Organisational and individual behavioural susceptibility and protection approach for ransomware attacks

Abubakar Bello, Queen Aigbefo

Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review


Ransomware attacks have become complex due to the ability of networked-systems constantly used as attack-vectors for propagating the ransomware payload to victims. The threat is socially engineered, making it difficult for victims to protect their data. Confidential information resources and assets are lost and rarely recovered in an attack resulting in financial losses amounting to millions of dollars. Ongoing research is exploring avenues to solve this problem including cybersecurity awareness and training from a singularised perspective, not pluralistic, to educate users of the consequences of their actions. The purpose of this study is to gain perceptions of several industries to develop insights on how to protect organisations from becoming victims of socially engineered ransomware attacks. Using a qualitative approach, critical themes on behavioural susceptibility to socially engineered ransomware were obtained, as well as the demand for applying behavioural theories and technical controls to develop effective training and education initiatives for resisting these attacks.
Original languageEnglish
Title of host publicationHandbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
EditorsSaqib Saeed, Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Yousaf Bin Zikria
Place of PublicationHershey, Pennsylvania
PublisherIGI Global
Number of pages23
ISBN (Electronic)9781668452868
ISBN (Print)1668452847 , 9781668452844
Publication statusPublished - 21 Oct 2022


  • Artificial Intelligence
  • Blockchain
  • Cyber Policies
  • Cybersecurity
  • Data Leakage
  • Digital Transformation
  • Fintech
  • Machine Learning
  • Risk Management
  • Social Commerce


Dive into the research topics of 'Organisational and individual behavioural susceptibility and protection approach for ransomware attacks'. Together they form a unique fingerprint.

Cite this