**Author details**

Andrew C. Miller1,2\*, Abbas M. Khan2 and Sophia Ziad3

1 Department of Emergency Medicine, East Carolina University Brody School of Medicine, Greenville, NC, USA

2 The MORZAK Collaborative, Columbia, MD, USA

3 Department of Mathematics and Statistics, University of Maryland Baltimore County, Baltimore, MD, USA

\*Address all correspondence to: Taqwa1@gmail.com

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**79**

*Ransomware and Academic International Medicine DOI: http://dx.doi.org/10.5772/intechopen.91762*

> [9] Krisby RM. Health care held ransom: Modifications to data breach security and the future of health care privacy protection. Health Matrix.

> [10] Pope J. Ransomware: Minimizing the risks. Innovations in Clinical Neuroscience. 2016;**13**(11-12):37-40

Ransomware: Evolution, mitigation and prevention. International Journal of Management Reviews. 2017;**13**(1):10-21

[11] Richardson R, North MM.

[12] Branch LE, Eller WS, Bias TK, et al. Trends in malware attacks against United States healthcare organizations, 2016-2017. Global Biosecurity. 2019;**1**:15.

DOI: 10.31646/gbio.7

[13] Kelpsas B, Nelson A. Ransomware in hospitals: What providers will inevitably face when attacked. The Journal of Medical Practice Management. 2016;**32**:67-70

[14] Hull G, John H, Arief B. Ransomware deployment methods and analysis: Views from a predictive model and human responses. Crime Science. 2019;**8**:1-22. DOI: 10.1186/

[15] Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from Ransomware attacks. Applied Clinical Informatics. 2016;**7**(2):624-632. DOI: 10.4338/

[16] Federal Bureau of Investigation, U.S. Department of Justice. Cyber Crime [Internet]. 2019 Available from: https://www.fbi.gov/investigate/cyber/

[17] Harley D. Ransomware: To Pay or Not to Pay? WeLiveSecurity [Internet]. 2016. Available from: https://www. welivesecurity.com/2016/08/22/

[Accessed: 17 November 2019]

s40163-019-0097-9

ACI-2016-04-SOA-0064

2018;**28**:365-401

[1] Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care. 2017;**25**(1):1-10. DOI:

[2] Chernyshev M, Zeadally S, Baig Z. Healthcare data breaches: Implications for digital forensic readiness. Journal of Medical Systems. 2018;**43**(1):7. DOI:

[3] Coventry L, Branley D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018;**113**:48-52. DOI: 10.1016/j.maturitas.2018.04.008

[4] Spence N, Bhardwaj N, Paul DP, Coustasse A. Ransomware in healthcare facilities: A harbinger of the future? Perspectives in Health Information Management. 2018:**15**(Summer):1-22

[5] Cook S. 2017-2019 Ransomware statistics and facts. Comparitech [Internet]. 2019. Available from: https:// www.comparitech.com/antivirus/ ransomware-statistics/ [Accessed:

[6] Sussman B. Ransomware: Hackers Are Raising Their Prices. SecureWorld [Internet]. 2019. Available from: https:// www.secureworldexpo.com/industrynews/ransomware-hackers-raisingprices [Accessed: 25 November 2019]

18 November 2017]

[7] Ghafur S, Kristensen S,

[8] Slayton TB. Ransomware: The virus attacking the healthcare industry. The Journal of Legal Medicine. 2018;**38**:287-311. DOI: 10.1080/01947648.2018.1473186

s41746-019-0161-6

Honeyford K, et al. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine. 2019;**2**:98. DOI: 10.1038/

**References**

10.3233/THC-161263

10.1007/s10916-018-1123-2

*Ransomware and Academic International Medicine DOI: http://dx.doi.org/10.5772/intechopen.91762*
