{"id":"https://openalex.org/W4200228653","doi":"https://doi.org/10.1145/3481357.3481508","title":"Replicating a Study of Ransomware in Germany","display_name":"Replicating a Study of Ransomware in Germany","publication_year":2021,"publication_date":"2021-10-11","ids":{"openalex":"https://openalex.org/W4200228653","doi":"https://doi.org/10.1145/3481357.3481508"},"language":"en","primary_location":{"id":"doi:10.1145/3481357.3481508","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3481357.3481508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 European Symposium on Usable Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021324454","display_name":"Anna-Marie Ortloff","orcid":"https://orcid.org/0000-0002-5735-178X"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anna-Marie Ortloff","raw_affiliation_strings":["University of Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090159320","display_name":"Maike Vossen","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maike Vossen","raw_affiliation_strings":["University of Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005498852","display_name":"Christian Tiefenau","orcid":"https://orcid.org/0000-0002-0904-1437"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Tiefenau","raw_affiliation_strings":["University of Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021324454"],"corresponding_institution_ids":["https://openalex.org/I135140700"],"apc_list":null,"apc_paid":null,"fwci":0.3047,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.56517918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"151","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9416327476501465},{"id":"https://openalex.org/keywords/ransom","display_name":"Ransom","score":0.7359731197357178},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.684525191783905},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.5733693242073059},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5285120010375977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5231015682220459},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4574635624885559},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4353308379650116},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4262637495994568},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3400745689868927},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.16553384065628052},{"id":"https://openalex.org/keywords/demography","display_name":"Demography","score":0.1554519236087799},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1133924126625061},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.0855674147605896}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9416327476501465},{"id":"https://openalex.org/C2781426709","wikidata":"https://www.wikidata.org/wiki/Q1414572","display_name":"Ransom","level":2,"score":0.7359731197357178},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.684525191783905},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.5733693242073059},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5285120010375977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5231015682220459},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4574635624885559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4353308379650116},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4262637495994568},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3400745689868927},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.16553384065628052},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.1554519236087799},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1133924126625061},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0855674147605896},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3481357.3481508","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3481357.3481508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 European Symposium on Usable Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1484855372","https://openalex.org/W1591059668","https://openalex.org/W1998102636","https://openalex.org/W2017179611","https://openalex.org/W2258098469","https://openalex.org/W2552218842","https://openalex.org/W2582743722","https://openalex.org/W2587745032","https://openalex.org/W2601607297","https://openalex.org/W2614042168","https://openalex.org/W2750688159","https://openalex.org/W2766662076","https://openalex.org/W2769073493","https://openalex.org/W2784113120","https://openalex.org/W2790338002","https://openalex.org/W2808131992","https://openalex.org/W2892161609","https://openalex.org/W2902163892","https://openalex.org/W2913264887","https://openalex.org/W2914982603","https://openalex.org/W2931556662","https://openalex.org/W2945832014","https://openalex.org/W2963549118","https://openalex.org/W3000137316","https://openalex.org/W3032043542","https://openalex.org/W3111126165","https://openalex.org/W4242721106","https://openalex.org/W4396754091"],"related_works":["https://openalex.org/W4237045072","https://openalex.org/W4386388924","https://openalex.org/W2614042168","https://openalex.org/W2778994855","https://openalex.org/W2913313394","https://openalex.org/W4285276936","https://openalex.org/W4281476659","https://openalex.org/W4213358345","https://openalex.org/W4206259164","https://openalex.org/W2914950722"],"abstract_inverted_index":{"Ransomware":[0],"is":[1,34],"a":[2,55,78,90,140],"pertinent":[3],"threat":[4],"to":[5,36,61,73,83],"businesses":[6],"and":[7,18,105,119,135,146],"end":[8],"user":[9],"data.":[10],"While":[11],"several":[12],"attacks":[13],"on":[14],"enterprises":[15],"are":[16,40],"reported":[17],"give":[19],"insights":[20],"into":[21],"the":[22,31,65,85,99,106,116],"prevalence":[23,29],"of":[24,58,87,109],"such":[25],"ransomware":[26,88,141],"attacks,":[27],"this":[28,75],"in":[30,89,137],"general":[32],"population":[33,81],"hard":[35],"estimate":[37,62],"since":[38],"they":[39],"not":[41],"monitored":[42],"by":[43,50,132],"an":[44,123],"official":[45],"entity.":[46],"A":[47],"2019":[48],"study":[49,84],"Simoiu":[51],"et":[52],"al.":[53],"surveyed":[54],"representative":[56,79],"sample":[57],"American":[59],"consumers":[60],"it":[63],"for":[64,77,144],"US":[66],"population.":[67],"One":[68],"year":[69],"later,":[70],"we":[71],"aimed":[72],"replicate":[74],"effort":[76],"German":[80],"(N=963)":[82],"spread":[86],"different":[91],"context.":[92],"Our":[93],"findings":[94],"suggest":[95],"some":[96],"differences":[97],"between":[98],"two":[100],"samples":[101],"concerning":[102],"payment":[103],"methods":[104],"participants\u2019":[107],"way":[108],"dealing":[110],"with":[111],"ransomware.":[112],"Other":[113],"aspects,":[114],"like":[115],"ransom":[117],"amounts":[118],"behavioral":[120],"changes":[121],"after":[122],"attack,":[124],"were":[125],"largely":[126],"similar.":[127],"We":[128],"extend":[129],"prior":[130],"work":[131],"examining":[133],"disagreements":[134],"uncertainty":[136],"judging":[138],"whether":[139],"attack":[142],"occurred":[143],"participants":[145],"researchers":[147],"alike.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
