Organisational and individual behavioural susceptibility and protection approach for ransomware attacks

Abubakar Bello*, Queen Aigbefo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


Ransomware attacks have become complex due to the ability of networked-systems constantly used as attack-vectors for propagating the ransomware payload to victims. The threat is socially engineered, making it difficult for victims to protect their data. Confidential information resources and assets are lost and rarely recovered in an attack resulting in financial losses amounting to millions of dollars. Ongoing research is exploring avenues to solve this problem including cybersecurity awareness and training from a singularised perspective, not pluralistic, to educate users of the consequences of their actions. The purpose of this study is to gain perceptions of several industries to develop insights on how to protect organisations from becoming victims of socially engineered ransomware attacks. Using a qualitative approach, critical themes on behavioural susceptibility to socially engineered ransomware were obtained, as well as the demand for applying behavioural theories and technical controls to develop effective training and education initiatives for resisting these attacks.

Original languageEnglish
Title of host publicationHandbook of research on cybersecurity issues and challenges for business and FinTech applications
EditorsSaqib Saeed, Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Yousaf Bin Zikria
Place of PublicationHershey, PA
PublisherIGI Global
Number of pages23
ISBN (Electronic)9781668452868
ISBN (Print)9781668452844, 9781668452851
Publication statusPublished - 2023

Publication series

NameAdvances in Information Security, Privacy, and Ethics (AISPE) Book Series
PublisherIGI Global
ISSN (Print)1948-9730
ISSN (Electronic)1948-9749


Dive into the research topics of 'Organisational and individual behavioural susceptibility and protection approach for ransomware attacks'. Together they form a unique fingerprint.

Cite this