Author of the publication

It's More Than Just Money: The Real-World Harms from Ransomware Attacks.

, , , , , , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 261-274. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The anatomy of online deception: what makes automated text convincing?, , and . SAC, page 1115-1120. ACM, (2016)IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond., , , , and . IT Prof., 25 (5): 17-19 (September 2023)A framework for effective corporate communication after cyber security incidents., and . Comput. Secur., (2020)Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter., , and . ISI, page 98-103. IEEE, (2019)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CyberSA, page 1-8. IEEE, (2020)#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives., , and . EuroS&P Workshops, page 438-447. IEEE, (2020)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)Behind the Mask: A Computational Study of Anonymous' Presence on Twitter., , and . ICWSM, page 327-338. AAAI Press, (2020)The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter., , and . ICWSM Workshops, (2021)BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business., and . ICIW, page 286-291. IEEE Computer Society, (2009)