References
- Ashford, Warwick. 2017. “Wannacry an Example of Pseudo-Ransomware, Says McAfee”. ComputerWeekly. Accessed December 31, 2017. https://www.computerweekly.com/news/450427114/WannaCry-an-example-of-pseudo-ransomware-says-McAfee.
- Assante, Michael, and Andrew Bochman. 2017. “Automation, Autonomy & Megacities 2025: A Dark Preview.” Center for Strategic and International Studies 3: 1–16. doi: 10.1142/S2377740017500075
- Atlanta Department of Procurement. 2018. “Emergency Procurements”. Accessed May 5, 2018. https://procurement.atlantaga.gov/emergency-procurements/.
- BBC News. 2017. “NHS Trusts ‘At Fault’ Over Cyber-Attack”. BBC News. Accessed December 31, 2017. https://www.bbc.co.uk/news/technology-41753022.
- Benner, Katie, Mike Isaac, and Sheera Frenkel. 2017. “Uber Hid 2016 Breach, Paying Hackers to Delete Stolen Data”. New York Times, November 21. Accessed January 14, 2018. https://www.nytimes.com/2017/11/21/technology/uber-hack.html.
- Berkeley. 2018. “Incident Response Planning Guideline – Information Security and Policy”. Security Berkeley. Accessed February 24, 2018. https://security.berkeley.edu/incident-response-planning-guideline.
- Berry, Melissa. 2017. “How Many Uber Drivers Are There? The Rideshare Guy Blog and Podcast”. Accessed December 30, 2017. https://therideshareguy.com/how-many-uber-drivers-are-there/.
- Birdsey, Ian. 2017. “NHS Cyber Incident Response Plan Not Tested Locally Prior To ‘WannaCry’ Attack, NAO Finds”. Out-Law. Accessed April 9, 2018. https://www.out-law.com/en/articles/2017/october/nhs-cyber-incident-response-plan-not-tested-locally-prior-to-wannacry-attack-nao-finds/.
- Carbon Black. 2017. The Ransomware Economy. Waltham: Carbon Black. Accessed November 9, 2017. https://www.carbonblack.com/resource/the-ransomware-economy/.
- Cohen, Fred. 2006. The Use of Deception Techniques: Honeypots and Decoys. Handbook of Information Security. John Wiley & Sons.
- Das, Samburaj. 2016. “Melrose Police Pay 1 Bitcoin to Get Rid of Ransomware”. CCN, March 1. Accessed January 13, 2018. https://www.ccn.com/melrose-police-pay-1-bitcoin-to-get-rid-of-ransomware.
- Dutton, Yvonne, and Jon Bellish. 2014. “Refusing to Negotiate: Analyzing the Legality and Practicality of a Piracy Ransom Ban.” Cornell International Law Journal 47: 299–329.
- European Data Protection Supervisor. 2018. “The History of the General Data Protection Regulation”. EDPS Europe. Accessed February 25, 2018. https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en.
- Falco, Gregory, Arun Viswanathan, Carlos Caldera, and Howard Shrobe. 2018. “A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities.” IEEE Access 6: 48360–48373. doi: 10.1109/ACCESS.2018.2867556.
- Finkle, Jim, and Heather Somerville. 2017. “Regulators to Press Uber after it Admits Covering Up Data Breach”. Reuters. Accessed December 31, 2017. https://www.reuters.com/article/us-uber-cyberattack/regulators-to-press-uber-after-it-admits-covering-up-data-breach-idUSKBN1DL2UQ.
- F-Secure. 2016. “Evaluating the Customer Journey of Crypto-Ransomware and the Paradox Behind it”. Cyentia Institute. Accessed February 26, 2018. https://www.cyentia.com/library-item/evaluating-the-customer-journey-of-crypto-ransomware-and-the-paradox-behind-it/.
- Greenberg, Andy. 2017. “Uber Paid Off Hackers to Hide A 57-Million User Data Breach”. Wired. Accessed December 30, 2017. https://www.wired.com/story/uber-paid-off-hackers-to-hide-a-57-million-user-data-breach/.
- Greenemeier, Larry. 2018. “Urban Bungle: Atlanta Cyber Attack Puts Other Cities on Notice”. Scientific American. Accessed May 5, 2018. https://www.scientificamerican.com/article/urban-bungle-atlanta-cyber-attack-puts-other-cities-on-notice/.
- Hern, Alex. 2017. “NHS Could Have Avoided WannaCry Hack with ‘Basic IT Security’, Says Report”. Guardian, October 27. Accessed December 31, 2017. https://www.theguardian.com/technology/2017/oct/27/nhs-could-have-avoided-wannacry-hack-basic-it-security-national-audit-office.
- IBM. 2016. “IBM Study: Businesses More Likely to Pay Ransomware than Consumers”. IBM. Accessed October 29, 2017. https://www-03.ibm.com/press/us/en/pressrelease/51230.wss.
- INL. 2018. “Control Systems Cyber Security”. Idaho National Laboratory. Accessed February 24, 2018. https://inl.gov/research-programs/control-systems-cyber-security/.
- Jayaswal, Vikas, William Yurcik, and David Doss. 2002. “Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism?” Technology and Society 380–386.
- Klein, Andy. 2017. “Back-up Awareness Survey, Our 10th Year”. Industry Report. Accessed October 31, 2017. https://www.backblaze.com/blog/back-up-awareness-survey/.
- Köszegi, Sabine T., Gregory E. Kersten, and Rudolf Vetschera. 2002. “The Effects of Culture in Anonymous Negotiations: Experiment in Four Countries.” HICSS. Proceedings of the 35th Annual Hawaii International Conference, 418–427.
- Krebs, Brian. 2016. “San Francisco Rail System Hacker Hacked”. Krebs on Security. Accessed October 31, 2017. https://krebsonsecurity.com/2016/11/san-francisco-rail-system-hacker-hacked/.
- Lanceley, Frederick J. 2003. On-Scene Guide for Crisis Negotiators. Boca Raton: CRC Press.
- Lennox-Gentle, Thaine. 2010. “Piracy, Sea Robbery, and Terrorism: Enforcing Laws to Deter Ransom Payments and Hijacking.” Transportation Law Journal 37: 199–217.
- Lynley, Matthew. 2017. “Travis Kalanick Says Uber Has 40 Million Monthly Active Riders”. TechCrunch. Accessed December 30, 2017. https://techcrunch.com/2016/10/19/travis-kalanick-says-uber-has-40-million-monthly-active-riders/?guccounter=1.
- Mansfield-Devine, Steve. 2016. “Ransomware: Taking Businesses Hostage.” Network Security 2016 (10): 8–17. doi:10.1016/S1353-4858(16)30096-4.
- McAfee. 2018. “Security Solutions: Endpoint, Cloud, Network, Antivirus, Malware”. McAfee. Accessed December 31, 2017. https://www.mcafee.com/en-gb/index.html.
- McCallister, Doreen. 2018. “Atlanta Working ‘Around the Clock’ to Fight Off Ransomware Attack.” National Public Radio. Accessed May 5, 2018. https://www.npr.org/sections/thetwo-way/2018/03/27/597208778/atlanta-working-around-the-clock-to-fight-off-ransomware-attack?t=1549373586105.
- Meyer, David. 2017. “Uber Is Already Getting Sued Over Its Gigantic Data Breach”. Fortune. Accessed December 31, 2017. http://fortune.com/2017/11/22/uber-data-breach-lawsuit/.
- Morse, Amyas. 2017. Investigation: WannaCry Cyber Attack and the NHS. London: National Audit Office. Accessed December 31, 2017. https://www.nao.org.uk/report/investigation-wannacry-cyber-attack-and-the-nhs/.
- Mozy. 2018. “Online Backup, Cloud Backup, and Data Backup Solutions”. Mozy. Accessed December 31, 2017. https://mozy.co.uk/#slide-11.
- Nakashima, Ellen, and Philip Rucker. 2017. “U.S. Declares North Korea Carried Out Massive WannaCry Cyberattack”. Washington Post, December 19. Accessed December 31, 2017. https://www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html?noredirect=on&utm_term=.c761406ffdb5.
- Newcomer, Eric. 2017. “Uber Paid Hackers to Delete Stolen Data on 57 Million People”. Bloomberg. Accessed December 30, 2017. https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data.
- Orcutt, Mike. 2017. “Insurance Companies Are Struggling to Make Sense of Cybersecurity Risk”. MIT Technology Review. Accessed February 28, 2018. https://lifeboat.com/blog/2017/04/insurance-companies-are-struggling-to-make-sense-of-cybersecurity-risk.
- Palo Alto Networks. 2018. “Next Generation Security Platforms”. Palo Alto Networks. Accessed October 31, 2017. https://paloaltonetworks.com.
- Rodriguez, Joe. 2016. “Munis Tech Expert Reveals Details of Harrowing Ransomware Attack”. San Francisco Examiner. Accessed October 31, 2017. http://www.sfexaminer.com/munis-tech-expert-reveals-details-harrowing-ransomware-attack/.
- Stouffer, Keith, Joe Falco, and Karen Scarfone. 2011. “Guide to Industrial Control Systems (ICS) Security.” NIST Special Publication 800 (82). doi:10.6028/NIST.SP.800-82r2.
- Susskind, Lawrence. 2014. Good for You, Great for Me: Finding the Trading Zone and Winning at Win-win Negotiation. New York: Public Affairs.
- Vecchi, Gregory M., Vincent B. Van Hasselt, and Stephen J. Romano. 2005. “Crisis (Hostage) Negotiation: Current Strategies and Issues in High-Risk Conflict Resolution.” Aggression and Violent Behavior 10 (5): 533–551. doi:org/10.1016/j.avb.2004.10.001.
- Williams, Clarence. 2017. “Hackers Hit D.C. Police Closed-Circuit Camera Network, City Officials Disclose”. Washington Post, January 27. Accessed March 20, 2017. https://www.washingtonpost.com/local/public-safety/hackers-hit-dc-police-closed-circuit-camera-network-city-officials-disclose/2017/01/27/d285a4a4-e4f5-11e6-ba11-63c4b4fb5a63_story.html?utm_term=.402190c11df6.