IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

PRODUCT RESILIENCE AND ACCOUNTABILITY IN THE ERA OF RANSOMWARE:A RISK-AWARE SOFTWARE PRODUCT MANAGEMENT PERSPECTIVE FOR INDIAN ENTERPRISES

AUTHORS:
Jeyarani Milton
Mentor
Swagatika Samal
Affiliation
John College, Bengaluru, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Ransomware attacks have emerged as a persistent and economically damaging threat to enterprises operating in increasingly digital and interconnected environments. Indian organizations, particularly those relying on software-intensive business processes, face heightened exposure due to rapid digital transformation, cloud adoption, and limited cyber risk awareness. While existing ransomware research largely concentrates on technical detection and prevention mechanisms, relatively little attention has been paid to ransomware as a product-level risk influencing software design decisions, accountability, and long-term resilience.


This study proposes a risk-aware software product management perspective for addressing ransomware threats in Indian enterprises. Using a secondary data-driven approach, the research synthesizes insights from industry reports, national cyber advisories, and documented ransomware incidents to identify key risk drivers and economic consequences. The study introduces a conceptual framework that maps ransomware risks to product management decisions across the software lifecycle, emphasizing resilience, accountability, and cost-sensitive prioritization.


The findings highlight that ransomware resilience is not merely a security feature but a strategic product capability with measurable economic implications. By embedding risk-awareness into product planning and design, software product managers can improve organizational preparedness, justify security investments, and contribute to the stability of India’s digital ecosystem. The study aligns with national objectives of building trustworthy, resilient, and accountable digital products.

Keywords
Article Metrics
Article Views
40
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Milton, J. (2026). Product Resilience and Accountability in the Era of Ransomware:A Risk-Aware Software Product Management Perspective for Indian Enterprises. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.193

Milton, Jeyarani. "Product Resilience and Accountability in the Era of Ransomware:A Risk-Aware Software Product Management Perspective for Indian Enterprises." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.193.

Milton, Jeyarani. "Product Resilience and Accountability in the Era of Ransomware:A Risk-Aware Software Product Management Perspective for Indian Enterprises." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.193.

References
1.Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., & Savage,S. (2013).Measuring the cost of cybercrime. The Economics of Information Security and Privacy, 265–300.

2.European Union Agency for Cybersecurity. (2023).ENISA threat landscape 2023. Publications Office of the European Union.

3.Gordon, L. A., Loeb, M. P., & Zhou, L. (2016).The impact of information security breaches: Has there been a downward shift in costs? Journal of Computer Security, 24(1), 1–26.

4.IBM Security. (2023).Cost of a data breach report 2023. IBM Corporation.

5.Verizon. (2023).Data breach investigations report. Verizon Enterprise.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
The Political Economy of Human Trafficking: Slavery and Early Modern Capitalism
string(21) "Yamin Mohammad Munshi" Munshi, Y. M.
(2026)
DOI: 10.55041/ijsmt.v2i3.055
An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic
string(10) "Jeevaa S R" R, J. S.
(2026)
DOI: 10.55041/ijsmt.v2i3.053
A Comparative Study on Water Quality Dynamics in Saharanpur District with Reference to Monsoon Fluctuations
string(11) "Priya Patel" Patel, P.
(2026)
DOI: 10.55041/ijsmt.v2i3.129
Scroll to Top