Fig. 3From: Ransomware deployment methods and analysis: views from a predictive model and human responsesPotential links between stages at lower and higher levelsBack to article page