{"id":"https://openalex.org/W4200068894","doi":"https://doi.org/10.1109/istas52410.2021.9629211","title":"Emerging ransomeware threats: An anticipatory ethical anaylsis","display_name":"Emerging ransomeware threats: An anticipatory ethical anaylsis","publication_year":2021,"publication_date":"2021-10-28","ids":{"openalex":"https://openalex.org/W4200068894","doi":"https://doi.org/10.1109/istas52410.2021.9629211"},"language":"en","primary_location":{"id":"doi:10.1109/istas52410.2021.9629211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istas52410.2021.9629211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053287624","display_name":"Richard L. Wilson","orcid":"https://orcid.org/0000-0001-9482-6302"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Richard Wilson","raw_affiliation_strings":["Dept\u2019s of Philosophy&Computer and Information Sciences, Towson University, Towson, MD, U.S.A","Dept's of Philosophy&Computer and Information Sciences, Towson University, Towson, MD, U.S.A"],"affiliations":[{"raw_affiliation_string":"Dept\u2019s of Philosophy&Computer and Information Sciences, Towson University, Towson, MD, U.S.A","institution_ids":[]},{"raw_affiliation_string":"Dept's of Philosophy&Computer and Information Sciences, Towson University, Towson, MD, U.S.A","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031913629","display_name":"Ion Iftimie","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ion Iftimie","raw_affiliation_strings":["School of Business, George Washington University, Washington, DC, U.S.A"],"affiliations":[{"raw_affiliation_string":"School of Business, George Washington University, Washington, DC, U.S.A","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053287624"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9142,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75111562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9164832234382629},{"id":"https://openalex.org/keywords/extortion","display_name":"Extortion","score":0.8817731142044067},{"id":"https://openalex.org/keywords/ransom","display_name":"Ransom","score":0.8293834328651428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6939864158630371},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5384262800216675},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.4798516631126404},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4345468282699585},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4272938072681427},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.4217376410961151},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39909350872039795},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2776678502559662},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1631125509738922},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14770960807800293},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09759455919265747},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08907970786094666},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08605769276618958}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9164832234382629},{"id":"https://openalex.org/C2779066997","wikidata":"https://www.wikidata.org/wiki/Q6452087","display_name":"Extortion","level":2,"score":0.8817731142044067},{"id":"https://openalex.org/C2781426709","wikidata":"https://www.wikidata.org/wiki/Q1414572","display_name":"Ransom","level":2,"score":0.8293834328651428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6939864158630371},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5384262800216675},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.4798516631126404},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4345468282699585},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4272938072681427},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.4217376410961151},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39909350872039795},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2776678502559662},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1631125509738922},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14770960807800293},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09759455919265747},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08907970786094666},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08605769276618958}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/istas52410.2021.9629211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istas52410.2021.9629211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4237045072","https://openalex.org/W4386388924","https://openalex.org/W3178261856","https://openalex.org/W3095609254","https://openalex.org/W2886257824","https://openalex.org/W2614042168","https://openalex.org/W4251141062","https://openalex.org/W2778994855","https://openalex.org/W3013350171","https://openalex.org/W2913313394"],"abstract_inverted_index":{"Ransomware":[0,304],"has":[1],"become":[2,72],"a":[3,53],"primary":[4],"security":[5],"risk":[6],"to":[7,33,134,173,215,249,270,279,295],"businesses,":[8],"and":[9,24,27,37,69,171,221,236,243,259,264,276,281,305],"it":[10,195],"is":[11,59,182,189],"now":[12],"the":[13,80,84,100,142,146,150,162,169,227,300,311],"fastest-growing":[14],"category":[15],"of":[16,55,74,82,185,256,286,302],"cybercrime.":[17],"Furthermore,":[18],"ransomware":[19,41,75,188,318],"attacks":[20,76,114],"on":[21,44,161],"healthcare,":[22],"energy":[23],"water":[25],"distribution,":[26],"defense":[28],"contractor":[29],"organizations":[30,251],"have":[31],"begun":[32],"impact":[34],"both":[35],"business":[36,170,237],"national":[38],"security.":[39],"Traditional":[40],"encrypts":[42],"files":[43,88,95,121,143,147],"an":[45,129,178],"infected":[46],"computer":[47],"which":[48,120,210],"blocks":[49],"users\u2019":[50],"access":[51],"until":[52],"sum":[54],"money":[56],"or":[57,66,86,97,165],"ransom":[58,181],"paid,":[60],"often":[61],"via":[62],"cryptocurrencies":[63],"like":[64,239],"Bitcoin":[65],"Ethereum.":[67],"Businesses":[68],"individuals":[70],"who":[71],"victims":[73],"are":[77,122,148,246,268],"faced":[78],"with":[79],"expense":[81],"paying":[83],"ransom,":[85],"restoring":[87,99],"from":[89,138,252,299],"backup":[90],"if":[91,128],"this":[92,253,283,307],"available,":[93],"losing":[94],"altogether":[96],"completely":[98],"files.":[101],"Beginning":[102],"in":[103,191,209,226,234],"late":[104],"2019,":[105],"cybercriminals":[106],"stepped":[107],"up":[108],"their":[109],"game":[110],"by":[111,140,156,166,218],"deploying":[112],"new":[113,254],"known":[115],"as":[116,310],"\u201cdouble-extortion\u201d":[117],"ransomware,":[118],"within":[119],"stolen":[123,211],"before":[124,145],"being":[125],"encrypted.":[126],"Even":[127],"organization":[130],"might":[131],"be":[132,197,216],"able":[133],"recover":[135],"its":[136,192],"data":[137,160,212,257],"backups,":[139,245],"stealing":[141],"first":[144],"encrypted,":[149],"attacker":[151],"can":[152,196],"still":[153,190],"profit":[154],"either":[155],"selling":[157],"any":[158],"confidential":[159],"dark":[163],"web":[164],"further":[167],"extorting":[168],"threatening":[172],"leak":[174],"sensitive":[175],"information":[176],"unless":[177],"even":[179,204],"larger":[180],"paid.":[183],"As":[184],"2021,":[186],"double-extortion":[187],"infancy,":[193],"but":[194],"anticipated":[198],"that":[199],"possible":[200],"long-term":[201],"trends":[202],"toward":[203],"more":[205],"persistent":[206,287],"multiple-extortion":[207],"tactics,":[208],"could":[213],"continue":[214],"used":[217],"cybercriminals,":[219],"terrorists,":[220],"rogue":[222],"nation-states":[223],"potentially":[224],"decades":[225],"future":[228,297,317],"will":[229,293],"continue.":[230],"Traditional,":[231],"passive":[232],"measures":[233],"cybersecurity":[235],"continuity,":[238],"firewalls,":[240],"antivirus":[241],"software,":[242],"frequent":[244],"not":[247],"sufficient":[248],"protect":[250],"type":[255],"theft":[258],"extortion":[260],"enterprise.":[261],"Government":[262],"agencies":[263],"private":[265],"corporations":[266],"alike":[267],"beginning":[269],"employ":[271],"active":[272],"cyber":[273],"threat":[274],"hunters":[275],"intelligence":[277],"analysts":[278],"detect":[280],"neutralize":[282],"newest":[284],"class":[285],"threat.":[288],"This":[289],"anticipatory":[290],"ethical":[291,308],"analysis":[292,309],"attempt":[294],"identify":[296],"threats":[298],"development":[301],"Multiple-Extortion":[303],"use":[306],"basis":[312],"for":[313],"developing":[314],"policy":[315],"about":[316],"developments.":[319]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
