Mitigating Ransomware Victimisation Through the Sharing Economy

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter examines the role of the ‘No More Ransom' platform on scarce resource sharing between the public and private sectors to mitigate ransomware victimisation. The chapter investigates the effectiveness of the platform with the most prominent sharing economy variables; low barrier accessibility, transaction cost, and trust-building. The chapter employs each sharing economy variable on three beneficiaries of the platform victims, law enforcement agencies (LEAs) and private companies. Based on Europol documents, semi-structured elite interviews and online expert webinars, the chapter's central argument is that the ‘No More Ransom' platform provides a low barrier to entry for victims, LEAs, and private companies to access the platform. It also reduces the transaction cost for all parties sharing decryption tools. However, for more efficient resource sharing, the addition of robust trust-building mechanisms in the platform for the private sector will reduce the possible trust issues between LEAs and the private sector and motivate and encourage more private sector participation. Increasing private sector participation, as a result, will reduce the transaction cost of obtaining decryption tools by victims.
Original languageEnglish
Title of host publicationThe Sharing Economy for Tackling Cybercrime
PublisherSpringer Nature
Pages43-54
Number of pages12
ISBN (Electronic)978-3-031-20274-2
ISBN (Print)978-3-031-20273-5 , 978-3-031-20276-6
DOIs
Publication statusPublished - 2 Jan 2023

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer Nature
ISSN (Print)1613-5113
ISSN (Electronic)2363-9466

Keywords

  • Cybercrime
  • Europol
  • Public-private partnership
  • Ransomware
  • Sharing economy

Fingerprint

Dive into the research topics of 'Mitigating Ransomware Victimisation Through the Sharing Economy'. Together they form a unique fingerprint.

Cite this