{"id":"https://openalex.org/W4403668362","doi":"https://doi.org/10.48550/arxiv.2409.09744","title":"Taming the Ransomware Threats: Leveraging Prospect Theory for Rational Payment Decisions","display_name":"Taming the Ransomware Threats: Leveraging Prospect Theory for Rational Payment Decisions","publication_year":2024,"publication_date":"2024-09-15","ids":{"openalex":"https://openalex.org/W4403668362","doi":"https://doi.org/10.48550/arxiv.2409.09744"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2409.09744","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.09744","pdf_url":"https://arxiv.org/pdf/2409.09744","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2409.09744","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079215564","display_name":"Pranjal Sharma","orcid":"https://orcid.org/0000-0001-6418-9381"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sharma, Pranjal","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5079215564"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9366000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9258999824523926,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8043116331100464},{"id":"https://openalex.org/keywords/prospect-theory","display_name":"Prospect theory","score":0.645025372505188},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5310941934585571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48418501019477844},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39477503299713135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3515632152557373},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34296363592147827},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3353240489959717},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.1653234362602234},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.07670256495475769}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8043116331100464},{"id":"https://openalex.org/C339426","wikidata":"https://www.wikidata.org/wiki/Q1151839","display_name":"Prospect theory","level":2,"score":0.645025372505188},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5310941934585571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48418501019477844},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39477503299713135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3515632152557373},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34296363592147827},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3353240489959717},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.1653234362602234},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.07670256495475769}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2409.09744","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.09744","pdf_url":"https://arxiv.org/pdf/2409.09744","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2409.09744","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2409.09744","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2409.09744","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.09744","pdf_url":"https://arxiv.org/pdf/2409.09744","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403668362.pdf","grobid_xml":"https://content.openalex.org/works/W4403668362.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W3120595989"],"abstract_inverted_index":{"Day":[0],"by":[1,81,142],"day,":[2],"the":[3,31,56,78,89,116,135,147,174],"frequency":[4],"of":[5,62,177],"ransomware":[6],"attacks":[7],"on":[8,97,111],"organizations":[9,43,86,106,182],"is":[10],"experiencing":[11],"a":[12,39,48,51,60,70],"significant":[13],"surge.":[14],"High-profile":[15],"incidents":[16],"involving":[17],"major":[18],"entities":[19],"like":[20],"Las":[21],"Vegas":[22],"giants":[23],"MGM":[24],"Resorts,":[25],"Caesar":[26],"Entertainment,":[27],"and":[28,64,100,126,144,159],"Boeing":[29],"underscore":[30],"profound":[32],"impact,":[33],"posing":[34],"substantial":[35],"business":[36],"barriers.":[37],"When":[38],"sudden":[40],"cyberattack":[41],"occurs,":[42],"often":[44],"find":[45],"themselves":[46],"at":[47],"loss,":[49],"with":[50],"looming":[52],"countdown":[53],"to":[54,59,76,84,107,113,115,133,152,183],"pay":[55],"ransom,":[57],"leading":[58],"cascade":[61],"impromptu":[63],"unfavourable":[65],"decisions.":[66,186],"This":[67,121],"paper":[68],"adopts":[69],"novel":[71],"approach,":[72],"leveraging":[73,156],"Prospect":[74,98,131,161],"Theory,":[75],"elucidate":[77],"tactics":[79],"employed":[80],"cyber":[82],"attackers":[83,143],"entice":[85],"into":[87,164],"paying":[88],"ransom.":[90],"Furthermore,":[91],"it":[92],"introduces":[93],"an":[94,101],"algorithm":[95,122],"based":[96],"Theory":[99,132],"Attack":[102],"Recovery":[103],"Plan,":[104],"enabling":[105,181],"make":[108],"informed":[109,170],"decisions":[110],"whether":[112],"consent":[114],"ransom":[117],"demands":[118],"or":[119,179],"resist.":[120],"Ransomware":[123],"Risk":[124],"Analysis":[125],"Decision":[127],"Support":[128],"(RADS)":[129],"uses":[130],"re-instantiate":[134],"shifted":[136],"reference":[137],"manipulated":[138],"as":[139],"perceived":[140],"gains":[141],"adjusts":[145],"for":[146],"framing":[148],"effect":[149],"created":[150],"due":[151],"time":[153],"urgency.":[154],"Additionally,":[155],"application":[157],"criticality":[158],"incorporating":[160],"Theory's":[162],"insights":[163],"under/over":[165],"weighing":[166],"probabilities,":[167],"RADS":[168],"facilitates":[169],"decision-making":[171],"that":[172],"transcends":[173],"simplistic":[175],"framework":[176],"\"consent\"":[178],"\"resistance,\"":[180],"achieve":[184],"optimal":[185]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
