Ransomware: A Research and a Personal Case Study of Dealing with this Nasty Malware

Azad Ali
InSITE 2017  •  2017  •  pp. 916
[This Proceedings paper was revised and published in the journal Issues in Informing Science and Information Technology]

Aim/Purpose: Share research finding about ransomware, depict the ransomware work in a format that commonly used by researchers and practitioners and illustrate personal case experience in dealing with ransomware.

Background: Author was hit with Ransomware, suffered a lot from it, and did a lot of research about this topic. Author wants to share findings in his research and his experience in dealing with the aftermath of being hit with ransomware.

Methodology: Case study. Applying the literature review for a personal case study.

Contribution: More knowledge and awareness about ransomware, how it attacks peoples’ computers, and how well informed users can be hit with this malware.

Findings: Even advanced computer users can be hit and suffer from Ransomware attacks. Awareness is very helpful. In addition, this study drew in chart format what is termed “The Ransomware Process”, depicting in chart format the steps that ransomware hits users and collects ransom.

Recommendations for Practitioners : Study reiterates other recommendations made for dealing with ransomware attacks but puts them in personal context for more effective awareness about this malware.

Recommendation for Researchers: This study lays the foundation for additional research to find solutions to the ransomware problem. IT researchers are aware of chart representations to depict cycles (like SDLC). This paper puts the problem in similar representation to show the work of ransomware.

Impact on Society: Society will be better informed about ransomware. Through combining research, illustrating personal experience, and graphically representing the work of ransomware, society at large will be better informed about the risk of this malware.

Future Research: Research into solutions for this problem and how to apply them to personal cases
Ransomware, Malware, Crypto 3, Crypto 4, Computer ransom
38 total downloads
Share this
 Back

Back to Top ↑