Quantitative and Qualitative Research on Ransomware Research Paper

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

Following the rise in the cases of ransomware attacks, it is crucial to approach the issues and find alternative solutions. Ransomware is computer software created to hinder computer users from accessing the computer system unless they pay a specific access fee (Yaqoob et al., 2017). A ransom is a fee paid to access the information back. Computer users get the links to such software from phished emails and unwarily open. Accessing the phished emails results in damage through loss of sensitive personal data and details, disruption of their regular programmes loss of finances paid to regain access to their computer systems. This report reviews the quantitative and qualitative characteristics of ransomware.

We will write a custom essay on your topic a custom Research Paper on Quantitative and Qualitative Research on Ransomware
808 writers online

Methodology

The Delphi method, use of questionnaires reading journal articles and surveys, are used in the research to gain quality and reliable feedback. After collecting the data, the researcher reviewed using content analysis, where we looked into the scope of the data giving the information discussed below. The methods used in the collection and analysing the data were cheap and easily accessible in this case. Though the data collected is accurate, convincing the participants to participate in such a delicate topic was the only problem encountered. The explorer managed relevant information about the qualities of the ransomware and estimated their quantitative characteristics.

Study Findings and Results

The ransomware consists of unbreakable encryptions that the creators can only access. Unbreakable encryption creates a hard to answer puzzle for the computer owner, making them pay for the ransomware’s removal as the only reliable option. The computer owners fear and lack alternatives to accessing their systems. Removing the ransomware attack once the computer user opens the link is difficult because the virus contaminates the computer system. The virus encrypts all kinds of data and creates an impossibility to identify the areas and files affected by the hacking. Once the encryption occurs, the files’ names are interfered with, exaggerating the difficulty to trace the destroyed files. It creates instability in the thinking of the computer owner and leads to the payment of the ransom.

Additionally, the hackers display symbolic images and messages to inform the owner that they have to pay a ransom to access their files. The hackers send the photos and news to create panic in the computer owner, leading to unstable decisions (Hull, John & Arief, 2019). The ransom has a time limit by which innocent computer users should pay. Failing to pay the ransom extends the damage on the computer systems until the casualty makes the payment. The victimiser directs victims to make payments in the form of Bitcoins. Bitcoins are difficult to trace; thus no evidence about the creators of the ransomware. The creators of this computer software use ransomware to exploit computer users who are not cautious and sensitive in protecting their computers from such attacks.

In terms of quantity, ransomware attacks have led to losses of billions of money and affected a large magnitude of people, that is, millions of computer users throughout the world (Thomas, 2018). The victims undergo similar circumstances and fail to keep their accessories off the attacks. However, despite the challenges of detective measures to identify the sources of these attacks to protect computer users, people can take personal precautionary actions to protect their computers from external aggression and evade their losses. First, computer users should employ data backup systems in case such incidences occur, and they will have a better alternative than falling into the trap of paying the ransom. Second, they should upgrade their computer systems into the most recent ones. Updating to the latest systems ensure they are less exposed to ransomware compared to those using outdated ones. Lastly, they should use antivirus software to protect the computers from questionable sites and mails.

Conclusion

Ransomware causes discomfort among computer users and exploits them to pay an unnecessary amount of money to access their property. Victims experience moments of insecurity due to loss of personal data, losing money correcting the mess, and disrupting their schedules. Lack of systems to decrypt the computer systems without paying the wholesome has aided in the exploitation process and should be looked into by governmental and non-governmental agencies.

Reference

Hull, G., John, H., & Arief, B. (2019). Crime Science, 8(1), 1-22.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Thomas, J. (2018). Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3), 1-23.

Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., & Guizani, M. (2017). Computer Networks, 129, 444-458.

Print
Need an custom research paper on Quantitative and Qualitative Research on Ransomware written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, February 21). Quantitative and Qualitative Research on Ransomware. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/

Work Cited

"Quantitative and Qualitative Research on Ransomware." IvyPanda, 21 Feb. 2023, ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

References

IvyPanda. (2023) 'Quantitative and Qualitative Research on Ransomware'. 21 February.

References

IvyPanda. 2023. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

1. IvyPanda. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.


Bibliography


IvyPanda. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

Powered by CiteTotal, easy referencing generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1