University of Twente Student Theses
Exploring Influencing Behaviours in Ransomware Negotiations : Comparing Parties and Identifying Patterns
Schnirch, L.P.M. (2024) Exploring Influencing Behaviours in Ransomware Negotiations : Comparing Parties and Identifying Patterns.
PDF
1MB |
Abstract: | The prevalence of ransomware attacks has increased significantly over the past decade, and there is a notable lack of effective prevention and detection tools. Therefore, the most viable opportunity for victims to reduce financial losses and retrieve their data lies in the negotiation stage of an attack. Here, by effectively employing and responding to influence strategies, victims might be able to persuade the threat actor to decrease the ransom amount. Therefore, insights into influencing behaviours in this context are essential. Hence, this study explored the use of influencing behaviours by both threat actors and victims in ransomware negotiations, building on the Table of Ten influencing strategies by Giebels (2002, as cited in Giebels & Noelanders, 2004). Using a sample of 25 ransomware negotiation logs from an open-source repository, this study conducted a comprehensive analysis of influencing behaviours employed by both parties. Specifically, after coding the logs based on the Table of Ten, the coded data was used to compute the relative frequency of each behaviour, identify the most frequent behaviour (mode) at each utterance level, and conduct sequential pattern analysis using the cSPADE algorithm aiming uncover strategic sequences. The interpretation of the results indicated that there is a special need for threat actors in ransomware negotiations to proof their credibility. Furthermore, it showed that threat actors contribute more to the negotiations in terms of utterances. Lastly, the current study established that there are reoccurring patterns of influencing behaviours in ransomware negotiations. Overall, by applying the Table of Ten to a context of ransomware and producing empirically supported insights, this research bridges a gap in literature, contributing to the understanding of negotiation dynamics in ransomware cases. |
Item Type: | Essay (Bachelor) |
Faculty: | BMS: Behavioural, Management and Social Sciences |
Subject: | 77 psychology |
Programme: | Psychology BSc (56604) |
Link to this item: | https://purl.utwente.nl/essays/100716 |
Export this item as: | BibTeX EndNote HTML Citation Reference Manager |
Repository Staff Only: item control page