Towards a response to ransomware: Examining digital capabilities of the WannaCry attack

N.-B. Schirrmacher, J. Ondrus, F.T.C. Tan

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© PACIS 2018.The growth of the information security industry reflects the global threat of cybercriminal activities. Cybercriminal activities impose significant costs on the global economy. Yet, although cybercriminal activities are underpinned by information systems (IS), research is scarce on how digitalization facilitates cybercrimes. To understand, anticipate and control successful cybercriminal modi operandi, crime researchers need to understand the capabilities inherent in cybercriminals. We analyze the case of the WannaCry attack, a global unprecedented ransomware attack, from an IS capability perspective. Our preliminary analysis suggests a three-phase process model of the dynamic environment of WannaCry consisting of cybercriminals and counterparties. During each phase, cybercriminals relied on different types of IS capabilities to continue their operations within a changing context.
Original languageEnglish
Title of host publicationProceedings of the 22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018
EditorsM. Tanabu, D. Senoo
PublisherAssociation for Information Systems
ISBN (Electronic)9784902590838
Publication statusPublished - 2018
Externally publishedYes
Event22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018 - Yokohama, Japan
Duration: 26 Jun 201830 Jun 2018

Conference

Conference22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018
Country/TerritoryJapan
CityYokohama
Period26/06/1830/06/18

Fingerprint

Dive into the research topics of 'Towards a response to ransomware: Examining digital capabilities of the WannaCry attack'. Together they form a unique fingerprint.

Cite this