Fig. 2From: Ransomware deployment methods and analysis: views from a predictive model and human responsesPredictive model of ransomware deployment methodsBack to article page