Javascript must be enabled to continue!
To pay or not: game theoretic models of ransomware
View through CrossRef
Abstract
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and develop the game theoretic literature on kidnapping in order to gain insight on ransomware. The prior literature on kidnapping has largely focused on political or terrorist hostage taking. We demonstrate, however, that key models within the literature can be adapted to give critical new insight on ransomware. We primarily focus on two models. The first gives insight on the optimal ransom that criminals should charge. The second gives insight on the role of deterrence through preventative measures. A key insight from both models will be the importance of spillover effects across victims. We will argue that such spillovers point to the need for some level of outside intervention, by governments or otherwise, to tackle ransomware.
Oxford University Press (OUP)
Title: To pay or not: game theoretic models of ransomware
Description:
Abstract
Ransomware is a type of malware that encrypts files and demands a ransom from victims.
It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain.
In this article, we review and develop the game theoretic literature on kidnapping in order to gain insight on ransomware.
The prior literature on kidnapping has largely focused on political or terrorist hostage taking.
We demonstrate, however, that key models within the literature can be adapted to give critical new insight on ransomware.
We primarily focus on two models.
The first gives insight on the optimal ransom that criminals should charge.
The second gives insight on the role of deterrence through preventative measures.
A key insight from both models will be the importance of spillover effects across victims.
We will argue that such spillovers point to the need for some level of outside intervention, by governments or otherwise, to tackle ransomware.
Related Results
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware att...
Schule und Spiel – mehr als reine Wissensvermittlung
Schule und Spiel – mehr als reine Wissensvermittlung
Die öffentliche Schule Quest to learn in New York City ist eine Modell-Schule, die in ihren Lehrmethoden auf spielbasiertes Lernen, Game Design und den Game Design Prozess setzt. I...
Effects of Ransomware: Analysis, Challenges and Future Perspective
Effects of Ransomware: Analysis, Challenges and Future Perspective
This review paper highlights the challenges and best practices in malware analysis, specifically focusing on the age of ransomware. It provides an overview of malware and its impac...
Game Theory in Business Ethics: Bad Ideology or Bad Press?
Game Theory in Business Ethics: Bad Ideology or Bad Press?
Solomon’s article and Binmore’s response exemplify a standard exchange between the game theorist and those critical of applying game theory to ethics. The critic of game theory lis...
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review
This study aims to address the challenges and propose solutions for the Optimization of Blockchain-Based Cybersecurity Systems to Enhance Resilience Against Ransomware Attacks usin...
Konsep Perilaku Keputusan Pembelian Game Online
Konsep Perilaku Keputusan Pembelian Game Online
E-Sport sports have been recognized as sports since 2020. The rise of technological developments makes game applications more very diverse and competitive. Data shows that the numb...
A Proposed Methodology to Mitigate the Ransomware Attack
A Proposed Methodology to Mitigate the Ransomware Attack
Now a day’s network security becomes more important to organizations, government offices. With the fast advancement of the innovation, assaults throughout the years have turned out...
Application of Game Theoretic Model for Cyber Threat Intelligence Framework
Application of Game Theoretic Model for Cyber Threat Intelligence Framework
In the ever-evolving landscape of cybersecurity, the application of game
theoretic models has emerged as a powerful and innovative approach to
enhance our understanding and managem...

