• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • CONTACT US
Tuesday, September 26, 2023
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • CONTACT US
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • CONTACT US
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Business professors study ideal responses to ransomware attacks

Bioengineer by Bioengineer
June 30, 2021
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Study: Ransomware attacks forcing business to act against their long-term interests

IMAGE

Credit: UTA

A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect them.

Kay-Yut Chen, Jingguo Wang and Yan Lang are authors of a new study in the journal Management Science titled “Coping with Digital Extortion: An Experimental Study on Benefit Appeals and Normative Appeals.” Chen and Wang are professors of information systems and operations management at UTA. Lang is a doctoral student in the department.

A ransomware attack is like a cyber hijacking, with criminals infiltrating and seizing an organization’s data or computer systems and demanding a payment or ransom to restore access.

In its study, the UTA trio explains that companies are finding that it makes sense to negotiate with their attackers to drive down the cost of the ransom. But such behavior in turn incentivizes attackers to continue their illegal activities and runs counter to FBI guidance.

“From a policy perspective, the FBI is telling businesses not to give in,” Wang said. “But we’ve found that when you’re trying to run a business, there is almost always a ransom that becomes similar to a break-even point.”

This study investigates in part how to nudge companies toward adopting strategies that decrease the risk of digital extortion. The researchers used behavioral game theory to study tactics such as investing in cybersecurity or refusing to pay ransoms and used human subject experiments to analyze strategic decisions made by interacting players.

“We reason that when companies are hit with ransomware attacks, even if they pay the ransom, they still must pay for added security,” Chen said.

National data shows these ransomware attacks are spiking, with experts saying an organization is attacked by ransomware every 40 seconds. Earlier this year, one of the nation’s largest pipelines, carrying gasoline and jet fuel from Texas to the East Coast, shut down after a ransomware attack.

“We must convince companies that just because the bad actors come down on the ransom, it doesn’t make it right to pay them–and you’ll probably continue to have problems,” Wang said. “We need to encourage firms to do the right thing in security investing. Recognizing the long-term benefits of this approach could help other companies come to the right decision.”

###

Media Contact
Herb Booth
[email protected]

Original Source

https://www.uta.edu/news/news-releases/2021/06/30/responses-to-ransomware-attacks

Tags: Business/EconomicsSystem Security/Hackers
Share13Tweet8Share2ShareShareShare2

Related Posts

AML missing a crucial statute to curb transnational wildlife trafficking

Why endangered wildlife needs AML law coverage and banks need to share IWT intelligence

September 26, 2023
IMAP Illustration

NASA’s Interstellar Mapping and Acceleration Probe passes system integration review

September 25, 2023

National Science Foundation taps Worcester Polytechnic Institute fire protection expertise and resources for the Wildfire Interdisciplinary Research Center

September 25, 2023

Men who trust their doctors, receive adequate time and general information about prostate cancer screening are more likely to have productive discussions

September 25, 2023
Please login to join discussion

POPULAR NEWS

  • blank

    Microbe Computers

    59 shares
    Share 24 Tweet 15
  • A pioneering study from Politecnico di Milano sheds light on one of the still poorly understood aspects of cancer

    35 shares
    Share 14 Tweet 9
  • Fossil spines reveal deep sea’s past

    34 shares
    Share 14 Tweet 9
  • Scientists go ‘back to the future,’ create flies with ancient genes to study evolution

    75 shares
    Share 30 Tweet 19

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Why endangered wildlife needs AML law coverage and banks need to share IWT intelligence

NASA’s Interstellar Mapping and Acceleration Probe passes system integration review

National Science Foundation taps Worcester Polytechnic Institute fire protection expertise and resources for the Wildfire Interdisciplinary Research Center

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 57 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In