openalex.org/W2518265829","https://openalex.org/W2536018345","https://openalex.org/W2539082945","https://openalex.org/W2550109527","https://openalex.org/W2558619741","https://openalex.org/W2559964890","https://openalex.org/W2613718673","https://openalex.org/W2614042168","https://openalex.org/W2697842147","https://openalex.org/W2724134549","https://openalex.org/W2773511604","https://openalex.org/W2781518247","https://openalex.org/W2784113120","https://openalex.org/W2787931603","https://openalex.org/W2798414551","https://openalex.org/W2798499856","https://openalex.org/W2885747980","https://openalex.org/W2900786531","https://openalex.org/W2951730021","https://openalex.org/W2962756421","https://openalex.org/W2963054141","https://openalex.org/W4297970707","https://openalex.org/W6620707391","https://openalex.org/W6631877889","https://openalex.org/W6637373629","https://openalex.org/W6638021444","https://openalex.org/W6639864006","https://openalex.org/W6682691769","https://openalex.org/W6729193369","https://openalex.org/W6737892506","https://openalex.org/W6748061875","https://openalex.org/W6764301065"],"related_works":["https://openalex.org/W2991310984","https://openalex.org/W2786702830","https://openalex.org/W2985953190","https://openalex.org/W3044043031","https://openalex.org/W2011493390","https://openalex.org/W2890774408","https://openalex.org/W2744300789","https://openalex.org/W2006781395","https://openalex.org/W2498584526","https://openalex.org/W3115667107","https://openalex.org/W2012725847","https://openalex.org/W3178387577","https://openalex.org/W2327195941","https://openalex.org/W2389217975","https://openalex.org/W2481619893","https://openalex.org/W2562437036","https://openalex.org/W1500279465","https://openalex.org/W3158791582","https://openalex.org/W650145798","https://openalex.org/W2235043326"],"abstract_inverted_index":{"With":[0],"the":[1,5,11,20,65,78,83,91,111,115,146,170,186,238],"recent":[2,60],"growth":[3],"in":[4,19,99,120,155,194,202,218],"number":[6],"of":[7,28,53,90,117,123,128,139,163,172,213,240],"malicious":[8],"activities":[9],"on":[10],"internet,":[12],"cybersecurity":[13],"research":[14],"has":[15,56],"seen":[16],"a":[17,58,107,140],"boost":[18],"past":[21],"few":[22],"years.":[23],"However,":[24],"as":[25,62,161],"certain":[26],"variants":[27,71,212],"malware":[29],"can":[30,231],"provide":[31,208],"highly":[32],"lucrative":[33],"opportunities":[34],"for":[35,101],"bad":[36],"actors,":[37],"significant":[38,59],"resources":[39],"are":[40,142],"dedicated":[41],"to":[42,110,114,144,148,151,177,184,196,220,234],"innovations":[43],"and":[44,93,190,207,215,223,229],"improvements":[45],"by":[46,73,80],"vast":[47],"criminal":[48],"organisations.":[49],"Among":[50],"these":[51],"forms":[52],"malware,":[54],"ransomware":[55,173,214],"experienced":[57],"rise":[61],"it":[63,180],"offers":[64],"perpetrators":[66],"great":[67],"financial":[68],"incentive.":[69],"Ransomware":[70],"operate":[72],"removing":[74],"system":[75,84,103,164],"access":[76,104,150],"from":[77],"user":[79,136],"either":[81],"locking":[82],"or":[85,88,97,105,137,236],"encrypting":[86],"some":[87],"all":[89],"data,":[92,153],"subsequently":[94],"demanding":[95],"payment":[96],"ransom":[98,147],"exchange":[100],"returning":[102],"providing":[106],"decryption":[108],"key":[109],"victim.":[112],"Due":[113],"ubiquity":[116],"sensitive":[118],"data":[119],"many":[121,126,156],"aspects":[122],"modern":[124],"life,":[125],"victims":[127,217],"such":[129,192,241],"attacks,":[130],"be":[131,178,232],"they":[132,225],"an":[133],"individual":[134],"home":[135],"operators":[138],"business,":[141],"forced":[143],"pay":[145],"regain":[149],"their":[152,216],"which":[154],"cases":[157],"does":[158,174],"not":[159,175],"happen":[160],"renormalisation":[162],"operations":[165],"is":[166,181],"never":[167],"guaranteed.":[168],"As":[169,200],"problem":[171],"seem":[176],"subsiding,":[179],"very":[182],"important":[183],"investigate":[185],"underlying":[187],"forces":[188],"driving":[189],"facilitating":[191],"attacks":[193],"order":[195,219],"create":[197],"preventative":[198],"measures.":[199],"such,":[201],"this":[203],"paper,":[204],"we":[205],"discuss":[206],"further":[209],"insight":[210],"into":[211],"understand":[221],"how":[222],"why":[224],"have":[226],"been":[227],"targeted":[228],"what":[230],"done":[233],"prevent":[235],"mitigate":[237],"effects":[239],"attacks.":[242]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
