Fig. 13From: Ransomware deployment methods and analysis: views from a predictive model and human responsesRecovery after ransomware incidentBack to article page