• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Thursday, March 26, 2026
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Business professors study ideal responses to ransomware attacks

Bioengineer by Bioengineer
June 30, 2021
in Science News
Reading Time: 2 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Study: Ransomware attacks forcing business to act against their long-term interests

IMAGE

Credit: UTA

A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect them.

Kay-Yut Chen, Jingguo Wang and Yan Lang are authors of a new study in the journal Management Science titled “Coping with Digital Extortion: An Experimental Study on Benefit Appeals and Normative Appeals.” Chen and Wang are professors of information systems and operations management at UTA. Lang is a doctoral student in the department.

A ransomware attack is like a cyber hijacking, with criminals infiltrating and seizing an organization’s data or computer systems and demanding a payment or ransom to restore access.

In its study, the UTA trio explains that companies are finding that it makes sense to negotiate with their attackers to drive down the cost of the ransom. But such behavior in turn incentivizes attackers to continue their illegal activities and runs counter to FBI guidance.

“From a policy perspective, the FBI is telling businesses not to give in,” Wang said. “But we’ve found that when you’re trying to run a business, there is almost always a ransom that becomes similar to a break-even point.”

This study investigates in part how to nudge companies toward adopting strategies that decrease the risk of digital extortion. The researchers used behavioral game theory to study tactics such as investing in cybersecurity or refusing to pay ransoms and used human subject experiments to analyze strategic decisions made by interacting players.

“We reason that when companies are hit with ransomware attacks, even if they pay the ransom, they still must pay for added security,” Chen said.

National data shows these ransomware attacks are spiking, with experts saying an organization is attacked by ransomware every 40 seconds. Earlier this year, one of the nation’s largest pipelines, carrying gasoline and jet fuel from Texas to the East Coast, shut down after a ransomware attack.

“We must convince companies that just because the bad actors come down on the ransom, it doesn’t make it right to pay them–and you’ll probably continue to have problems,” Wang said. “We need to encourage firms to do the right thing in security investing. Recognizing the long-term benefits of this approach could help other companies come to the right decision.”

###

Media Contact
Herb Booth
[email protected]

Original Source

https://www.uta.edu/news/news-releases/2021/06/30/responses-to-ransomware-attacks

Tags: Business/EconomicsSystem Security/Hackers
Share13Tweet8Share2ShareShareShare2

Related Posts

Microtubules Found to Actively Ensure Accurate Chromosome Distribution During Cell Division

March 25, 2026

Aversive Learning Hijacks Brain Sugar Sensor

March 25, 2026

Isolated H2-Reduced Clusters Boost CO2-to-Methanol Catalysis

March 25, 2026

In-Sensor Cryptography Links Physical Process to Digital Identity

March 25, 2026
Please login to join discussion

POPULAR NEWS

  • blank

    Revolutionary AI Model Enhances Precision in Detecting Food Contamination

    96 shares
    Share 38 Tweet 24
  • Imagine a Social Media Feed That Challenges Your Views Instead of Reinforcing Them

    1003 shares
    Share 397 Tweet 248
  • Uncovering Functions of Cavernous Malformation Proteins in Organoids

    54 shares
    Share 22 Tweet 14
  • Promising Outcomes from First Clinical Trials of Gene Regulation in Epilepsy

    51 shares
    Share 20 Tweet 13

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

In-Sensor Cryptography Links Physical Process to Digital Identity

Can Psychosocial Factors Influence Cancer Risk?

Depression Factors in Elderly: Pre vs. Post-COVID Analysis

Subscribe to Blog via Email

Success! An email was just sent to confirm your subscription. Please find the email now and click 'Confirm' to start subscribing.

Join 78 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.